<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.3 20070202//EN" "journalpublishing.dtd">
<article article-type="research-article" dtd-version="2.3" xml:lang="EN" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">Front. Phys.</journal-id>
<journal-title>Frontiers in Physics</journal-title>
<abbrev-journal-title abbrev-type="pubmed">Front. Phys.</abbrev-journal-title>
<issn pub-type="epub">2296-424X</issn>
<publisher>
<publisher-name>Frontiers Media S.A.</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">1191793</article-id>
<article-id pub-id-type="doi">10.3389/fphy.2023.1191793</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Physics</subject>
<subj-group>
<subject>Original Research</subject>
</subj-group>
</subj-group>
</article-categories>
<title-group>
<article-title>Chaotic encryption algorithm with scrambling diffusion based on the Josephus cycle</article-title>
<alt-title alt-title-type="left-running-head">Zhang et al.</alt-title>
<alt-title alt-title-type="right-running-head">
<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.3389/fphy.2023.1191793">10.3389/fphy.2023.1191793</ext-link>
</alt-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname>Zhang</surname>
<given-names>Huijie</given-names>
</name>
<xref ref-type="aff" rid="aff1">
<sup>1</sup>
</xref>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Sun</surname>
<given-names>Weizhen</given-names>
</name>
<xref ref-type="aff" rid="aff1">
<sup>1</sup>
</xref>
</contrib>
<contrib contrib-type="author" corresp="yes">
<name>
<surname>Lu</surname>
<given-names>Ling</given-names>
</name>
<xref ref-type="aff" rid="aff1">
<sup>1</sup>
</xref>
<xref ref-type="aff" rid="aff2">
<sup>2</sup>
</xref>
<xref ref-type="corresp" rid="c001">&#x2a;</xref>
<uri xlink:href="https://loop.frontiersin.org/people/715083/overview"/>
</contrib>
</contrib-group>
<aff id="aff1">
<sup>1</sup>
<institution>School of Biological Science and Medical Engineering</institution>, Southeast University, <addr-line>Nanjing</addr-line>, <country>China</country>
</aff>
<aff id="aff2">
<sup>2</sup>
<institution>School of Biomedical Engineering and Informatics</institution>, Nanjing Medical University, <addr-line>Nanjing</addr-line>, <country>China</country>
</aff>
<author-notes>
<fn fn-type="edited-by">
<p>
<bold>Edited by:</bold> <ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/1896874/overview">Teddy Craciunescu</ext-link>, National Institute for Laser Plasma and Radiation Physics, Romania</p>
</fn>
<fn fn-type="edited-by">
<p>
<bold>Reviewed by:</bold> <ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/903766/overview">Kehui Sun</ext-link>, Central South University, China</p>
<p>
<ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/910455/overview">Shaobo He</ext-link>, Central South University, China</p>
</fn>
<corresp id="c001">&#x2a;Correspondence: Ling Lu, <email>lvling@njmu.edu.cn</email>
</corresp>
</author-notes>
<pub-date pub-type="epub">
<day>09</day>
<month>05</month>
<year>2023</year>
</pub-date>
<pub-date pub-type="collection">
<year>2023</year>
</pub-date>
<volume>11</volume>
<elocation-id>1191793</elocation-id>
<history>
<date date-type="received">
<day>22</day>
<month>03</month>
<year>2023</year>
</date>
<date date-type="accepted">
<day>25</day>
<month>04</month>
<year>2023</year>
</date>
</history>
<permissions>
<copyright-statement>Copyright &#xa9; 2023 Zhang, Sun and Lu.</copyright-statement>
<copyright-year>2023</copyright-year>
<copyright-holder>Zhang, Sun and Lu</copyright-holder>
<license xlink:href="http://creativecommons.org/licenses/by/4.0/">
<p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.</p>
</license>
</permissions>
<abstract>
<p>Digital images are characterized by high redundancy and strong interpixel correlation. Breaking the correlation between data and improving sensitivity are crucial to protecting image information. To effectively achieve this goal, a chaotic encryption algorithm based on Josephus cycle scrambling diffusion is proposed in this paper. First, the adaptive key is generated by the Hash function to generate the initial value of the chaotic system, which is highly related to the plaintext image. The generation of the adaptive key can effectively resist plaintext attacks. Second, the pseudorandom sequence generated by the two-difference chaotic mapping is applied as the step sequence and direction sequence of Josephus traversal and optimizes Josephus traversal via variable steps and directions; the ranks of plain-text images are scrambled by the Josephus cycle to break the strong correlation between pixels. Finally, the initial cipher-text is divided into blocks to complete the Josephus cycle scrambling diffusion of image blocks, intrablock pixel bits and bit planes. The double permutations at the pixel level and bit level break the high correlation between pixels. Compared with the previous studies, our algorithm&#x2019;s average entropy of encrypted images is 7.9994, which has slightly improved. The correlation coefficient of the cryptographic image fluctuates up and down by approximately 0. In addition, the algorithm has the advantages of a large key space, high key sensitivity, anti-robust attack, and feasible encryption efficiency.</p>
</abstract>
<kwd-group>
<kwd>image encryption</kwd>
<kwd>chaotic mapping</kwd>
<kwd>Josephus cycle</kwd>
<kwd>security analysis</kwd>
<kwd>attacks</kwd>
</kwd-group>
<custom-meta-wrap>
<custom-meta>
<meta-name>section-at-acceptance</meta-name>
<meta-value>Complex Physical Systems</meta-value>
</custom-meta>
</custom-meta-wrap>
</article-meta>
</front>
<body>
<sec id="s1">
<title>1 Introduction</title>
<p>Due to the epidemic, increasing interpersonal communications have been moved to the internet. As a result, users&#x27; demands for privacy protection and information security are gradually becoming urgent. Unlike text data, digital images, as a kind of two-dimensional information commonly used online, possess considerable data volume, high redundancy and strong interpixel correlations. Therefore, traditional encryption methods are not applicable for encrypting images, while the existing encryption algorithms for digital images generally have the disadvantages of complicated encryption processes and long time consumption, which no longer satisfy the demands of image encryption.</p>
<p>Chaos theory was first introduced by mathematician Matthews [<xref ref-type="bibr" rid="B1">1</xref>] into the field of cryptography; however, it was not until 1998 that Fridrich [<xref ref-type="bibr" rid="B2">2</xref>] proposed an image encryption algorithm based on chaotic mapping, which opened a new era of this particular algorithm&#x2019;s rapid development. American mathematician Claude Shannon [<xref ref-type="bibr" rid="B3">3</xref>] suggested the classical structure of image encryption based on a chaotic system to be scrambling-diffusion. In the scrambling phase, the positions of image pixels are varied so that their distribution is as random as possible, destroying the similarity between neighboring pixels in the plain-text image. In the diffusion phase, the pixel values interact with each other and change randomly to hide the plain-text image information [<xref ref-type="bibr" rid="B4">4</xref>&#x2013;<xref ref-type="bibr" rid="B6">6</xref>]. The security of the encryption effect of this algorithm based on chaotic systems is mainly determined by the structure of this encryption algorithm and the performance of the adopted chaotic systems [<xref ref-type="bibr" rid="B7">7</xref>].</p>
<p>According to the confusion system used for encryption, chaotic encryption algorithms can be classified into two types: continuous chaotic encryption algorithms and discrete chaotic encryption algorithms. Continuous chaotic systems consist of one-dimensional higher-order nonlinear differential equations or multivariate first-order differential equations, while discrete chaotic systems comprise iterative mappings, i.e., difference equations. Low-dimensional continuous chaotic systems were previously applied to cryptography in chaos theory because of their simple structure and easy implementation. For example, Gao et al. [<xref ref-type="bibr" rid="B8">8</xref>] proposed an image encryption algorithm based on the typical Lorenz and Chen systems.</p>
<p>Due to its small or discontinuous chaotic range, resulting in an uneven distribution of the output chaotic sequence, C. Pak [<xref ref-type="bibr" rid="B9">9</xref>], R.A. Elmanfaloty [<xref ref-type="bibr" rid="B10">10</xref>] improved the structures of different one-dimensional chaotic systems to effectively increase the chaotic range of chaotic systems and improve the uniformity of chaotic system distribution and the key space of encryption algorithms. Wang et al. [<xref ref-type="bibr" rid="B11">11</xref>] proposed a chaotic image encryption algorithm with a perceptual model based on a high-dimensional Loranz chaotic system and a perceptual model of a neural network. Cheng et al. [<xref ref-type="bibr" rid="B12">12</xref>], based on a five-dimensional super multiwing chaotic system, designed a chunkwise scrambling algorithm with mixed R, G, and B components to enhance the dependency among the components and improve the scrambling efficiency. Discrete chaotic systems include one-dimensional chaotic mappings and high-dimensional chaotic mappings. One-dimensional chaotic mappings such as logistic mappings, segmented linear chaotic mappings, and Tent are used for image encryption because of their simple structure and fast calculation, such as those of the digital image encryption algorithm based on logistic mapping proposed by Wang et al. [<xref ref-type="bibr" rid="B13">13</xref>]. However, their one-dimensional discrete chaotic mapping interval is narrow, multiple period windows will lead to a small cipher space, and the attacker can analyze and attack the chaotic mapping used, which is proven to be insecure [<xref ref-type="bibr" rid="B14">14</xref>]. To overcome the shortcomings of one-dimensional chaotic mappings, researchers have proposed many different methods to construct chaotic mappings. Hua et al. [<xref ref-type="bibr" rid="B15">15</xref>] proposed a two-dimensional logic-based tuned sinusoidal mapping and used it for image encryption. Due to truncation and rounding errors, the chaotic trajectory can be trapped in a cycle when the device is operated with finite accuracy [<xref ref-type="bibr" rid="B16">16</xref>]. [<xref ref-type="bibr" rid="B17">17</xref>] proposed extending the time for chaotic mappings to enter a cycle with extended accuracy, which is also limited in its effectiveness since the accuracy cannot be scaled up infinitely. Another approach is to combine multiple mappings together by cascading or switching [<xref ref-type="bibr" rid="B12">12</xref>]. Both cascading and switching ignore the interactions between multiple mappings, and their combination&#x2019;s effect depends on the superiority of the strategy. Chai et al. [<xref ref-type="bibr" rid="B38">38</xref>] proposed an image encryption scheme based on multiobjective optimization and block compressed sensing. However, those methods based on chaotic systems only scramble the plaint image pixel position, which does not change the entropy and histogram values of the plaintext. This means that the capacity to defend against statistical attacks is poor.</p>
<p>Additionally, some nonchaotic encryption schemes have been used for image encryption at the bit level. The Arnold transform, geometry transform, and E curve transform are classical image scrambling algorithms that are nonchaotic. Hua et al. [<xref ref-type="bibr" rid="B28">28</xref>] proposed a two-dimensional plane scrambling algorithm based on Josephus travel. Yu and Yang [<xref ref-type="bibr" rid="B35">35</xref>] proposed a symmetric algorithm applied in remote sensing images, which improved encryption security. A dynamic bit-flipping diffusion encryption algorithm is proposed in the literature. Zhu et al. [<xref ref-type="bibr" rid="B36">36</xref>] proposed a three-dimensional bit-level image encryption algorithm using Rubik&#x2019;s cube method.</p>
<p>Inspired by the above literature, we combine image bit-level and bit-level encryption and propose an image encryption method with high security and sensitivity by combining a new two-dimensional differential chaotic map and an improved Joseph cycle. In this paper, we propose an image encryption method with high security and sensitivity by combining a new two-dimensional differential chaos mapping and an improved Josephus cycle. The image chunking strategy is utilized to enhance the algorithm scrambling efficiency; the improved Josephus cycle enables dynamic variable-step and variable-direction Josephus scrambling diffusion. The scrambling-diffusion of encrypted images is carried out in two dimensions: pixel bits within a block and pixel bit planes within a block, which can effectively reduce the correlation between adjacent data, and the scrambling effect of encrypted images is more random and effective [<xref ref-type="bibr" rid="B18">18</xref>]. Also used the adaptive key, which came from the sum and average of the plain-text image, while the method in this paper adopted the hash value of the plain-text image as the adaptive key, which is more sensitive to plain-text changes.</p>
<p>In this paper, the security of the algorithm is verified and compared with related algorithms in terms of correlation and information entropy. The experimental results show that the algorithm in this paper encrypts images with uniform pixel distribution and low interpixel correlation and can effectively resist common attacks with high security.</p>
</sec>
<sec id="s2">
<title>2 Basic theory</title>
<sec id="s2-1">
<title>2.1 Chaotic systems</title>
<sec id="s2-1-1">
<title>2.1.1 Two-dimensional differential chaotic map</title>
<p>A chaotic system is a nonlinear dynamic system. It has randomness, sensitivity to initial conditions, nonperiodicity and long-term unpredictability. It is suitable for image encryption with a large amount of data and high correlation. Two-dimensional chaotic mapping contains fewer periodic windows in branching graphs, a larger range of chaotic parameters, and faster operation compared to one-dimensional chaotic mapping, and these properties are consistent with cryptographic characteristics, so two-dimensional chaotic mapping is often used in key generators. Combined with the Nicholson-Bailey model [<xref ref-type="bibr" rid="B40">40</xref>] in the study of biological populations, the two-dimensional difference equation to be studied in this paper is proposed as follows, which is a variation of Nicholson-Bailey model [<xref ref-type="bibr" rid="B41">41</xref>].<disp-formula id="e1">
<mml:math id="m1">
<mml:mrow>
<mml:mfenced open="{" close="" separators="|">
<mml:mrow>
<mml:mtable columnalign="left">
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:msub>
<mml:mi>y</mml:mi>
<mml:mrow>
<mml:mi>n</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:msub>
<mml:mi>y</mml:mi>
<mml:mi>n</mml:mi>
</mml:msub>
<mml:mo>&#x2061;</mml:mo>
<mml:mi>exp</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>r</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mi>y</mml:mi>
<mml:mi>n</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>a</mml:mi>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mi>n</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mrow>
<mml:mi>n</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:msub>
<mml:mi>y</mml:mi>
<mml:mi>n</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>exp</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>a</mml:mi>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mi>n</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
<label>(1)</label>
</disp-formula>
</p>
<p>The <italic>r</italic> is chosen as 3, the initial point is arbitrarily set between [0, 1], and Eq. <xref ref-type="disp-formula" rid="e1">1</xref> is iterated 1,000 times. <xref ref-type="fig" rid="F1">Figure 1</xref> shows the bifurcation diagram of parameter a about x and y in the interval [<xref ref-type="bibr" rid="B2">2</xref>, <xref ref-type="bibr" rid="B6">6</xref>]. From the figure, we can see that it is a curve at [2, 3.22], so the equation converges at this stage. When <italic>a</italic> &#x3d; 3.23, the Hopf branch appears, and periodic motion occurs at [3.23, 3.62]. At [3.63, 3.90], the image contains a 4-terminal curve, which means a motion of 4-cycle. When the equation is greater than 3.91, as <italic>a</italic> increases, there is no regularity at the beginning, and the equation gradually enters chaos.</p>
<fig id="F1" position="float">
<label>FIGURE 1</label>
<caption>
<p>Bifurcation diagram for the range <inline-formula id="inf1">
<mml:math id="m2">
<mml:mrow>
<mml:mn>2</mml:mn>
<mml:mo>&#x2264;</mml:mo>
<mml:mi>a</mml:mi>
<mml:mo>&#x2264;</mml:mo>
<mml:mn>6</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula> with respect to <italic>x, y</italic>.</p>
</caption>
<graphic xlink:href="fphy-11-1191793-g001.tif"/>
</fig>
</sec>
<sec id="s2-1-2">
<title>2.1.2 Lyapunov exponent</title>
<p>The Lyapunov exponent is an important index to verify the randomness and chaotic characteristics of chaotic sequences. If the Lyapunov exponent of the chaotic system is positive, the chaotic system has chaotic characteristics. The larger the positive value is, the better the chaotic characteristics of the chaotic system are.</p>
<p>It can be seen from <xref ref-type="fig" rid="F2">Figure 2</xref>, when <italic>a</italic> &#x3e; 4.04, the Lyapunov exponent is greater than zero, which indicates that the equation enters a chaotic phenomenon. <xref ref-type="fig" rid="F2">Figure 2</xref> verifies that the Lyapunov exponent diagram of this 2D difference equation agrees with the bifurcation diagram, and the equation shows rich dynamic behavior as the parameter a changes in the interval [<xref ref-type="bibr" rid="B2">2</xref>, <xref ref-type="bibr" rid="B6">6</xref>].</p>
<fig id="F2" position="float">
<label>FIGURE 2</label>
<caption>
<p>Lyapunov exponent plots for <inline-formula id="inf2">
<mml:math id="m3">
<mml:mrow>
<mml:mn>2</mml:mn>
<mml:mo>&#x2264;</mml:mo>
<mml:mi>a</mml:mi>
<mml:mo>&#x2264;</mml:mo>
<mml:mn>5</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula>
</p>
</caption>
<graphic xlink:href="fphy-11-1191793-g002.tif"/>
</fig>
</sec>
<sec id="s2-1-3">
<title>2.1.3 Stability analysis of chaotic systems</title>
<p>The immovable points of the nonlinear iterative equations are used as a powerful tool to describe the evolution of the system dynamics. System (1) contains immobile points that satisfy the <inline-formula id="inf3">
<mml:math id="m4">
<mml:mrow>
<mml:mi>F</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:msup>
<mml:mi>x</mml:mi>
<mml:mo>&#x2a;</mml:mo>
</mml:msup>
<mml:mo>,</mml:mo>
<mml:msup>
<mml:mi>y</mml:mi>
<mml:mo>&#x2a;</mml:mo>
</mml:msup>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> equation as:<disp-formula id="e2">
<mml:math id="m5">
<mml:mrow>
<mml:mfenced open="" close="}" separators="|">
<mml:mrow>
<mml:mtable columnalign="left">
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:msup>
<mml:mi>y</mml:mi>
<mml:mo>&#x2a;</mml:mo>
</mml:msup>
<mml:mo>&#x3d;</mml:mo>
<mml:msup>
<mml:mi>y</mml:mi>
<mml:mo>&#x2a;</mml:mo>
</mml:msup>
<mml:mo>&#x2061;</mml:mo>
<mml:mi>exp</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>r</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>y</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>a</mml:mi>
<mml:msup>
<mml:mi>x</mml:mi>
<mml:mo>&#x2a;</mml:mo>
</mml:msup>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:msup>
<mml:mi>x</mml:mi>
<mml:mo>&#x2a;</mml:mo>
</mml:msup>
<mml:mo>&#x3d;</mml:mo>
<mml:msup>
<mml:mi>y</mml:mi>
<mml:mo>&#x2a;</mml:mo>
</mml:msup>
<mml:mrow>
<mml:mo>(</mml:mo>
</mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>exp</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>a</mml:mi>
<mml:msup>
<mml:mi>x</mml:mi>
<mml:mo>&#x2a;</mml:mo>
</mml:msup>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
<label>(2)</label>
</disp-formula>
</p>
<p>The solution is:<disp-formula id="e3">
<mml:math id="m6">
<mml:mrow>
<mml:mfenced open="{" close="" separators="|">
<mml:mrow>
<mml:mtable columnalign="left">
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:msubsup>
<mml:mi>x</mml:mi>
<mml:mn>1</mml:mn>
<mml:mo>&#x2a;</mml:mo>
</mml:msubsup>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>r</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>ln</mml:mi>
<mml:mo>&#x2061;</mml:mo>
<mml:mi>Q</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>Q</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
<mml:mrow>
<mml:mi>Q</mml:mi>
<mml:mi>r</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:msubsup>
<mml:mi>y</mml:mi>
<mml:mn>1</mml:mn>
<mml:mo>&#x2a;</mml:mo>
</mml:msubsup>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mtext>lnQ</mml:mtext>
</mml:mrow>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
<label>(3)</label>
</disp-formula>
</p>
<p>Among them:<disp-formula id="e4">
<mml:math id="m7">
<mml:mrow>
<mml:mi>Q</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:msup>
<mml:mi>e</mml:mi>
<mml:mrow>
<mml:mi>a</mml:mi>
<mml:msup>
<mml:mi>x</mml:mi>
<mml:mo>&#x2a;</mml:mo>
</mml:msup>
</mml:mrow>
</mml:msup>
</mml:mrow>
</mml:math>
<label>(4)</label>
</disp-formula>
</p>
<p>The positive equilibrium point of Eq. <xref ref-type="disp-formula" rid="e1">1</xref> is expressed as <inline-formula id="inf4">
<mml:math id="m8">
<mml:mrow>
<mml:msup>
<mml:mi>E</mml:mi>
<mml:mo>&#x2a;</mml:mo>
</mml:msup>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:msup>
<mml:mi>x</mml:mi>
<mml:mo>&#x2a;</mml:mo>
</mml:msup>
<mml:mo>,</mml:mo>
<mml:msup>
<mml:mi>y</mml:mi>
<mml:mo>&#x2a;</mml:mo>
</mml:msup>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>, and based on Eq. <xref ref-type="disp-formula" rid="e3">3</xref>, the positive equilibrium point cannot be solved analytically.</p>
<p>To discuss the stability of the equilibrium point, model (1) is written in the following equations:<disp-formula id="e5">
<mml:math id="m9">
<mml:mrow>
<mml:mfenced open="{" close="" separators="|">
<mml:mrow>
<mml:mtable columnalign="left">
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>n</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:msub>
<mml:mi>F</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mi>n</mml:mi>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>y</mml:mi>
<mml:mi>n</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:mi>y</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>n</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:msub>
<mml:mi>F</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mi>n</mml:mi>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>y</mml:mi>
<mml:mi>n</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
<label>(5)</label>
</disp-formula>
</p>
<p>Adding a small permutation <inline-formula id="inf5">
<mml:math id="m10">
<mml:mrow>
<mml:mo>&#x394;</mml:mo>
<mml:mi>x</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> and <inline-formula id="inf6">
<mml:math id="m11">
<mml:mrow>
<mml:mo>&#x394;</mml:mo>
<mml:mi>y</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> at the <italic>n</italic> pair of equilibrium points, the equation evolves at the <italic>n &#x2b; 1</italic> pair as follows:<disp-formula id="e6">
<mml:math id="m12">
<mml:mrow>
<mml:mfenced open="{" close="" separators="|">
<mml:mrow>
<mml:mtable columnalign="left">
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>n</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#x2b;</mml:mo>
<mml:mo>&#x394;</mml:mo>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mrow>
<mml:mi>n</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:msub>
<mml:mi>F</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mi>n</mml:mi>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>y</mml:mi>
<mml:mi>n</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#x2b;</mml:mo>
<mml:mo>&#x394;</mml:mo>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mi>n</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:mi>y</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>n</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#x2b;</mml:mo>
<mml:mo>&#x394;</mml:mo>
<mml:msub>
<mml:mi>y</mml:mi>
<mml:mrow>
<mml:mi>n</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:msub>
<mml:mi>F</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mi>n</mml:mi>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>y</mml:mi>
<mml:mi>n</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#x2b;</mml:mo>
<mml:mo>&#x394;</mml:mo>
<mml:msub>
<mml:mi>y</mml:mi>
<mml:mi>n</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
<label>(6)</label>
</disp-formula>
</p>
<p>To obtain a linear stability analysis, the Taylor expansion of the above equation is given as:<disp-formula id="e7">
<mml:math id="m13">
<mml:mrow>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mtable columnalign="left">
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:mo>&#x394;</mml:mo>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mrow>
<mml:mi>n</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:mo>&#x394;</mml:mo>
<mml:msub>
<mml:mi>y</mml:mi>
<mml:mrow>
<mml:mi>n</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mtable columnalign="left">
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:mfrac>
<mml:mrow>
<mml:mo>&#x2202;</mml:mo>
<mml:msub>
<mml:mi>F</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x2202;</mml:mo>
<mml:mi>x</mml:mi>
</mml:mrow>
</mml:mfrac>
<mml:mtext>&#x2002;</mml:mtext>
<mml:mfrac>
<mml:mrow>
<mml:mo>&#x2202;</mml:mo>
<mml:msub>
<mml:mi>F</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x2202;</mml:mo>
<mml:mi>y</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:mfrac>
<mml:mrow>
<mml:mo>&#x2202;</mml:mo>
<mml:msub>
<mml:mi>F</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x2202;</mml:mo>
<mml:mi>x</mml:mi>
</mml:mrow>
</mml:mfrac>
<mml:mtext>&#x2002;</mml:mtext>
<mml:mfrac>
<mml:mrow>
<mml:mo>&#x2202;</mml:mo>
<mml:msub>
<mml:mi>F</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x2202;</mml:mo>
<mml:mi>y</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mrow>
<mml:msup>
<mml:mi>x</mml:mi>
<mml:mo>&#x2a;</mml:mo>
</mml:msup>
<mml:mo>,</mml:mo>
<mml:msup>
<mml:mi>y</mml:mi>
<mml:mo>&#x2a;</mml:mo>
</mml:msup>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mtable columnalign="left">
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:mo>&#x394;</mml:mo>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mi>n</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:mo>&#x394;</mml:mo>
<mml:msub>
<mml:mi>y</mml:mi>
<mml:mi>n</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
<label>(7)</label>
</disp-formula>
</p>
<p>For the equilibrium point <inline-formula id="inf7">
<mml:math id="m14">
<mml:mrow>
<mml:msub>
<mml:mi>E</mml:mi>
<mml:mn>0</mml:mn>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mn>0,0</mml:mn>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>:<disp-formula id="e8">
<mml:math id="m15">
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mtable columnalign="left">
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:mfrac>
<mml:mrow>
<mml:mo>&#x2202;</mml:mo>
<mml:msub>
<mml:mi>F</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x2202;</mml:mo>
<mml:mi>x</mml:mi>
</mml:mrow>
</mml:mfrac>
<mml:mtext>&#x2002;</mml:mtext>
<mml:mfrac>
<mml:mrow>
<mml:mo>&#x2202;</mml:mo>
<mml:msub>
<mml:mi>F</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x2202;</mml:mo>
<mml:mi>y</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:mfrac>
<mml:mrow>
<mml:mo>&#x2202;</mml:mo>
<mml:msub>
<mml:mi>F</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x2202;</mml:mo>
<mml:mi>x</mml:mi>
</mml:mrow>
</mml:mfrac>
<mml:mtext>&#x2002;</mml:mtext>
<mml:mfrac>
<mml:mrow>
<mml:mo>&#x2202;</mml:mo>
<mml:msub>
<mml:mi>F</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x2202;</mml:mo>
<mml:mi>y</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mn>0,0</mml:mn>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mtable columnalign="left">
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:msup>
<mml:mi>e</mml:mi>
<mml:mi>r</mml:mi>
</mml:msup>
<mml:mtext>&#x2009;</mml:mtext>
<mml:mn>0</mml:mn>
</mml:mrow>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:mn>0</mml:mn>
<mml:mtext>&#x2003;</mml:mtext>
<mml:mn>0</mml:mn>
</mml:mrow>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
<label>(8)</label>
</disp-formula>where the characteristic roots are <inline-formula id="inf8">
<mml:math id="m16">
<mml:mrow>
<mml:msub>
<mml:mi>&#x3bb;</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:msup>
<mml:mi>e</mml:mi>
<mml:mi>r</mml:mi>
</mml:msup>
</mml:mrow>
</mml:math>
</inline-formula> and <inline-formula id="inf9">
<mml:math id="m17">
<mml:mrow>
<mml:msub>
<mml:mi>&#x3bb;</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula>, with the parameter <inline-formula id="inf10">
<mml:math id="m18">
<mml:mrow>
<mml:mi>r</mml:mi>
<mml:mo>&#x3e;</mml:mo>
<mml:mn>0</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula>, which leads to <inline-formula id="inf11">
<mml:math id="m19">
<mml:mrow>
<mml:mrow>
<mml:mfenced open="|" close="|" separators="|">
<mml:mrow>
<mml:msub>
<mml:mi>&#x3bb;</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#x3e;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula>, indicating that the equilibrium point <inline-formula id="inf12">
<mml:math id="m20">
<mml:mrow>
<mml:msub>
<mml:mi>E</mml:mi>
<mml:mn>0</mml:mn>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mn>0,0</mml:mn>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> is unstable.</p>
<p>For positive equilibrium point <inline-formula id="inf13">
<mml:math id="m21">
<mml:mrow>
<mml:msup>
<mml:mi>E</mml:mi>
<mml:mo>&#x2a;</mml:mo>
</mml:msup>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:msup>
<mml:mi>N</mml:mi>
<mml:mo>&#x2a;</mml:mo>
</mml:msup>
<mml:mo>,</mml:mo>
<mml:msup>
<mml:mi>P</mml:mi>
<mml:mo>&#x2a;</mml:mo>
</mml:msup>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>:<disp-formula id="e9">
<mml:math id="m22">
<mml:mrow>
<mml:mfenced open="" close="}" separators="|">
<mml:mrow>
<mml:mtable columnalign="left">
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mfenced open="" close="|" separators="|">
<mml:mrow>
<mml:mfrac>
<mml:mrow>
<mml:mo>&#x2202;</mml:mo>
<mml:msub>
<mml:mi>F</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x2202;</mml:mo>
<mml:mi>N</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:msup>
<mml:mi>E</mml:mi>
<mml:mo>&#x2a;</mml:mo>
</mml:msup>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>r</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>ln</mml:mi>
<mml:mo>&#x2061;</mml:mo>
<mml:mi>Q</mml:mi>
</mml:mrow>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mfenced open="" close="|" separators="|">
<mml:mrow>
<mml:mfrac>
<mml:mrow>
<mml:mo>&#x2202;</mml:mo>
<mml:msub>
<mml:mi>F</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x2202;</mml:mo>
<mml:mi>P</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:msup>
<mml:mi>E</mml:mi>
<mml:mo>&#x2a;</mml:mo>
</mml:msup>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>a</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>r</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mi>ln</mml:mi>
<mml:mo>&#x2061;</mml:mo>
<mml:mi>Q</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mi>Q</mml:mi>
</mml:mrow>
<mml:mi>r</mml:mi>
</mml:mfrac>
</mml:mrow>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mfenced open="" close="|" separators="|">
<mml:mrow>
<mml:mfrac>
<mml:mrow>
<mml:mo>&#x2202;</mml:mo>
<mml:msub>
<mml:mi>F</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x2202;</mml:mo>
<mml:mi>N</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:msup>
<mml:mi>E</mml:mi>
<mml:mo>&#x2a;</mml:mo>
</mml:msup>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>Q</mml:mi>
</mml:mrow>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mfenced open="" close="|" separators="|">
<mml:mrow>
<mml:mfrac>
<mml:mrow>
<mml:mo>&#x2202;</mml:mo>
<mml:msub>
<mml:mi>F</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x2202;</mml:mo>
<mml:mi>N</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:msup>
<mml:mi>E</mml:mi>
<mml:mo>&#x2a;</mml:mo>
</mml:msup>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>a</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>r</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mi>ln</mml:mi>
<mml:mo>&#x2061;</mml:mo>
<mml:mi>Q</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mi>Q</mml:mi>
</mml:mrow>
<mml:mi>r</mml:mi>
</mml:mfrac>
</mml:mrow>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
<label>(9)</label>
</disp-formula>
</p>
<p>Given the matrix:<disp-formula id="e10">
<mml:math id="m23">
<mml:mrow>
<mml:mi>A</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mtable columnalign="left">
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:msub>
<mml:mi>G</mml:mi>
<mml:mn>11</mml:mn>
</mml:msub>
<mml:mtext>&#x2002;</mml:mtext>
<mml:msub>
<mml:mi>G</mml:mi>
<mml:mn>12</mml:mn>
</mml:msub>
</mml:mrow>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:msub>
<mml:mi>G</mml:mi>
<mml:mn>21</mml:mn>
</mml:msub>
<mml:mtext>&#x2002;</mml:mtext>
<mml:msub>
<mml:mi>G</mml:mi>
<mml:mn>22</mml:mn>
</mml:msub>
</mml:mrow>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
<label>(10)</label>
</disp-formula>where the characteristic equation of <inline-formula id="inf14">
<mml:math id="m24">
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mfenced open="" close="|" separators="|">
<mml:mrow>
<mml:mrow>
<mml:msub>
<mml:mi>G</mml:mi>
<mml:mn>11</mml:mn>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mo>&#x2202;</mml:mo>
<mml:msub>
<mml:mi>F</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x2202;</mml:mo>
<mml:mi>N</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:msup>
<mml:mi>E</mml:mi>
<mml:mo>&#x2a;</mml:mo>
</mml:msup>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>G</mml:mi>
<mml:mn>12</mml:mn>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mfenced open="" close="|" separators="|">
<mml:mrow>
<mml:mfrac>
<mml:mrow>
<mml:mo>&#x2202;</mml:mo>
<mml:msub>
<mml:mi>F</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x2202;</mml:mo>
<mml:mi>P</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:msup>
<mml:mi>E</mml:mi>
<mml:mo>&#x2a;</mml:mo>
</mml:msup>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>G</mml:mi>
<mml:mn>21</mml:mn>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mfenced open="" close="|" separators="|">
<mml:mrow>
<mml:mfrac>
<mml:mrow>
<mml:mo>&#x2202;</mml:mo>
<mml:msub>
<mml:mi>F</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x2202;</mml:mo>
<mml:mi>N</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:msup>
<mml:mi>E</mml:mi>
<mml:mo>&#x2a;</mml:mo>
</mml:msup>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>G</mml:mi>
<mml:mn>22</mml:mn>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mfenced open="" close="|" separators="|">
<mml:mrow>
<mml:mfrac>
<mml:mrow>
<mml:mo>&#x2202;</mml:mo>
<mml:msub>
<mml:mi>F</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x2202;</mml:mo>
<mml:mi>N</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:msup>
<mml:mi>E</mml:mi>
<mml:mo>&#x2a;</mml:mo>
</mml:msup>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> is:<disp-formula id="e11">
<mml:math id="m25">
<mml:mrow>
<mml:mrow>
<mml:mfenced open="" close="|" separators="|">
<mml:mrow>
<mml:mrow>
<mml:mfenced open="|" close="" separators="|">
<mml:mrow>
<mml:mtable columnalign="left">
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:msub>
<mml:mi>G</mml:mi>
<mml:mn>11</mml:mn>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3bb;</mml:mi>
<mml:mtext>&#x2002;</mml:mtext>
<mml:msub>
<mml:mi>G</mml:mi>
<mml:mn>12</mml:mn>
</mml:msub>
</mml:mrow>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:msub>
<mml:mi>G</mml:mi>
<mml:mn>21</mml:mn>
</mml:msub>
<mml:mtext>&#x2002;</mml:mtext>
<mml:msub>
<mml:mi>G</mml:mi>
<mml:mn>22</mml:mn>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3bb;</mml:mi>
</mml:mrow>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0</mml:mn>
</mml:mrow>
</mml:math>
<label>(11)</label>
</disp-formula>
</p>
<p>Additionally, revised as:<disp-formula id="e12">
<mml:math id="m26">
<mml:mrow>
<mml:mi>Q</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>&#x3bb;</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#x2261;</mml:mo>
<mml:msup>
<mml:mi>&#x3bb;</mml:mi>
<mml:mn>2</mml:mn>
</mml:msup>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>B</mml:mi>
<mml:mi>&#x3bb;</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mi>C</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0</mml:mn>
</mml:mrow>
</mml:math>
<label>(12)</label>
</disp-formula>where <inline-formula id="inf15">
<mml:math id="m27">
<mml:mrow>
<mml:mi>B</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:msub>
<mml:mi>G</mml:mi>
<mml:mn>11</mml:mn>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:msub>
<mml:mi>G</mml:mi>
<mml:mn>12</mml:mn>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:mi>C</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:msub>
<mml:mi>G</mml:mi>
<mml:mn>11</mml:mn>
</mml:msub>
<mml:msub>
<mml:mi>G</mml:mi>
<mml:mn>22</mml:mn>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mi>G</mml:mi>
<mml:mn>21</mml:mn>
</mml:msub>
<mml:msub>
<mml:mi>G</mml:mi>
<mml:mn>12</mml:mn>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>,</p>
<p>
<inline-formula id="inf16">
<mml:math id="m28">
<mml:mrow>
<mml:mi>Q</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>&#x3bb;</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> is an upper-concave para-curve, while the equation&#x2019;s root as the positive equilibrium point becomes asymptotically stable when the following conditions are satisfied.</p>
<p>Solving the condition for asymptotic stability of the positive equilibrium point as:<disp-formula id="e13">
<mml:math id="m29">
<mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>C</mml:mi>
<mml:mo>&#x3c;</mml:mo>
<mml:mi>B</mml:mi>
<mml:mo>&#x3c;</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo>&#x2b;</mml:mo>
<mml:mi>C</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>C</mml:mi>
<mml:mo>&#x3c;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:math>
<label>(13)</label>
</disp-formula>
</p>
</sec>
</sec>
<sec id="s2-2">
<title>2.2 Josephus cycle</title>
<p>Josephus cycle [<xref ref-type="bibr" rid="B37">37</xref>] is a classical problem of mathematical application: it is known that individuals (denoted by the numbers 1,2,3,4, n, respectively) are sitting around a round table. Starting with the person numbered 1, the person who has counted to <inline-formula id="inf17">
<mml:math id="m30">
<mml:mrow>
<mml:mi mathvariant="normal">m</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> comes out of the column; the sequence started from 1 again and repeated until all the people come out of the column. Based on the order of the columns, a sequence is obtained: Josephus sequence. Available at <inline-formula id="inf18">
<mml:math id="m31">
<mml:mrow>
<mml:mi>J</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>f</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>S</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>l</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>, this is <inline-formula id="inf19">
<mml:math id="m32">
<mml:mrow>
<mml:mi>S</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> for the total number of elements, <inline-formula id="inf20">
<mml:math id="m33">
<mml:mrow>
<mml:mi>l</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> for the step size, and <inline-formula id="inf21">
<mml:math id="m34">
<mml:mrow>
<mml:mi>J</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> for the Josephus sequence.</p>
<p>To increase the diversity of Josephus, this paper introduces the pseudorandom sequence generated by a chaotic system as the dynamic step of the Josephus cycle based on the original rule; using the parity of the pseudorandom sequence as the dynamic direction, the Josephus function is further extended to <inline-formula id="inf22">
<mml:math id="m35">
<mml:mrow>
<mml:mi>J</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>f</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>S</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>l</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>r</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>D</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>.</p>
</sec>
<sec id="s2-3">
<title>2.3 Combined scrambling diffusion of bits and bit planes</title>
<p>The pixels of a grayscale map are generally composed of 8-digit binary, where the amount of binary information varies greatly from position to position. For example, a &#x201c;1&#x201d; in the eighth bit represents 128 (<inline-formula id="inf23">
<mml:math id="m36">
<mml:mrow>
<mml:msup>
<mml:mn>2</mml:mn>
<mml:mn>7</mml:mn>
</mml:msup>
</mml:mrow>
</mml:math>
</inline-formula>), while the lowest bit &#x201c;1&#x2ee; represents 1 (<inline-formula id="inf24">
<mml:math id="m37">
<mml:mrow>
<mml:msup>
<mml:mn>2</mml:mn>
<mml:mn>0</mml:mn>
</mml:msup>
</mml:mrow>
</mml:math>
</inline-formula>). The information contained in each bit is proportional as follows:<disp-formula id="e14">
<mml:math id="m38">
<mml:mrow>
<mml:mi>p</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:msup>
<mml:mn>2</mml:mn>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msup>
<mml:mrow>
<mml:mstyle displaystyle="true">
<mml:munderover>
<mml:mo>&#x2211;</mml:mo>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mn>8</mml:mn>
</mml:munderover>
</mml:mstyle>
<mml:msup>
<mml:mn>2</mml:mn>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msup>
</mml:mrow>
</mml:mfrac>
<mml:mtext>&#x2003;</mml:mtext>
<mml:mi>i</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1,2,3,4,5,6,7,8</mml:mn>
</mml:mrow>
</mml:math>
<label>(14)</label>
</disp-formula>
</p>
<p>From Eq. <xref ref-type="disp-formula" rid="e14">14</xref>, it can be seen that as the bits increase, the proportion of information contained in the bits increases. Therefore, the bits of different bit positions are scrambled. Then, the scrambled bit planes are diffused by the bit positions. Finally, 8&#xa0;bit planes are obtained after bit position diffusion, and these bit planes are reorganized into one pixel plane to obtain the image after bit position diffusion.</p>
</sec>
</sec>
<sec id="s3">
<title>3 Image encryption algorithm</title>
<sec id="s3-1">
<title>3.1 Encryption algorithm</title>
<p>The encryption scheme proposed in this paper mainly consists of five parts: image rank permutation, image block division, image block diffusion, bit-level scrambling diffusion and cipher-text image block combination. The proposed encryption scheme can be represented by a block diagram, as shown in <xref ref-type="fig" rid="F3">Figure 3</xref>. The whole scheme can be divided into pixel diffusion and bit diffusion. First, an adaptive key is generated through a plain-text image for the chaotic system&#x2019;s initial values, and three pairs of pseudorandom sequences are generated. Second, to diffuse the image via row and column shuffling and divide into blocks, one pair of pseudo random sequences is used for the modified Josephus traversal to finish the block scrambling diffusion. Third, another two pairs of pseudorandom sequences finish shuffling at the bit level for the pixel and bit plane. In combination with a modified Josephus traversal, the image is dislocated and diffused using a production-issue chaotic sequence.</p>
<fig id="F3" position="float">
<label>FIGURE 3</label>
<caption>
<p>General frame of the encryption scheme.</p>
</caption>
<graphic xlink:href="fphy-11-1191793-g003.tif"/>
</fig>
</sec>
<sec id="s3-2">
<title>3.2 Key generation</title>
<p>Adaptive keys are an effective method to improve the resistance of encrypted images to known plaintext attacks. As [<xref ref-type="bibr" rid="B19">19</xref>] described, independent key streams increase the possibility of selecting plaintext attacks. In contrast, generating adaptive keys from plain-text images can achieve a 1-time 1-classification effect. Of course, the plain-text image has to be highly dispersed into the keystream. For this reason, this paper uses the hash value of the plain-text image to construct the initial value of the chaotic system. Any small change in the image will result in a huge change in the hash value, and the initial value of the chaotic system will also change. Of course, the use of different system parameters and initial values determines the superiority of the cryptographic complexity of this chaotic sequence [<xref ref-type="bibr" rid="B20">20</xref>]. Showed that choosing appropriate parameters in the chaotic interval could make the autocorrelation property of the resulting chaotic sequence close to white noise. Therefore, in this paper, the adaptive key is processed and controlled to fall within the chaotic interval.</p>
<p>Read the plain-text image <inline-formula id="inf25">
<mml:math id="m39">
<mml:mrow>
<mml:mi>p</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>m</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>n</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>, where m and n are the length and width of the image, respectively. Calculate the SHA-256 cipher-text value <italic>H</italic> of the image. Convert the cipher-text value to the initial value of the 2-D differential chaos system <inline-formula id="inf26">
<mml:math id="m40">
<mml:mrow>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mn>0</mml:mn>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>y</mml:mi>
<mml:mn>0</mml:mn>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>, the parameter <inline-formula id="inf27">
<mml:math id="m41">
<mml:mrow>
<mml:mi>a</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula>, and the number of discarded terms <inline-formula id="inf28">
<mml:math id="m42">
<mml:mrow>
<mml:mi>c</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula>.<disp-formula id="e15">
<mml:math id="m43">
<mml:mrow>
<mml:mfenced open="" close="}" separators="|">
<mml:mrow>
<mml:mtable columnalign="left">
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mn>0</mml:mn>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>h</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>x</mml:mi>
<mml:mn>2</mml:mn>
<mml:mi>d</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>c</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>H</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>:</mml:mo>
<mml:mn>16</mml:mn>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#xd7;</mml:mo>
<mml:msup>
<mml:mn>10</mml:mn>
<mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>20</mml:mn>
</mml:mrow>
</mml:msup>
</mml:mrow>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:msub>
<mml:mi>y</mml:mi>
<mml:mn>0</mml:mn>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>h</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>x</mml:mi>
<mml:mn>2</mml:mn>
<mml:mi>d</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>c</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>H</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mn>17</mml:mn>
<mml:mo>:</mml:mo>
<mml:mn>32</mml:mn>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#xd7;</mml:mo>
<mml:msup>
<mml:mn>10</mml:mn>
<mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>20</mml:mn>
</mml:mrow>
</mml:msup>
</mml:mrow>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:mi>a</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>h</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>x</mml:mi>
<mml:mn>2</mml:mn>
<mml:mi>d</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>c</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>H</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>:</mml:mo>
<mml:mn>16</mml:mn>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#xd7;</mml:mo>
<mml:msup>
<mml:mn>10</mml:mn>
<mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>20</mml:mn>
</mml:mrow>
</mml:msup>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>4.04</mml:mn>
</mml:mrow>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:mi>c</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>h</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>x</mml:mi>
<mml:mn>2</mml:mn>
<mml:mi>d</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>c</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>H</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>:</mml:mo>
<mml:mn>16</mml:mn>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#xd7;</mml:mo>
<mml:msup>
<mml:mn>10</mml:mn>
<mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>20</mml:mn>
</mml:mrow>
</mml:msup>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>1000</mml:mn>
</mml:mrow>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
<label>(15)</label>
</disp-formula>
</p>
<p>The initial values generated by Eq. <xref ref-type="disp-formula" rid="e15">15</xref> are brought into Eq. <xref ref-type="disp-formula" rid="e1">1</xref> to iterate the random sequence of <inline-formula id="inf29">
<mml:math id="m44">
<mml:mrow>
<mml:mi>c</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>21</mml:mn>
<mml:mo>&#xd7;</mml:mo>
<mml:mi>m</mml:mi>
<mml:mo>&#xd7;</mml:mo>
<mml:mi>n</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> to obtain two chaotic sequences <inline-formula id="inf30">
<mml:math id="m45">
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>y</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula>. To enhance the randomness of the chaotic sequences, the first <inline-formula id="inf31">
<mml:math id="m46">
<mml:mrow>
<mml:mi>c</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> values are discarded, and the interval sampling method proposed by [<xref ref-type="bibr" rid="B21">21</xref>] is adopted for sequence sampling with a sampling interval of 12 to expand the <inline-formula id="inf32">
<mml:math id="m47">
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>y</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> sequence into four pseudorandom sequences of <inline-formula id="inf33">
<mml:math id="m48">
<mml:mrow>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>y</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>y</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>, and [<xref ref-type="bibr" rid="B21">21</xref>] revealed that <inline-formula id="inf34">
<mml:math id="m49">
<mml:mrow>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> are independent and <inline-formula id="inf35">
<mml:math id="m50">
<mml:mrow>
<mml:msub>
<mml:mi>y</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>y</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> are independent. The even positions of <inline-formula id="inf36">
<mml:math id="m51">
<mml:mrow>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> are extracted to form a new random sequence <inline-formula id="inf37">
<mml:math id="m52">
<mml:mrow>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mn>3</mml:mn>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>, and the even positions of <inline-formula id="inf38">
<mml:math id="m53">
<mml:mrow>
<mml:msub>
<mml:mi>y</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>y</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> are extracted to form a new random sequence <inline-formula id="inf39">
<mml:math id="m54">
<mml:mrow>
<mml:msub>
<mml:mi>y</mml:mi>
<mml:mn>3</mml:mn>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>.</p>
</sec>
<sec id="s3-3">
<title>3.3 Image scrambling encryption</title>
<p>First read in the image <inline-formula id="inf40">
<mml:math id="m55">
<mml:mrow>
<mml:mi>P</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> through the row/column permutation into <inline-formula id="inf41">
<mml:math id="m56">
<mml:mrow>
<mml:msub>
<mml:mi>P</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>. Second, we divide the scrambled image <inline-formula id="inf42">
<mml:math id="m57">
<mml:mrow>
<mml:msub>
<mml:mi>P</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> of size <inline-formula id="inf43">
<mml:math id="m58">
<mml:mrow>
<mml:mi>M</mml:mi>
<mml:mo>&#xd7;</mml:mo>
<mml:mi>N</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> into <inline-formula id="inf44">
<mml:math id="m59">
<mml:mrow>
<mml:mi>m</mml:mi>
<mml:mo>&#xd7;</mml:mo>
<mml:mi>n</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> non-overlapping blocks <inline-formula id="inf45">
<mml:math id="m60">
<mml:mrow>
<mml:msub>
<mml:mi>P</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mfenced open="{" close="}" separators="|">
<mml:mrow>
<mml:mrow>
<mml:mfenced open="" close="|" separators="|">
<mml:mrow>
<mml:msub>
<mml:mi>P</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1,2</mml:mn>
<mml:mo>,</mml:mo>
<mml:mo>&#x22ef;</mml:mo>
<mml:mo>,</mml:mo>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>, where <inline-formula id="inf46">
<mml:math id="m61">
<mml:mrow>
<mml:mi>k</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>M</mml:mi>
<mml:mo>&#xd7;</mml:mo>
<mml:mi>N</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>m</mml:mi>
<mml:mo>&#xd7;</mml:mo>
<mml:mi>n</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:math>
</inline-formula> is the number of blocks, and each block has <inline-formula id="inf47">
<mml:math id="m62">
<mml:mrow>
<mml:mi>m</mml:mi>
<mml:mo>&#xd7;</mml:mo>
<mml:mi>n</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> pixels, i.e., <inline-formula id="inf48">
<mml:math id="m63">
<mml:mrow>
<mml:msub>
<mml:mi>P</mml:mi>
<mml:msub>
<mml:mn>1</mml:mn>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mfenced open="{" close="}" separators="|">
<mml:mrow>
<mml:mrow>
<mml:mfenced open="" close="|" separators="|">
<mml:mrow>
<mml:msub>
<mml:mi>P</mml:mi>
<mml:msub>
<mml:mn>1</mml:mn>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:msub>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mi>j</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1,2</mml:mn>
<mml:mo>,</mml:mo>
<mml:mo>&#x22ef;</mml:mo>
<mml:mo>,</mml:mo>
<mml:mi>m</mml:mi>
<mml:mo>&#xd7;</mml:mo>
<mml:mi>n</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>.</p>
<p>The image block scrambling process can be divided into the following 3 steps.</p>
<p>
<statement>
<p>Step 1 Interblock scrambling. In this paper, we give a cyclic traversal method with variable step length and direction. The method is combined with a chaotic system, in which the chaotic sequence <inline-formula id="inf49">
<mml:math id="m64">
<mml:mrow>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>y</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> is used as the direction and step sequence, and when the Josephus traversal cycle is performed on the image blocks, the cycle direction is determined first, and then the traversal is performed according to the step length.</p>
</statement>
</p>
<p>
<statement>
<p>Step 2Block built-in scrambling protects pixel bit scrambling and bit plane scrambling.</p>
</statement>
</p>
<p>
<statement content-type="step" id="Step_2_1">
<label>Step 2.1</label>
<p>Pixel bit position scrambling uses the chaotic sequence <inline-formula id="inf50">
<mml:math id="m65">
<mml:mrow>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mn>3</mml:mn>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>y</mml:mi>
<mml:mn>3</mml:mn>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> as a variable direction, variable step sequence to traverse the pixel&#x2019;s bits in a cycle.</p>
</statement>
</p>
<p>
<statement content-type="step" id="Step_2_2">
<label>Step 2.2</label>
<p>Bit plane scrambling, image blocks are all composed of 8 bit planes, using chaotic sequences <inline-formula id="inf51">
<mml:math id="m66">
<mml:mrow>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>y</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>, with directional sequences, step sequences, and cyclic traversal of the bit values within the bit planes.</p>
</statement>
</p>
<p>
<statement>
<p>Step 3 Splice the cipher-text image blocks to obtain the cipher-text image.</p>
</statement>
</p>
</sec>
<sec id="s3-4">
<title>3.4 Image recovery</title>
<p>The decryption process is the reverse of the encryption process, and the main steps are as follows:</p>
<p>Input: Ciphertext image, SHA-256 cipher-text value <italic>H</italic>.</p>
<p>Out: Plaintext image.</p>
<p>
<statement>
<p>Step 1The ciphertext image I is converted into a 2-D moment of size M &#xd7; N array.</p>
</statement>
</p>
<p>
<statement>
<p>Step 2Generated the key sequences {<inline-formula id="inf52">
<mml:math id="m67">
<mml:mrow>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mn>3</mml:mn>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>y</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>y</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>y</mml:mi>
<mml:mn>3</mml:mn>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>} as the method in <xref ref-type="sec" rid="s3-1">Section 3.1</xref>
</p>
</statement>
</p>
<p>
<statement>
<p>Step 3Block built-in scrambling protects pixel bit scrambling and bit plane scrambling.</p>
</statement>
</p>
<p>
<statement content-type="step" id="Step_3_1">
<label>Step 3.1</label>
<p>Joseph traversal with sequence {<inline-formula id="inf53">
<mml:math id="m68">
<mml:mrow>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mn>3</mml:mn>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>y</mml:mi>
<mml:mn>3</mml:mn>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>}, which uses as a variable step size and variable direction is used to complete the scrambling of the image bit plane.</p>
</statement>
</p>
<p>
<statement content-type="step" id="Step_3_2">
<label>Step 3.2</label>
<p>Joseph traversal with sequence {<inline-formula id="inf54">
<mml:math id="m69">
<mml:mrow>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>y</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>}, which uses as a variable step size and variable direction is used to complete the scrambling of the pixel bit plane.</p>
</statement>
</p>
<p>
<statement content-type="step" id="Step_4">
<label>Step 4</label>
<p>Joseph traversal with sequence {<inline-formula id="inf55">
<mml:math id="m70">
<mml:mrow>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>y</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>}, which is used as variable astep size and variable direction is used to scramble the image pixel blocks, and a new image matrix is obtained, which is the plaintext image.</p>
</statement>
</p>
</sec>
</sec>
<sec id="s4">
<title>4 Security analysis</title>
<p>The effectiveness of the proposed encryption algorithm is verified from histogram, correlation, differential attack, key space, information entropy, clipping and noise attacks using data from the USC-SIPI &#x27;Miscellaneous&#x27; database.</p>
<sec id="s4-1">
<title>4.1 Histogram analysis</title>
<p>The more uniform the histogram is, the looser the relationship between the pixel intensity value and the number of pixels, the more random the image is, and the more difficult it is for an attacker to recover the original image through a histogram analysis attack.</p>
<p>
<xref ref-type="fig" rid="F4">Figure 4</xref> shows the histograms and pixel distributions of the three images of Lena, Boat, and Feifei in the testing database, where the first row is the plain-text image, the second is the histogram of the plain-text image, the third is the pixel distribution of the plain-text image, and the fourth and fifth are the histograms and pixel distributions of the cipher-text obtained from encryption of the corresponding plain-text. Both the histogram and the pixel distribution of the plain-text image present significant differences, i.e., uneven distribution. The difference between the histogram and the pixel distribution of the obtained cipher text is relatively insignificant, and the comparison shows that the pixel distribution of the cipher text is more uniform than that of the plain text. This is because the Josephus cyclic scrambling diffusion of bit positions and bits at the bit level changed the bit values composed of the plain-text image&#x2019;s bit planes so that the pixel value distribution of the reconstructed pixel planes tends to be uniform. Therefore, the algorithm in this paper was proven to have a good ability to resist statistical analysis.</p>
<fig id="F4" position="float">
<label>FIGURE 4</label>
<caption>
<p>Plain-text histogram and cryptographic histogram for different images.</p>
</caption>
<graphic xlink:href="fphy-11-1191793-g004.tif"/>
</fig>
<p>To test the uniformity of the histogram, a chi-square test was used, which is computed by the following equation.<disp-formula id="e16">
<mml:math id="m71">
<mml:mrow>
<mml:msup>
<mml:mi>&#x3c7;</mml:mi>
<mml:mn>2</mml:mn>
</mml:msup>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mn>255</mml:mn>
</mml:mrow>
</mml:mfrac>
<mml:msup>
<mml:mrow>
<mml:mstyle displaystyle="true">
<mml:munderover>
<mml:mo>&#x2211;</mml:mo>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0</mml:mn>
</mml:mrow>
<mml:mn>255</mml:mn>
</mml:munderover>
</mml:mstyle>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>h</mml:mi>
<mml:mi>i</mml:mi>
<mml:mi>s</mml:mi>
<mml:msub>
<mml:mi>t</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mn>256</mml:mn>
</mml:mrow>
</mml:mfrac>
<mml:mrow>
<mml:mstyle displaystyle="true">
<mml:munderover>
<mml:mo>&#x2211;</mml:mo>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0</mml:mn>
</mml:mrow>
<mml:mn>255</mml:mn>
</mml:munderover>
</mml:mstyle>
<mml:mrow>
<mml:mi>h</mml:mi>
<mml:mi>i</mml:mi>
<mml:mi>s</mml:mi>
<mml:msub>
<mml:mi>t</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
<mml:mn>2</mml:mn>
</mml:msup>
</mml:mrow>
</mml:math>
<label>(16)</label>
</disp-formula>where <inline-formula id="inf56">
<mml:math id="m72">
<mml:mrow>
<mml:mi>h</mml:mi>
<mml:mi>i</mml:mi>
<mml:mi>s</mml:mi>
<mml:msub>
<mml:mi>t</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> is the pixel value frequency (0&#x2013;255). The lower the chi-square value, the better the consistency. To the significant level of <italic>&#x3b1;</italic> is fixed, so <inline-formula id="inf57">
<mml:math id="m73">
<mml:mrow>
<mml:mi>P</mml:mi>
<mml:mrow>
<mml:mfenced open="{" close="}" separators="|">
<mml:mrow>
<mml:msup>
<mml:mi>&#x3c7;</mml:mi>
<mml:mn>2</mml:mn>
</mml:msup>
<mml:mo>&#x2265;</mml:mo>
<mml:msubsup>
<mml:mi>&#x3c7;</mml:mi>
<mml:mi>&#x3b1;</mml:mi>
<mml:mn>2</mml:mn>
</mml:msubsup>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>n</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>&#x3b1;</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula>, then <inline-formula id="inf58">
<mml:math id="m74">
<mml:mrow>
<mml:msup>
<mml:mi>&#x3c7;</mml:mi>
<mml:mn>2</mml:mn>
</mml:msup>
<mml:mo>&#x227a;</mml:mo>
<mml:msubsup>
<mml:mi>&#x3c7;</mml:mi>
<mml:mi>&#x3b1;</mml:mi>
<mml:mn>2</mml:mn>
</mml:msubsup>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>n</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> satisfies the desired condition.</p>
<p>When <inline-formula id="inf59">
<mml:math id="m75">
<mml:mrow>
<mml:mi>&#x3b1;</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0.01,0.05,0.1</mml:mn>
<mml:mo>;</mml:mo>
<mml:msubsup>
<mml:mi>&#x3c7;</mml:mi>
<mml:mn>0.01</mml:mn>
<mml:mn>2</mml:mn>
</mml:msubsup>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mn>255</mml:mn>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>310.45739</mml:mn>
<mml:mo>,</mml:mo>
<mml:msubsup>
<mml:mi>&#x3c7;</mml:mi>
<mml:mn>0.05</mml:mn>
<mml:mn>2</mml:mn>
</mml:msubsup>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mn>255</mml:mn>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>293.24783</mml:mn>
<mml:mo>,</mml:mo>
<mml:msubsup>
<mml:mi>&#x3c7;</mml:mi>
<mml:mn>0.1</mml:mn>
<mml:mn>2</mml:mn>
</mml:msubsup>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mn>255</mml:mn>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>284.33591</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula>, the plaintext image and the encrypted image &#x3c7;2 points. When the significance level was <italic>&#x3b1;</italic> &#x3d; 0.05, all ciphertext images [<xref ref-type="bibr" rid="B39">39</xref>] passed the test.</p>
</sec>
<sec id="s4-2">
<title>4.2 Correlation analysis</title>
<p>The neighboring pixel values of plain-text images are very close to each other and have a strong correlation. Breaking the correlation between pixels is important to resist statistical analysis attacks. Correlation analysis is used to test the strength of the correlation between image pixels. The correlation between ordinary image pixels is usually extremely high, and the correlation coefficient of an image usually tends to be close to 1. If the correlation between adjacent or most pixels can be broken instead, then if the correlation and the correlation coefficient are reduced, it is more resistant to statistical analysis attacks. The correlation coefficient is calculated using the following equation:<disp-formula id="e17">
<mml:math id="m76">
<mml:mrow>
<mml:mfenced open="" close="}" separators="|">
<mml:mrow>
<mml:mtable columnalign="left">
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:mi>E</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>x</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi>N</mml:mi>
</mml:mrow>
</mml:mfrac>
<mml:mrow>
<mml:mstyle displaystyle="true">
<mml:munderover>
<mml:mo>&#x2211;</mml:mo>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mi>N</mml:mi>
</mml:munderover>
</mml:mstyle>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mrow>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:mi>D</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>x</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi>N</mml:mi>
</mml:mrow>
</mml:mfrac>
<mml:mrow>
<mml:mstyle displaystyle="true">
<mml:munderover>
<mml:mo>&#x2211;</mml:mo>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mi>N</mml:mi>
</mml:munderover>
</mml:mstyle>
<mml:msup>
<mml:mrow>
<mml:mfenced open="[" close="]" separators="|">
<mml:mrow>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>E</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>x</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mn>2</mml:mn>
</mml:msup>
</mml:mrow>
</mml:mrow>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:mi mathvariant="normal">c</mml:mi>
<mml:mi mathvariant="normal">o</mml:mi>
<mml:mi mathvariant="normal">v</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>y</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi>N</mml:mi>
</mml:mrow>
</mml:mfrac>
<mml:mrow>
<mml:mstyle displaystyle="true">
<mml:munderover>
<mml:mo>&#x2211;</mml:mo>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mi>N</mml:mi>
</mml:munderover>
</mml:mstyle>
<mml:mrow>
<mml:mrow>
<mml:mfenced open="[" close="]" separators="|">
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>E</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>x</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mrow>
<mml:mfenced open="[" close="]" separators="|">
<mml:mrow>
<mml:mi>y</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>E</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>y</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mrow>
</mml:mrow>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:msub>
<mml:mi>&#x3b3;</mml:mi>
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:mi>y</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi mathvariant="normal">c</mml:mi>
<mml:mi mathvariant="normal">o</mml:mi>
<mml:mi mathvariant="normal">v</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>y</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
<mml:msqrt>
<mml:mrow>
<mml:mi>D</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>x</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mi>D</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>y</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:msqrt>
</mml:mfrac>
</mml:mrow>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
<label>(17)</label>
</disp-formula>
</p>
<p>Randomly selected 5,000 pairs of pixel points, the statistical results of the correlation between the horizontal, vertical and diagonal directions of the original image and the cipher-text image in the test database are shown in <xref ref-type="table" rid="T1">Table 1</xref>, from which it can be seen that the number of prior relationships in the three directions of the cipher-text image fluctuates up and down around x &#x3d; 0, indicating that the correlation between the pixels of the adjacent images of the plain-text is very low, revealing that the proposed encryption method is reliable and secure.</p>
<table-wrap id="T1" position="float">
<label>TABLE 1</label>
<caption>
<p>Correlations of ciphertext images.</p>
</caption>
<table>
<tbody valign="top">
<tr>
<td align="left">
</td>
</tr>
<tr>
<td align="left">
<inline-graphic xlink:href="FPHY_fphy-2023-1191793_wc_tfx1.tif"/>
</td>
</tr>
</tbody>
</table>
</table-wrap>
<table-wrap id="T2" position="float">
<label>TABLE 2</label>
<caption>
<p>NPCR and UACI values of cipher-text images (%).</p>
</caption>
<table>
<thead valign="top">
<tr>
<th rowspan="2" align="center">Teat image</th>
<th colspan="3" align="center">NPCR</th>
<th colspan="3" align="center">UACI</th>
</tr>
<tr>
<th align="center">Reference [<xref ref-type="bibr" rid="B24">24</xref>]</th>
<th align="center">Reference [<xref ref-type="bibr" rid="B25">25</xref>]</th>
<th align="center">Perposed</th>
<th align="center">Reference [<xref ref-type="bibr" rid="B24">24</xref>]</th>
<th align="center">Reference [<xref ref-type="bibr" rid="B25">25</xref>]</th>
<th align="center">Perposed</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td>5.2.08</td>
<td align="center">99.960</td>
<td align="center">99.6070</td>
<td align="center">99.7085</td>
<td align="center">33.692</td>
<td align="center">33.4734</td>
<td align="center">33.4695</td>
</tr>
<tr>
<td>5.2.09</td>
<td align="center">99.876</td>
<td align="center">99.6106</td>
<td align="center">99.6989</td>
<td align="center">33.548</td>
<td align="center">33.4572</td>
<td align="center">33.4610</td>
</tr>
<tr>
<td>5.2.10</td>
<td align="center">99.654</td>
<td align="center">99.6096</td>
<td align="center">99.7012</td>
<td align="center">33.454</td>
<td align="center">33.4575</td>
<td align="center">33.4580</td>
</tr>
<tr>
<td>7.1.01</td>
<td align="center">99.957</td>
<td align="center">99.6095</td>
<td align="center">99.6945</td>
<td align="center">33.648</td>
<td align="center">33.4726</td>
<td align="center">33.4506</td>
</tr>
<tr>
<td>7.1.02</td>
<td align="center">99.918</td>
<td align="center">99.6117</td>
<td align="center">99.7102</td>
<td align="center">33.465</td>
<td align="center">33.4563</td>
<td align="center">33.4409</td>
</tr>
<tr>
<td>7.1.03</td>
<td align="center">99.849</td>
<td align="center">99.6123</td>
<td align="center">99.6968</td>
<td align="center">33.273</td>
<td align="center">33.4535</td>
<td align="center">33.4606</td>
</tr>
<tr>
<td>7.1.04</td>
<td align="center">99.991</td>
<td align="center">99.6114</td>
<td align="center">99.6978</td>
<td align="center">33.202</td>
<td align="center">33.4475</td>
<td align="center">33.4572</td>
</tr>
<tr>
<td>7.1.05</td>
<td align="center">99.942</td>
<td align="center">99.6099</td>
<td align="center">99.6982</td>
<td align="center">33.830</td>
<td align="center">33.4559</td>
<td align="center">33.4608</td>
</tr>
<tr>
<td>7.1.06</td>
<td align="center">99.670</td>
<td align="center">99.6064</td>
<td align="center">99.6979</td>
<td align="center">33.627</td>
<td align="center">33.4515</td>
<td align="center">33.5106</td>
</tr>
<tr>
<td>7.1.07</td>
<td align="center">99.983</td>
<td align="center">99.6068</td>
<td align="center">99.6986</td>
<td align="center">33.609</td>
<td align="center">33.4638</td>
<td align="center">33.4600</td>
</tr>
<tr>
<td>7.1.08</td>
<td align="center">99.818</td>
<td align="center">99.6097</td>
<td align="center">99.6995</td>
<td align="center">33.375</td>
<td align="center">33.4536</td>
<td align="center">33.4610</td>
</tr>
<tr>
<td>7.1.09</td>
<td align="center">99.874</td>
<td align="center">99.6112</td>
<td align="center">99.6989</td>
<td align="center">33.530</td>
<td align="center">33.4729</td>
<td align="center">33.4679</td>
</tr>
<tr>
<td>7.1.10</td>
<td align="center">99.697</td>
<td align="center">99.6096</td>
<td align="center">99.6979</td>
<td align="center">33.438</td>
<td align="center">33.4605</td>
<td align="center">33.4665</td>
</tr>
<tr>
<td>boat.512</td>
<td align="center">99.715</td>
<td align="center">99.6084</td>
<td align="center">99.7002</td>
<td align="center">33.374</td>
<td align="center">33.4434</td>
<td align="center">33.4492</td>
</tr>
<tr>
<td>elaine.512</td>
<td align="center">99.746</td>
<td align="center">99.6095</td>
<td align="center">99.7010</td>
<td align="center">33.379</td>
<td align="center">33.4746</td>
<td align="center">33.4700</td>
</tr>
<tr>
<td>Gray21.512</td>
<td align="center">99.643</td>
<td align="center">99.6074</td>
<td align="center">99.6998</td>
<td align="center">33.507</td>
<td align="center">33.4588</td>
<td align="center">33.4672</td>
</tr>
<tr>
<td>Numbers.512</td>
<td align="center">99.653</td>
<td align="center">99.6102</td>
<td align="center">99.6899</td>
<td align="center">33.388</td>
<td align="center">33.4477</td>
<td align="center">33.4576</td>
</tr>
<tr>
<td>Ruler.512</td>
<td align="center">99.637</td>
<td align="center">99.6092</td>
<td align="center">99.6996</td>
<td align="center">33.415</td>
<td align="center">33.4637</td>
<td align="center">33.4566</td>
</tr>
<tr>
<td>Mean</td>
<td align="center">99.910</td>
<td align="center">99.6095</td>
<td align="center">99.6700</td>
<td align="center">33.486</td>
<td align="center">33.459</td>
<td align="center">33.4605</td>
</tr>
<tr>
<td>STD</td>
<td align="center">0.1312</td>
<td align="center">0.00171</td>
<td align="center">0.00445</td>
<td align="center">0.1551</td>
<td align="center">0.0094</td>
<td align="center">0.0142</td>
</tr>
<tr>
<td>Pass/all</td>
<td align="center">All</td>
<td align="center">All</td>
<td align="center">All</td>
<td align="center">14/18</td>
<td align="center">All</td>
<td align="center">All</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>
<xref ref-type="fig" rid="F5">Figures 5</xref>&#x2013;<xref ref-type="fig" rid="F7">7</xref> visualizes the correlation results before and after encryption. The plain-text images are strongly correlated in three directions. After the proposed encryption algorithm, the correlation of neighboring pixels is substantially weakened. It is this structure and characteristics of the plain-text image that make it resistant to statistical attacks.</p>
<fig id="F5" position="float">
<label>FIGURE 5</label>
<caption>
<p>Correlations of adjacent pixels in the horizontal <bold>(A,D)</bold>, vertical <bold>(B,E)</bold>, and diagonal <bold>(C,F)</bold> directions before and after Lena encryption.</p>
</caption>
<graphic xlink:href="fphy-11-1191793-g005.tif"/>
</fig>
<fig id="F6" position="float">
<label>FIGURE 6</label>
<caption>
<p>Correlations of adjacent pixels in the horizontal <bold>(A,D)</bold>, vertical <bold>(B,E)</bold>, and diagonal <bold>(C,F)</bold> directions before and after boat encryption.</p>
</caption>
<graphic xlink:href="fphy-11-1191793-g006.tif"/>
</fig>
<fig id="F7" position="float">
<label>FIGURE 7</label>
<caption>
<p>Correlations of adjacent pixels in the horizontal <bold>(A,D)</bold>, vertical <bold>(B,E)</bold>, and diagonal <bold>(C,F)</bold> directions before and after Feifei encryption.</p>
</caption>
<graphic xlink:href="fphy-11-1191793-g007.tif"/>
</fig>
</sec>
<sec id="s4-3">
<title>4.3 Differential attack analysis</title>
<p>The differential attack is a deciphering method to attack the encryption algorithm by analyzing the degree of cipher-text change due to the subtle difference in plain-text. To analyze the resistance of the proposed encryption algorithm to the differential attack, this paper observes the degree of difference between the cipher-text images after two encryptions by changing the pixel value at any point in the plain-text image. If the degree of difference is large, the proposed algorithm is able to resist the differential attack effectively. The pixel change rate (NPCR) and the pixel average change intensity (UACI) are usually measured using the expressions of NPCR and UACI as follows:<disp-formula id="e18">
<mml:math id="m77">
<mml:mrow>
<mml:mfenced open="" close="}" separators="|">
<mml:mrow>
<mml:mtable columnalign="left">
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:mi>N</mml:mi>
<mml:mi>P</mml:mi>
<mml:mi>C</mml:mi>
<mml:mi>R</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mn>1</mml:mn>
<mml:mrow>
<mml:mi>M</mml:mi>
<mml:mo>&#xd7;</mml:mo>
<mml:mi>N</mml:mi>
</mml:mrow>
</mml:mfrac>
<mml:msubsup>
<mml:mo>&#x2211;</mml:mo>
<mml:mi>i</mml:mi>
<mml:mi>M</mml:mi>
</mml:msubsup>
<mml:msubsup>
<mml:mo>&#x2211;</mml:mo>
<mml:mi>j</mml:mi>
<mml:mi>N</mml:mi>
</mml:msubsup>
<mml:mi>D</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#xd7;</mml:mo>
<mml:mn>100</mml:mn>
<mml:mo>%</mml:mo>
</mml:mrow>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:mi>D</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mfenced open="{" close="" separators="|">
<mml:mrow>
<mml:mtable columnalign="left">
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>I</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#x2260;</mml:mo>
<mml:msub>
<mml:mi>I</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:mn>0</mml:mn>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>I</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:msub>
<mml:mi>I</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:mi>U</mml:mi>
<mml:mi>A</mml:mi>
<mml:mi>C</mml:mi>
<mml:mi>I</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:msubsup>
<mml:mo>&#x2211;</mml:mo>
<mml:mi>i</mml:mi>
<mml:mi>M</mml:mi>
</mml:msubsup>
<mml:msubsup>
<mml:mo>&#x2211;</mml:mo>
<mml:mi>j</mml:mi>
<mml:mi>N</mml:mi>
</mml:msubsup>
<mml:mrow>
<mml:mfenced open="|" close="|" separators="|">
<mml:mrow>
<mml:msub>
<mml:mi>I</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mi>I</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mi>D</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
<mml:mrow>
<mml:mn>255</mml:mn>
<mml:mo>&#xd7;</mml:mo>
<mml:mi>M</mml:mi>
<mml:mo>&#xd7;</mml:mo>
<mml:mi>N</mml:mi>
</mml:mrow>
</mml:mfrac>
<mml:mo>&#xd7;</mml:mo>
<mml:mn>100</mml:mn>
<mml:mo>%</mml:mo>
</mml:mrow>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
<label>(18)</label>
</disp-formula>where <inline-formula id="inf60">
<mml:math id="m78">
<mml:mrow>
<mml:msub>
<mml:mi>I</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>I</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> is the two plain-text images to be encrypted with only one pixel difference. For an arbitrary NPCR and UACI, expect 100% and 33.4635%.</p>
<p>The NPCR and UACI pairwise scores of the test images were analyzed. The mean value of NPCR and the standard deviation of UACI of the proposed method in this paper are 99.6700 and 0.0045, respectively. The mean value and standard deviation of UACI are 33.4605 and 0.0142, respectively. The comparison shows that the NPCR, UACI of the proposed encryption algorithm is very close to the theoretical value, and its labelling difference is the smallest among the compared methods. This indicates that the proposed method has better sensitivity. In addition, the significance level of our images is set to 0.05, and then the critical values of NPCR and UACI corresponding to different sizes are calculated. Compared with the approaches of [<xref ref-type="bibr" rid="B22">22</xref>, <xref ref-type="bibr" rid="B23">23</xref>], the proposed method exhibits the same pass rate, but the mean value of the encrypted images in this paper is closer to the theoretical value of 33.4605%, but the standard deviation 0.0142 of the encryption algorithm in this paper fell between the two comparative works, indicating that the encryption algorithm in this paper can better resist the differential attack, but the stability of the ability to resist the split attack is between the two comparative methods.</p>
</sec>
<sec id="s4-4">
<title>4.4 Key space analysis</title>
<p>To effectively resist brute force attacks, the key should have a sufficiently large key space in addition to a strong sensitivity. The size of the key space is determined by the number of keys; the larger the number of keys, the larger the key space of the encryption algorithm, and the stronger its ability to resist brute-force attacks.</p>
<p>The security key factors of the encryption algorithm in this paper are five, which are two parameters of the system, two initial values of the chaotic system and the order of chaos taking m. The sensitivity of both chaotic parameters and chaotic initial values is <inline-formula id="inf61">
<mml:math id="m79">
<mml:mrow>
<mml:msup>
<mml:mn>10</mml:mn>
<mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>15</mml:mn>
</mml:mrow>
</mml:msup>
</mml:mrow>
</mml:math>
</inline-formula>, then the key capacity of this encryption algorithm is <inline-formula id="inf62">
<mml:math id="m80">
<mml:mrow>
<mml:msup>
<mml:mn>10</mml:mn>
<mml:mn>15</mml:mn>
</mml:msup>
<mml:mo>&#xd7;</mml:mo>
<mml:msup>
<mml:mn>10</mml:mn>
<mml:mn>15</mml:mn>
</mml:msup>
<mml:mo>&#xd7;</mml:mo>
<mml:msup>
<mml:mn>10</mml:mn>
<mml:mn>15</mml:mn>
</mml:msup>
<mml:mo>&#xd7;</mml:mo>
<mml:msup>
<mml:mn>10</mml:mn>
<mml:mn>15</mml:mn>
</mml:msup>
<mml:mo>&#x3d;</mml:mo>
<mml:msup>
<mml:mn>10</mml:mn>
<mml:mn>60</mml:mn>
</mml:msup>
</mml:mrow>
</mml:math>
</inline-formula>, which is greater than <inline-formula id="inf63">
<mml:math id="m81">
<mml:mrow>
<mml:msup>
<mml:mn>2</mml:mn>
<mml:mn>100</mml:mn>
</mml:msup>
</mml:mrow>
</mml:math>
</inline-formula>, therefore, it can be considered that this image encryption process has a strong resistance to exhaustive attacks.</p>
</sec>
<sec id="s4-5">
<title>4.5 Information entropy analysis</title>
<p>Information entropy is a test of uncertainty and is calculated as in Eq. <xref ref-type="disp-formula" rid="e19">19.</xref>
<disp-formula id="e19">
<mml:math id="m82">
<mml:mrow>
<mml:mi>H</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>m</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mo>&#x2212;</mml:mo>
<mml:mrow>
<mml:mstyle displaystyle="true">
<mml:munderover>
<mml:mo>&#x2211;</mml:mo>
<mml:mrow>
<mml:mi>k</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:msup>
<mml:mn>2</mml:mn>
<mml:mi>N</mml:mi>
</mml:msup>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:munderover>
</mml:mstyle>
<mml:mrow>
<mml:mi>p</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:msub>
<mml:mi>m</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:msub>
<mml:mi>log</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
<mml:mo>&#x2061;</mml:mo>
<mml:mi>p</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:msub>
<mml:mi>m</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mrow>
</mml:mrow>
</mml:math>
<label>(19)</label>
</disp-formula>
<inline-formula id="inf64">
<mml:math id="m83">
<mml:mrow>
<mml:mi>p</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>m</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> denotes the probability of occurrence of information m. For grayscale images, information m has 256 states, the minimum value is 0 and the maximum value is 255. When the information entropy is eight, it indicates that the information is completely random, that is, the larger the cipher-text information entropy is, the more secure it is. <xref ref-type="table" rid="T3">Table 3</xref> provides the image information entropy using the proposed encryption algorithm, and by comparing with the methods of [<xref ref-type="bibr" rid="B24">24</xref>, <xref ref-type="bibr" rid="B25">25</xref>], the cipher-text image information entropy 7.9994 proposed in this paper is closer to the ideal value of eight. Its randomness is better than that of the compared methods.</p>
<table-wrap id="T3" position="float">
<label>TABLE 3</label>
<caption>
<p>Information entropy of plaintext images and ciphertext images.</p>
</caption>
<table>
<thead valign="top">
<tr>
<th rowspan="2" align="left">Textimage</th>
<th rowspan="2" align="left">Size</th>
<th rowspan="2" align="left">Plaintext images</th>
<th colspan="3" align="left">Ciphertext images</th>
</tr>
<tr>
<th align="left">Reference [<xref ref-type="bibr" rid="B22">22</xref>]</th>
<th align="left">Reference [<xref ref-type="bibr" rid="B25">25</xref>]</th>
<th align="left">Proposed</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="left">5.2.08</td>
<td rowspan="17" align="left">512 &#xd7; 512</td>
<td align="center">7.5237</td>
<td align="left">7.9991</td>
<td align="left">7.9993</td>
<td align="left">7.9995</td>
</tr>
<tr>
<td align="left">5.2.10</td>
<td align="center">5.7056</td>
<td align="left">7.9991</td>
<td align="left">7.9993</td>
<td align="left">7.9990</td>
</tr>
<tr>
<td align="left">7.1.01</td>
<td align="center">6.0274</td>
<td align="left">7.9990</td>
<td align="left">7.9991</td>
<td align="left">7.9992</td>
</tr>
<tr>
<td align="left">7.1.02</td>
<td align="center">4.0045</td>
<td align="left">7.9991</td>
<td align="left">7.9992</td>
<td align="left">7.9996</td>
</tr>
<tr>
<td align="left">7.1.04</td>
<td align="center">6.1074</td>
<td align="left">7.9992</td>
<td align="left">7.9993</td>
<td align="left">7.9993</td>
</tr>
<tr>
<td align="left">7.1.05</td>
<td align="center">6.5632</td>
<td align="left">7.9992</td>
<td align="left">7.9992</td>
<td align="left">7.9992</td>
</tr>
<tr>
<td align="left">7.1.06</td>
<td align="center">6.6953</td>
<td align="left">7.9992</td>
<td align="left">7.9993</td>
<td align="left">7.9996</td>
</tr>
<tr>
<td align="left">7.1.07</td>
<td align="center">5.9916</td>
<td align="left">7.9991</td>
<td align="left">7.9993</td>
<td align="left">7.9995</td>
</tr>
<tr>
<td align="left">7.1.08</td>
<td align="center">5.5034</td>
<td align="left">7.9990</td>
<td align="left">7.9993</td>
<td align="left">7.9996</td>
</tr>
<tr>
<td align="left">7.1.09</td>
<td align="center">6.1898</td>
<td align="left">7.9991</td>
<td align="left">7.9992</td>
<td align="left">7.9995</td>
</tr>
<tr>
<td align="left">7.1.10</td>
<td align="center">5.9088</td>
<td align="left">7.9990</td>
<td align="left">7.9993</td>
<td align="left">7.9995</td>
</tr>
<tr>
<td align="left">Boat.512</td>
<td align="center">7.1914</td>
<td align="left">7.9992</td>
<td align="left">7.9994</td>
<td align="left">7.9996</td>
</tr>
<tr>
<td align="left">Elaine.512</td>
<td align="center">7.5060</td>
<td align="left">7.9992</td>
<td align="left">7.9993</td>
<td align="left">7.9994</td>
</tr>
<tr>
<td align="left">Gray21.512</td>
<td align="center">4.3923</td>
<td align="left">7.9993</td>
<td align="left">7.9994</td>
<td align="left">7.9996</td>
</tr>
<tr>
<td align="left">Numbers.512</td>
<td align="center">7.7292</td>
<td align="left">7.9994</td>
<td align="left">7.9991</td>
<td align="left">7.9995</td>
</tr>
<tr>
<td align="left">Ruler.512</td>
<td align="center">0.5000</td>
<td align="left">7.9987</td>
<td align="left">7.9992</td>
<td align="left">7.9996</td>
</tr>
<tr>
<td align="left">Mean</td>
<td align="center">&#x2014;</td>
<td align="left">7.9991</td>
<td align="left">7.9993</td>
<td align="left">7.9994</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>The information entropy can better reflect the overall randomness of the image, while the local information entropy can better reflect the microscopic randomness of the image. Local information entropy is an improved information algorithm that selects nonoverlapping regions in an image and calculates the evaluation information entropy of these regions, which is calculated as in Eq. <xref ref-type="disp-formula" rid="e20">20</xref>:<disp-formula id="e20">
<mml:math id="m84">
<mml:mrow>
<mml:mover accent="true">
<mml:mrow>
<mml:msub>
<mml:mi>H</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>k</mml:mi>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>T</mml:mi>
<mml:mi>B</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>S</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
<mml:mo>&#xaf;</mml:mo>
</mml:mover>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:mfrac>
<mml:mrow>
<mml:mstyle displaystyle="true">
<mml:munderover>
<mml:mo>&#x2211;</mml:mo>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mi>k</mml:mi>
</mml:munderover>
</mml:mstyle>
<mml:mrow>
<mml:mi>H</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:msub>
<mml:mi>S</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mrow>
</mml:mrow>
</mml:math>
<label>(20)</label>
</disp-formula>
<inline-formula id="inf65">
<mml:math id="m85">
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> denotes the number of regions, <inline-formula id="inf66">
<mml:math id="m86">
<mml:mrow>
<mml:msub>
<mml:mi>T</mml:mi>
<mml:mi>B</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> denotes the number of pixels in the selected regions, and <inline-formula id="inf67">
<mml:math id="m87">
<mml:mrow>
<mml:mover accent="true">
<mml:mrow>
<mml:msub>
<mml:mi>H</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>k</mml:mi>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>T</mml:mi>
<mml:mi>B</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>S</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
<mml:mo>&#xaf;</mml:mo>
</mml:mover>
</mml:mrow>
</mml:math>
</inline-formula> denotes the local information entropy. Let <inline-formula id="inf68">
<mml:math id="m88">
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> &#x3d; 30, and the confidence interval of local information entropy is [7.900,573,7.904,227] when the significance level is 0.05. The local information entropy of the test image is shown in <xref ref-type="table" rid="T4">Table 4</xref>, and the encryption algorithm proposed in this paper and those in [<xref ref-type="bibr" rid="B22">22</xref>, <xref ref-type="bibr" rid="B23">23</xref>, <xref ref-type="bibr" rid="B25">25</xref>] are all within the confidence interval. However, the mean value of 7.902,633 of the proposed algorithm in this paper is better than that of [<xref ref-type="bibr" rid="B25">25</xref>]. The standard deviation in this paper is 0.000102, which is smaller than those of the three compared methods. The local randomness of the image encrypted by the proposed algorithm is also better than the three compared methods in terms of stability performance.</p>
<table-wrap id="T4" position="float">
<label>TABLE 4</label>
<caption>
<p>Comparison of local Shannon entropy.</p>
</caption>
<table>
<thead valign="top">
<tr>
<th align="left">Test image</th>
<th align="left">Size</th>
<th align="left">Reference [<xref ref-type="bibr" rid="B23">23</xref>]</th>
<th align="left">Reference [<xref ref-type="bibr" rid="B22">22</xref>]</th>
<th align="left">Reference [<xref ref-type="bibr" rid="B25">25</xref>]</th>
<th align="left">Proposed</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="left">5.2.08</td>
<td rowspan="21" align="left">512 &#xd7; 512</td>
<td align="left">7.902,793</td>
<td align="left">7.902,831</td>
<td align="left">7.902,038</td>
<td align="left">7.902,658</td>
</tr>
<tr>
<td align="left">5.2.09</td>
<td align="left">7.902,972</td>
<td align="left">7.903,028</td>
<td align="left">7.902,722</td>
<td align="left">7.902,726</td>
</tr>
<tr>
<td align="left">5.2.10</td>
<td align="left">7.902,464</td>
<td align="left">7.903,511</td>
<td align="left">7.902,478</td>
<td align="left">7.902,646</td>
</tr>
<tr>
<td align="left">7.1.01</td>
<td align="left">7.903,339</td>
<td align="left">7.903,252</td>
<td align="left">7.902,012</td>
<td align="left">7.902,714</td>
</tr>
<tr>
<td align="left">7.1.02</td>
<td align="left">7.902,649</td>
<td align="left">7.903,313</td>
<td align="left">7.902,484</td>
<td align="left">7.902,660</td>
</tr>
<tr>
<td align="left">7.1.03</td>
<td align="left">7.902,493</td>
<td align="left">7.903,103</td>
<td align="left">7.902,833</td>
<td align="left">7.902,698</td>
</tr>
<tr>
<td align="left">7.1.04</td>
<td align="left">7.903,261</td>
<td align="left">7.902,625</td>
<td align="left">7.902,047</td>
<td align="left">7.902,685</td>
</tr>
<tr>
<td align="left">7.1.05</td>
<td align="left">7.902,714</td>
<td align="left">7.902,435</td>
<td align="left">7.902,568</td>
<td align="left">7.902,669</td>
</tr>
<tr>
<td align="left">7.1.06</td>
<td align="left">7.902,563</td>
<td align="left">7.902,675</td>
<td align="left">7.902,022</td>
<td align="left">7.902,712</td>
</tr>
<tr>
<td align="left">7.1.07</td>
<td align="left">7.903,185</td>
<td align="left">7.902,813</td>
<td align="left">7.902,398</td>
<td align="left">7.902,683</td>
</tr>
<tr>
<td align="left">7.1.08</td>
<td align="left">7.902,805</td>
<td align="left">7.902,668</td>
<td align="left">7.902,137</td>
<td align="left">7.902,697</td>
</tr>
<tr>
<td align="left">7.1.09</td>
<td align="left">7.903,070</td>
<td align="left">7.902,632</td>
<td align="left">7.902,142</td>
<td align="left">7.902,657</td>
</tr>
<tr>
<td align="left">7.1.10</td>
<td align="left">7.902,929</td>
<td align="left">7.902,486</td>
<td align="left">7.902,171</td>
<td align="left">7.902,706</td>
</tr>
<tr>
<td align="left">Boat.512</td>
<td align="left">7.902,697</td>
<td align="left">7.902,885</td>
<td align="left">7.902,046</td>
<td align="left">7.902,438</td>
</tr>
<tr>
<td align="left">Elaine.512</td>
<td align="left">7.902,755</td>
<td align="left">7.902,805</td>
<td align="left">7.902,632</td>
<td align="left">7.902,642</td>
</tr>
<tr>
<td align="left">Gray21.512</td>
<td align="left">7.903,661</td>
<td align="left">7.903,106</td>
<td align="left">7.902,718</td>
<td align="left">7.902,495</td>
</tr>
<tr>
<td align="left">Numbers.512</td>
<td align="left">7.902,545</td>
<td align="left">7.903,263</td>
<td align="left">7.902,067</td>
<td align="left">7.902,368</td>
</tr>
<tr>
<td align="left">Ruler.512</td>
<td align="left">7.902,896</td>
<td align="left">7.902,848</td>
<td align="left">7.902,004</td>
<td align="left">7.902,549</td>
</tr>
<tr>
<td align="left">Mean</td>
<td align="left">7.902,877</td>
<td align="left">7.902,904</td>
<td align="left">7.902,307</td>
<td align="left">7.902,633</td>
</tr>
<tr>
<td align="left">STD</td>
<td align="left">0.000324</td>
<td align="left">0.000303</td>
<td align="left">0.0002931</td>
<td align="left">0.000102</td>
</tr>
<tr>
<td align="left">PASS/ALL</td>
<td align="left">ALL</td>
<td align="left">ALL</td>
<td align="left">ALL</td>
<td align="left">ALL</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec id="s4-6">
<title>4.6 Clipping attack and noise attack</title>
<p>A clipping attack is an attack method that intercepts and destroys or removes part of the data of a cipher-text image during transmission. Usually, the clipped part is a region in the image with strong interpixel correlation, and the lost information is difficult to recover. Therefore, breaking the interpixel correlation is a measure of the clipping resistance performance of the image encryption algorithm. If the strong interpixel correlation of the image leads to decryption, it may fail when the cipher-text image after the loss of information does not provide enough valid information. In this paper, by combining two-dimensional difference mapping with the Josephus cycle, the image is dislocated using a chunking strategy with uniform pixel distribution, and when the cipher-text image is clipped, the clipped part is not a complete distinction in the original image but is scattered in various regional points so that the clipped image still retains enough information to enable it to recover the corresponding plain-text image. The following test images of Lena et al. shown in <xref ref-type="fig" rid="F8">Figure 8</xref> are clipped by 1/16, 1/8, and 1/4 (the pixels at the clipped position are all 0, and the clipped sample is shown in <xref ref-type="fig" rid="F10">Figure 10</xref>), and the decrypted image of the clipped cipher-text image is shown in the second row of <xref ref-type="fig" rid="F8">Figure 8</xref>. The algorithm in this paper has certain recovery ability when subjected to clipping attacks, and the encryption algorithm in this paper can resist certain clipping attacks.</p>
<fig id="F8" position="float">
<label>FIGURE 8</label>
<caption>
<p>Encryption results after clipping attack <bold>(A)</bold> Encryption of Lena&#x2019;s 1/4 clipping, <bold>(B)</bold> Encryption of Boat&#x2019;s 1/8 clipping, <bold>(C)</bold> Encryption of Feifei&#x2019;s 1/16 clipping.</p>
</caption>
<graphic xlink:href="fphy-11-1191793-g008.tif"/>
</fig>
<p>
<xref ref-type="fig" rid="F9">Figure 9</xref> shows the effect of Lean reduced by different decryption algorithms at the same degree of clipping, and it can be seen that the proposed encryption algorithm is different from [<xref ref-type="bibr" rid="B25">25</xref>]. There is almost no difference between the proposed encryption algorithm and [<xref ref-type="bibr" rid="B25">25</xref>], but it is significantly better than the algorithms in [<xref ref-type="bibr" rid="B26">26</xref>, <xref ref-type="bibr" rid="B27">27</xref>].</p>
<fig id="F9" position="float">
<label>FIGURE 9</label>
<caption>
<p>Decryption results after noise attack: <bold>(A)</bold> decryption of &#x201c;Lena&#x201d; with noise intensity of 0.25, <bold>(B)</bold> decryption of &#x201c;Ship&#x201d; with noise intensity of 0.10, and <bold>(C)</bold> Decryption of &#x201c;Baboon&#x201d; with noise intensity of 0.05.</p>
</caption>
<graphic xlink:href="fphy-11-1191793-g009.tif"/>
</fig>
<fig id="F10" position="float">
<label>FIGURE 10</label>
<caption>
<p>Comparison of decryption results after clipping attack: <bold>(A)</bold> 1/4&#xb0; clipping of the encrypted &#x201c;Lena&#x201d;, <bold>(B)</bold> Decryption by the algorithm proposed in this paper, <bold>(C)</bold> Decryption by the algorithm proposed in [<xref ref-type="bibr" rid="B25">25</xref>], <bold>(D)</bold> Decryption by the algorithm in [<xref ref-type="bibr" rid="B26">26</xref>], <bold>(E)</bold> Decryption by the algorithm in [<xref ref-type="bibr" rid="B27">27</xref>].</p>
</caption>
<graphic xlink:href="fphy-11-1191793-g010.tif"/>
</fig>
<p>Image noise is the unnecessary or redundant interference information that exists in image data. In the process of image acquisition or transmission, due to the influence of image sensor material, working environment, transmission channel, etc., the image may receive noise contamination, which will have a certain impact on the decryption of the terminal image. Therefore, the ability to resist certain noise attacks is an indicator of the performance of image encryption algorithms. In this paper, we use pepper noise to simulate noise contamination in transmission and add different intensities of pepper noise to the cipher image to test the anti-noise ability of the algorithm in this paper.</p>
<p>
<xref ref-type="fig" rid="F10">Figure 10</xref> shows the results obtained by restoring the test cipher-text image after adding pretzel noise with noise densities of 0.25, 0.10, and 0.05. From this, it can be seen that the greater the noise intensity, the deeper the impact on the image and the poorer the quality of the decrypted image, but the algorithm in this paper can still distinguish the main information of the original image from the overall effect, which indicates that the algorithm in this paper can tolerate a certain degree of noise and has a certain anti-interference ability.</p>
<p>
<xref ref-type="fig" rid="F11">Figure 11</xref> shows the individual results of using the encryption algorithms proposed in this paper and [<xref ref-type="bibr" rid="B25">25</xref>, <xref ref-type="bibr" rid="B26">26</xref>] for cipher-text image restoration under noise attacks. The first column shows the proposed algorithm in this paper, the second column shows the results of [<xref ref-type="bibr" rid="B25">25</xref>], and the third column is the results of [<xref ref-type="bibr" rid="B42">42</xref>]. The first row is a 1% noise attack, and the second row is a 5% noise attack. By comparing the decrypted images under the same noise interference, it can be seen that the decryption algorithm in this paper outperforms the other two encryption algorithms.</p>
<fig id="F11" position="float">
<label>FIGURE 11</label>
<caption>
<p>Comparison of decryption results after noise attack: <bold>(A)</bold> decrypted after a 1% noise attack by the proposed algorithm, <bold>(B)</bold> decrypted after a 1% noise attack by the algorithm in [<xref ref-type="bibr" rid="B25">25</xref>], <bold>(C)</bold> decrypted after a 1% noise attack by the algorithm in [<xref ref-type="bibr" rid="B42">42</xref>], <bold>(D)</bold> decrypted after a 5% noise attack by the proposed algorithm, <bold>(E)</bold> decrypted after a 5% noise attack by the algorithm in [<xref ref-type="bibr" rid="B25">25</xref>], and <bold>(F)</bold> decrypted after a 5% noise attack by the algorithm in [<xref ref-type="bibr" rid="B42">42</xref>].</p>
</caption>
<graphic xlink:href="fphy-11-1191793-g011.tif"/>
</fig>
</sec>
<sec id="s4-7">
<title>4.7 Lossless and perceived encryption analysis</title>
<p>The proposed method is lossless encryption. We use the value of the peak signal measure noise ratio (PSNR) to calculate the difference between the plain and cipher images. When the value of PSNR between the plain image and the cipher image is minimal, the encryption performance is better. In contrast, the PSNR value between plain and decrypted images must be infinity to prove that the encryption is lossless. PSNR can be calculated by Eq. <xref ref-type="disp-formula" rid="e21">(21)</xref>
<disp-formula id="e21">
<mml:math id="m89">
<mml:mrow>
<mml:mi>P</mml:mi>
<mml:mi>S</mml:mi>
<mml:mi>N</mml:mi>
<mml:mi>R</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>10</mml:mn>
<mml:mo>&#xd7;</mml:mo>
<mml:msub>
<mml:mi>log</mml:mi>
<mml:mn>10</mml:mn>
</mml:msub>
<mml:mo>&#x2061;</mml:mo>
<mml:mrow>
<mml:mo>(</mml:mo>
</mml:mrow>
<mml:msup>
<mml:mn>255</mml:mn>
<mml:mn>2</mml:mn>
</mml:msup>
<mml:mrow>
<mml:mo>/</mml:mo>
</mml:mrow>
<mml:mfrac>
<mml:mn>1</mml:mn>
<mml:mrow>
<mml:mi>M</mml:mi>
<mml:mi>N</mml:mi>
</mml:mrow>
</mml:mfrac>
<mml:mrow>
<mml:mstyle displaystyle="true">
<mml:munderover>
<mml:mo>&#x2211;</mml:mo>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mi>M</mml:mi>
</mml:munderover>
</mml:mstyle>
<mml:mrow>
<mml:mstyle displaystyle="true">
<mml:munderover>
<mml:mo>&#x2211;</mml:mo>
<mml:mrow>
<mml:mi>j</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mi>N</mml:mi>
</mml:munderover>
</mml:mstyle>
<mml:mfrac>
<mml:mrow>
<mml:msup>
<mml:mrow>
<mml:mfenced open="|" close="|" separators="|">
<mml:mrow>
<mml:mi>I</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:msup>
<mml:mi>I</mml:mi>
<mml:mo>&#x2032;</mml:mo>
</mml:msup>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mn>2</mml:mn>
</mml:msup>
</mml:mrow>
<mml:mrow>
<mml:mn>255</mml:mn>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:mrow>
</mml:mrow>
</mml:math>
<label>(21)</label>
</disp-formula>where I is the plain image, I&#x2032; is the image cipher or image decrypt depending on the calculation of the encryption or decryption process and the pixel coordinates are i, j. The result measured by PSNR is presented in <xref ref-type="table" rid="T3">Table 3</xref>.</p>
<p>We also use structural similarity (SSIM) to measure the quality of the encryption proposed for the cipher image. In addition, SSIM is also used to measure the quality of the decrypted image from the distortion that occurs, which has a value between 0 and 1. A large value means that SSIM is better. The SSIM can be calculated by Eq. <xref ref-type="disp-formula" rid="e22">22</xref>
<disp-formula id="e22">
<mml:math id="m90">
<mml:mrow>
<mml:mi>S</mml:mi>
<mml:mi>S</mml:mi>
<mml:mi>I</mml:mi>
<mml:mi>M</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mn>2</mml:mn>
<mml:msub>
<mml:mi>&#x3bc;</mml:mi>
<mml:mi>c</mml:mi>
</mml:msub>
<mml:msub>
<mml:mi>&#x3bc;</mml:mi>
<mml:mi>s</mml:mi>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:msub>
<mml:mi>C</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mn>2</mml:mn>
<mml:msub>
<mml:mi>&#x3c3;</mml:mi>
<mml:mrow>
<mml:mi>C</mml:mi>
<mml:mi>S</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:msub>
<mml:mi>C</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
<mml:mrow>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:msup>
<mml:msub>
<mml:mi>&#x3bc;</mml:mi>
<mml:mi>c</mml:mi>
</mml:msub>
<mml:mn>2</mml:mn>
</mml:msup>
<mml:mo>&#x2b;</mml:mo>
<mml:msup>
<mml:msub>
<mml:mi>&#x3bc;</mml:mi>
<mml:mi>s</mml:mi>
</mml:msub>
<mml:mn>2</mml:mn>
</mml:msup>
<mml:mo>&#x2b;</mml:mo>
<mml:msub>
<mml:mi>C</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:msup>
<mml:msub>
<mml:mi>&#x3c3;</mml:mi>
<mml:mi>c</mml:mi>
</mml:msub>
<mml:mn>2</mml:mn>
</mml:msup>
<mml:mo>&#x2b;</mml:mo>
<mml:msup>
<mml:msub>
<mml:mi>&#x3c3;</mml:mi>
<mml:mi>s</mml:mi>
</mml:msub>
<mml:mn>2</mml:mn>
</mml:msup>
<mml:mo>&#x2b;</mml:mo>
<mml:msub>
<mml:mi>C</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:math>
<label>(22)</label>
</disp-formula>where <inline-formula id="inf69">
<mml:math id="m91">
<mml:mrow>
<mml:msub>
<mml:mi>C</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> and <inline-formula id="inf70">
<mml:math id="m92">
<mml:mrow>
<mml:msub>
<mml:mi>C</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> are two constants, c represents the cover image and s means the stego image. Moreover, represent the average and the standard deviation, respectively. The result measured by SSIM is presented in <xref ref-type="table" rid="T5">Table 5</xref>.</p>
<table-wrap id="T5" position="float">
<label>TABLE 5</label>
<caption>
<p>SSIM between the cover image and stego image.</p>
</caption>
<table>
<thead valign="top">
<tr>
<th align="center">Test image</th>
<th align="center">Proposed</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="center">Boat.512</td>
<td align="center">0.9785</td>
</tr>
<tr>
<td align="center">Elaine.512</td>
<td align="center">0.9797</td>
</tr>
<tr>
<td align="center">Gray21.512</td>
<td align="center">0.9794</td>
</tr>
<tr>
<td align="center">Numbers.512</td>
<td align="center">0.9786</td>
</tr>
<tr>
<td align="center">Ruler.512</td>
<td align="center">0.9812</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec id="s4-8">
<title>4.8 Encryption time and encryption complexity analysis</title>
<p>In this section, we chose an image named Lena, which is a representation to compare the encryption time with the other encryption schemes. <xref ref-type="table" rid="T6">Table 6</xref> shows different algorithms&#x2019; encryption times. Encryption is not the best, but it is the best in decryption since decryption does not need to recive the pseudorandom sequence.</p>
<table-wrap id="T6" position="float">
<label>TABLE 6</label>
<caption>
<p>The running time of different algorithms.</p>
</caption>
<table>
<thead valign="top">
<tr>
<th align="center">Metric</th>
<th align="center">Input images</th>
<th align="center">Encryption(s)</th>
<th align="center">Decryption(s)</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="center">Reference [<xref ref-type="bibr" rid="B29">29</xref>]</td>
<td rowspan="7" align="center">Lena</td>
<td align="center">0.40585</td>
<td align="center">&#x2014;</td>
</tr>
<tr>
<td align="center">Reference [<xref ref-type="bibr" rid="B30">30</xref>]</td>
<td align="center">1.7351</td>
<td align="center">3.4689</td>
</tr>
<tr>
<td align="center">Reference [<xref ref-type="bibr" rid="B31">31</xref>]</td>
<td align="center">0.3440</td>
<td align="center">&#x2014;</td>
</tr>
<tr>
<td align="center">Reference [<xref ref-type="bibr" rid="B32">32</xref>]</td>
<td align="center">10.8232</td>
<td align="center">10.6952</td>
</tr>
<tr>
<td align="center">Reference [<xref ref-type="bibr" rid="B33">33</xref>]</td>
<td align="center">14.8401</td>
<td align="center">14.9266</td>
</tr>
<tr>
<td align="center">Reference [<xref ref-type="bibr" rid="B34">34</xref>]</td>
<td align="center">0.329,276</td>
<td align="center">0.217,033</td>
</tr>
<tr>
<td align="center">Proposed</td>
<td align="center">0.34498</td>
<td align="center">0.2017</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>The proposed algorithm&#x2019;s computational complexity mainly depends on the calculation of the integer data. The proposed encryption method&#x2019;s computational complexity is <inline-formula id="inf71">
<mml:math id="m93">
<mml:mrow>
<mml:mi mathvariant="normal">&#x398;</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mn>8</mml:mn>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>M</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mi>N</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#x2b;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>N</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:mfrac>
<mml:mo>&#x2b;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>M</mml:mi>
<mml:mo>&#xd7;</mml:mo>
<mml:mi>N</mml:mi>
</mml:mrow>
<mml:mn>2</mml:mn>
</mml:mfrac>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#x2264;</mml:mo>
<mml:mi mathvariant="normal">&#x398;</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>M</mml:mi>
<mml:mo>&#xd7;</mml:mo>
<mml:mi>N</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>, where <italic>M</italic> and <italic>N</italic> represent the length and width of the image, respectively. Therefore, the encryption scheme is proposed with a high encryption speed.</p>
</sec>
</sec>
<sec sec-type="conclusion" id="s5">
<title>5 Conclusion</title>
<p>To address the problems of weak security of current image encryption algorithms, this paper proposes a Josephus cycle image encryption algorithm based on a two-difference chaotic system. The chunking strategy is used to improve the efficiency of the scrambling diffusion, and the adaptive key generation algorithm is used to break the correlation between neighboring pixels through the scrambling diffusion of bit&#xa0;bits and bit planes by applying the rank transformation method and the Josephus cycle with variable step length and direction. Experimental evidence is conducted using USC-SIPI &#x27;Miscellaneous&#x2019; images, which are commonly used in encryption. The results show that the algorithm in this paper can effectively resist common attacks such as information analysis, brute force, noise, and clipping and can be applied to the encryption and transmission of image information. However, the algorithm in this paper also has certain shortcomings, and the bit-level encryption in this paper increases the complexity of the algorithm. To guarantee the security of the algorithm, it is complicated to choose the scrambling method, which affects the encryption speed, and if the algorithm is applied to fast mobile devices, the efficiency of the algorithm needs to be further improved.</p>
</sec>
</body>
<back>
<sec sec-type="data-availability" id="s6">
<title>Data availability statement</title>
<p>Publicly available datasets were analyzed in this study. This data can be found here: <ext-link ext-link-type="uri" xlink:href="http://sipi.usc.edu/database/">http://sipi.usc.edu/database/</ext-link>.</p>
</sec>
<sec id="s7">
<title>Author contributions</title>
<p>HZ provided the idea of algorithm. HZ and WS carried out the simulations, arranged the architecture, and drafted the manuscript. LL supervised the work and revised the manuscript. Both authors read and approved the final manuscript.All authors contributed to the article and approved the submitted version.</p>
</sec>
<sec sec-type="COI-statement" id="s8">
<title>Conflict of interest</title>
<p>The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.</p>
</sec>
<sec sec-type="disclaimer" id="s9">
<title>Publisher&#x2019;s note</title>
<p>All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.</p>
</sec>
<ref-list>
<title>References</title>
<ref id="B1">
<label>1.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Matthews</surname>
<given-names>R</given-names>
</name>
</person-group>. <article-title>On the derivation of a &#x201c;Chaotic&#x201d; encryption algorithm</article-title>. <source>Cryptologic</source> (<year>1989</year>) <volume>13</volume>(<issue>1</issue>):<fpage>29</fpage>&#x2013;<lpage>42</lpage>. <pub-id pub-id-type="doi">10.1080/0161-118991863745</pub-id>
</citation>
</ref>
<ref id="B2">
<label>2.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Fridrich</surname>
<given-names>J</given-names>
</name>
</person-group>. <article-title>Symmetric ciphers based on two-dimensional chaotic maps</article-title>. <source>Int J Bifurcation chaos</source> (<year>1998</year>) <volume>8</volume>(<issue>6</issue>):<fpage>1259</fpage>&#x2013;<lpage>84</lpage>. <pub-id pub-id-type="doi">10.1142/s021812749800098x</pub-id>
</citation>
</ref>
<ref id="B3">
<label>3.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Shannon</surname>
<given-names>CE</given-names>
</name>
</person-group>. <article-title>Communication theory of secrecy systems</article-title>. <source>Bell Syst Tech J</source> (<year>1949</year>) <volume>28</volume>(<issue>4</issue>):<fpage>656</fpage>&#x2013;<lpage>715</lpage>. <pub-id pub-id-type="doi">10.1002/j.1538-7305.1949.tb00928.x</pub-id>
</citation>
</ref>
<ref id="B4">
<label>4.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Li</surname>
<given-names>CQ</given-names>
</name>
<name>
<surname>Lin</surname>
<given-names>D</given-names>
</name>
<name>
<surname>Lu</surname>
<given-names>JH</given-names>
</name>
</person-group>. <article-title>Cryptanalyzing an Image-Scrambling encryption algorithm of pixel bits</article-title>. <source>IEEE Multimedia</source> (<year>2017</year>) <volume>24</volume>(<issue>3</issue>):<fpage>64</fpage>&#x2013;<lpage>71</lpage>. <pub-id pub-id-type="doi">10.1109/mmul.2017.3051512</pub-id>
</citation>
</ref>
<ref id="B5">
<label>5.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Hua</surname>
<given-names>ZY</given-names>
</name>
<name>
<surname>Yi</surname>
<given-names>S</given-names>
</name>
<name>
<surname>Zhou</surname>
<given-names>Y</given-names>
</name>
</person-group>. <article-title>Medical image encryption using high-speed scrambling and pixel adaptive diffusion</article-title>. <source>Signal Process.</source> (<year>2018</year>) <volume>144</volume>:<fpage>134</fpage>&#x2013;<lpage>44</lpage>. <pub-id pub-id-type="doi">10.1016/j.sigpro.2017.10.004</pub-id>
</citation>
</ref>
<ref id="B6">
<label>6.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Hu</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Han</surname>
<given-names>F</given-names>
</name>
</person-group>. <article-title>A pixel-based scrambling scheme for digital medical images protection</article-title>. <source>J Netw Comput Appl</source> (<year>2009</year>) <volume>32</volume>(<issue>4</issue>):<fpage>788</fpage>&#x2013;<lpage>94</lpage>. <pub-id pub-id-type="doi">10.1016/j.jnca.2009.02.009</pub-id>
</citation>
</ref>
<ref id="B7">
<label>7.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zheng</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Luo</surname>
<given-names>Z</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>Q</given-names>
</name>
</person-group>. <article-title>An efficient image encryption algorithm based on multi chaotic system and random DAN coding</article-title>. <source>Multimedia Tools Appl</source> (<year>2020</year>) <volume>79</volume>:<fpage>29901</fpage>&#x2013;<lpage>21</lpage>. <pub-id pub-id-type="doi">10.1007/s11042-020-09454-9</pub-id>
</citation>
</ref>
<ref id="B8">
<label>8.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Gao</surname>
<given-names>T</given-names>
</name>
<name>
<surname>Chen</surname>
<given-names>Z</given-names>
</name>
</person-group>. <article-title>Image encryption based on a new total shuffling algorithm</article-title>. <source>Chaos, solitons and fractals</source> (<year>2008</year>) <volume>38</volume>(<issue>1</issue>):<fpage>213</fpage>&#x2013;<lpage>20</lpage>. <pub-id pub-id-type="doi">10.1016/j.chaos.2006.11.009</pub-id>
</citation>
</ref>
<ref id="B9">
<label>9.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Pak</surname>
<given-names>C</given-names>
</name>
<name>
<surname>An</surname>
<given-names>K</given-names>
</name>
<name>
<surname>Jang</surname>
<given-names>P</given-names>
</name>
<name>
<surname>Kim</surname>
<given-names>J</given-names>
</name>
</person-group>. <article-title>A novel bit-level color image encryption using improved 1D chaotic map</article-title>. <source>Multimedia Tools Appl</source> (<year>2018</year>) <volume>78</volume>(<issue>9</issue>):<fpage>12027</fpage>&#x2013;<lpage>42</lpage>. <pub-id pub-id-type="doi">10.1007/s11042-018-6739-1</pub-id>
</citation>
</ref>
<ref id="B10">
<label>10.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Elmanfaloty</surname>
<given-names>RA</given-names>
</name>
<name>
<surname>Abou-Bakr</surname>
<given-names>E</given-names>
</name>
</person-group>. <article-title>An image encryption scheme using a 1D chaotic double section skew tent map</article-title>. <source>Complexity</source> (<year>2020</year>) <volume>2020</volume>:<fpage>7647421</fpage>&#x2013;<lpage>18</lpage>. <pub-id pub-id-type="doi">10.1155/2020/7647421</pub-id>
</citation>
</ref>
<ref id="B11">
<label>11.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Wang</surname>
<given-names>XY</given-names>
</name>
<name>
<surname>Yang</surname>
<given-names>L</given-names>
</name>
<name>
<surname>Liu</surname>
<given-names>R</given-names>
</name>
<name>
<surname>Kadir</surname>
<given-names>A</given-names>
</name>
</person-group>. <article-title>A chaotic image encryption algorithm based on perceptron model</article-title>. <source>Nonlinear Dyn</source> (<year>2010</year>) <volume>62</volume>(<issue>3</issue>):<fpage>615</fpage>&#x2013;<lpage>21</lpage>. <pub-id pub-id-type="doi">10.1007/s11071-010-9749-8</pub-id>
</citation>
</ref>
<ref id="B12">
<label>12.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Cheng</surname>
<given-names>G</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>C</given-names>
</name>
<name>
<surname>Chen</surname>
<given-names>H</given-names>
</name>
</person-group>. <article-title>A novel color image encryption algorithm based on hyperchaotic system and permutation-diffusion architecture</article-title>. <source>Int J Bifurcation Chaos</source> (<year>2019</year>) <volume>29</volume>(<issue>09</issue>):<fpage>1950115</fpage>. <pub-id pub-id-type="doi">10.1142/s0218127419501153</pub-id>
</citation>
</ref>
<ref id="B13">
<label>13.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Wang</surname>
<given-names>X</given-names>
</name>
<name>
<surname>Teng</surname>
<given-names>L</given-names>
</name>
<name>
<surname>Qin</surname>
<given-names>X</given-names>
</name>
</person-group>. <article-title>A novel colour image encryption algorithm based on chaos</article-title>. <source>Signal Process</source> (<year>2012</year>) <volume>92</volume>:<fpage>1101</fpage>&#x2013;<lpage>8</lpage>. <pub-id pub-id-type="doi">10.1016/j.sigpro.2011.10.023</pub-id>
</citation>
</ref>
<ref id="B14">
<label>14.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Arroyo</surname>
<given-names>D</given-names>
</name>
<name>
<surname>Diaz</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Rodriguez</surname>
<given-names>FB</given-names>
</name>
</person-group>. <article-title>Cryptanalysis of a one round chaos-based substitution permutation network</article-title>. <source>Signal Process</source> (<year>2013</year>) <volume>93</volume>:<fpage>1358</fpage>&#x2013;<lpage>64</lpage>. <pub-id pub-id-type="doi">10.1016/j.sigpro.2012.11.019</pub-id>
</citation>
</ref>
<ref id="B15">
<label>15.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Hua</surname>
<given-names>Z</given-names>
</name>
<name>
<surname>Zhou</surname>
<given-names>Y</given-names>
</name>
</person-group>. <article-title>Image encryption using 2D logistic-adjusted-sine map</article-title>. <source>Inf Sci</source> (<year>2016</year>) <volume>339</volume>:<fpage>237</fpage>&#x2013;<lpage>53</lpage>. <pub-id pub-id-type="doi">10.1016/j.ins.2016.01.017</pub-id>
</citation>
</ref>
<ref id="B16">
<label>16.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Chen</surname>
<given-names>C</given-names>
</name>
<name>
<surname>Sun</surname>
<given-names>K</given-names>
</name>
<name>
<surname>He</surname>
<given-names>S</given-names>
</name>
</person-group>. <article-title>An improved image encryption algorithm with finite computing precision</article-title>. <source>Signal Process</source> (<year>2020</year>) <volume>168</volume>:<fpage>107340</fpage>. <pub-id pub-id-type="doi">10.1016/j.sigpro.2019.107340</pub-id>
</citation>
</ref>
<ref id="B17">
<label>17.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Flores-Vergara</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Inzunza-Gonzalez</surname>
<given-names>E</given-names>
</name>
<name>
<surname>Garcia-Guerrero</surname>
<given-names>E</given-names>
</name>
<name>
<surname>L&#xf3;pez-Bonilla</surname>
<given-names>O</given-names>
</name>
<name>
<surname>Rodr&#xed;guez-Orozco</surname>
<given-names>E</given-names>
</name>
<name>
<surname>Hern&#xe1;ndez-Ontiveros</surname>
<given-names>J</given-names>
</name>
<etal/>
</person-group> <article-title>Implementing a chaotic cryptosystem by performing parallel computing on embedded systems with multiprocessors</article-title>. <source>Entropy</source> (<year>2019</year>) <volume>21</volume>:<fpage>268</fpage>. <pub-id pub-id-type="doi">10.3390/e21030268</pub-id>
</citation>
</ref>
<ref id="B18">
<label>18.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Niu</surname>
<given-names>Y</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>X</given-names>
</name>
</person-group>. <article-title>An image encryption algorithm based on filling curve and adjacent pixel bit scrambling</article-title>. <source>J Electro Inf Tech</source> (<year>2022</year>) <volume>44</volume>(<issue>3</issue>):<fpage>1137</fpage>&#x2013;<lpage>46</lpage>.</citation>
</ref>
<ref id="B19">
<label>19.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Rehman</surname>
<given-names>AU</given-names>
</name>
<name>
<surname>Liao</surname>
<given-names>X</given-names>
</name>
<name>
<surname>Kulsoom</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Ullah</surname>
<given-names>S</given-names>
</name>
</person-group>. <article-title>A modified (Dual) fusion technique for image encryption using SHA-256 hash and multiple chaotic maps</article-title>. <source>Multimedia Tools Appl</source> (<year>2016</year>) <volume>75</volume>(<issue>18</issue>):<fpage>11241</fpage>&#x2013;<lpage>66</lpage>. <pub-id pub-id-type="doi">10.1007/s11042-015-2851-7</pub-id>
</citation>
</ref>
<ref id="B20">
<label>20.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Lin</surname>
<given-names>T</given-names>
</name>
<name>
<surname>Xu</surname>
<given-names>Y</given-names>
</name>
</person-group>. <article-title>Experimental study of different parameters on chaotic stream ciphers forinformation encryption</article-title>. <source>Acta Scientiarum Naturalium Universitatis Sunyatseni</source> (<year>2004</year>) <volume>43</volume>(<issue>S2</issue>):<fpage>101</fpage>&#x2013;<lpage>4</lpage>. <pub-id pub-id-type="doi">10.3321/j.issn:0529-6579.2004.z2.026</pub-id>
</citation>
</ref>
<ref id="B21">
<label>21.</label>
<citation citation-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Huang</surname>
<given-names>L</given-names>
</name>
<name>
<surname>Han</surname>
<given-names>G</given-names>
</name>
<name>
<surname>Xiang</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Min</surname>
<given-names>L</given-names>
</name>
</person-group>. <article-title>Optimization of chaotic measurement matrix in compressive sensing</article-title>. In: <conf-name>Proceedings of the 2nd International Conference on Digital Signal Processing</conf-name>; <conf-loc>Tokyo</conf-loc> (<year>2018</year>).</citation>
</ref>
<ref id="B22">
<label>22.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Alawida</surname>
<given-names>M</given-names>
</name>
<name>
<surname>Samsudin</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Alshoura</surname>
<given-names>WH</given-names>
</name>
</person-group>. <article-title>An image encryption scheme based on hybridizing digital chaos and finite state machine</article-title>. <source>Signal Process</source> (<year>2019</year>) <volume>164</volume>:<fpage>249</fpage>&#x2013;<lpage>66</lpage>. <pub-id pub-id-type="doi">10.1016/j.sigpro.2019.06.013</pub-id>
</citation>
</ref>
<ref id="B23">
<label>23.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Himeur</surname>
<given-names>Y</given-names>
</name>
<name>
<surname>Boukabou</surname>
<given-names>A</given-names>
</name>
</person-group>. <article-title>A robust and secure key-frames based video watermarking system using chaotic encryption</article-title>. <source>Multimedia Tools Appl</source> (<year>2018</year>) <volume>77</volume>(<issue>7</issue>):<fpage>8603</fpage>&#x2013;<lpage>27</lpage>. <pub-id pub-id-type="doi">10.1007/s11042-017-4754-2</pub-id>
</citation>
</ref>
<ref id="B24">
<label>24.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zhou</surname>
<given-names>Y</given-names>
</name>
<name>
<surname>Bao</surname>
<given-names>L</given-names>
</name>
<name>
<surname>Chen</surname>
<given-names>L</given-names>
</name>
</person-group>. <article-title>Image encryption using a new parametric switching chaotic system</article-title>. <source>Signal Process</source> (<year>2013</year>) <volume>93</volume>(<issue>11</issue>):<fpage>3039</fpage>&#x2013;<lpage>52</lpage>. <pub-id pub-id-type="doi">10.1016/j.sigpro.2013.04.021</pub-id>
</citation>
</ref>
<ref id="B25">
<label>25.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Xian</surname>
<given-names>Y</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>X</given-names>
</name>
</person-group>. <article-title>Fractal sorting matrix and its application on chaotic image encryption</article-title>. <source>Inf Sci</source> (<year>2021</year>) <volume>547</volume>:<fpage>1154</fpage>&#x2013;<lpage>69</lpage>. <pub-id pub-id-type="doi">10.1016/j.ins.2020.09.055</pub-id>
</citation>
</ref>
<ref id="B26">
<label>26.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Cun</surname>
<given-names>Q</given-names>
</name>
<name>
<surname>Tong</surname>
<given-names>X</given-names>
</name>
<name>
<surname>Zhu</surname>
<given-names>W</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>M</given-names>
</name>
</person-group>. <article-title>Selective image encryption method based on dynamic DNA coding and new chaotic map</article-title>. <source>Optik</source> (<year>2021</year>) <volume>243</volume>:<fpage>167286</fpage>. <pub-id pub-id-type="doi">10.1016/j.ijleo.2021.167286</pub-id>
</citation>
</ref>
<ref id="B27">
<label>27.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Chai</surname>
<given-names>X</given-names>
</name>
<name>
<surname>Chen</surname>
<given-names>Y</given-names>
</name>
<name>
<surname>Broyde</surname>
<given-names>L</given-names>
</name>
</person-group>. <article-title>A novel chaos-based image encryption algorithm using DNA sequence operations,</article-title>. <source>Opt Lasers Eng</source> (<year>2017</year>) <volume>88</volume>:<fpage>197</fpage>&#x2013;<lpage>213</lpage>. <pub-id pub-id-type="doi">10.1016/j.optlaseng.2016.08.009</pub-id>
</citation>
</ref>
<ref id="B28">
<label>28.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Hua</surname>
<given-names>Z</given-names>
</name>
<name>
<surname>Xu</surname>
<given-names>B</given-names>
</name>
<name>
<surname>Jin</surname>
<given-names>F</given-names>
</name>
<name>
<surname>Huang</surname>
<given-names>F</given-names>
</name>
</person-group>. <article-title>Image encryption using Josephus problem and filtering diffusion</article-title>. <source>IEEE Access</source> (<year>2021</year>) <volume>7</volume>:<fpage>8660</fpage>&#x2013;<lpage>74</lpage>. <pub-id pub-id-type="doi">10.1109/access.2018.2890116</pub-id>
</citation>
</ref>
<ref id="B29">
<label>29.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Girdhar</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Kapur</surname>
<given-names>H</given-names>
</name>
<name>
<surname>Kumar</surname>
<given-names>V</given-names>
</name>
</person-group>. <article-title>A novel grayscale image encryption approach based on chaotic maps and image blocks</article-title>. <source>Appl Phys</source> (<year>2021</year>) <volume>127</volume>:<fpage>39</fpage>. <pub-id pub-id-type="doi">10.1007/s00340-021-07585-x</pub-id>
</citation>
</ref>
<ref id="B30">
<label>30.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Yan</surname>
<given-names>X</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>X</given-names>
</name>
<name>
<surname>Xian</surname>
<given-names>Y</given-names>
</name>
</person-group>. <article-title>Chaotic image encryption algorithm based on arithmetic sequence scrambling model and DNA encoding operation</article-title>. <source>Multimedia Tools Appl</source> (<year>2021</year>) <volume>80</volume>:<fpage>10949</fpage>&#x2013;<lpage>83</lpage>. <pub-id pub-id-type="doi">10.1007/s11042-020-10218-8</pub-id>
</citation>
</ref>
<ref id="B31">
<label>31.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Ping</surname>
<given-names>P</given-names>
</name>
<name>
<surname>Xu</surname>
<given-names>F</given-names>
</name>
<name>
<surname>Mao</surname>
<given-names>Y</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>Z</given-names>
</name>
</person-group>. <article-title>Designing permutation&#x2013;substitution image encryption networks with Henon map</article-title>. <source>Neurocomputing</source> (<year>2018</year>) <volume>283</volume>:<fpage>53</fpage>&#x2013;<lpage>63</lpage>. <pub-id pub-id-type="doi">10.1016/j.neucom.2017.12.048</pub-id>
</citation>
</ref>
<ref id="B32">
<label>32.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Chai</surname>
<given-names>X</given-names>
</name>
<name>
<surname>Gan</surname>
<given-names>Z</given-names>
</name>
<name>
<surname>Yuan</surname>
<given-names>K</given-names>
</name>
<name>
<surname>Chen</surname>
<given-names>Y</given-names>
</name>
<name>
<surname>Liu</surname>
<given-names>X</given-names>
</name>
</person-group>. <article-title>A novel image encryption scheme based on DNA sequence operations and chaotic systems</article-title>. <source>Neural Comput Appl</source> (<year>2019</year>) <volume>31</volume>:<fpage>219</fpage>&#x2013;<lpage>37</lpage>. <pub-id pub-id-type="doi">10.1007/s00521-017-2993-9</pub-id>
</citation>
</ref>
<ref id="B33">
<label>33.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Hu</surname>
<given-names>T</given-names>
</name>
<name>
<surname>Liu</surname>
<given-names>Y</given-names>
</name>
<name>
<surname>Gong</surname>
<given-names>L</given-names>
</name>
<name>
<surname>Ouyang</surname>
<given-names>C</given-names>
</name>
</person-group>. <article-title>An image encryption scheme combining chaos with cycle operation for DNA sequences</article-title>. <source>Nonlinear Dyn</source> (<year>2016</year>) <volume>87</volume>:<fpage>51</fpage>&#x2013;<lpage>66</lpage>. <pub-id pub-id-type="doi">10.1007/s11071-016-3024-6</pub-id>
</citation>
</ref>
<ref id="B34">
<label>34.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Sakshi</surname>
<given-names>P</given-names>
</name>
<name>
<surname>Thanikkaiselvan</surname>
<given-names>V</given-names>
</name>
</person-group>. <article-title>Image encryption using a spectrally efficient halton logistics tent (HaLT) Map and DNA encoding for secured</article-title>. <source>Entropy</source> (<year>2022</year>).</citation>
</ref>
<ref id="B35">
<label>35.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Yu</surname>
<given-names>Z</given-names>
</name>
<name>
<surname>Yang</surname>
<given-names>Z</given-names>
</name>
</person-group>. <article-title>Method of remote sensing image detail encryption based on symmetry algorithm</article-title>. <source>J Ambient Intelligence Humanized Comput</source> (<year>2021</year>). <pub-id pub-id-type="doi">10.1007/s12652-020-02818-x</pub-id>
</citation>
</ref>
<ref id="B36">
<label>36.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Hua</surname>
<given-names>Z</given-names>
</name>
<name>
<surname>Zhou</surname>
<given-names>Y</given-names>
</name>
</person-group>. <article-title>Design of image cipher using block-based scrambling and image filtering</article-title>. <source>Inf Sci</source> (<year>2017</year>) <volume>396</volume>:<fpage>97</fpage>&#x2013;<lpage>113</lpage>. <pub-id pub-id-type="doi">10.1016/j.ins.2017.02.036</pub-id>
</citation>
</ref>
<ref id="B37">
<label>37.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Park</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Dogan</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Te&#x131;xe&#x131;raBlock</surname>
<given-names>R</given-names>
</name>
</person-group>. <article-title>Josephus Problem: When the reality is more cruel than the old story</article-title>. <source>Hacettepe J Math Stat</source> (<year>2021</year>) <volume>50</volume>:<fpage>970</fpage>&#x2013;<lpage>81</lpage>.</citation>
</ref>
<ref id="B38">
<label>38.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Chai</surname>
<given-names>X</given-names>
</name>
<name>
<surname>Fu</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Gan</surname>
<given-names>Z</given-names>
</name>
<name>
<surname>Lu</surname>
<given-names>Y</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>Y</given-names>
</name>
</person-group>. <article-title>An image encryption scheme based on multi-objective optimization and block compressed sensing</article-title>. <source>Nonlinear Dyn</source> (<year>2022</year>) <volume>108</volume>:<fpage>2671</fpage>&#x2013;<lpage>704</lpage>. <pub-id pub-id-type="doi">10.1007/s11071-022-07328-3</pub-id>
</citation>
</ref>
<ref id="B39">
<label>39.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Nakano</surname>
<given-names>K</given-names>
</name>
<name>
<surname>Suzuki</surname>
<given-names>K</given-names>
</name>
</person-group>. <article-title>Known-plaintext attack-based analysis of double random phase encoding using multiple known plaintext-ciphertext pairs</article-title>. <source>Appl Opt</source> (<year>2022</year>) <volume>61</volume>:<fpage>9010</fpage>&#x2013;<lpage>9</lpage>. <pub-id pub-id-type="doi">10.1364/ao.469244</pub-id>
</citation>
</ref>
<ref id="B40">
<label>40.</label>
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Nicholson</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Bailey</surname>
<given-names>V</given-names>
</name>
</person-group>. <source>The balance of animal populations: Part I, in proceedings of the zoological society of landon</source>. <publisher-loc>Oxford, UK</publisher-loc>: <publisher-name>Blackwell Publishing</publisher-name> (<year>1935</year>). p. <fpage>551</fpage>&#x2013;<lpage>98</lpage>.</citation>
</ref>
<ref id="B41">
<label>41.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Hassan</surname>
<given-names>S</given-names>
</name>
<name>
<surname>Ahluwalia</surname>
<given-names>D</given-names>
</name>
<name>
<surname>Maddali</surname>
<given-names>RK</given-names>
</name>
<name>
<surname>Manglik</surname>
<given-names>M</given-names>
</name>
</person-group>. <article-title>Computational dynamics of the nicholson-bailey models</article-title>. <source>Eur Phys J plus</source> (<year>2018</year>) <volume>133</volume>(<issue>349</issue>):<fpage>2</fpage>&#x2013;<lpage>22</lpage>.</citation>
</ref>
<ref id="B42">
<label>42.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zhou</surname>
<given-names>C</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>X</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>H</given-names>
</name>
</person-group>. <article-title>Image encryption algorithm with matrix semi-tensor product</article-title>. <source>Nonlinear Dyn</source> (<year>2021</year>) <volume>105</volume>(<issue>1</issue>):<fpage>859</fpage>&#x2013;<lpage>76</lpage>.</citation>
</ref>
</ref-list>
</back>
</article>