A Secure Image Encryption Scheme Based On A New Hy
A Secure Image Encryption Scheme Based On A New Hy
A Secure Image Encryption Scheme Based On A New Hy
Article
A Secure Image Encryption Scheme Based on a New
Hyperchaotic System and 2D Compressed Sensing
Muou Liu 1 , Chongyang Ning 1, * and Congxu Zhu 2, *
1 College of Electronic Information and Physics, Central South University of Forestry and Technology,
Changsha 410004, China; [email protected]
2 School of Computer Science and Engineering, Central South University, Changsha 410083, China
* Correspondence: [email protected] (C.N.); [email protected] (C.Z.); Tel.: +86-135-4968-3946 (C.Z.)
exhibit chaotic states in three or more dimensions, while discrete time iterative mapping
systems can exhibit chaotic states in one dimension. Usually, the higher dimension of a
chaotic system means the stronger its chaotic performance; however, the time overhead of
generating random key sequences for high-dimensional chaotic systems is large, which
is very unfavorable for application scenarios that require real-time encryption. At the
same time, the confidential transmission of large amounts of image data also brings large
transmission latency. Therefore, chaotic encryption schemes combined with compressed
sensing (CS) [10–12] have received more and more attention from researchers [13–15].
Compressed sensing (CS) is an algorithm in the field of communication that can recover
the original signal in signals acquired at a sampling rate much lower than that required
by the Nyquist–Shannon Sampling Theorem, which is advantageous for compressing
sparse signals like images. In recent years, a number of image-encryption algorithms
combining compressed sensing have been proposed. Wei et al. [13] proposed a compression–
encryption algorithm combining compressed sensing and optical encryption. Chai et al. [16]
proposed an image-encryption scheme based on multi-objective optimization and Block
Compressed Sensing (BCS), which improves security and efficiency. Fan et al. [17] proposed
a new four-dimensional chaotic system and semi-tensor product compressed sensing
model for image data security protection in wireless media sensor networks (WMSNs).
Zhang et al. [18] utilized two-dimensional compressed sensing (2DCS) and developed an
iterative singular-value thresholding (ISVT) scheme.
Although some existing compression–encryption schemes based on chaotic systems
can achieve image security protection, they also have problems such as the narrow parame-
ter intervals of chaotic behaviors, a small key space, and the insufficient quality of images
after image decryption and reconstruction. Therefore, it is necessary to construct a chaotic
system with better chaotic performance and apply this system to image compression and
encryption. The main contributions of this paper are as follows:
(1) A new 2D chaotic system is proposed, which has strong chaotic performance
and is advantageous in the construction of measurement matrices and image-encryption
algorithms for 2DCS.
(2) Improvements are made on the basis of the two-dimensional projected gradient
(2DPG) algorithm [19] to improve the image compression and reconstruction performance.
(3) A new image encryption algorithm is designed, and the security of the encryption
algorithm is proven experimentally.
The paper is organized as follows. In Section 2, a new 2D hyperchaotic system is
proposed and its chaotic performance is extensively analyzed. An image-compression and
-reconstruction scheme based on an improved 2D projected gradient (2DPG) algorithm is
presented in Section 3. The newly designed image-encryption and -decryption algorithms
are presented in Section 4. The experimental results of the proposed algorithm of this paper
are shown and the results are analyzed in Section 5. Finally, the conclusion of this paper is
given in Section 6.
It can be seen from system (1) that a and b are the controlling parameters of the
hyperchaotic system. The state variables at the n-th and n + 1-th discrete time points in the
iterative Equation (1), respectively, are represented by xn and xn+1 . Since system (1) consists
of trigonometric functions, the following conclusions can be drawn from the properties of
trigonometric functions. If xn ∈ R and yn ∈ R, then xn+1 ∈ R and yn+1 ∈ R. System (1) is
a mapping of R → R.
(a) (b)
Figure 1. The bifurcation diagram of system (1): (a) bifurcation diagram of different parameters
a corresponding to variable x; (b) bifurcation diagram of different parameters a corresponding to
variable y.
The phase diagram for hyperchaotic systems is a graphical tool used to visualize the
relationship between the state variables of a system in a nonlinear dynamical system. In
hyperchaotic systems, where the system has multiple iterative equations, the phase diagram
usually shows the interactions of at least three state variables, since a two-dimensional
phase diagram cannot adequately describe the complexity of hyperchaotic systems. The
phase diagram is a graphical representation used to show the evolution of the state of
a dynamic system over time. In a phase diagram, one or more variables of the system
serve as axes, and changes in another variable or variables are plotted on these axes. For
hyperchaotic systems, phase diagrams can show the interactions and dynamics between
multiple variables. The phase diagram of system (1) with initial values ( x0 , y0 ) = (0.2, 0.3)
and control parameters a = 20, b = 40 is shown in Figure 2.
As can be seen from the figure, the hyperchaotic system (1) has a complex trajectory.
It shows that the chaotic system proposed in this paper has a high degree of state value
randomness and is suitable as a generator of pseudo-random sequences.
Entropy 2024, 26, 603 4 of 20
(a) (b)
(c) (d)
Figure 2. Phase diagram of system (1): (a) 2D attractor when ( x0 , y0 ) = (0.2, 0.3); (b) the relationship
between the three iterative sequences xn , xn+1 , xn+2 ; (c) the relationship between the three iterative
sequences xn , yn , xn+1 ; (d) the relationship between the three iterative sequences xn , yn , yn+1 .
where N denotes the number of iterative rounds to iteratively obtain the chaotic sequence.
By comparing the magnitude of the LE values of different chaotic systems, it is
possible to infer the degree of randomness of the sequences generated by different systems.
Figure 3 shows the LE plots of the recently proposed 2D-CSCM map [21], the 2D-CLII
map [22], and the new 2D map proposed in this paper. Both the 2D-CSCM map and
the 2D-CLII map have only one control parameter a. As can be seen from Figure 3a, the
Lyapunov exponential curves of 2D-CSCM are less stable, and the LE values corresponding
to individual parameters are even less than zero. From Figure 3b, it can be seen that there
are two positive Lyapunov exponential curves for 2D-CLII when the control parameter
a is varied in the interval [0, 10], but they are both smaller than the 2D map proposed in
this paper. Figure 3c shows the variation of the Lyapunov exponent with respect to the
parameter b = 40 while a varies between 0 and 60. Figure 3d shows the variation of the
Lyapunov exponent with respect to the parameter a = 30 while b varies between 0 and
60. As can be seen from Figure 3, the 2D system proposed in this paper has two positive
Lyapunov exponents, proving that the system is hyperchaotic. In addition, the parameter
interval of the 2D system in this paper that produces hyperchaos is very large. The above
results show that the 2D system proposed in this paper has better chaotic properties.
(a) (b)
(c) (d)
Figure 3. Graphs of Lyapunov exponents for 3 different 2D chaotic systems: (a) plot of Lyapunov
exponent for 2D-CSCM; (b) plot of Lyapunov exponent for 2D-CLII; (c) plot of Lyapunov exponent
for the proposed map corresponding to parameter a; (d) plot of Lyapunov exponent for the proposed
map corresponding to parameter b.
Entropy 2024, 26, 603 6 of 20
N −| k |
∑ ( x (i ) − x )( x (i + | k | ) − x )
i =1
autocorr (k) = (5)
N −| k |
2
∑ ( x (i ) − x )
i =1
N −| k|
∑ ( x (i ) − x )(y(i + | k| ) − y)
i =1
crosscorr (k) = s s (6)
N −| k | N −| k |
2 2
∑ ( x (i ) − x ) ∑ ( y (i ) − y )
i =1 i =1
where x and y are the averages of the { x (i )} and {y(i )} series, respectively.
For system (1), Figure 4a shows a plot of the autocorrelation coefficient of the ran-
dom sequence { x (i )} generated iteratively for the initial values of the system ( x0 , y0 ) =
(0.299, 0.674) and the control parameters a = 10, b = 20. Figure 4b shows the plot of the
cross-correlation coefficient between two random sequences { x (i )} and {y(i )} generated
iteratively for the initial state values of the system ( x0 , y0 ) = (0.299, 0.674) and the con-
trol parameters a = 10, b = 20. In summary, the sequences generated by the new 2D
map system proposed in this paper have good randomness, and their correlation and
cross-correlation coefficient meet the requirements of random sequences.
(a) (b)
Figure 4. Plot of correlation for system (1): (a) autocorrelation; (b) cross-correlation.
when the control parameter a is varied from 0 to 10. Figure 5b plots the approximate
entropy variation curves of the 2D chaotic system proposed in this paper when the control
parameter b = 40 and a is varied in the range of 0 to 20.
(a) (b)
Figure 5. Approximate entropy of two different chaotic systems: (a) approximate entropy of the
2D-CLII chaotic system; (b) approximate entropy of the 2D chaotic system proposed in this paper.
As can be seen in Figure 5, the 2D chaotic system proposed in this paper has a larger
approximation entropy and a wider range of parameter variations compared to the recently
proposed 2D-CLII system. For system (1) in this paper, the average ApEn value of the
generated sequences { x (i )} is 1.9514 and the average ApEn value of the sequences {y(i )}
is 1.9474, while for the recently proposed 2D-CLII system, the average ApEn value of the
generated sequences { x (i )} is 1.9442 and the average ApEn value of the sequences {y(i )}
is 1.8057. It can also be seen from Figure 5 that the approximate entropy change of the 2D
chaotic system proposed in this paper is more stable. Therefore, the proposed 2D chaotic
system has better chaotic performance.
(a) (b)
Figure 6. Permutation entropy of two different chaotic systems: (a) permutation entropy of the
2D-CLII chaotic system; (b) permutation entropy of the 2D chaotic system proposed in this paper.
Table 1. NIST statistical test results for the 2D hyperchaotic system proposed in this paper.
Table 1. Cont.
1: xb = mod( f loor ( X ∗ 1015 ), 256); ▷ Get a sequence of integers with values 0–255
2: FID = fopen(‘D:\NIST\f55.bin’,‘w’);
3: COUNT = fwrite(FID,xb,‘uint8’); ▷ Save the integer sequence xb as binary
4: fclose(FID);
y = Φx (7)
2 2 2
where x ∈ R N ×1 is a one-dimensional column vector of length N 2 × 1, Φ ∈ R M × N is a
2
measurement matrix of size M2 × N 2 , y ∈ R M ×1 is a one-dimensional column vector of
length M2 × 1, and y is referred to as the vector of measurements for x.
The CS sampling operator shaped as (7) is called one-dimensional CS (1DCS), and
1DCS requires O( M2 N 2 ) arithmetic operations and M2 N 2 memory cells to store the mea-
surement matrix. Therefore, when 1DCS is used to sample 2D images, it faces two main
challenges as follows [24]: First, the computational complexity of the codec is very high,
and the time complexity of 1DCS is O( M2 N 2 ) operations. Secondly, the measurement
matrix requires a large amount of storage space (M2 N 2 memory cells are required for
storing the measurement matrix).
Entropy 2024, 26, 603 10 of 20
M2
SR = (9)
N2
It should be noted that CS and data compression serve different purposes. CS aims to
reduce the number of samples, which are usually represented as real values with infinite
precision. In contrast, data compression focuses on reducing the number of bits occupied
by information. Even though CS can significantly reduce the number of samples, the bit
width occupied by each sample store may increase. Typically, for an image with 256 levels
of grey scale, an 8-bit representation is required for each pixel. However, after CS encoding,
the number of bits required to represent each CS real-valued sample increases significantly.
In order to reduce the number of bits for transmitting the information, it is necessary to
perform the quantization of the values of the CS real-valued samples, which is to map the
values of the CS real-valued samples to a range of pixel values of a 256-level grey-scale
image, i.e., integers in the interval [0, 255].
The process of recovering the original image information from the compression-aware
measurements of an image is called image reconstruction, which is the inverse process of
compression-aware compressive sampling. In practice, many reconstruction algorithms
have been proposed for 2DCS, such as the 2D projected gradient (2DPG) algorithm [19],
the 2D orthogonal matching tracking (2D-OMP) algorithm [25], and the 2D smoothing L0
(2D-SL0) [26] algorithm, which are all effective at reconstructing 2D compressed perceptual
information.
In this paper, the 2D projected gradient (2DPG) algorithm will be used to achieve the
reconstruction of the original image from the 2D perceptual measurements of the image.
The 2DPG algorithm used in this paper to reconstruct the compressed image is a modified
version of the open-source code of the 2DPG-ED algorithm in Reference [24].
the random performance of the measurement matrix, this paper adopts a chaotic system
to generate the two measurement matrices required for 2DCS compression sampling Φ1
and Φ2 . For practical image-compression systems, it is necessary to use some quantization
strategies to generate a compressed bitstream of CS samples. In order to make the quantized
information consistent with the range of pixel values of common digital images, in this
paper, the values of CS real-valued samples are quantized into integers in the interval
[0, 255] by mapping.
The algorithmic steps of the image compression process can be described in detail
as follows: Step 1: In grey scale mapping, the pixel values of the original image are
uniformly shifted using Equation (10):
B = A−F (10)
where F is an N × N constant matrix with element values of 128 (N is the number of rows
or columns of the original image).
Step 2: Generate two measurement matrices Φ1 and Φ2 using chaotic mapping.
In this paper, system (1) is used to generate two random matrices U and V. The
specific generation algorithm is shown in Algorithm 2.
Then, the standard orthogonal bases Φ1 and Φ2 applicable to the ranges of U and V
are obtained from the random matrices U and V, respectively:
Here, the function orth(U) serves to return a standard orthogonal basis applicable to the
range of U. Finally, the first M rows are taken for Φ1 and Φ2 to obtain new submatrices
Φ1 = Φ1 (1 : M, :) and√Φ2 = Φ2 (1 : M, :) as the 2D compressed perception measurement
matrices, where M = CR × N ≪ N and SR is the sampling rate defined by Equation (9).
Step 3: 2DCS compression sampling is performed on the grey scale mapped image B
to obtain the sampled measurement value matrix Y. The specific algorithm is shown in the
2DCS key Equation (12):
where Acs = Φ1 AΦ2 T and Fcs = Φ1 FΦ2 T are the compression perception measurements
of A and F, respectively.
Entropy 2024, 26, 603 12 of 20
Step 4: The quantization of the matrix of sampled measurements Y yields the output
compressed image of the session Z. The algorithm for quantization is shown in the
following Equation (13):
(Y − Ymin ) × 255
Ymax = max(max(Y)), Ymin = min(min(Y)), Z = (13)
(Ymax − Ymin )
where max() and min() are the maximum and minimum functions, respectively, and [ x ] is
rounding to the nearest integer of x.
A′ cs = Y′ + Fcs (16)
Step 4: Based on Acs = Φ1 AΦ2T, invoke the improved 2DPG algorithm to reconstruct the
original image A from the recovered measurements A′ cs (the reconstructed A is denoted by A′).
The secret key for the encryption scheme proposed in this paper consists of five double-
precision floating-point numbers {x0, y0, a, b, k} and an 8-bit unsigned integer Pre. The four
double-precision floating-point numbers {x0, y0, a, b} serve as the iterative initial values for the
2D hyperchaotic system, while the 8-bit unsigned integer Pre and double-precision floating-
point number k are used as intermediate keys for encryption. The image-encryption al-
gorithm consists of two main parts: chaotic key sequence generation, synchronized pixel
disruption, and diffusion. These two main parts alternate to closely associate the key with
the image pixel values, which improves the difficulty of key cracking. This greatly improves
the security of the encryption algorithm. The specific steps of the encryption algorithm are
as follows (Algorithm 3).
where 255 is the maximum possible pixel value of the image; for an 8-bit image this is
usually 255. MSE is the Mean Squared Error (MSE) and is calculated as:
M N
1
MSE =
M×N ∑ ∑ ( Ii,j − Ki,j )2 (18)
i =1 j =1
Here, I is the original image, K is the processed image, and M and N are the number
of rows and columns of the image, respectively.
The SSIM is a more complex image-quality-evaluation index, which not only considers
the brightness and contrast of the image, but also the structural information of the image.
The calculation formula of the SSIM is as follows:
(2µ x µy + c1 )(2σxy + c2 )
SSI M ( x, y) = (19)
(µ2x
+ µ2y + c1 )(σx2 + σy2 + c2 )
where x and y are the original and processed images, respectively; µ x and µy are the means
of the images; σx2 and σy2 are the variances of the images; σxy is the covariance of the images
x and y; and c1 and c2 are small constants used to avoid having a denominator of zero.
Figure 7 shows the intuitive results of the above test images, compressed images, and
reconstructed images obtained by using the new 2D chaotic system; the human eye basically
cannot distinguish the difference between the reconstructed image and the original image;
when the sampling rate SR = 0.5, M = 362, so the size of the compressed sampled image
is 362 × 362.
Entropy 2024, 26, 603 15 of 20
Figure 7. Four classical test images and their compressed sampled and reconstructed images:
(a) original image Lena, (b) compressed and encrypted image Lena, (c) reconstructed image Lena,
(d) original image Barbara, (e) compressed and encrypted image Barbara, (f) reconstructed image
Barbara, (g) original image peppers, (h) compressed and encrypted image peppers, (i) reconstructed
image peppers, (j) original image cameraman, (k) compressed and encrypted image cameraman, and
(l) reconstructed image cameraman.
Table 3 exhibits a comparison of the reconstructed image quality results using the
chaotic system (1) and the Logistic chaotic system to generate the measurement matrix. The
Entropy 2024, 26, 603 16 of 20
PSNR and SSIM values of the reconstructed images show that the reconstructed images
obtained by using the new 2D chaotic system for generating the random measurement
matrices were of better quality than those obtained by using the Logistic chaotic system for
generating the random measurement matrices.
Table 3. Comparison of reconstructed image quality metrics of test images obtained using different
chaotic systems.
L
H (x) = − ∑ P( xi )log2 [ P( xi )] (20)
i =1
Table 4 shows the information entropy of the encrypted image obtained by our pro-
posed scheme in comparison with other references, from which it can be seen that the
information entropy of the encrypted image obtained by our scheme is closer to the ideal
value of 8.
Entropy 2024, 26, 603 17 of 20
(a) (b)
(c) (d)
(e) (f)
(g) (h)
Figure 8. Histogram of pixel distribution of plaintext image and ciphertext image of two test images.
(a) Plaintext image peppers. (b) Histogram of plaintext image peppers. (c) Ciphertext image peppers.
(d) Histogram of ciphertext image peppers. (e) Plaintext image cameraman. (f) Histogram of plaintext
image cameraman. (g) Ciphertext image cameraman. (h) Histogram of Ciphertext image cameraman.
Entropy 2024, 26, 603 18 of 20
Test Images Plain Image Ours Ref. [28] Ref. [29] Ref. [30]
Lena 7.4456 7.9989 7.9977 7.9970 7.9914
Baboon 7.3579 7.9992 \ \ 7.9917
Peppers 7.5715 7.9987 7.9976 7.9971 7.9915
Cameraman 7.0480 7.9968 \ 7.9971 \
N
∑ ( ai − a)(bi − b)
i =1
CC ( a, b) = s (21)
N N 2
2
∑ ( a i − a ) ∑ ( bi − b )
i =1 i =1
Table 5. Comparison results of the CC values of the algorithm proposed in this paper with other
similar algorithms (image: Lena).
6. Conclusions
In this paper, a new 2D discrete hyperchaotic system is proposed, and the chaotic
performance of this hyperchaotic system is verified by bifurcation diagrams, Lyapunov
diagrams, approximate entropy, and permutation entropy. The new 2D hyperchaotic
system as a pseudo-random number generator can completely pass all the test items of
NIST and is suitable for constructing measurement matrices for 2D compressed perception
and generating key sequences for image encryption. Compared with some existing 2D
chaotic systems, it enhances the complexity of the system and possesses good chaotic
performance, which improves the security of encryption. In addition, in this paper, the
image is encrypted after compression using two-dimensional compressed sensing (2DCS),
which effectively reduces the amount of data transmission of the encrypted image. In
Entropy 2024, 26, 603 19 of 20
addition, the existing 2D projected gradient (2DPG) algorithm is improved to enhance the
quality of image reconstruction. Finally, this paper designs an encryption algorithm for
simultaneous disruption and diffusion of image pixels for the new 2D chaotic system. The
security of the algorithm was verified by experiments such as key space size analysis and
information entropy comparison of encrypted images.
Although the image-compression-measurement matrix generated by the new 2D
chaotic map designed in this paper can achieve better image reconstruction than the
traditional chaotic map, it still does not change the nature of lossy image compression, and
the compression performance of the image is still greatly affected by the measurement
matrix. In the future, the powerful learning ability of deep neural networks can be explored
and used to compress images to achieve the purpose of lossless image compression.
Author Contributions: Conceptualization, M.L. and C.Z.; methodology, C.N. and M.L.; software,
M.L.; validation, M.L., C.N. and C.Z.; formal analysis, M.L.; investigation, C.Z.; resources, C.N.;
data curation, M.L.; writing—original draft preparation, M.L.; writing—review and editing, C.Z.;
visualization, C.N.; supervision, C.N. and C.Z.; project administration, C.N.; funding acquisition,
C.N. All authors have read and agreed to the published version of the manuscript.
Funding: This work was supported by the Excellent Youth Project of Hunan Provincial Department
of Education (No. 23B0253), and the Hunan Key Laboratory of Intelligent Logistics Technology
(2019TP1015).
Institutional Review Board Statement: Not applicable.
Data Availability Statement: The data presented in this study are available on request from the
corresponding author.
Conflicts of Interest: The authors declare no conflicts of interest.
References
1. Cui, G.; Zhou, X.; Wang, H.; Hao, W.; Zhou, A.; Ma, J. Optical Color Image Encryption Algorithm Based on Two-Dimensional
Quantum Walking. Electronics 2024, 13, 2026. [CrossRef]
2. Shen, H.; Shan, X. An Efficient Image Cryptosystem Utilizing Difference Matrix and Genetic Algorithm. Entropy 2024, 26, 351.
[CrossRef] [PubMed]
3. Zareimani, E.; Parvaz, R. Secure Multiple-Image Transfer by Hybrid Chaos System: Encryption and Visually Meaningful Images.
Mathematics 2024, 12, 1176. [CrossRef]
4. Yang, Y.G.; Wang, B.P.; Zhou, Y.H.; Shi, W.M.; Liao, X. Efficient color image encryption by color-grayscale conversion based on
steganography. Multimed. Tools Appl. 2023, 82, 10835–10866. [CrossRef]
5. Chen, C.; Zhu, D.; Wang, X.; Zeng, L. One-Dimensional Quadratic Chaotic System and Splicing Model for Image Encryption.
Electronics 2023, 12, 1325. [CrossRef]
6. Gao, X.; Mou, J.; Xiong, L.; Sha, Y.; Yan, H.; Cao, Y. A fast and efficient multiple images encryption based on single-channel
encryption and chaotic system. Nonlinear Dyn. 2022, 108, 613–636. [CrossRef]
7. Chen, H.; Bai, E.; Jiang, X. A Fast Image Encryption Algorithm Based on Improved 6-D Hyper-Chaotic System. IEEE Access 2022,
10, 116031–116044. [CrossRef]
8. Zhu, S.; Deng, X.; Zhang, W.; Zhu, C. Secure image encryption scheme based on a new robust chaotic map and strong S-box.
Math. Comput. Simul. 2023, 207, 322–346. [CrossRef]
9. Zhu, S.; Deng, X.; Zhang, W.; Zhu, C. Construction of a New 2D Hyperchaotic Map with Application in Efficient Pseudo-Random
Number Generator Design and Color Image Encryption. Mathematics 2023, 11, 3171. [CrossRef]
10. Donoho, D. Compressed sensing. IEEE Trans. Inf. Theory 2006, 52, 1289–1306. [CrossRef]
11. Hassan, A.M.A.; Mohsen, S.; Abo-Zahhad, M.M. ECG signals compression using dynamic compressive sensing technique toward
IoT applications. Multimed. Tools Appl. 2023, 35709–35726. [CrossRef]
12. Bonfert, C.; Ruopp, E.; Waldschmidt, C. Improving SAR Imaging by Superpixel-Based Compressed Sensing and Backprojection
Processing. IEEE Trans. Geosci. Remote Sens. 2024, 62. [CrossRef]
13. Wei, J.; Zhang, M.; Tong, X. Multi-Image Compression-Encryption Algorithm Based on Compressed Sensing and Optical
Encryption. Entropy 2022, 24, 784. [CrossRef]
14. Zhang, C.; Zhang, S.; Liang, K.; Chen, Z. Double Image Encryption Algorithm Based on Parallel Compressed Sensing and Chaotic
System. IEEE Access 2024, 12, 54745–54757. [CrossRef]
15. Wang, C.; Song, L. An image encryption scheme based on chaotic system and compressed sensing for multiple application
scenarios. Inf. Sci. 2023, 642, 119166. [CrossRef]
Entropy 2024, 26, 603 20 of 20
16. Chai, X.; Fu, J.; Gan, Z.; Lu, Y.; Zhang, Y. An image encryption scheme based on multi-objective optimization and block
compressed sensing. Nonlinear Dyn. 2022, 108, 2671–2704. [CrossRef]
17. Fan, F.; Verma, V.; Long, G.; Tsafack, N.; Jiang, D. Image encryption scheme using a new 4-D chaotic system with a cosinoidal
nonlinear term in WMSNs. Phys. Scr. 2024, 99, 055216. [CrossRef]
18. Zhang, B.; Xiao, D.; Li, Y.; Yang, L. 2D Compressed Sensing Using Nonlocal Low-Rank Prior Reconstruction for Cipher-Image
Coding. IEEE Signal Process. Lett. 2022, 29, 2033–2037. [CrossRef]
19. Chen, G.; Li, D.; Zhang, J. Iterative gradient projection algorithm for two-dimensional compressive sensing sparse image
reconstruction. Signal Process. 2014, 104, 15–26. [CrossRef]
20. Zhang, Y.; Hua, Z.; Bao, H.; Huang, H.; Zhou, Y. An n-Dimensional Chaotic System Generation Method Using Parametric Pascal
Matrix. IEEE Trans. Ind. Inform. 2022, 18, 8434–8444. [CrossRef]
21. Qiu, H.; Xu, X.; Jiang, Z.; Sun, K.; Xiao, C. A color image encryption algorithm based on hyperchaotic map and Rubik’s Cube
scrambling. Nonlinear Dyn. 2022, 110, 2869–2887. [CrossRef]
22. Zhou, L.; Lin, Z.; Tan, F. Multiple-image encryption scheme based on a new 2D hyperchaotic map with blurred pixels. Phys. Scr.
2024, 99, 045247. [CrossRef]
23. Zhu, S.; Deng, X.; Zhang, W.; Zhu, C. Image Encryption Scheme Based on Newly Designed Chaotic Map and Parallel DNA
Coding. Mathematics 2023, 11, 231. [CrossRef]
24. Zhang, B.; Xiao, D.; Xiang, Y. Robust Coding of Encrypted Images via 2D Compressed Sensing. IEEE Trans. Multimed. 2021,
23, 2656–2671. [CrossRef]
25. Yong, F.; JiaJi, W.; BorMin, H. 2D sparse signal recovery via 2D orthogonal matching pursuit. Sci. China-Inf. Sci. 2012, 55, 889–897.
[CrossRef]
26. Ghaffari, A.; Babaie-Zadeh, M.; Jutten, C. Sparse decomposition of two dimensional signals. In Proceedings of the 2009 IEEE
International Conference on Acoustics, Speech and Signal Processing, Taipei, Taiwan, 19–24 April 2009; pp. 3157–3160. [CrossRef]
27. Barker, E.; Pritzker, P.; May, W.; Barker, W.; Burr, W.; Polk, T. Nist Special Publication 800-57 Part 1 Revision 4 Recommendation for
Key Management Part 1: General Nist Special Publication 800-57 Part 1 Revision 4 Recommendation for Key Management Part 1:
General. 2018. Available online: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt1r4.pdf (accessed on 9
July 2024).
28. Zhou, S.; Qiu, Y.; Wang, X.; Zhang, Y. Novel image cryptosystem based on new 2D hyperchaotic map and dynamical chaotic
S-box. Nonlinear Dyn. 2023, 111, 9571–9589. [CrossRef]
29. Yan, X.; Wang, X.; Xian, Y. Chaotic image encryption algorithm based on arithmetic sequence scrambling model and DNA
encoding operation. Multimed. Tools Appl. 2021, 80, 10949–10983. [CrossRef]
30. Teng, L.; Wang, X.; Yang, F.; Xian, Y. Color image encryption based on cross 2D hyperchaotic map using combined cycle shift
scrambling and selecting diffusion. Nonlinear Dyn. 2021, 105, 1859–1876. [CrossRef]
31. Zhang, Z.; Tang, J.; Ni, H.; Huang, T. Image adaptive encryption algorithm using a novel 2D chaotic system. Nonlinear Dyn. 2023,
111, 10629–10652. [CrossRef]
32. Zheng, J.; Liu, L. Novel image encryption by combining dynamic DNA sequence encryption and the improved 2D logistic sine
map. IET Image Process. 2020, 14, 2310–2320. [CrossRef]
33. Zhu, S.; Deng, X.; Zhang, W.; Zhu, C. A New One-Dimensional Compound Chaotic System and Its Application in High-Speed
Image Encryption. Appl. Sci. 2021, 11, 11206. [CrossRef]
34. Jiang, X.; Jiang, G.; Wang, Q.; Shu, D. Image encryption algorithm based on 2D-CLICM chaotic system. Iet Image Process. 2023,
17, 2127–2141. [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual
author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to
people or property resulting from any ideas, methods, instructions or products referred to in the content.