Optics and Precision Engineering, Volume. 33, Issue 4, 624(2025)

Double hyperchaotic systems combine compressed sensing and Fibonacci transform for color image encryption

Jingwen JIA1, Zhao ZHANG1、*, Hongyan ZHOU2, and Xuebo CHEN2
Author Affiliations
  • 1School of Computer Science and Software Engineering, University of Science and Technology Liaoning, Anshan405, China
  • 2School of Electronic and Information Engineering, University of Science and Technology Liaoning, Anshan114051, China
  • show less
    Figures & Tables(19)
    Color image encryption diagram
    Color image decryption diagram
    Encrypt and decrypt images
    Distribution of adjacent pixel
    Histogram analysis
    Key sensitivity analysis
    Salt and pepper noise robustness
    Gaussian noise robustness
    Cropping attack analysis
    • Table 1. Correlation coefficient between adjacent pixels of the original image and the encrypted

      View table
      View in Article

      Table 1. Correlation coefficient between adjacent pixels of the original image and the encrypted

      图像原始图像加密图像
      水平垂直对角线水平垂直对角线
      Lena512R0.978 550.989 180.967 38-0.002 802-0.000 144-0.002 468
      G0.967 20.982 560.954 440.007 593 40.005 392 8-0.000 971
      B0.928 680.957 410.916 85-0.003 196-0.007 9350.003 881 1
      Aeroplane512R0.971 90.963 870.943 210.004 307 10.001 286 30.005 563 4
      G0.949 150.968 860.926 580.005 230 30.000 843 050.003 758 3
      B0.962 250.948 940.929 32-0.005 724-0.016 4530.005 930 5
      Baboon256R0.834 120.767 20.771 110.007 117 9-0.005 793 80.006 552 6
      G0.755 050.662 550.661 14-0.003 971-0.003 130 80.006 420 4
      B0.845 70.792 320.786 530.006 619-0.007 488-0.006 523
    • Table 2. Comparison of correlation coefficients

      View table
      View in Article

      Table 2. Comparison of correlation coefficients

      Lena256水平垂直对角线
      本文R0.000 346 840.002 114 30.001 274 3
      G-0.008 982-0.007 459-0.004 007 1
      B0.000 725 420.005 065 9-0.006 925 8
      文献[5R0.034 6910.005 710 10.005 859 5
      G-0.005 392-0.006 838-0.001 048 8
      B0.042 0850.014 2170.006 740 8
      文献[16R-0.004 9-0.017 40.004 5
      G0.001 1-0.015 6-0.016 0
      B-0.004 5-0.017 50.001 8
      文献[17R0.005 60.003 6-0.002 4
      G-0.002 4-0.001 20.002 9
      B-0.003 5-0.002 30.004 3
    • Table 3. Comparison of key space

      View table
      View in Article

      Table 3. Comparison of key space

      算法本文文献[1文献[4文献[5文献[16
      密钥空间101801082106010721062
    • Table 4. Analysis of Information entropy

      View table
      View in Article

      Table 4. Analysis of Information entropy

      图像原始图像加密图像
      RGB组合图像RGB组合图像
      Lena5127.253 17.5946.968 47.750 27.999 27.999 27.999 17.999 7
      Aeroplane5126.717 86.7996.213 86.663 97.999 27.999 27.999 27.999 7
      Baboon5127.752 87.465 47.766 67.765 87.999 27.999 27.999 27.999 8
      Pepper5127.338 87.496 37.058 37.669 87.999 37.999 27.9997.999 7
      Lena2567.299 27.645 36.998 57.7727.996 67.9977.996 87.999
      Baboon2567.760 27.490 67.7667.771 67.996 67.996 77.997 27.999 1
      Pepper2567.344 97.560 77.100 37.713 97.996 87.996 57.996 97.999 1
    • Table 5. Comparison of Information entropy

      View table
      View in Article

      Table 5. Comparison of Information entropy

      算法Lena512Baboon512Lena256Baboon256
      本文7.999 77.999 87.999 07.999 1
      17--7.999 07.980 0
      237.999 07.999 1--
    • Table 6. PSNR and SSIM of the image

      View table
      View in Article

      Table 6. PSNR and SSIM of the image

      图像压缩率PSNRSSIM
      RGBRGB
      Lena5120.941.833 741.921 141.847 60.988 40.987 30.984 6
      0.740.940 139.510 638.182 60.978 10.976 80.961 8
      0.538.656 736.379 935.464 60.962 80.949 40.925 7
      Pepper5120.940.972 441.308 138.988 10.982 00.982 40.968 5
      0.737.627 738.667 837.769 30.960 10.969 70.957 4
      0.535.545 236.341 535.862 40.931 60.949 80.938 9
      Tree2560.939.595 439.129 838.379 90.943 90.944 90.927 6
      0.735.51235.158 134.469 50.880 90.903 30.859 4
      0.532.794 932.208 332.409 10.790 20.819 70.785 1
    • Table 7. Analysis of resisting differential attacks

      View table
      View in Article

      Table 7. Analysis of resisting differential attacks

      图像NPCRUACI
      RGBRGB
      Lena51299.607 499.608 399.610 233.471 733.465 033.476 5
      Aeroplane51299.603 699.606 999.605 033.447 433.466 033.465 6
      Baboon51299.609 399.609 799.608 833.450 533.452 333.454 6
      Pepper51299.606 599.615 499.609 733.462 533.448 333.472 8
      Baboon25699.612 599.610 699.595 533.466 833.473 633.450 8
      Pepper25699.609 499.603 399.603 333.492 233.443 433.466 5
      Tree25699.603 399.609 499.603 333.456 533.470 233.414 0
      Lena25699.603 399.609 499.609 433.464 533.458 833.458 4
      文献[4]Lena25699.652 199.629 299.627 733.39433.428 333.525 5
      文献[5]Lena25699.607 899.592 699.606 333.457 133.452 933.649 4
      文献[16]Lena25699.625 799.614 599.625 733.489 233.479 833.491 6
    • Table 8. PSNR comparison after SPN attack

      View table
      View in Article

      Table 8. PSNR comparison after SPN attack

      攻击噪声强度/%本文文献[5文献[26
      RGBRGBRGB
      SPN0.0130.683 232.175 334.300 532.675 831.942 432.822 728.183 527.838 527.926 5
      0.127.814 828.182 328.753 722.724 822.086 922.866 218.101 917.874 417.972 7
      0.227.528 828.06628.06619.664 719.171 520.098 8---
    • Table 9. Running time analysis

      View table
      View in Article

      Table 9. Running time analysis

      图像加密时间解密时间
      Baboon2560.213 52.057 4
      Tree2560.210 22.803 0
      Lena2560.211 12.774 3
      Pepper2560.212 12.398 3
      Lena5120.643 98.045 0
      Aeroplane5120.650 88.297 9
      Baboon5120.658 39.629 3
      Pepper5120.661 49.052 4
    • Table 10. Comparison of running time

      View table
      View in Article

      Table 10. Comparison of running time

      图像算法加密时间解密时间
      Baboon256300.263 62.694 74
      本文0.213 52.057 4
      Lena25651.911s1.946
      61.241.28
      本文0.211 12.774 3
    Tools

    Get Citation

    Copy Citation Text

    Jingwen JIA, Zhao ZHANG, Hongyan ZHOU, Xuebo CHEN. Double hyperchaotic systems combine compressed sensing and Fibonacci transform for color image encryption[J]. Optics and Precision Engineering, 2025, 33(4): 624

    Download Citation

    EndNote(RIS)BibTexPlain Text
    Save article for my favorites
    Paper Information

    Category:

    Received: May. 30, 2024

    Accepted: --

    Published Online: May. 20, 2025

    The Author Email: Zhao ZHANG (zhangzhao@ustl.edu.cn)

    DOI:10.37188/OPE.20253304.0624

    Topics