Professional Documents
Culture Documents
A Novel Image Encryption Algorithm Based On Chaotic System and DNA Computing
A Novel Image Encryption Algorithm Based On Chaotic System and DNA Computing
net/publication/315504623
CITATIONS READS
38 565
5 authors, including:
Xiuli Chai
Henan University
44 PUBLICATIONS 2,143 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Xiuli Chai on 30 March 2018.
Xiuli Chai
School of Computer and Information Engineering
Institute of Image Processing and Pattern Recognition
Henan University, Kaifeng 475004, P. R. China
chaixiuli@henu.edu.cn
Zhihua Gan
School of Software
Henan University, Kaifeng 475004, P. R. China
gzh@henu.edu.cn
Yang Lu
Research Department
Henan University, Kaifeng 475004, P. R. China
lykyc@henu.edu.cn
Yiran Chen
Department of Electrical and Computer Engineering
Duke University, Durham, NC 27708, USA
yiran.chen@duke.edu
Daojun Han*
School of Computer and Information Engineering
Henan University, Kaifeng 475004, P. R. China
hdj@henu.edu.cn
A novel image encryption algorithm using the chaotic system and deoxyribonucleic acid (DNA)
computing is presented. Di®erent from the traditional encryption methods, the permutation
and di®usion of our method are manipulated on the 3D DNA matrix. Firstly, a 3D DNA
matrix is obtained through bit plane splitting, bit plane recombination, DNA encoding of
the plain image. Secondly, 3D DNA level permutation based on position sequence group
(3DDNALPBPSG) is introduced, and chaotic sequences generated from the chaotic system are
employed to permutate the positions of the elements of the 3D DNA matrix. Thirdly, 3D DNA
level di®usion (3DDNALD) is given, the confused 3D DNA matrix is split into sub-blocks, and
*Corresponding author.
1750069-1
X. Chai et al.
XOR operation by block is manipulated to the sub-DNA matrix and the key DNA matrix from
the chaotic system. At last, by decoding the di®used DNA matrix, we get the cipher image. SHA
256 hash of the plain image is employed to calculate the initial values of the chaotic system to
avoid chosen plaintext attack. Experimental results and security analyses show that our scheme
is secure against several known attacks, and it can e®ectively protect the security of the images.
Keywords: Image encryption; chaotic system; deoxyribonucleic acid (DNA); security analyses.
1. Introduction
With the rapid growth of Internet and wireless networks, more and more images are
transmitted and stored over the Internet, and as an e®ective method to protect the
image safety, image encryption has received a great deal of increasing interest.1–4
Di®erent from texts, images have some inherent features, such as bulk data capacity,
high redundancy and strong correlation among adjacent pixels, which makes tradi-
tional encryption methods, such as AES, DES, IDEA not able to be operated e±-
ciently. Therefore, many image encryption algorithms based on optical transform,
chaotic systems, wavelet transform, cellular automata, DNA computing, compres-
sive sensing and others are introduced.1–31
Chaotic systems have many signi¯cant features, such as sensitive dependence on
initial values, pseudorandomness and ergodicity, which makes chaotic systems very
suitable for cryptography. In 1998, Fridrich presented the ¯rst general architecture
for chaos-based image cipher.5 It is made up of permutation and di®usion. This
architecture has become the most popular structure, and been adopted in many
chaos-based image encryption schemes.6–13 For example, Wang6 proposed a novel
color image encryption with heterogeneous bit-permutation and correlated chaos,
one-dimensional chaotic map was used to generate pseudorandom sequences during
the permutation and di®usion process. In Ref. 7, Chen presented an image encryp-
tion algorithm, confusion and di®usion operations were both manipulated based on a
lookup table, and Logistic map was used to construct the lookup table. By combining
2D Arnold Cat map and 3D cellular automata, a confusion-di®usion encryption
algorithm was proposed in Ref. 8. A stream-cipher algorithm based on one-time keys
and robust chaotic maps was given in Ref. 9, and the piecewise linear chaotic map
was used as the generator of a pseudo-random key stream sequence. Hyperchaotic
systems have complex dynamical characteristics and are more suitable for image
encryption than one-dimensional and two-dimensional chaotic systems. Wang
et al.10,11 presented two color image encryption algorithms, two high dimensional
hyperchaotic systems are used, Chai et al.12 utilized genetic recombination and the
4D memristive hyperchaotic system to introduce a color image encryption method,
and a novel lossless color image encryption scheme using 2D DWT and 6D
hyperchaotic system was introduced in Ref. 13. Many image encryption algorithms
based on chaos have been presented,14–23 however, some encryption methods have
been broken and proved to be unsafe.24–31
1750069-2
A novel image encryption algorithm based on chaotic system and DNA computing
1750069-3
X. Chai et al.
Based on the above analyses, a novel image encryption algorithm combining DNA
computing and chaotic encryption is introduced in the paper. The architecture of
permutation and di®usion is adopted. It has three advantages. Firstly, a 3D DNA
level permutation based on position sequence group (3DDNALPBPSG) is given to
confuse the positions of the DNA elements of the 3D DNA matrix, the DNA matrix is
generated from the plain image, a new chaotic system is used to produce random
chaotic sequences, chaotic sequences are sorted and a position sequence group is
picked out based on the plain image, and then the elements of the 3D DNA matrix
are permutated. The 3D DNA level permutation scheme may make the elements
randomly relocate to any position, which improves the confusion e®ect and increases
the safety level. Moreover, a 3D DNA level di®usion (3DDNALD) is presented. The
confused 3D DNA matrix is split into blocks, and XOR operation is manipulated to
the sub-DNA matrix and the key DNA matrix. We employ the chaotic system to
obtain the key matrix, and then get the key DNA matrix by the DNA encoding rule.
XOR operation by blocks can save much di®usion time. Besides, the permutation
and di®usion process have close relationship with the plain image. In the permuta-
tion process, the initial values of the chaotic system are calculated by the SHA 256
hash of the plain image. In the di®usion process, hamming distance of the plain image
is used to modify the initial values of the chaotic system, thus the key matrix
will change with the changing of the plain image. The DNA encoding/decoding rules
of the plain image and key matrix are determined by the plain image. Thus, our
algorithm can resist against the chosen plaintext and known plaintext attacks
e®ectively.
This paper is organized as follows. In Sec. 2, we give the preliminary works of the
proposed algorithm. Section 3 introduces the encryption scheme of the proposed
cryptosystem. Section 4 illustrates some simulation results through numerical
experiments of our algorithm. Security analyses are given in Sec. 5. The concluding
remarks are drawn in Sec. 6.
2. Preliminary Works
2.1. The new there-dimensional chaotic system
Recently, Guan et al.45 presented a new three-dimensional autonomous smooth
chaotic system with three quadratic nonlinear terms and one constant term, the new
system can generate a four-scroll chaotic attractor, and exhibit multiple chaotic and
periodic attractors in a wide range of parameters and initial values. The system has a
simple system structure but complex dynamical behaviors, and therefore, it is very
suitable for image encryption. The chaotic system can be described by the following
di®erential equations:
8
< x_ ¼ ax yz y þ k;
y_ ¼ by þ xz; ð1Þ
:
z_ ¼ cz þ xy;
1750069-4
A novel image encryption algorithm based on chaotic system and DNA computing
60 60
40
40
20
y
z
0
20
−20
−40 0
−50 0 50 −50 0 50
x y
60
50
40 z
z
20
0
50
50
0 0
0
−50 0 50 y −50 −50 x
x
where x, y, z are the system variables, a, b, c, k are the system parameters. When
a ¼ 10, b ¼ 20, c ¼ 2, k ¼ 1, the system is chaotic. The system attractor is shown
in Fig. 1.
When the initial values of the system variables are (1, 1, 1), the corresponding
Lyapunov exponents are 1.5857, 0.002273 and 13:588, and the Lyapunov dimen-
sion is 2.1167. Figure 2 shows the changing trend of the three system state variables
within 12 000 iterations. From these two ¯gures, it is evident that this new three-
dimensional autonomous chaotic system has good chaotic dynamic behavior, and can
be applied in image encryption ¯eld.
1750069-5
X. Chai et al.
60
X
50 Y
Z
40
30
20
X,Y,Z
10
−10
−20
−30
−40
0 2000 4000 6000 8000 10000 12000
Iteration
Rule 1 2 3 4 5 6 7 8
A 00 00 01 01 10 10 11 11
T 11 11 10 10 01 01 00 00
C 01 10 00 11 00 11 01 10
G 10 01 11 00 11 00 10 01
Inversely, if the DNA sequence is known (for example, \TGCA"), the binary number
can be obtained by the rule 8 (the decoding rule is 8), that is \00011011", the decimal
number is \27", and this is the decoding process of the DNA sequence.
XOR A G C T
A A G C T
G G A T C
C C T A G
T T C G A
1750069-6
A novel image encryption algorithm based on chaotic system and DNA computing
DNA sequences \AGCT" and \TGAC", the result is \TACG" using Table 2. In the
paper, XOR operation is used to fuse the permutated matrix and the key matrix.
3. Encryption Scheme
3.1. Generation of the initial values of the chaotic system
In the paper, SHA 256 hash function is used to enlarge the key space of the proposed
encryption scheme, enhance the relationship of the encryption algorithm with the
plain image, and upgrade the security level. It is known even if there is only one bit
di®erence between two plain images, and their SHA 256 hash values will be
completely di®erent. Therefore, we can get \one plain image, one key".
First, we get the 256 bit secret key K of the plain image using the SHA 256 hash
function, next, the key is divided into 8-bit blocks ðki Þ, thus K can be expressed as
follows:
K ¼ k1 ; k2 ; . . . ; k32 : ð3Þ
Then, the initial values of the chaotic system can be computed as follows:
ððk1 k2 k3 k4 k5 Þ þ ðk6 k7 k8 k9 k10 k11 ÞÞ mod 28
x0 ¼ x 00 þ ; ð4Þ
255
ððk12 k13 k14 k15 k16 Þ þ ðk17 k18 k19 k20 k21 k22 ÞÞ mod 28
y0 ¼ y 00 þ ;
255
ð5Þ
ððk23 k24 k25 Þ þ ðk26 k27 k28 Þ þ ðk29 k30 k31 k32 ÞÞ mod 28
z0 ¼ z 00 þ ;
255
ð6Þ
1750069-7
X. Chai et al.
where x0 , y0 , z0 are the initial values of the chaotic system, x 00 ; y 00 ; z 00 are the initial
given values, mod is the modular operator and x y denotes the XOR operation in
the binary.
Obviously, Equations (4)–(6) illustrates that the initial values of the chaotic
system are highly sensitive to the plain image, and the encryption method with total
complexity of more than 2128 (Ref. 47) can resist any brute-force attack. When we ¯x
x 00 ; y 00 ; z 00 , di®erent initial values of the chaotic systems arise for di®erent plain
images, moreover, di®erent initial values can be obtained through choosing di®erent
x 00 ; y 00 ; z 00 even for the same plain image, and this increases the security level of our
encryption method.
(i) Bits at di®erent bit planes have di®erent weight, the lower bit planes and the
higher bit planes are combined into bit matrices in the bit plane recombination,
the position of bit planes is changed and the weight of each bit element is
changed accordingly; this can downgrade the statistical information of the
image and upgrade the encryption performance.
(ii) The encoding rule l1 is sensitive with the plain image, thus di®erent images has
di®erent encoding rule, and our encryption scheme has close relationship with
the plain image.
(iii) For the permutation methods based on chaotic sequence sorting, the transfor-
mation of a 3D DNA matrix to a cubic DNA matrix decreases the iterative times
of the chaotic systems and save the permutation time.
1750069-8
A novel image encryption algorithm based on chaotic system and DNA computing
Step 1: Iterate the chaotic system for r þ l times using the initial values x0 ; y0 ; z0
produced by Sec. 3.1, state variables xi ; yi ; zi can be obtained, and then the
three integer sequences X; Y ; Z are generated as follows:
8
< X ¼ fx1 ; x2 ; . . . ; xr g;
Y ¼ fy1 ; y2 ; . . . ; yr g; ð7Þ
:
Z ¼ fz1 ; z2 ; . . . ; zr g;
8
14 8
< xi ¼ bðabsðxi Þ bxi cÞ 10 c mod 2 ;
>
yi ¼ bðabsðyi Þ byi cÞ 1014 c mod 28 ; ð8Þ
>
: 14
zi ¼ bðabsðzi Þ bzi cÞ 10 c mod 2 ; 8
where bxc returns the nearest integer for x, and we may discard the values
obtained by the former l (l 500) times in order to avoid transit e®ects.
Step 2: Sort the sequences X; Y ; Z in ascending order, then get three position
index sequences X; ¼ fk x1 ; k x2 ; . . . ; k xn g, Y ¼ fk y ; k y ; . . . ; k yn g, Z ¼
Y ; Z , X
1 2
fk 1 ; k 2 ; . . . ; k n g.
z z z
1750069-9
X. Chai et al.
Step 1: As described in Sec. 3.2, the bit planes BP0 and BP7 , BP1 and BP6 , BP2 and
BP5 , BP3 and BP4 are recombined, encoded by encoding rule l1 , four DNA
matrices ðBP ð07Þ; BP ð16Þ; BP ð25Þ; BP ð34ÞÞ with the size of M N are
obtained. Firstly, compute the hamming distances between four DNA ma-
trices, four of them are employed, and these are:
8
>
> d1 ¼ HðBP ð07Þ; BP ð16ÞÞ;
>
< d ¼ HðBP ð16Þ; BP ð25ÞÞ;
2
ð9Þ
>
> d3 ¼ HðBP ð25Þ; BP ð34ÞÞ;
>
:
d4 ¼ HðBP ð07Þ; BP ð34ÞÞ:
Step 2: The new initial values of the chaotic system can be given by,
d1 d2 d3
x 000 ¼ x0 þ ; y 000 ¼ y0 þ ; z 000 ¼ z0 þ ð10Þ
3MN 3MN 3MN
Step 3: Use x 000 ; y 000 ; z 000 to iterate the chaotic system t ¼ dMN=6e times, state vari-
ables x1i ; y1i ; z1i can be obtained, and then the three integer sequences X1 ;
Y1 ; Z1 are generated by Eqs. (11) and (12).
8
< X1 ¼ fx11 ; x12 ; . . . ; x1t g;
Y ¼ fy11 ; y12 ; . . . ; y1t g; ð11Þ
: 1
Z1 ¼ fz11 ; z12 ; . . . ; z1t g;
8
14 10
< x1i ¼ bðabsðx1i Þ bx1i cÞ 10 c mod 2 ;
>
y1i ¼ bðabsðy1i Þ by1i cÞ 1014 c mod 210 ; ð12Þ
>
: 14
z1i ¼ bðabsðz1i Þ bz1i cÞ 10 c mod 2 ; 10
where bxc returns the nearest integer for x, dxe gets the nearest integer more
than x.
Step 4: Convert the elements of sequences X1 ; Y1 ; Z1 into new sequences X 0 1 , Y 0 1 ,
Z 0 1 through Eqs. (13) and (14).
8 0
< X 1 ¼ fx 11 ; x 12 ; . . . ; x 1t g;
0 0 0
Y 0 ¼ fy 0 11 ; y 0 12 ; . . . ; y 0 1t g; ð13Þ
: 01
Z 1 ¼ fz 0 11 ; z 0 12 ; . . . ; z 0 1t g;
8
8
< x 1i ¼ ðx1i þ y1i Þ mod 2 ;
> 0
1750069-10
A novel image encryption algorithm based on chaotic system and DNA computing
Step 1: Calculate the external key K through the SHA 256 hash of the plain image,
and then get the initial values of the chaotic systems using Eqs. (3)–(6).
Step 2: Transform the plain image P (M N) to a 3D DNA cubic matrix P 2
(r r r) as described by Sec. 3.2, encoding rule l1 is determined by
l1 ¼ ðk1 100Þ mod 8 þ 1, and k1 can be obtained by Eq. (3).
Step 3: Perform 3DDNALPBPSG to matrix P 2, as described in Sec. 3.3.
Step 4: Manipulate 3DDNALD to the permutated 3D DNA matrix as shown in
Sec. 3.4, and obtain the di®used 3D DNA matrix C3ð2Þ. The encoding rule l2
and l3 can be computed by: l2 ¼ d4 mod 8 þ 1, l3 ¼ d2 mod 8 þ 1, and d4 ; d2
are the hamming distances computed by Eq. (9).
1750069-11
X. Chai et al.
Splitting and
Initial values Modified
recombination of
bit planes initial values
x0 y0 z0
1750069-12
A novel image encryption algorithm based on chaotic system and DNA computing
4. Simulation Results
In this section, several experiments are conducted on multiple images, and all the
experiments are performed on a personal computer with the following hardware
environment: 2.5GHz CPU, 4GB memory and Windows 7 operating system, and the
compiler software is Matlab 2014a. Some parameters are selected as follows: a ¼ 10;
Fig. 4. Simulation results. (a) Plain image of Lena (256 256), (b) corresponding cipher image,
(c) decrypted image, (d) plain image of Cameraman (256 256), (e) corresponding cipher image,
(f) decrypted image, (g) plain image of Baboon (512 512), (h) corresponding cipher image and (i) decrypted
image.
1750069-13
X. Chai et al.
5. Security Analyses
5.1. Key space analysis
The key space of a good encryption algorithm should be large enough to make the
brute force attack impossible. In the proposed cryptosystem, the keys consist of:
(1) the 256 bit long SHA 256 hash value; (2) the given initial values x 00 ; y 00 ; z 00 ;
(3) iterating parameter l of the chaotic system; (4) the ¯rst pixel value P ð1Þ of the
plain image. The key space of SHA 256 with complexity of the best attack is 2128
larger than 2100 , (Ref. 48) which means our algorithm is enough to resist any kinds of
brute force attack.
1000 600
800 500
400
600
300
400
200
200
100
0 0
(a) (b)
Fig. 5. (Color online) Histogram analysis results of the plain and cipher images. (a) histogram of
Cameraman, (b) histogram of cipher image, (c) histogram of Finger, (d) histogram of cipher image,
(e) histogram of Baboon and (f) histogram of cipher image.
1750069-14
A novel image encryption algorithm based on chaotic system and DNA computing
600
800
500
600 400
300
400
200
200
100
0 0
(c) (d)
2500
3000
2500 2000
2000 1500
1500
1000
1000
500
500
0 0
(e) (f)
Fig. 5. (Continued )
Here Z ¼ fz1 ; z2 ; . . . ; z256 g denotes the vector of the histogram values, zi and zj
are the numbers of pixels which gray values are equal to i and j, respectively. For
three di®erent images, the variances of the histograms of the plain image and cipher
image are illustrated in Table 3. From Table 3, we may watch that the variances of
Images Lena (256 256) Cameraman (256 256) Baboon (512 512)
1750069-15
X. Chai et al.
the cipher images are reduced a lot compared with those of the respective plain
images, and thus the security level of our proposed algorithm is very high.
1 XN
EðxÞ ¼ x; ð19Þ
N i¼1 i
1 XN
DðxÞ ¼ ðx EðxÞÞ2 ; ð20Þ
N i¼1 i
where EðxÞ and DðxÞ are the expectation and variance of variable x, respectively.
Correlation of two adjacent pixels of the plain image Lena (256 256) and its
cipher image are illustrated in Fig. 6. Table 4 shows the correlation coe±cients of two
250 250
200 200
pixel gray value on location(x+1,y)
150 150
100 100
50 50
0 0
0 50 100 150 200 250 0 50 100 150 200 250
pixel gray value on location(x,y) pixel gray value on location(x,y)
(a) (b)
Fig. 6. (Color online) Correlation of two adjacent pixels of the plain image Lena (256 256) and its
cipher image. (a) horizontal direction in plain image, (b) horizontal direction in cipher image, (c) vertical
direction in plain image, (d) vertical direction in cipher image, (e) diagonal direction in plain image and
(f) diagonal direction in cipher image.
1750069-16
A novel image encryption algorithm based on chaotic system and DNA computing
250 250
200 200
pixel gray value on location(x,y+1)
100 100
50 50
0 0
0 50 100 150 200 250 0 50 100 150 200 250
pixel gray value on location(x,y) pixel gray value on location(x,y)
(c) (d)
250 250
pixel gray value on location(x+1,y+1)
200 200
150 150
100 100
50 50
0 0
0 50 100 150 200 250 0 50 100 150 200 250
pixel gray value on location(x,y) pixel gray value on location(x,y)
(e) (f)
Fig. 6. (Continued )
Table 4. Correlation coe±cients of two adjacent pixels in the plain and cipher images.
1750069-17
X. Chai et al.
adjacent pixels in the plain and cipher images. From the results, we can watch that
the correlation of the plain images is close to 1, whereas that of the cipher images is
close to 0, and those mean our proposed algorithm can resist the statistical attack
e®ectively.
Fig. 7. Key sensitivity tests. (a) cipher image with x 00 ¼ 1:2340000001, (b) cipher image with y 00 ¼
0:0230000001, (c) cipher image with z 00 ¼ 0:9990000001, (d) recovered image with x 00 ¼ 1:2340000001,
(e) recovered image with y 00 ¼ 0:0230000001 and (f) recovered image with z 00 ¼ 0:9990000001.
1750069-18
A novel image encryption algorithm based on chaotic system and DNA computing
Moreover, a good encryption method should have good key sensitivity in the
decryption process, and that means the plain images cannot be recovered successfully
even though there is a slight di®erence between the encryption key and decryption
key. Figure 7(d) shows the recovered image using x 00 ¼ 1:2340000001 with other keys
the same, Fig. 7(e) is the recovered image using y 00 ¼ 0:0230000001 and Fig. 7(f)
illustrates the recovered image with z 00 ¼ 0:9990000001. The results mean that the
original images cannot be recovered by the wrong keys, and our algorithm is sensitive
to the keys.
Position
1750069-19
X. Chai et al.
Size 256 256 256 256 256 256 256 256 512 512 512 512
NPCR 99.62% 99.60% 99.58% 99.60% 99.60% 99.63%
UACI 33.49% 33.44% 33.49% 33.42% 33.47% 33.46%
can ¯nd that the values of NPCR and UACI are close to the expected values, which
means that the proposed algorithm is very sensitive to tiny changes in the plain
image, and the algorithm is robust against di®erential attack.
where pðmi Þ represents the probability of symbol mi . For a random image with 256
gray levels, we may get theoretical value 8 by Eq. (24). Table 7 illustrates the
information entropies of the plain and cipher images, as we can ¯nd that the infor-
mation entropies of the cipher images using our encryption algorithm are close to 8,
thus the algorithm proposed has a good property of information entropy. Besides,
our algorithm has better performance than Ref. 14 and the same with Refs. 15 and
Ref. 16.
1750069-20
A novel image encryption algorithm based on chaotic system and DNA computing
256 hash values of the plain image, so that di®erent keystreams are generated in the
confusion process for di®erent original images. Moreover, the hamming distance of
the plain image is obtained to modify the initial values of the chaotic system, and
then di®erent key matrices are obtained in the di®usion process. Besides, DNA
encoding/decoding rules of the plain image are calculated by the SHA 256 hash
value of the plain image. In a word, our encryption algorithm highly depends on the
plain image, and it can resist against known plaintext and chosen plaintext attacks
e®ectively.
1750069-21
X. Chai et al.
6. Conclusions
A novel image encryption scheme based on chaotic encryption and DNA computing
has been proposed in the paper. Our scheme di®ers from others in three ways. Firstly,
permutation is manipulated on the 3D DNA matrix, we introduce a 3D DNA level
permutation based on position sequence group (3DDNALPBPSG), and employ
chaotic sequences to relocate the elements of DNA matrix. Secondly, di®usion is
conducted on the 3D DNA matrix, it is divided into sub-blocks, XOR operation by
block is manipulated to the sub-DNA matrix and the key DNA matrix from the
chaotic system. Finally, the permutation and di®usion scheme are highly sensitive to
the plain image, and our algorithm has strong ability against chosen plaintext and
known plaintext attacks. Experimental results and security analyses demonstrate
that the scheme possesses large key space, high security and good encryption speed.
Thus, it can be used in the image encryption application.
Acknowledgments
All the authors are deeply grateful to the editors for smooth and fast handling of the
manuscript. The authors would also like to thank the anonymous referees for their
valuable suggestions to improve the quality of this paper. This work is supported by
the National Natural Science Foundation of China (Grant No. 41571417 and
U1604145), Science and Technology Foundation of Henan Province of China (Grant
No. 152102210048), Foundation and Frontier Project of Henan Province of China
1750069-22
A novel image encryption algorithm based on chaotic system and DNA computing
References
1. Z. Y. Hua and Y. C. Zhou, Inf. Sci. 339, 237 (2016).
2. X. L. Chai, Z. H. Gan, Y. R. Chen and Y. S. Zhang, Signal Process. 134, 35 (2017).
3. G. D. Ye and X. L. Huang, Secur. Commun. Netw. 9, 2015 (2016).
4. N. R. Zhou, S. M. Pan, S. Cheng and Z. H. Zhou, Opt. Laser Technol. 82, 121 (2016).
5. J. Fridrich, Int. J. Bifurcat Chaos 8, 1259 (1998).
6. X. Wang and H. Zhang, Opt. Commun. 342, 51 (2015).
7. J. Chen, Z. Zhu, C. Fu, L. Zhang and Y. Zhang, Nonlinear Dyn. 81, 3 (2015).
8. A. Martin Del Rey and G. Rodriguez Sanchez, Int. J. Mod. Phys. C 26, 1450069 (2015).
9. H. J. Liu and X. Y. Wang, Comput. Math. Appl. 59, 3320 (2010).
10. H. J. Liu and X. Y. Wang, Opt. Commun. 284, 3895 (2011).
11. X. Y. Wang, L. Yang, R. Liu and K. Abdurahman, Nonlinear Dyn. 62, 615 (2010).
12. X. L. Chai, Z. H. Gan, Y. Lu, M. H. Zhang and Y. R. Chen, Chin. Phys. B 25, 100503
(2016).
13. X. J. Wu, D. W. Wang, J. Kurths and H. B. Kan, Inf. Sci. 249–250, 137 (2016).
14. Y. C. Zhou, W. J. Cao and C. L. Philip, Signal Process. 100, 197 (2014).
15. G. Ye, Nonlinear Dyn. 75, 417 (2014).
16. X. Wang and D. Xu, Nonlinear Dyn. 75, 345 (2014).
17. X. Wang and J. Zhang, Int. Symp. on Biometrics and Security Technologies, ISBAST'08
DOI: 10.1109/ISBAST.2008.4547639 (2008).
18. Aqeel ur Rehman, X. Liao, A. Kulsoom and Syed Ali Abbas, Multimed. Tools Appl. 74,
4655 (2015).
19. S. Lian, J. Sun and Z. Wang, Chaos Solitons Fractals 26, 117 (2005).
20. K. W. Wong, B. S. H. Kwok and W. S. Law, Phys. Lett. A 372, 2645 (2008).
21. D. Xiao and X. Liao, Chaos Solitons Fractals 40, 2191 (2009).
22. Y. Zhang and D. Xiao, Commun. Nonlinear Sci. Numer. Simul. 19, 74 (2014).
23. Y. Wang, K. W. Wong, X. Liao and G. Chen, J. Appl. Soft Comput. 11, 514 (2011).
24. X. Y. Wang, F. Chen, T. Wang, D. H. Xu and Y. T. Ma, Int. J. Mod. Phys. B 27, 1350196
(2013).
25. A. Akhavan, A. Samsudin and A. Akhshani, Opt. Commun. 350, 77 (2015).
26. R. Bechikh, H. Hermassi, A. A. Abd EI-Latif, R. Rhouma and S. Belghith, Signal Process.
Image Commun. 39, 151 (2015).
27. C. Q. Li, Y. S. Liu, T. Xie and Michael, Z. Q. Chen, Nonlinear Dyn. 73, 2083 (2013).
28. C. Q. Li, Signal Process. 118, 203 (2016).
29. F. Ozkaynak and A. Bedri Ozer, Optik 127, 5190 (2016).
30. E. Y. Xie, C. Q. Li, S. M. Yu and J. H. L., Signal Process. 132, 150 (2017).
31. R. Bechikh, H. Hermassi, A. A. Abd EI-Latif, R. Rhouma and S. Belghith, Signal Process:
Image 39, 151 (2015).
32. L. M. Adleman, Science 266, 1021 (1994).
33. M. Babaei, Nat. Comput. 12, 101 (2013).
34. L. Liu, Q. Zhang and X. Wei, Comput. Electr. Eng. 38, 1240 (2012).
35. Y. Liu, J. Tang and T. Xie, Opt. Laser Eng. 60, 111 (2014).
36. X. Wang, Y. Zhang and Y. Zhao, Nonlinear Dyn. 82, 1269 (2015).
1750069-23
X. Chai et al.
37. H. Liu, X. Wang and K. Abdurahman, Appl. Soft Comput. 12, 1457 (2012).
38. Q. Zhang, L. Liu and X. Wei, AEU-Int. J. Electron. C 68, 186 (2014).
39. X. Huang and G. Ye, Multimed Tools Appl. 72, 57 (2014).
40. X. Wei, L. Guo, Q. Zhang, J. Zhang and S. Lian, J. Syst. Software 85, 290 (2012).
41. R. Guesmi, M. A. B. Farah, A. Kachouri and M. Samet, Nonlinear Dyn. 83, 1123 (2016).
42. Q. Zhang, L. Guo and X. Wei, Optik 124, 3596 (2013).
43. Q. Zhang and X. Wei, Optik 124, 6276 (2013).
44. X. L. Chai, Y. R. Chen and L. Broyde, Opt. Laser Eng. 88, 197 (2017).
45. Z. H. Guan, Q. Lai, M. Chi, X. M. Cheng and F. Liu, Nonlinear Dyn. 75, 331 (2014).
46. P. Gaborit and O. D. King, Theor. Comput. Sci. 334, 99 (2005).
47. European Network of Excellence in Cryptology II, (2010), http://www.ecrypt.eu.org.
48. G. Alvarez and S. Li, Int. J. Bifur. Chaos 16, 2129 (2006).
49. Y. Q. Zhang and X. Y. Wang, Inf. Sci. 273, 329 (2014).
50. X. Y. Wang, L. Teng and X. Qin, Signal Process. 92, 1101 (2012).
51. Y. Q. Zhang and X. Y. Wang, Appl. Soft Comput. 26, 10 (2015).
52. Y. Q. Zhang, X. Y. Wang, J. Liu and Z. L. Chi, Opt. Laser Eng. 82, 95 (2016).
1750069-24