Next Article in Journal
Reduced Models of Point Vortex Systems
Previous Article in Journal
Magnetic Contribution to the Seebeck Effect
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A New Efficient Digital Image Encryption Based on Inverse Left Almost Semi Group and Lorenz Chaotic System

1
Department of Mathematics, Quaid-i-Azam University, Islamabad 44000, Pakistan
2
Department of Applied Mathematics and Statistics, Institute of Space Technology Islamabad, Islamabad 44000, Pakistan
3
Cyber and Information Security Lab, Institute of Space Technology Islamabad, Islamabad 44000, Pakistan
*
Author to whom correspondence should be addressed.
Entropy 2018, 20(12), 913; https://doi.org/10.3390/e20120913
Submission received: 12 October 2018 / Revised: 6 November 2018 / Accepted: 7 November 2018 / Published: 30 November 2018

Abstract

:
In this research article, we propose a new structure namely inverse left almost semigroup (LA-semigroup) by adding confusion in our proposed image encryption scheme along with discrete and continuous chaotic systems in order to complement the diffusion characteristics. The performance analysis was conducted in terms of the correlation analysis, the pixels uniformity analysis, the sensitivity analysis, the information entropy analysis, and pixels difference based measurements. The results show that the proposed algorithm has better information security properties, which can provide strong security and a high performance.

1. Introduction

The existing world demands fast and secure communication. The bandwidth is increasing every day due to third generation, fourth generation and fifth generation technologies. Digital contents can be easily accessed through any geographical remote area because of the ideology of a global village. By advancing the technologies, smart and simple to access information from any remote station creates a massive insecurity of digital information. The security of digital multimedia is one of the vital problems of the information sciences. The widespread broadcasting and distribution of digital information over the internet, especially social media like Facebook and Twitter, have made it important to protect our most important information from theft, illegal copying, handling and sharing. The advancement of digital media technology and other multimedia related technology has made it possible to perform some standard procedures in order to improve the security of our digital images/audio/videos from being utilized criminally over the web.
There are a number of information security techniques that have been designed whose algorithms are based on cryptography, which is one of the most important branch of cryptology that is used to make an encryption scheme to secure information. Classical encryption techniques usually utilize either substitution or permutation to develop a cryptosystem; for instance, mono-alphabetical and polyalphabetic ciphers. The use of only substitution or permutation while developing any encryption scheme is susceptible to different cryptographic attacks. Consequently, the cryptosystems are getting weaker every day due to the advancement of technologies and computational powers of machines. In 1949, Claude Shannon gave the idea of confusion and diffusion, which completely changed the security mechanisms of the digital world. The information theory added a new pillar in information security. After the theory of Claude Shannon, the idea of confusion and diffusion was extensively used, which means substitution and permutation were utilized at a time in modern block ciphers [1,2]. According to Shannon, confusion specifies the connections between the cipher text and the key as much as complex whereas diffusion corresponds to the redundancy in the statistical data of the plaintext used in the statistical data of the cipher text. This master idea fundamentally changed the ideology of modern block and steam ciphers. The ideas of confusion and diffusion were utilized in a number of modern block ciphers namely international data encryption standard (IDEA), data encryption standard (DES), and advanced encryption standard (AES).
Thereafter, different new techniques were designed which use chaos theory, wavelets transform, discrete transforms, optics, DNA sequences and quantum spinning and rotations [3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34]. In recent times, chaos theory has been used in an extensive way for the development of image encryption mechanisms [35,36]. The three fundamental characteristics of chaos that have made it possible to use it in the development of encryption algorithms are sensitive to the initial condition, topological mixing, and dense periodic orbits. These three properties were closely related to cryptography. Due to the cryptographically robust characteristics of chaos, we have utilized the Lorenz chaotic system while designing our novel image encryption technique.
So far, different types of mathematical structures were utilized namely Group, Ring, Galois field and Galois ring for the construction of a substitution box (S-box), which is one of the most important nonlinear components of any modern block ciphers. The thrust of new mathematical structures for the development of encryption techniques is one of the most important areas of research in information security [8,11,12,15]. An algebraic structure equipped with a closed and left invertive binary operation is called a left almost semigroup (abbreviated as LA-semigroup). This notion was made known by Kazim and Naseeruddin in the early 1970s [37]. Mushtaq and Yusuf discussed some important properties in [38]. Such groupoids are also called right modular groupoids or left invertive groupoids or incorrectly as Abel Grassmann’s groupoid [39,40,41]. By successive applications of the left invertive law in an arbitrary LA-semigroup, it can be seen that the medial identity ( s t ) ( u v ) = ( s u ) ( t v ) naturally holds in an LA-semigroup. It is important to mention here that every LA-semigroup is always medial but its converse is not true. It is a non-associative and non-commutative structure midway between a groupoid and commutative semigroup.
In order to define the associative powers of elements in an LA-semigroup the identity (ss)s = s(ss) was introduced in Reference [42]. An LA-semigroup with this additional property is called a locally associative LA-semigroup. Some important decompositions of locally associative LA-semigroups were also investigated in References [42,43]. Consider a locally associative LA-semigroup defined by the Table 1.
Where 0 ( 0 ( 0 0 ) ) = 2 1 = ( 0 ( 0 0 ) ) 0 , substantiates that a locally associative LA-semigroup not need to have associative powers necessarily.
The LA-semigroups, after the 1970 s , evolved from the study of a diverse generalization of groups and semigroups. It has become a separate branch within itself with a considerable number of research results. The reason for its procession is its natural existence in almost all mathematical contexts in which groups and semigroups have been developed.
The study of LA-semigroups has wide applications in the locally associative LA-semigroups, abelian groups, the theory of fuzzy LA-semigroups, ternary semihypergroups, Γ -semihypergroups, neutrosophic LA-semigroups, soft sets and the theory of non-commutative groupoids [42,43,44,45,46,47,48,49]. Here, we propose a new scheme for the encryption of images based on an inverse LA-semigroup and a modified nonlinear chaotic map, which has better confusion and diffusion characteristics that are necessary for a modern substitution-permutation network.
This article comprises of five sections. In Section 2, we introduce fundamentals of a novel structure inverse LA-semigroups. In Section 3, we propose an algorithm for the encryption of images. The efficiency and safety measures for the suggested algorithm are examined in Section 4. The numerical measures are also discussed in Section 4 to examine the response of suggested scheme against differential attacks. Finally, give conclusions in the Section 5.

2. Preliminaries

This section is primarily related to some standard definitions, which will be quite useful in subsequent sections.
Definition 1.
An LA-semigroup is a pair ( L , ) where A   is a non-empty set; : L   ×   L L satisfies ( a b ) c = ( c b ) a for all a , b , c L . One can easily observe that the medial identity ( a b ) ( c d ) = ( a c ) ( b d ) naturally holds in the LA-semigroups. It is important to mention here that every LA-semigroup is always medial but its converse is not true.
Definition 2.
An LA-semigroup ( L , ) satisfying the left permutable law a ( b c ) = b ( a c ) is called LA**-semigroup. An LA-semigroup with left identity is always LA**-semigroup and LA**-semigroup naturally satisfies the paramedial identity ( a b ) ( c d ) = ( d b ) ( c a ) .
We provide counter examples of three groupoids of order 5 in Table 2, where (i) is a medial groupoid but not an LA-semigroup, (ii) is a left permutable groupoid, which is also paramedial but not an LA-semigroup, (iii) is a left permutable groupoid with left identity but not an LA-semigroup (see Table 2).
Definition 3.
An LA-semigroup ( L , ) equiped with left identity e , that is, e a = a for all a L is LA-monoid. One can notice that left permutable law and paramedial law always hold in an LA-monoid L . We also investigate a paramedial groupoid with a left identity is LA**-semigroup. An element a L for which there exist an element a 1 L such that a 1 a = e , then a 1 is called left inverse of a . Right inverse for an element in an LA-monoid can also be defined analogously. It is easy to observe that if a 1 L is the left inverse for an element a A , that is, a 1 a = e . Then a a 1 = ( e a ) a 1 = ( a 1 a ) e = e e = e . Then a = e a = ( a 1 a ) a = ( a a ) a 1 = e a 1 = a 1 . Showing that left and right inverses are unique in an LA-monoid. An LA-monoid, in which each element has its left inverse element is known as LA-group.
Definition 4.
An LA-semigroup ( L , ) satisfying the weak associative law ( a b ) c = b ( a c ) is called LA*-semigroup. The identities ( a b ) c = b ( a c )   a n d   ( a b ) c = b ( c a ) are equivalent in an LA-semigroup L .
Definition 5.
LA-group is an LA-monoid in which each element has a unique left multiplicative inverse. LA-monoids are special cases of LA-semigroups whereas LA-groups are special cases of LA-monoid.
Definition 6.
An LA-semigroup L is unipotent if a a = b b for all a , b L . We define a transformation O ( L ) :   L L by O L ( a ) = a a for all a L .
Proposition 1.
An LA-semigroup L is unipotent if and only if k e r ( O L ) = L   ×   L , where k e r ( O L ) = { ( a , b ) L   ×   L : O L ( a ) = O L ( b ) } .
Lemma 1.
Every unipotent left cancellative LA-semigroup is paramedial.
Let ( L , ) and ( L , ) be any two LA-semigroups of the same order. A mapping φ : ( L , ) ( L , ) is a homomorphism if it preserves the multiplication, that is, ( a b ) φ = ( a ) φ ( b ) φ and an anti-homomorphism if it reverts the multiplication that is, ( a b ) φ = ( b ) φ ( a ) φ . If such mapping is bijective, then it is known as isomorphism and anti-isomorphism respectively. If such a bijection exists, then the groupoids are isomorphic and anti-isomorphic respectively.
For instance, if two LA-semigroups have isomorphic tables, they have the same structural properties. So we say that an isomorphism is an action between two multiplication tables. If we are provided with a permutation φ of the elements of A , we transform the table by permuting the rows according to φ , then each column, and permuting the values at the end. An anti-isomorphism is an action followed by transposing the resulting table of an isomorphism. The outcome of applying the permutation ( b , d ) is given in Table 3 (ii). Table 3 (i) and Table 3 (ii) are isomorphic. If A has n elements then atmost multiplication tables isomorphic to given LA-semigroup.
Theorem 1.
Let L be an LA-semigroup satisfying paramedical law. Then, one has
(i)
O L is an anti-endomorphism.
(ii)
O L ( L ) is sub LA-semigroup of L .
(iii)
k e r ( O L ) is a congruence relation.
Definition 7.
An LA-semigroup L , in which for every u L there exists a unique v L for which ( u v ) u = u and ( v u ) v = v is called an inverse LA-semigroup. This notion was made known by Mushtaq and Iqbal in Reference [9]. They proved some interesting facts and a famous Wagner Preston theorem on the representation of inverse LA-semigroups [9]. An inverse LA*-semigroup and inverse LA**-semigroup are defined analogously. Some interesting results are that every LA-group is an inverse LA-semigroup more precisely an inverse LA**-semigroup but the converse is not true [10]. Presentation of a semigroup is a set of generators and relations which completely depicts a particular semigroup of a finite or an infinite semigroup. Ruskuc worked on semigroup presentations in his PhD thesis [11]. Here, we find that Π = a | a 257 = a = a a 128 , a m a 256 m = a 256 ; 1 m 256 > represents an inverse LA**-semigroup of order 256 generated by a . Here, by an S-box of order 16 , we mean a latin square of size 16   ×   16 whose entries are selected from a set of 256 different symbols in such a way that there is no repetition in any row and column of the table.

3. Proposed Digital Image Encryption Algorithm

The present section deals with the encryption procedure.

3.1. Image Encryption

Designed image encryption techniques comprise of confusion and diffusion. As illustrated in Figure 1, the encryption method is based on the steps given below:
Step 1: Take a standard digital color image of size m   ×   n .
Step 2: Read the inverse left almost LA-semigroup of order m ×   n .
Step 3: Apply a substitution transformation by using the LA-semigroup as listed in Step 2, which adds confusion to the proposed algorithm.
Step 4: Generate chaotic sequences using Lorenz chaotic differential equations with a logistic map (seed values for each iteration comes from the Lorenz chaotic differential equation utilized three chaotic logistic maps used seeds from x, y and z directions solutions of Lorenz chaotic differential equations).
Step 5: Apply a bitwise addition under modulo 2, of confused image produced in Step 3 with the chaotic sequences generated in Step 4 for each layer of the digital image that uses x component values for the red layer, y component values from the green layer and z component values of the logistic map for the blue layer of a given image.
Step 6: Apply all of the above steps on each layer of the digital image.
Step 7: Display the encrypted image.

3.2. Image Decryption

This method is used as a reverse process of our encryption procedure. The encrypted images through our proposed algorithm can be seen in Figure 2, Figure 3 and Figure 4 respectively.

4. Security Analysis of the Proposed Algorithm

Here, we apply some statistical measures on the typical digital contents to examine the safety during execution of the proposed encryption scheme. These measurements are strictly based on a precise evaluation, a realistic inspection and an inconsistency criterion for the encryption of images.

4.1. Uniformity Analysis of Image Pixels

A histogram of an image provides information about the circulation of the pixel intensity esteems for an image. A protected framework in encryption can have an identical histogram to resist statistical assaults. The histograms in Figure 5, Figure 6 and Figure 7 represent the standard and encrypted images of Lena, Baboon, and Peppers. From Figure 5, Figure 6 and Figure 7, we analyzed that the histograms of the standard images are not uniform, whereas the histograms of the encrypted digital images are uniform. The uniformity of pixel heights in the histograms of the encrypted images creates difficulty for attackers to find the clue for the maximum information region.

4.2 Correlation Analysis for Adjacent Pixels

The purpose of the correlation analysis was to examine the connections of neighboring pixels in the original and encrypted images. Mathematically, the correlation coefficients r X , Y of two neighboring pixels is defined as:
r X , Y = C o v ( X , Y ) V a r ( X ) V a r ( Y ) ,
where X and Y are the estimations of two neighboring pixels of gray scale image, Var(X) and Var(Y) are deviations of X and Y individually and Cov(X,Y) represents the covariance. The correlation coefficients of the plain and encrypted digital images have a distinctive substance displayed in Table 4, Table 5, Table 6 and Table 7 identified by the plain and enciphered digital images are provided in Figure 8, Figure 9 and Figure 10. In addition, Table 4 contains the quantified evaluation of the correlation coefficient demonstrating the diffusion of the unique and encoded images horizontally, vertically and diagonally. Presently, we consider 2000 pairs of randomly selected neighboring pixels to look over the original and the enciphered images horizontally, vertically and diagonally. In Table 4, the correlation coefficients for the green, blue and red parts of the encrypted images are quite small, which implies an irrelevant correlation between adjoining pixels.
In addition, high correlation coefficients for the red, green and blue parts of the original images make data spillage conceivable. Table 6 provides us with similar position correlations for the red, green and blue parts, while Table 7 gives the adjoining position correlations for the red, green and blue parts. From Table 6 and Table 7, we analyze that the correlation coefficients of the encrypted digital images for the red, green and blue parts are all lower than −0.002, while the greatest correlation coefficient for the original images is 0.9652 in the event of the Lena image, 0.8310 for the Baboon and 0.9444 for the Peppers image, which indicates that the correlations for the red, green and blue parts of the encrypted images are adequately diminished. Therefore, our encryption scheme is highly defensive against statistical attacks.
In addition, we plotted the correlation coefficients for the red, green and blue parts of the original images in Figure 8a–d, Figure 9a–d and Figure 10a–d and the encrypted images Figure 8e–h, Figure 9e–h and Figure 10e–h toward every directions, as delineated in Figure 8, Figure 9 and Figure 10. The solid correlation between adjoining pixels of the plain images is apparent as the specks are congregated along the slanting in Figure 8a–d, Figure 9a–d and Figure 10a–d. Nonetheless, the specks are scattered over the whole plane in Figure 8a–d, Figure 9a–d and Figure 10a–d, which shows that the correlation is incredibly diminished in the encrypted digital images.

4.3. Pixel Modification Based Measurements

The quality of an image depends upon the pixel difference which is calculated by means the mean square error (MSE), average difference (AD), maximum difference (MD), normalized absolute error (NAE), normalized cross correlation (NCC), structure content (SC) and peak signal to noise ratio) values (PSNR). These metrics are used for the comparison of unlike images.

4.3.1. Mean Square Error (MSE)

An encrypted image should not be equivalent to the original digital image due to the application of the encryption scheme over the plain image, which surely adds some noise to the actual digital content. We find MSE of the plain and encrypted images to analyze the level of enciphering. Mathematically, MSE is defined as:
M S E = j = 1 m k = 1 n ( P j k C j k ) 2 m   ×   n
where P i j and C i j are the pixels positioned in the j-th row and k-th column of the plain and enciphered images respectively. A larger value of the MSE enhances the security of the encryption scheme.

4.3.2. Peak Signal to Noise Ratio (PSNR)

Mathematically, PSNR is defined as:
PSNR = 20 log 10 [ I M A X M S E ] ,
where I M A X is the maximum value of pixel which can occur. The low value of PSNR shows the more difference of the original and enciphered images. In Table 8, we discuss values MSE and PSNR to ensure the versatility of the suggested scheme.

4.3.3. Normalized Absolute Error (NAE)

Mathematically, normalized absolute error (abbreviated as NAE) is defined as:
N A E = j = 1 m k = 1 n | P j k C j k | j = 1 m k = 1 n | C j k | .
It is the proportion of the encrypted digital content to the original image. A bigger estimation of NAE demonstrates the great nature of coming about the scrambled image after the encryption process.

4.3.4. Maximum Difference (MD)

Mathematically, the maximum difference is defined as:
M D = M a x | P j k C j k | ,
where
j = 1 , 2 , , m ,   k = 1 , 2 , , n .
It measures the maximum of the error signal. A higher value of the maximum difference indicates that the quality of the encryption scheme is better.

4.3.5. Average Difference (AD)

The average difference measures the pixel contrast between the original image and its corresponding enciphered image. This quantitative measure is only utilized in object revealing and pattern recognition applications and it can likewise be pertinent to any image preparing applications where we locate the normal distinction between two digital contents. A larger estimation of the AD indicates the great quality of the digital image encryption (see Table 9). Mathematically, the average difference is defined as:
A D = j = 1 m K = 1 n ( P j k C j k ) m   ×   n .
The value of AD is ideally zero for two same digital images.

4.4. Similarities Measures

The likenesses between two signals can be estimated through a cross-correlation, structure similarity, and structure content. These are the standard devices for assessing how much two signs are comparable or divergent. It is a basic way to match two image patches, for highlight recognition and in addition a part of more refined systems. The method has a few favorable circumstances. We have used a standardized correlation and structure content with the end goal to demonstrate the dissimilarities among the original and scrambled images.

4.4.1. Normalized Cross Correlation (NCC)

A normalized cross-correlation (NCC) has been normally utilized as a metric to assess the level of likeness (or difference) between two digital images. The normalized cross-correlation is limited in the range between −1 and 1. The setting of the location edge esteem is significantly less difficult than the cross-correlation. The NCC measures the cozy connection between two images, it might be plain and enciphered digital images. All of the correlation-based measures are considered as 1, as the distinction between the two images is considered as zero. In each image, the similitude estimation is done dependent on the direct splendor and complexity varieties of utilizing cross-correlation. Mathematically, normalized cross-correlation is defined as:
N C C = j = 1 m k = 1 n P j k   ×   C j k k = 1 n ( P j k ) 2
where m × n is the size of both plain image P and cipher image C. The estimation of NCC for encryption varies from or not near unity, which unmistakably means that the proposed scheme includes solid dissimilarities among the pixels of plain and scrambled images (see Table 9).

4.4.2. Structural Content (SC)

This measure viably thinks about the aggregate weight of an original signal to that of a coded or given. It is, hence, a worldwide metric. This measure is likewise called as structural content (SC), and in the event that it is spread at 1, at that point the changed over image is of better quality and a huge estimation of SC implies that the image is of low quality. Mathematically, structural content is defined as:
S C = j = 1 M k = 1 N ( P ( j , k ) ) 2 j = 1 M k = 1 N ( C ( j , k ) ) 2   .
On account of the plain and encoded images, the estimation of SC is not close to unity because the encryption scheme includes confusion and diffusion-like noise and commotion in the original image. The estimation of SC isn’t near one if there should be an occurrence of all advanced standard shading images (red, green and blue layers) (see Table 9).

4.5. Entropy Investigation

Entropy is evaluated to analyze the spreading of the gray scale estimations of the images. The coarser the image is, the bigger the entropy is. For an irregular image with 256 gray levels, the entropy ought to, in a perfect world, be 8 [9]. On the off chance that the entropy of the encrypted image is under 8, there is a probability of consistency, and this is a risk to the anticipated security. Mathematically, we can represent the entropy H for a data source y is characterized as:
H = i = 0 2 N 1 p ( y i ) log 2 p ( y i ) ,
where 2 N are all possible states of information and yi is the source images. For a completely sporadic source exuding signs, entropy should be N. In Table 10, the entropies of different plain and enciphered image entropies are given as demonstrated by the plain images in Figure 2, Figure 3 and Figure 4. These values are very close to the theoretical value which is 8. Consequently, information spillage in our encryption is negligible and well secured for physical attacks. We have looked at data entropy for our proposed encryption method with the already developed encryption plans. Table 11 shows that the entropy of the offered scheme for the scrambled images are better than the already available algorithms.
In Table 11 and Table 12, we compare the entropy of the proposed algorithm to the already defined algorithms. Our entropies are approximately equal to 8, which is the most suitable value. This minimizes the chance of data spillage during the encryption. Consequently, the proposed image cryptosystem is secure against an entropy assault. In addition, the entropy estimations of the introduced scheme are better than the encryption schemes [3,4,5,6].

4.6. Robustness against Differential Attack

Diffusion is a basic parameter to examine the randomness in the encryption scheme. It is an important measurement in the proposed digital image encryption algorithm because it reflects even a minor change in the plain image [4,5]. By and large, the enemy may roll out by a slight improvement. For instance, by altering a single pixel of the original image and after that observe the difference in the outcome. Along these lines, we may discover a significant connection of the original and encrypted image. Since a little change in the original image can create a critical change in the encrypted image. Thus, differential attacks would be exceptionally wasteful and for all intents and purposes futile. On the off chance that an encryption scheme has a decent trademark, the connection between the original image and the encrypted image is extremely complex and it cannot be expected easily. We can measure the diffusion of an encryption scheme by changing a pixel in the original image [6]. To measure the effect of a one-pixel change in the original image and encrypted image, we used three estimations MAE, NPCR and UACI to examine security in the encrypted image against differential attacks. Suppose C 1 and C 2 are encrypted images before and after one pixel change in the plain image respectively. Then the MAE, NPCR and UACI are defined as:
M A E = j , k | C 1 ( j ,   k ) C 2 ( j ,   k ) | m   ×   n
N P C R = j , k D ( j , k ) W   ×   H   ×   100 %
where
D ( j , k ) = { 0 C 1 ( j ,   k ) = C 2 ( j ,   k ) 1 C 1 ( j ,   k ) C 2 ( j ,   k )
C 1 ( i , j ) ,   C 2 ( i , j ) represent the value of pixel at grid ( i , j ) and D(i, j) is a bipolar array at grid ( i , j ) .
U A C I = 1 W   ×   H j = 1 m k = 1 n | C 1 ( j ,   k ) C 2 ( j ,   k ) 255 |   ×   100 % .
In Table 13 and Table 14, we have MAE (> 75), (NPCR (> 99%) and UACI (≈ 33%) for the red, green and blue part of the encrypted standard images. These values of MAE, NPCR and UACI are very close to the best-approximated values already available in the literature. Hence, the suggested encryption algorithm can create more difficulty for differential attackers.
A comparison of the differential analysis with some of the already existing results is listed in Table 15 and Table 16 respectively.
We have also calculated the pixels difference base and similarities measurements between the original encrypted image C 1 and the one bit change encrypted image C 2 . The mathematical expressions for the pixels difference and similarity measures for C 1 and C 2 are given below:
M S E = j = 1 m K = 1 n ( C 1 ( j ,   k ) C 2 ( j ,   k ) ) 2 m   ×   n
P S N R = 20 log 10 [ I m a x j = 1 m K = 1 n ( C 1 ( j ,   k ) C 2 ( j ,   k ) ) 2 m   ×   n ]
N A E = j = 1 m K = 1 n | C 1 ( j ,   k ) C 2 ( j ,   k ) | j = 1 m K = 1 n | C 1 ( j ,   k ) |
M D = M a x | C 1 ( j ,   k ) C 2 ( j ,   k ) | ,
where
j = 1 , 2 , , m ,   k = 1 , 2 , , n
A D = j = 1 m K = 1 n ( C 1 ( j ,   k ) C 2 ( j ,   k ) ) m   ×   n
N C C = j = 1 m k = 1 n C 1 ( j ,   k )   ×   C 2 ( j ,   k ) k = 1 n ( C 1 ( j , k ) ) 2
S C = j = 1 m k = 1 n ( C 1 ( j , k ) ) 2 j = 1 m k = 1 n ( C 2 ( j , k ) ) 2 .
The analyses of the pixel difference and similarity measures are shown in Table 17. This shows that a slight difference in the neighboring pixels creates an avalanche effect, which is one of the basic requirements while designing any image encryption technique. The numerical values of MSE, PSNR, NCC, NAE AD, SC and MD for original encrypted image C 1 and the one bit change encrypted image C 2 clearly reflect that our proposed algorithm is resistive against differential attacks.

5. Conclusions

The present research article provides a new idea for the construction of an image encryption technique. A completely new inverse LA-semi group was investigating and applied for substitution, which is one of the most important components in symmetric encryption. This new mechanism added confusion, which is fundamentally responsible for breaking the pattern between the original and encrypted information. Moreover, we have utilized chaotic continuous systems in order to add diffusion into our proposed image encryption scheme. The proposed idea adds a new milestone for oncoming researchers.

Author Contributions

The major part of this article has been taken from the Ph.D. thesis of I.Y. who designed the method and mathematical structure of inverse LA-semigroup. M.K. performed the experiments and made helpful suggestions to improve the paper. Both authors read and approved the final version of the article.

Funding

We have not received any external funding for the research and publication of this article.

Acknowledgments

The authors are very grateful to vice chancellor Sayed Wilayat Hussain, Institute for Space Technology, Islamabad 44000 Pakistan for providing a decent research environment.

Conflicts of Interest

We have no conflict of interest for the publication of this article.

References

  1. Xie, E.Y.; Li, C.; Yu, S.; Lü, J. On the cryptanalysis of Fridrich’s chaotic image encryption scheme. Signal Process. 2017, 132, 150–154. [Google Scholar] [CrossRef]
  2. Li, C.; Lin, D.; Lü, J. Cryptanalyzing an Image-Scrambling Encryption Algorithm of Pixel Bits. IEEE MultiMedia 2017, 24, 64–71. [Google Scholar] [CrossRef] [Green Version]
  3. Rhouma, R.; Meherzi, S.; Belghith, S. OCML-based colour image encryption. Chaos Soliton. Fractals 2009, 40, 309–318. [Google Scholar] [CrossRef]
  4. Liu, H.; Wang, X. Color image encryption using spatial bit level permutation and high-dimension chaotic system. Opt. Commun. 2011, 284, 3895–3903. [Google Scholar] [CrossRef]
  5. Liu, H.; Wang, X.; Kadir, A. Color image encryption using Choquet fuzzy integral and hyper chaotic system. Optik 2013, 124, 3527–3533. [Google Scholar] [CrossRef]
  6. Kadir, A.; Hamdulla, A.; Guo, W. Color image encryption using skew tent map and hyper chaotic system of 6th-order CNN. Optik 2014, 125, 1671–1675. [Google Scholar] [CrossRef]
  7. Waseem, H.M.; Khan, M. Information Confidentiality Using Quantum Spinning, Rotation and Finite State Machine. Int. J. Theor. Phys. 2018, 57, 3584–3594. [Google Scholar] [CrossRef]
  8. Khan, M.; Shah, T.; Batool, S.I. A new approach for image encryption and watermarking based on substitution box over the classes of chain rings. Multimed. Tools Appl. November 2017, 76, 24027–24062. [Google Scholar] [CrossRef]
  9. Belazi, A.; Khan, M.; El-Latif, A.A.A.; Belghith, S. Efficient cryptosystem approaches: S-boxes and permutation substitution-based encryption. Nonlinear Dyn. 2017, 87, 337–361. [Google Scholar] [CrossRef]
  10. Khan, M.; Asghar, Z. A novel construction of substitution box for image encryption applications with Gingerbreadman chaotic map and S8 permutation. Neural Comput. Appl. 2018, 29, 993–999. [Google Scholar] [CrossRef]
  11. Khan, M.; Shah, T. Construction and applications of chaotic S-boxes in image encryption. Neural Comput. Appl. 2016, 27, 677–685. [Google Scholar] [CrossRef]
  12. Khan, M.; Shah, T. An efficient construction of substitution box with fractional chaotic system. Signal Image Video Process. 2015, 9, 1335–1338. [Google Scholar] [CrossRef]
  13. Khan, M.; Shah, T. An efficient chaotic image encryption scheme. Neural Comput. Appl. 2015, 26, 1137–1148. [Google Scholar] [CrossRef]
  14. Khan, M.; Shah, T. A novel construction of substitution box with Zaslavskii chaotic map and symmetric group. J. Intell. Fuzzy Syst. 2015, 28, 1509–1517. [Google Scholar]
  15. Huang, C.K.; Nien, H.H. Multi chaotic systems based pixel shuffle for image encryption. Opt. Commun. 2009, 282, 2123–2127. [Google Scholar] [CrossRef]
  16. Mondal, B.; Kumar, P.; Singh, S. A chaotic permutation and diffusion based image encryption algorithm for secure communications. Multimed. Tools Appl. 2018, 77, 31177–31198. [Google Scholar] [CrossRef]
  17. Enayatifar, R.; Abdullah, A.H.; Isnin, I.F. Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence. Opt. Lasers Eng. 2014, 56, 83–93. [Google Scholar] [CrossRef]
  18. Zhen, P.; Zhao, G.; Min, L.; Jin, X. Chaos-based image encryption scheme combining DNA coding and entropy. Multimed. Tools Appl. 2016, 75, 6303–6319. [Google Scholar] [CrossRef]
  19. Khan, M. A novel image encryption scheme based on multiple chaotic S-boxes. Nonlinear Dyn. 2015, 82, 527–533. [Google Scholar] [CrossRef]
  20. Yang, B.; Liao, X. A new color image encryption scheme based on logistic map over the finite field ZN. Multimed. Tools Appl. 2018, 77, 21803–21821. [Google Scholar] [CrossRef]
  21. Enayatifar, R.; Abdullah, A.H.; Isnin, I.F.; Altameem, A.; Lee, M. Image encryption using a synchronous permutation-diffusion technique. Opt. Lasers Eng. 2017, 90, 146–154. [Google Scholar] [CrossRef]
  22. Hamza, R.; Titouna, F. A novel sensitive image encryption algorithm based on the Zaslavsky chaotic map. Inf. Secur. J. Glob. Perspect. 2016, 25, 162–179. [Google Scholar] [CrossRef]
  23. Tong, X.J.; Zhang, M.; Wang, Z.; Ma, J. A joint color image encryption and compression scheme based on hyperchaotic system. Nonlinear Dyn. 2016, 84, 2333–2356. [Google Scholar] [CrossRef]
  24. Zhang, Y.S.; Xiao, D. Self-adaptive permutation and combined global diffusion for chaotic color image encryption. AEU Int. J. Electron. Commun. 2014, 68, 361–368. [Google Scholar] [CrossRef]
  25. Wang, X.; Teng, L.; Qin, X. A novel colour image encryption algorithm based on chaos. Signal Process. 2012, 92, 1101–1108. [Google Scholar] [CrossRef]
  26. Linhua, Z.; Liao, X.; Wang, X. An image encryption approach based on chaotic maps. Chaos Solitons Fractals 2005, 24, 759–765. [Google Scholar]
  27. Zhou, Q.; Wong, K.; Liao, X.; Xiang, T.; Hu, Y. Parallel image encryption algorithm based on discretized chaotic map. Chaos Solitons Fractals 2008, 38, 1081–1092. [Google Scholar] [CrossRef]
  28. Gao, H.; Zhang, Y.; Liang, S.; Li, D. A new chaotic algorithm for image encryption. Chaos Solitons Fractals 2006, 29, 393–399. [Google Scholar] [CrossRef]
  29. Mao, Y.; Chen, G.; Lian, S. A novel fast image encryption scheme based on 3D chaotic bakermaps. Int. J. Bifurc. Chaos 2004, 14, 3613–3624. [Google Scholar] [CrossRef]
  30. Etemadi Borujeni, S.; Eshghi, M. Chaotic image encryption design using tompkins-paige algorithm. Math. Prob. Eng. 2009, 2009. [Google Scholar] [CrossRef]
  31. Zhang, G.; Liu, Q. A novel image encryption method based on total shuffling scheme. Opt. Commun. 2011, 284, 2775–2780. [Google Scholar] [CrossRef]
  32. Wu, X.; Wang, K.; Wang, X.; Kan, H. Lossless chaotic color image cryptosystem based on DNA encryption and entropy. Nonlinear Dyn. 2017, 90, 855–875. [Google Scholar] [CrossRef]
  33. Dong, C. Color image encryption using one-time keys and coupled chaotic systems. Signal Process. Image Commun. 2014, 29, 628–640. [Google Scholar] [CrossRef]
  34. Praveenkumar, P.; Amirtharajan, R.; Thenmozhi, K.; Bosco, J.; Rayappan, B. Triple chaotic image scrambling on RGB—A random image encryption approach, Security Comm. Networks 2015, 8, 3335–3345. [Google Scholar]
  35. Li, C.; Lin, D.; Lü, J.; Hao, F. Cryptanalyzing an image encryption algorithm based on autoblocking and electrocardiography. IEEE MultiMedia 2018, 25. [Google Scholar] [CrossRef]
  36. Hua, Z.; Jin, F.; Xu, B.; Huang, H. 2D Logistic-Sine-coupling map for image encryption. Signal Process. 2018, 149, 148–161. [Google Scholar] [CrossRef]
  37. Kazim, M.A.; Naseeruddin, M. On almost semigroups. Alig. Bull. Math. 1972, 2, 1–7. [Google Scholar]
  38. Mushtaq, Q.; Yusuf, S.M. On LA-semigroups. Alig. Bull. Math. 1978, 8, 65–70. [Google Scholar]
  39. Ježek, J.; Kepka, T. Modular groupoids. Czech. Math. J. 1984, 34, 477–487. [Google Scholar]
  40. Holgate, P. Groupoids satisfying a simple invertive law. Math. Stud. 1992, 61, 101–106. [Google Scholar]
  41. Protić, P.V.; Stevanović, N. On Abel-Grassmann’s groupoids (exposition). In Proceedings of the Mathematical Conference Pristina, Pristina, Kosovo, 28 September–1 October 1994; pp. 27–29. [Google Scholar]
  42. Mushtaq, Q.; Yusuf, S.M. On locally associative LA-semigroups. J. Nat. Sci. Math. 1979, 1, 57–62. [Google Scholar]
  43. Mushtaq, Q.; Iqbal, Q. Decomposition of a Locally Associative LA-semigroup. Semigr. Forum 1990, 41, 155–164. [Google Scholar] [CrossRef]
  44. Mushtaq, Q.; Iqbal, M. On representation theorem for inverse LA-semigroups. Pak. Acad. Sci. 1993, 4, 247–254. [Google Scholar]
  45. Mushtaq, Q.; Khan, M. Semilattice decomposition of a locally associative AG**-Groupoid. Algebra Colloq. 2009, 16, 17–22. [Google Scholar] [CrossRef]
  46. Dudek, W.A.; Gigoń, R.S. Completely inverse AG**-groupoids. Semigr. Forum 2013, 87, 201–229. [Google Scholar] [CrossRef]
  47. Ruskuc, N. Semigroup Presentations. Ph.D. Thesis, University of St Andrews, St Andrews, Scotland, 1995. [Google Scholar]
  48. Yaqoob, N.; Chinram, R.; Ghareeb, A.; Aslam, M. Left almost semigroups characterized by their interval valued fuzzy ideals. Afr. Matematika 2013, 24, 231–245. [Google Scholar] [CrossRef]
  49. Yaqoob, N. Applications of rough sets to -hyperideals in left almost -semihypergroups. Neural Comput. Appl. 2012, 21, 267–273. [Google Scholar] [CrossRef]
Figure 1. Proposed encryption algorithm.
Figure 1. Proposed encryption algorithm.
Entropy 20 00913 g001
Figure 2. The images (e), (f), (g) and (h) are layer-wise encrypted results for images of Lena (a) plain image; (b) red; (c) green and (d) blue components respectively.
Figure 2. The images (e), (f), (g) and (h) are layer-wise encrypted results for images of Lena (a) plain image; (b) red; (c) green and (d) blue components respectively.
Entropy 20 00913 g002
Figure 3. The images (e), (f), (g) and (h) are layer-wise encrypted results for images of Baboon (a) plain image; (b) red; (c) green and (d) blue components respectively.
Figure 3. The images (e), (f), (g) and (h) are layer-wise encrypted results for images of Baboon (a) plain image; (b) red; (c) green and (d) blue components respectively.
Entropy 20 00913 g003
Figure 4. The images (e), (f), (g) and (h) are layer-wise encrypted results for images of Peppers (a) plain image; (b) red; (c) green and (d) blue components respectively.
Figure 4. The images (e), (f), (g) and (h) are layer-wise encrypted results for images of Peppers (a) plain image; (b) red; (c) green and (d) blue components respectively.
Entropy 20 00913 g004aEntropy 20 00913 g004b
Figure 5. Histograms (a) red component; (b) green component and (c) blue component for the original images of Lena with size 256 × 256. Histograms (d) red component; (e) green component; (f) blue component for the encrypted images of Lena.
Figure 5. Histograms (a) red component; (b) green component and (c) blue component for the original images of Lena with size 256 × 256. Histograms (d) red component; (e) green component; (f) blue component for the encrypted images of Lena.
Entropy 20 00913 g005aEntropy 20 00913 g005b
Figure 6. Histograms (a) red component; (b) green component and (c) blue component for the original images of Baboon with size 256 × 256. Histograms (d) red component; (e) green component; (f) blue component for the encrypted images of Baboon.
Figure 6. Histograms (a) red component; (b) green component and (c) blue component for the original images of Baboon with size 256 × 256. Histograms (d) red component; (e) green component; (f) blue component for the encrypted images of Baboon.
Entropy 20 00913 g006
Figure 7. Histograms (a) red component; (b) green component and (c) blue component for the original images of Peppers with size 256 × 256. Histograms (d) red component; (e) green component; (f) blue component for the encrypted images of Peppers.
Figure 7. Histograms (a) red component; (b) green component and (c) blue component for the original images of Peppers with size 256 × 256. Histograms (d) red component; (e) green component; (f) blue component for the encrypted images of Peppers.
Entropy 20 00913 g007
Figure 8. Correlation coefficients between the pairs of the pixels for (a) Original Lena image; (b) horizontally; (c) vertically and (d) diagonally (e) enciphered Lena image; (f) horizontally; (g) vertically; (h) diagonally.
Figure 8. Correlation coefficients between the pairs of the pixels for (a) Original Lena image; (b) horizontally; (c) vertically and (d) diagonally (e) enciphered Lena image; (f) horizontally; (g) vertically; (h) diagonally.
Entropy 20 00913 g008
Figure 9. Correlation coefficients between the pairs of the pixels for (a) original Baboon image; (b) horizontally; (c) vertically and (d) diagonally (e) enciphered Baboon image; (f) horizontally; (g) vertically; (h) diagonally.
Figure 9. Correlation coefficients between the pairs of the pixels for (a) original Baboon image; (b) horizontally; (c) vertically and (d) diagonally (e) enciphered Baboon image; (f) horizontally; (g) vertically; (h) diagonally.
Entropy 20 00913 g009
Figure 10. Correlation coefficients between the pairs of the pixels for (a) original Peppers image; (b) horizontally; (c) vertically and (d) diagonally (e) enciphered Peppers image; (f) horizontally; (g) vertically; (h) diagonally.
Figure 10. Correlation coefficients between the pairs of the pixels for (a) original Peppers image; (b) horizontally; (c) vertically and (d) diagonally (e) enciphered Peppers image; (f) horizontally; (g) vertically; (h) diagonally.
Entropy 20 00913 g010aEntropy 20 00913 g010b
Table 1. Locally associative left almost semigroup (LA-semigroup).
Table 1. Locally associative left almost semigroup (LA-semigroup).
*012
0221
1111
2111
Table 2. Counter Examples.
Table 2. Counter Examples.
(i)(ii)(iii)
*101234*201234*301234
044422000000030440
140044100021142003
240424200011201234
302200300020304334
444444400010443003
Table 3. A Multiplication table is mapped to another multiplication under permutation (b, d).
Table 3. A Multiplication table is mapped to another multiplication under permutation (b, d).
(i) (ii) (iii)
aBcde a p p l y   ( b ,   d ) adcbe r e a r r a n g e abcde
abEeaaadeeaaadaeea
baBbeedaddeebeeadd
cabcdecadcbecabcde
deAacbbeaacddacdae
eeaabbeeaaddeedaad
Table 4. Color components-wise correlation coefficient of cipher images.
Table 4. Color components-wise correlation coefficient of cipher images.
ImageLayerCorrelation of Encrypted ImageCorrelation of Altered Encrypted Image
LenaRed−0.019408−0.026560
Green0.0051990.016749
Blue−0.057938−0.013504
BaboonRed−0.017262−0.062436
Green−0.018564−0.039240
Blue−0.0118670.037551
AirplaneRed−0.0350360.025052
Green0.040117−0.065009
Blue−0.0150170.014972
PepperRed−0.002283−0.035236
Green−0.0198590.007575
Blue−0.0286590.044896
HouseRed−0.0342270.037809
Green−0.079819−0.001682
Blue0.020816−0.014746
Jelly beansRed−0.069787−0.002181
Green−0.0293730.018362
Blue−0.003245−0.027437
TreeRed0.0158150.008496
Green0.0322060.007798
Blue−0.021771−0.015972
SplashRed−0.030921−0.023138
Green0.0723830.012479
Blue0.005316−0.024963
Sail boat on lakeRed0.0354080.000482
Green−0.004099−0.030648
Blue0.0209350.020618
Table 5. Correlation coefficients of original and encrypted images.
Table 5. Correlation coefficients of original and encrypted images.
Standard ImagesOriginal ImageEncrypted Image
HorizontalVerticalDiagonalHorizontalVerticalDiagonal
Lena0.93390.96520.9076−0.0043−0.0090−0.0031
Baboon0.83100.77370.7723−0.0029−0.00790.0026
Peppers0.93920.90030.9444−0.0028−0.0090−0.0007
Table 6. Correlation coefficients of the plain and cipher image for the Lena color image of size 256 × 256.
Table 6. Correlation coefficients of the plain and cipher image for the Lena color image of size 256 × 256.
Standard ImagesPlain ImageEncrypted Image
RedGreenBlueRedGreenBlue
Horizontal0.93390.90440.8609−0.0084−0.0028−0.0072
Vertical0.96520.94640.9086−0.0052−0.0066−0.0098
Diagonal0.90760.87960.8371−0.00160.00120.0013
Table 7. Comparison between the correlation coefficients of the proposed scheme and recent techniques using Lena image.
Table 7. Comparison between the correlation coefficients of the proposed scheme and recent techniques using Lena image.
Correlation Directions
HorizontalVerticalDiagonal
Proposed encryption scheme−0.0043−0.0090−0.00310
Reference [3]0.068100.08450-
Reference [15]0.215700.058100.05040
Reference [17]0.007200.005800.00310
Reference [18]0.021400.04650−0.0090
Zhang et al. [26]0.082000.040000.00500
Zhou et al. [27]0.012000.027000.00700
Etimadi et al. [30]0.005000.011000.02300
Table 8. MSE and PSNR of the suggested scheme.
Table 8. MSE and PSNR of the suggested scheme.
ImagesPixel Difference Based Measures
MSEPSNR
Lena4859.0311.30
Baboon6399.0510.10
Peppers7274.449.55
Table 9. Pixel difference-based and correlation-based measures of the proposed encryption scheme.
Table 9. Pixel difference-based and correlation-based measures of the proposed encryption scheme.
Pixel Difference MeasuresCorrelation Measures
ImageLayerMSEPSNRADMDNAENCCSC
LenaRed106377.862552.31092550.46740.65981.6004
Green9245.28.4716−28.92112350.79680.99830.5788
Blue7169.49.5760−22.27762290.67131.09520.5632
BaboonRed8740.18.71561.96102550.59380.82590.9174
Green7802.89.2083−5.98052300.60250.91060.7810
Blue9714.38.2567−21.88182440.76700.90380.6819
AirplaneRed100398.113849.65052550.46160.67581.5368
Green106627.852449.59752420.47500.66411.5619
Blue107647.811063.11202550.44580.64601.7249
PepperRed8041.99.077222.13272340.49410.78081.1235
Green109937.7197−11.58432420.73960.78420.8678
Blue110487.6980−60.35582201.27881.33190.2955
Table 10. Entropies of various plain and enciphered images.
Table 10. Entropies of various plain and enciphered images.
ImageLayerPlain ImageAltered ImageEnciphered ImageEnciphered Altered Image
LenaRed7.23527.23537.99657.9975
Green7.58127.58147.99707.9970
Blue7.56827.56837.99717.9971
BaboonRed7.77667.77667.99657.9967
Green7.49117.49117.99687.9973
Blue7.75467.75467.99737.9973
AirplaneRed6.85056.85057.99727.9972
Green6.86226.86227.99697.9968
Blue6.45376.45377.99727.9972
PepperRed7.38437.38437.99767.9970
Green7.62307.62307.99717.9971
Blue7.14377.14387.99717.9971
HouseRed6.43106.43107.99707.9974
Green6.23206.23217.99697.9971
Blue6.53896.53897.99667.9970
Jelly beansRed5.26265.26267.99687.9968
Green6.54646.54637.99717.9973
Blue5.69475.69477.99717.9972
TreeRed7.21047.21047.99677.9966
Green6.92076.92067.99737.9973
Blue7.41367.41367.99737.9969
SplashRed7.20227.20227.99717.9973
Green7.00997.01007.99727.9970
Blue6.30566.30567.99717.9972
Table 11. Comparison between the entropies for 256 × 256 Lena image.
Table 11. Comparison between the entropies for 256 × 256 Lena image.
AlgorithmEntropy
Proposed7.9968
Sun’s algorithm [31]7.9965
Baptista’s algorithm [31]7.9260
Wong’s algorithm [31]7.9690
Xiang’s algorithm [31]7.9950
Table 12. Comparison of the entropy of the proposed algorithm to the already defined algorithms.
Table 12. Comparison of the entropy of the proposed algorithm to the already defined algorithms.
Encryption TechniquesTest ImageColor Components of Original ImageColor Components of Encrypted Image
RedGreenBlueRedGreenBlue
Proposed schemeLena7.29337.58127.56827.99657.99707.9971
Reference [32]Lena7.29337.58127.56827.99037.98907.9893
Reference [5]Lena7.29337.58127.56827.97327.97507.9715
Reference [4]Lena7.29337.58127.56827.97917.98027.9827
Reference [5]Lena7.29337.58127.56827.98717.98817.9878
Reference [4]Lena7.29337.58127.56827.98747.78727.7866
Reference [6]Lena7.29337.58127.56827.92787.97447.9705
Table 13. The evaluation of the security measurements of the suggested encrypted algorithm.
Table 13. The evaluation of the security measurements of the suggested encrypted algorithm.
Test ImagesNPCRUACIMAE
MaxMinMeanMaxMinMean
Lena99.99799.61299.71334.4333.2133.8779.22
Fruits99.99499.51599.69833.9833.0233.7183.45
Parrot99.99899.59799.86933.5333.1133.2475.38
Table 14. The evaluation of the security measurements of the suggested encrypted algorithm.
Table 14. The evaluation of the security measurements of the suggested encrypted algorithm.
ImageLayerNPCRUACI
LenaRed0.995920.33497
Green0.995950.33325
Blue0.996000.33223
BaboonRed0.995940.33589
Green0.995630.33352
Blue0.996230.33408
AirplaneRed0.996240.33469
Green0.996170.33473
Blue0.995910.33625
PepperRed0.995770.33446
Green0.995940.33453
Blue0.996070.33747
HouseRed0.995510.33487
Green0.996090.33492
Blue0.996030.33284
Jelly beansRed0.996120.33317
Green0.996170.33408
Blue0.996360.33406
TreeRed0.996270.33385
Green0.996200.33518
Blue0.996320.33577
SplashRed0.996060.33522
Green0.996000.33504
Blue0.996010.33395
Sail boat on lakeRed0.996180.33718
Green0.996040.33429
Blue0.996090.33493
Table 15. A comparison of calculated UACI and NPCR for 512 × 512 plain Lena image.
Table 15. A comparison of calculated UACI and NPCR for 512 × 512 plain Lena image.
Standard Lena ImageSuggestedRef. [19]Ref. [20]Ref. [21]Ref. [22]Ref. [23]Ref. [24]
UACI0.33920.33620.33510.33600.33510.33510.3342
NPCR0.99730.99610.99610.99630.99610.99600.9967
Table 16. NPCR, UACI values for the color components of the digital Lena image of size 256 × 256.
Table 16. NPCR, UACI values for the color components of the digital Lena image of size 256 × 256.
ChannelMetricsLenaRef. [33]Ref. [34]
RedNPCR0.995920.9960130.996108
UACI0.334970.3342100.334525
GreenNPCR0.995950.99613199.60580
UACI0.333250.3344850.334798
BlueNPCR0.996000.9962260.996057
UACI0.332230.3348150.334387
Table 17. Pixel difference analysis for the one bit change encrypted image with the plain image.
Table 17. Pixel difference analysis for the one bit change encrypted image with the plain image.
ImageLayerMSEPSNRNCCADSCMDNAE
LenaRed107707.80880.658052.55581.59992550.4713
Green9179.88.50250.9924−28.08620.58462470.7937
Blue7168.79.57641.0933−22.13000.56452260.6720
BaboonRed8683.78.74370.82512.24740.92122550.5919
Green7763.99.23000.9082−5.66910.78542250.6008
Blue9679.38.27230.9107−22.48630.67662490.7655
AirplaneRed101168.08070.671850.47121.55052530.4635
Green106267.86700.663449.77741.56792480.4740
Blue106487.85830.649162.64071.71592460.4427
PepperRed8043.99.07610.782121.80811.12002550.4943
Green111397.66240.7790−11.50380.86992460.7473
Blue111277.66701.3306−60.31760.29472281.2846

Share and Cite

MDPI and ACS Style

Younas, I.; Khan, M. A New Efficient Digital Image Encryption Based on Inverse Left Almost Semi Group and Lorenz Chaotic System. Entropy 2018, 20, 913. https://doi.org/10.3390/e20120913

AMA Style

Younas I, Khan M. A New Efficient Digital Image Encryption Based on Inverse Left Almost Semi Group and Lorenz Chaotic System. Entropy. 2018; 20(12):913. https://doi.org/10.3390/e20120913

Chicago/Turabian Style

Younas, Irfan, and Majid Khan. 2018. "A New Efficient Digital Image Encryption Based on Inverse Left Almost Semi Group and Lorenz Chaotic System" Entropy 20, no. 12: 913. https://doi.org/10.3390/e20120913

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop