<?xml version="1.0" encoding="utf-8"?><!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.0 20120330//EN" "JATS-journalpublishing1.dtd"><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">INFORMATICA</journal-id>
<journal-title-group><journal-title>Informatica</journal-title></journal-title-group>
<issn pub-type="epub">1822-8844</issn><issn pub-type="ppub">0868-4952</issn><issn-l>0868-4952</issn-l>
<publisher>
<publisher-name>Vilnius University</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">INFO1160</article-id>
<article-id pub-id-type="doi">10.15388/Informatica.2017.149</article-id>
<article-categories><subj-group subj-group-type="heading">
<subject>Research Article</subject></subj-group></article-categories>
<title-group>
<article-title>An Improved Image Encryption Scheme Based on a Non-Linear Chaotic Algorithm and Substitution Boxes</article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name><surname>Khan</surname><given-names>Jan Sher</given-names></name><email xlink:href="jskm893@gmail.com">jskm893@gmail.com</email><xref ref-type="aff" rid="j_info1160_aff_001">1</xref><xref ref-type="corresp" rid="cor1">∗</xref><bio>
<p><bold>J.S. Khan</bold> is currently pursuing his master of electrical engineering in the Department of Electrical and Electronics Engineering, Gaziantep University, Turkey. He obtained his bachelor of science degree in electrical engineering, from HITEC University in Taxila with highest distinction. As an exchange student, he completed his fourth year of undergraduate studies in the Department of Electric and Electronics Engineering at Istanbul Technical University (ITU), Turkey. His research interest includes chaos based encryption, cryptography and medical imaging.</p></bio>
</contrib>
<contrib contrib-type="author">
<name><surname>Khan</surname><given-names>Muazzam Ali</given-names></name><email xlink:href="khattakmuazzam@gmail.com">khattakmuazzam@gmail.com</email><xref ref-type="aff" rid="j_info1160_aff_002">2</xref><bio>
<p><bold>M. Khan</bold> (Senior member IEEE) is an assistant professor in the Department of Computing, SEECS, National University of Sciences &amp; Technology, Islamabad, Pakistan. He received his master with major in mobile networks from IIUI and PhD degree in computer sciences as a sandwich program from IIUI and UMKC, USA, in 2011. He completed his Post doc at University of Ulm, Germany, and University of Missouri, USA, in 2013 and 2016, respectively. He joined Awk University Mardan as an assistant professor/chair CS department in 2011. He has been at School of Computer Science, University of Ulm, Germany, and School of Computer and Electrical Engineering University of Missouri, USA, as post doc fellow with professor dr. G.M. Chaudhry and prof. dr. Frank. Later, dr. Khattak joined College of National University of Sciences &amp; Technology, Islamabad, as an assistant professor in 2013. He worked at the Networking and Multimedia Lab, University of Missouri, Kansas City, USA, as a research fellow. His research interests include wireless networks sensor, body area networks, image processing, image compression, image encryption and data network security.</p></bio>
</contrib>
<contrib contrib-type="author">
<name><surname>Ahmad</surname><given-names>Jawad</given-names></name><email xlink:href="jawad.saj@gmail.com">jawad.saj@gmail.com</email><xref ref-type="aff" rid="j_info1160_aff_003">3</xref><bio>
<p><bold>J. Ahmad</bold> received his BS degree in electronics engineering in 2009 from Muhammad Ali Jinnah University, Pakistan, and his MS degree in electrical engineering technology, from HITEC University, Pakistan, in 2012. Currently, he is enrolled as a PhD student at Glasgow Caledonian University, United Kingdom. His interest includes energy efficient systems, neural networks, cryptography and image encryption.</p></bio>
</contrib>
<contrib contrib-type="author">
<name><surname>Hwang</surname><given-names>Seong Oun</given-names></name><email xlink:href="sohwang@hongik.ac.kr">sohwang@hongik.ac.kr</email><xref ref-type="aff" rid="j_info1160_aff_004">4</xref><bio>
<p><bold>S.O. Hwang</bold> received the BS degree in mathematics in 1993 from the Seoul National University, the MS degree in computer and communications engineering in 1998 from the Pohang University of Science and Technology, and the PhD degree in computer science from the Korea Advanced Institute of Science and Technology. He worked as a software engineer at the LGCNS Systems, Inc. from 1994 to 1996. He worked as a senior researcher at the Electronics and Telecommunications Research Institute (ETRI) from 1998 to 2007. Since 2008, he has been working as an associate professor with the Department of Computer and Information Communication Engineering, Hongik University, Korea. His research interests include cryptography, cybernetic security and mobile network. He is a member of the IEEE.</p></bio>
</contrib>
<contrib contrib-type="author">
<name><surname>Ahmed</surname><given-names>Waqas</given-names></name><email xlink:href="imwaqasahmed@live.com">imwaqasahmed@live.com</email><xref ref-type="aff" rid="j_info1160_aff_005">5</xref><bio>
<p><bold>W. Ahmed</bold> attained his bachelor degree in communication engineering in the year 2008 from FAST University Islamabad, Pakistan. He did his masters in electrical engineering from HITEC University, Taxila. Currently, he is pursuing his PhD in computer vision from UET, Taxila, Pakistan. His area of interest involves signal processing, image processing, computer vision, and secure communication.</p></bio>
</contrib>
<aff id="j_info1160_aff_001"><label>1</label>Department of Electrical and Electronics, <institution>University of Gaziantep</institution>, 27310 Gaziantep, <country>Turkey</country></aff>
<aff id="j_info1160_aff_002"><label>2</label>Department of Computing, School of Electrical Engineering and Computer Science, <institution>National University of Sciences and Technology</institution>, Islamabad, <country>Pakistan</country></aff>
<aff id="j_info1160_aff_003"><label>3</label><institution>Glasgow Caledonian University</institution>, School of Engineering and Built Environment, Glasgow, <country>United Kingdom</country></aff>
<aff id="j_info1160_aff_004"><label>4</label>Department of Computer and Information Communication Engineering, <institution>Hongik University</institution>, Sejong, <country>South Korea</country></aff>
<aff id="j_info1160_aff_005"><label>5</label>Department of Electrical Engineering, <institution>HITEC University</institution>, Taxila, <country>Pakistan</country></aff>
</contrib-group>
<author-notes>
<corresp id="cor1"><label>∗</label>Corresponding author.</corresp>
</author-notes>
<pub-date pub-type="ppub"><year>2017</year></pub-date><pub-date pub-type="epub"><day>1</day><month>1</month><year>2017</year></pub-date><volume>28</volume><issue>4</issue><fpage>629</fpage><lpage>649</lpage><history><date date-type="received"><month>1</month><year>2017</year></date><date date-type="accepted"><month>7</month><year>2017</year></date></history>
<permissions><copyright-statement>© 2017 Vilnius University</copyright-statement><copyright-year>2017</copyright-year>
<license license-type="open-access" xlink:href="http://creativecommons.org/licenses/by/4.0/">
<license-p>Open access article under the <ext-link ext-link-type="uri" xlink:href="http://creativecommons.org/licenses/by/4.0/">CC BY</ext-link> license.</license-p></license></permissions>
<abstract>
<p>World has become a global village after introduction of social media and social networks. However, it extensively increased the demand for network resources, particularly multimedia traffic like images, videos and audio. The medium for this extensive traffic is always public networks such as internet or cellular networks. But the open nature of such network like internet always creates security threats for data during transmission. Due to many intrinsic features and higher correlation in multimedia traffic, existing encryption algorithms are not very convincing to perform well under critical scenarios. Therefore, many people in the research community are still working to propose new encryption schemes which can address these issues and handle multimedia traffic effectively on public networks. In this paper, we explore the weaknesses of existing encryption schemes, which compromise in many scenarios due to high correlation of multimedia traffic. To tackle this issue we proposed certain enhancements in an existing scheme. Our enhanced modification includes addition of bitwise XORed operation using non-linear chaotic algorithm. Performance of enhanced scheme is tested against state of the art security parameters. Efficiency of the proposed scheme is also validated via entropy, correlation, peak signal to noise ratio, unified average change intensity and number of pixels change rate tests.</p>
</abstract>
<kwd-group>
<label>Key words</label>
<kwd>non-linear chaotic algorithm</kwd>
<kwd>substitution box</kwd>
<kwd>chaos</kwd>
<kwd>uniform average change intensity</kwd>
<kwd>number of pixel change</kwd>
</kwd-group>
</article-meta>
</front>
<body>
<sec id="j_info1160_s_001">
<label>1</label>
<title>Introduction</title>
<p>Over the past few decades, advancement in digital technologies has made people’s lives more comfortable and faster. With all their charms, digital technologies, however, possess certain limitations to their robust utilization. Data transmission and reception over the internet is not secure in most cases. The problem can be resolved by applying encryption procedures to ensure that the data is only received by the intended user and even if the data is intercepted by an unauthorized or unintended user, the contents of the data should not make sense to him/her. Encryption is a process to disguise the information in such a way that only the intended user with a certain private key or code could be able to retrieve the actual data from the encrypted information (Acharya <italic>et al.</italic>, <xref ref-type="bibr" rid="j_info1160_ref_001">2008</xref>; Jakimoski and Subbalakshmi, <xref ref-type="bibr" rid="j_info1160_ref_021">2008</xref>; Schneier, <xref ref-type="bibr" rid="j_info1160_ref_035">1996</xref>; William, <xref ref-type="bibr" rid="j_info1160_ref_038">2006</xref>), which is called decryption, the reverse process of encryption. Symmetric key algorithms use the same keys for encryption and decryption, whereas different keys are used for encryption and decryption in public key algorithms. The traditional symmetric algorithms like Advanced Encryption Standard (AES), Data Encryption Standard (DES) and International Data Encryption Standard (IDES) encrypt text data in an efficient way (Bruce, <xref ref-type="bibr" rid="j_info1160_ref_011">1996</xref>; Stallings, <xref ref-type="bibr" rid="j_info1160_ref_036">2006</xref>; Leong <italic>et al.</italic>, <xref ref-type="bibr" rid="j_info1160_ref_029">2000</xref>). These traditional algorithms, however, fail to provide efficient encryption of image data due to its associated high redundancy, strong correlation and bulk capacity (Khan <italic>et al.</italic>, <xref ref-type="bibr" rid="j_info1160_ref_026">2017a</xref>; Ahmad <italic>et al.</italic>, <xref ref-type="bibr" rid="j_info1160_ref_007">2017</xref>). In 1989, Mathews presented the concept of chaotic encryption (Matthews, <xref ref-type="bibr" rid="j_info1160_ref_032">1984</xref>). Following Mathew’s novel idea, many researchers have turned their attention towards chaos-based image encryption and S-box construction techniques (Ahmad and Hwang, <xref ref-type="bibr" rid="j_info1160_ref_004">2016</xref>; Anees <italic>et al.</italic>, <xref ref-type="bibr" rid="j_info1160_ref_008">2014a</xref>; Khan <italic>et al.</italic>, <xref ref-type="bibr" rid="j_info1160_ref_024">2015a</xref>; Ahmad and Hwang, <xref ref-type="bibr" rid="j_info1160_ref_003">2015</xref>; Ahmad <italic>et al.</italic>, <xref ref-type="bibr" rid="j_info1160_ref_005">2015</xref>; Younas and Ahmad, <xref ref-type="bibr" rid="j_info1160_ref_040">2014</xref>; Anees <italic>et al.</italic>, <xref ref-type="bibr" rid="j_info1160_ref_009">2014b</xref>; Dawei <italic>et al.</italic>, <xref ref-type="bibr" rid="j_info1160_ref_014">2004</xref>; Ahmad <italic>et al.</italic>, <xref ref-type="bibr" rid="j_info1160_ref_006">2016</xref>; Huang and Guan, <xref ref-type="bibr" rid="j_info1160_ref_017">2005</xref>; Li and Zheng, <xref ref-type="bibr" rid="j_info1160_ref_030">2002</xref>; Ahmad and Ahmed, <xref ref-type="bibr" rid="j_info1160_ref_002">2010</xref>; Rehman <italic>et al.</italic>, <xref ref-type="bibr" rid="j_info1160_ref_034">2016</xref>; Khan <italic>et al.</italic>, <xref ref-type="bibr" rid="j_info1160_ref_025">2015b</xref>; Habib <italic>et al.</italic>, <xref ref-type="bibr" rid="j_info1160_ref_016">2017</xref>). These chaos-based image encryption algorithms have lots of merits, such as the large key space, ergodicity and sensitivity to the secret keys. Chung and Chang (<xref ref-type="bibr" rid="j_info1160_ref_013">1998</xref>) designed a new approach for encrypting binary images. They utilized different scan patterns at the same level in the scan tree structure and then applied a <inline-formula id="j_info1160_ineq_001"><alternatives><mml:math>
<mml:mn>2</mml:mn>
<mml:mi mathvariant="italic">D</mml:mi></mml:math><tex-math><![CDATA[$2D$]]></tex-math></alternatives></inline-formula> run-encoding technique <inline-formula id="j_info1160_ineq_002"><alternatives><mml:math>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>2</mml:mn>
<mml:mi mathvariant="italic">DRE</mml:mi>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math><tex-math><![CDATA[$(2\mathit{DRE})$]]></tex-math></alternatives></inline-formula>. However, Chang and Yu (<xref ref-type="bibr" rid="j_info1160_ref_012">2002</xref>) present cryptanalysis of the above scheme. Belkhouche and Qidwai proposed binary image encoding based on <inline-formula id="j_info1160_ineq_003"><alternatives><mml:math>
<mml:mn>1</mml:mn>
<mml:mi mathvariant="italic">D</mml:mi></mml:math><tex-math><![CDATA[$1D$]]></tex-math></alternatives></inline-formula> chaotic map (Belkhouche and Qidwai, <xref ref-type="bibr" rid="j_info1160_ref_010">2003</xref>). In 2014, Amir <italic>et al.</italic> utilized the chaotic behaviour of Logistic map and used more than one substitution box. Logistic chaotic map generates random values that randomly select S-box which is employed in the substitution process. In this paper, we first examine Amir <italic>et al.</italic>’s algorithm (Anees <italic>et al.</italic>, <xref ref-type="bibr" rid="j_info1160_ref_008">2014a</xref>) and then improve it on the basis of the security parameters suggested in Ahmad <italic>et al.</italic> (<xref ref-type="bibr" rid="j_info1160_ref_005">2015</xref>), Khan <italic>et al.</italic> (<xref ref-type="bibr" rid="j_info1160_ref_027">2017b</xref>). To improve the security characteristics of the Amir’s scheme for binary images, bitwise XOR operation is applied on image pixels. In order to verify the security of the proposed algorithm, various statistical analyses and histogram tests are applied on encrypted images.</p>
<p>The rest of the paper is organized as follows. Section <xref rid="j_info1160_s_002">2</xref> explains fundamental knowledge and defines problem statement. Section <xref rid="j_info1160_s_006">3</xref> presents the proposed scheme. Section <xref rid="j_info1160_s_007">4</xref> presents simulation results and comparative analysis. Section <xref rid="j_info1160_s_008">5</xref> concludes this paper.</p>
</sec>
<sec id="j_info1160_s_002">
<label>2</label>
<title>Fundamental Knowledge</title>
<p>In order to help readers to fully understand our modification to the Amir’s algorithm, we explain S-box, Non Chaotic Algorithm (NCA) and Logistic chaotic map. The Amir’s scheme works well for high number of gray scale values, but it totally fails in the case of small number of gray scale values. In this paper, we add diffusion to the Amir’s algorithm via XORed operation to validate the C. Shannon theory of SP-Network (Kam and Davida, <xref ref-type="bibr" rid="j_info1160_ref_023">1979</xref>).</p>
<sec id="j_info1160_s_003">
<label>2.1</label>
<title>Substitution Box</title>
<p>In the paper of Anees <italic>et al.</italic> (<xref ref-type="bibr" rid="j_info1160_ref_008">2014a</xref>), a novel chaotic scheme was proposed. Substitution is done using the technique of multiple substitution boxes (S-boxes). This paper addresses drawbacks of single S-box for substitutions in encryption algorithm and proposes a novel chaotic substitution scheme. For symmetric key algorithms of cryptography, S-box is a core component. S-box is basically a lookup table which is constructed by a boolean function taking <italic>n</italic> bits as input and producing <italic>m</italic> bits as output (Yildiz, <xref ref-type="bibr" rid="j_info1160_ref_039">2004</xref>). The substitution refers to the replacement of plaintext image data with another data set. The resulting substituted data is called the ciphertext image. The plaintext image can be retrieved when the substitution process is reversed. Figure <xref rid="j_info1160_fig_001">1</xref> shows the substitution of a single unit of data. Different algebraic structures exist in literature to construct S-boxes (Nyberg, <xref ref-type="bibr" rid="j_info1160_ref_033">1992</xref>; Weister and Tavares, <xref ref-type="bibr" rid="j_info1160_ref_037">1986</xref>; Kurosawa <italic>et al.</italic>, <xref ref-type="bibr" rid="j_info1160_ref_028">1997</xref>; Johansson and Pasalic, <xref ref-type="bibr" rid="j_info1160_ref_022">2003</xref>). Several S-boxes are used in the field of cryptography and their performance varies by using algebraic and statistical analysis. S-box exhibits the property of non-linearity and several researches have been undertaken to increase this phenomenon (Hussain <italic>et al.</italic>, <xref ref-type="bibr" rid="j_info1160_ref_018">2012</xref>, <xref ref-type="bibr" rid="j_info1160_ref_019">2013a</xref>, <xref ref-type="bibr" rid="j_info1160_ref_020">2013b</xref>). Despite its high non-linearity, S-boxes tend to exhibit low substitution results in highly correlated data set. To resolve this issue, chaotic behaviours of different set of equations are utilized to induce diffusion in the encryption algorithm. This chaotic nature of different functions are known as chaotic maps. As the name implies, the theory refers to the states of confusion, randomness, lack of order, lack of predictability and so on.</p>
<fig id="j_info1160_fig_001">
<label>Fig. 1</label>
<caption>
<p>Substitution process.</p>
</caption>
<graphic xlink:href="info1160_g001.jpg"/>
</fig>
</sec>
<sec id="j_info1160_s_004">
<label>2.2</label>
<title>Logistic Map</title>
<p>The nature of chaotic systems is such that any change in its initial conditions results in an unpredictable change in its outcome. These systems are therefore highly sensitive to the initial conditions. These systems bear the property that any change in the input, however it is infinitesimal, would result in extremely diverging outputs. This lowers the predictability of the outcomes to sufficiently impossible level. Diverse chaotic maps are practically deployed in various systems. Some of them are Arnold Cat map, Chen Lee system, Chirikov–Taylor map, Gauss map, Henon map, Horseshoe map, and Logistic map. The most popular is Logistic map. Mathematically, Logistic map can be written as:
<disp-formula id="j_info1160_eq_001">
<label>(1)</label><alternatives><mml:math display="block">
<mml:mtable displaystyle="true" columnalign="left">
<mml:mtr>
<mml:mtd class="align-odd">
<mml:mi mathvariant="italic">f</mml:mi>
<mml:mo>:</mml:mo>
<mml:mi mathvariant="italic">IR</mml:mi>
<mml:mo stretchy="false">→</mml:mo>
<mml:mi mathvariant="italic">IR</mml:mi>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd class="align-odd">
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">X</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">n</mml:mi>
<mml:mo>+</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>=</mml:mo>
<mml:mi mathvariant="italic">f</mml:mi>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">X</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">n</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
<mml:mo>=</mml:mo>
<mml:mi mathvariant="italic">r</mml:mi>
<mml:mo>.</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">X</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">n</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo>−</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">X</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">n</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
<mml:mo>.</mml:mo>
</mml:mtd>
</mml:mtr>
</mml:mtable></mml:math><tex-math><![CDATA[\[\begin{array}{l}\displaystyle f:\mathit{IR}\to \mathit{IR}\\ {} \displaystyle {X_{n+1}}=f({X_{n}})=r.{X_{n}}(1-{X_{n}}).\end{array}\]]]></tex-math></alternatives>
</disp-formula> 
In Eq. (<xref rid="j_info1160_eq_001">1</xref>), <italic>r ϵ</italic> <inline-formula id="j_info1160_ineq_004"><alternatives><mml:math>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>0</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>4</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math><tex-math><![CDATA[$(0,4)$]]></tex-math></alternatives></inline-formula> is the control parameter and <inline-formula id="j_info1160_ineq_005"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>0</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${x_{0}}$]]></tex-math></alternatives></inline-formula> is the initial condition in range <inline-formula id="j_info1160_ineq_006"><alternatives><mml:math>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>0</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math><tex-math><![CDATA[$(0,1)$]]></tex-math></alternatives></inline-formula>. In Li <italic>et al.</italic> (<xref ref-type="bibr" rid="j_info1160_ref_031">2017</xref>), Gao <italic>et al.</italic> examined <italic>r</italic> and divided the interval <italic>r</italic> into three slices. For <italic>r ϵ</italic> <inline-formula id="j_info1160_ineq_007"><alternatives><mml:math>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>0</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>3</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math><tex-math><![CDATA[$(0,3)$]]></tex-math></alternatives></inline-formula>, one will get the same <italic>x</italic> after a number of iterations with no chaotic behaviour. The periodicity still appears for <italic>r ϵ</italic> <inline-formula id="j_info1160_ineq_008"><alternatives><mml:math>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>3</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>3.6</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math><tex-math><![CDATA[$(3,3.6)$]]></tex-math></alternatives></inline-formula>, but phase space has different values and when <italic>r ϵ</italic> <inline-formula id="j_info1160_ineq_009"><alternatives><mml:math>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>3.6</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>4</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math><tex-math><![CDATA[$(3.6,4)$]]></tex-math></alternatives></inline-formula>, the periodicity totally disappears and random phenomenon starts. Figure <xref rid="j_info1160_fig_002">2</xref> shows the bifurcation and discrete domain plot of Logistic chaotic map. The Amir’s scheme utilizes chaotic behaviour of the Logistic map and uses more than one substitution box to substitute data. All S-boxes have values at altered positions and thus increase the probability of randomness in the algorithms. As the chaotic map generates random values, random selections of S-boxes are carried out.</p>
<fig id="j_info1160_fig_002">
<label>Fig. 2</label>
<caption>
<p>(a) Bifurcation diagram of Logistic map. (b) Logistic map values for <inline-formula id="j_info1160_ineq_010"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>0</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>=</mml:mo>
<mml:mn>0.4</mml:mn></mml:math><tex-math><![CDATA[${x_{0}}=0.4$]]></tex-math></alternatives></inline-formula> and <inline-formula id="j_info1160_ineq_011"><alternatives><mml:math>
<mml:mi mathvariant="italic">r</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>3.8</mml:mn></mml:math><tex-math><![CDATA[$r=3.8$]]></tex-math></alternatives></inline-formula>.</p>
</caption>
<graphic xlink:href="info1160_g002.jpg"/>
</fig>
</sec>
<sec id="j_info1160_s_005">
<label>2.3</label>
<title>Non-Linear Chaotic Map</title>
<p>In order to improve the security of and overcome some limitations in chaotic maps, the authors in Gao <italic>et al.</italic> (<xref ref-type="bibr" rid="j_info1160_ref_015">2006</xref>) designed a Non-Linear Chaotic Map (NCA). Due to the limitation of linear functions, the authors used power function <inline-formula id="j_info1160_ineq_012"><alternatives><mml:math>
<mml:msup>
<mml:mrow>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo>−</mml:mo>
<mml:mi mathvariant="italic">x</mml:mi>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">β</mml:mi>
</mml:mrow>
</mml:msup></mml:math><tex-math><![CDATA[${(1-x)^{\beta }}$]]></tex-math></alternatives></inline-formula> and tangent function. Mathematically, NCA can be written as: 
<disp-formula id="j_info1160_eq_002">
<label>(2)</label><alternatives><mml:math display="block">
<mml:mtable displaystyle="true">
<mml:mtr>
<mml:mtd>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">n</mml:mi>
<mml:mo>+</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>=</mml:mo>
<mml:mo maxsize="1.19em" minsize="1.19em" fence="true" mathvariant="normal">(</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo>−</mml:mo>
<mml:msup>
<mml:mrow>
<mml:mi mathvariant="italic">β</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mo>−</mml:mo>
<mml:mn>4</mml:mn>
</mml:mrow>
</mml:msup>
<mml:mo maxsize="1.19em" minsize="1.19em" fence="true" mathvariant="normal">)</mml:mo>
<mml:mo movablelimits="false">cot</mml:mo>
<mml:mo maxsize="2.03em" minsize="2.03em" fence="true" mathvariant="normal">(</mml:mo><mml:mstyle displaystyle="true">
<mml:mfrac>
<mml:mrow>
<mml:mi mathvariant="italic">α</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>+</mml:mo>
<mml:mi mathvariant="italic">β</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:mstyle>
<mml:mo maxsize="2.03em" minsize="2.03em" fence="true" mathvariant="normal">)</mml:mo>
<mml:msup>
<mml:mrow>
<mml:mo maxsize="2.03em" minsize="2.03em" fence="true" mathvariant="normal">(</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo>+</mml:mo><mml:mstyle displaystyle="true">
<mml:mfrac>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">β</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:mstyle>
<mml:mo maxsize="2.03em" minsize="2.03em" fence="true" mathvariant="normal">)</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">β</mml:mi>
</mml:mrow>
</mml:msup>
<mml:mo movablelimits="false">tan</mml:mo>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mi mathvariant="italic">α</mml:mi>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">n</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
<mml:msup>
<mml:mrow>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo>−</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">n</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">β</mml:mi>
</mml:mrow>
</mml:msup>
<mml:mo mathvariant="normal">,</mml:mo>
</mml:mtd>
</mml:mtr>
</mml:mtable></mml:math><tex-math><![CDATA[\[ {x_{n+1}}=\big(1-{\beta ^{-4}}\big)\cot \bigg(\frac{\alpha }{1+\beta }\bigg){\bigg(1+\frac{1}{\beta }\bigg)^{\beta }}\tan (\alpha {x_{n}}){(1-{x_{n}})^{\beta }},\]]]></tex-math></alternatives>
</disp-formula> 
where the seed parameters are defined as: 
<disp-formula id="j_info1160_eq_003">
<alternatives><mml:math display="block">
<mml:mtable displaystyle="true" columnalign="right">
<mml:mtr>
<mml:mtd class="align-odd">
<mml:mfenced separators="" open="{" close="">
<mml:mrow>
<mml:mtable equalrows="false" equalcolumns="false" columnalign="left">
<mml:mtr>
<mml:mtd class="array">
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">n</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo stretchy="false">∈</mml:mo>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>0</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
<mml:mo mathvariant="normal">,</mml:mo>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd class="array">
<mml:mi mathvariant="italic">α</mml:mi>
<mml:mo stretchy="false">∈</mml:mo>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>0</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>1.4</mml:mn>
<mml:mo fence="true" stretchy="false">]</mml:mo>
<mml:mo mathvariant="normal">,</mml:mo>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd class="array">
<mml:mi mathvariant="italic">β</mml:mi>
<mml:mo stretchy="false">∈</mml:mo>
<mml:mo fence="true" stretchy="false">[</mml:mo>
<mml:mn>5</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>43</mml:mn>
<mml:mo fence="true" stretchy="false">]</mml:mo>
<mml:mo mathvariant="normal">,</mml:mo>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd class="array">
<mml:mtext>or</mml:mtext>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd class="array">
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">n</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo stretchy="false">∈</mml:mo>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>0</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
<mml:mo mathvariant="normal">,</mml:mo>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd class="array">
<mml:mi mathvariant="italic">α</mml:mi>
<mml:mo stretchy="false">∈</mml:mo>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>1.4</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>1.5</mml:mn>
<mml:mo fence="true" stretchy="false">]</mml:mo>
<mml:mo mathvariant="normal">,</mml:mo>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd class="array">
<mml:mi mathvariant="italic">β</mml:mi>
<mml:mo stretchy="false">∈</mml:mo>
<mml:mo fence="true" stretchy="false">[</mml:mo>
<mml:mn>9</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>38</mml:mn>
<mml:mo fence="true" stretchy="false">]</mml:mo>
<mml:mo mathvariant="normal">,</mml:mo>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd class="array">
<mml:mtext>or</mml:mtext>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd class="array">
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">n</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo stretchy="false">∈</mml:mo>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>0</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
<mml:mo mathvariant="normal">,</mml:mo>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd class="array">
<mml:mi mathvariant="italic">α</mml:mi>
<mml:mo stretchy="false">∈</mml:mo>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>1.5</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>1.57</mml:mn>
<mml:mo fence="true" stretchy="false">]</mml:mo>
<mml:mo mathvariant="normal">,</mml:mo>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd class="array">
<mml:mi mathvariant="italic">β</mml:mi>
<mml:mo stretchy="false">∈</mml:mo>
<mml:mo fence="true" stretchy="false">[</mml:mo>
<mml:mn>3</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>15</mml:mn>
<mml:mo fence="true" stretchy="false">]</mml:mo>
<mml:mo>.</mml:mo>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mfenced>
</mml:mtd>
</mml:mtr>
</mml:mtable></mml:math><tex-math><![CDATA[\[ \left\{\begin{array}{l}{x_{n}}\in (0,1),\\ {} \alpha \in (0,1.4],\\ {} \beta \in [5,43],\\ {} \text{or}\\ {} {x_{n}}\in (0,1),\\ {} \alpha \in (1.4,1.5],\\ {} \beta \in [9,38],\\ {} \text{or}\\ {} {x_{n}}\in (0,1),\\ {} \alpha \in (1.5,1.57],\\ {} \beta \in [3,15].\end{array}\right.\]]]></tex-math></alternatives>
</disp-formula> 
NCA map has more large key space than other chaotic maps. Detailed map can be found in Gao <italic>et al.</italic> (<xref ref-type="bibr" rid="j_info1160_ref_015">2006</xref>).</p>
<p><bold>Problem Statement</bold></p>
<p>As binary images are very easy to process, they are actively used in many applications such as identification of objects on a conveyor belt or identification of object orientations. Due to the widespread use of binary images, an image encryption scheme should be strong enough to conceal pixelwise information. The plaintext Cameraman and Pepper binary images shown in Figs. <xref rid="j_info1160_fig_005">5</xref>(a), and <xref rid="j_info1160_fig_009">9</xref>(a) are encrypted using the Amir’s scheme (Anees <italic>et al.</italic>, <xref ref-type="bibr" rid="j_info1160_ref_008">2014a</xref>). As seen from Figs. <xref rid="j_info1160_fig_005">5</xref>(b) and <xref rid="j_info1160_fig_009">9</xref>(b), an encrypted binary image is still recognizable. The histogram results obtained from the Amir’s scheme shown in Figs. <xref rid="j_info1160_fig_005">5</xref>(d), and <xref rid="j_info1160_fig_009">9</xref>(d) are not flat. To support the observation, numerical results for entropy and correlation coefficient can be seen from Tables <xref rid="j_info1160_tab_001">1</xref>, <xref rid="j_info1160_tab_002">2</xref>, <xref rid="j_info1160_tab_003">3</xref> and <xref rid="j_info1160_tab_004">4</xref>. The Amir’s algorithm has sufficient efficiency for the gray scale images. It, however, fails in the case of binary images. As binary data consists of just 0’s and 1’s, the substitution is done using five values only. As it does not conceal the original pixels in a binary image, the Amir’s scheme is vulnerable in high correlation scenarios.</p>
</sec>
</sec>
<sec id="j_info1160_s_006">
<label>3</label>
<title>The Proposed Scheme</title>
<p>A new algorithm is proposed in order to improve the results of the Amir’s scheme (Anees <italic>et al.</italic>, <xref ref-type="bibr" rid="j_info1160_ref_008">2014a</xref>). Our main focus is on high correlated images, i.e. binary images. We added NCA based XORed operation to the existing Amir’s algorithm. Detailed steps of the modified Amir’s scheme are given as:</p>
<p>First, convert the pixel value of plaintext image <italic>I</italic> to binary value of 8 bits and store that binary value in <italic>I</italic>’. 
<disp-formula id="j_info1160_eq_004">
<label>(3)</label><alternatives><mml:math display="block">
<mml:mtable displaystyle="true">
<mml:mtr>
<mml:mtd>
<mml:msup>
<mml:mrow>
<mml:mi mathvariant="italic">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mo>′</mml:mo>
</mml:mrow>
</mml:msup>
<mml:mo>=</mml:mo>
<mml:mi mathvariant="italic">d</mml:mi>
<mml:mi mathvariant="italic">e</mml:mi>
<mml:mi mathvariant="italic">c</mml:mi>
<mml:mn>2</mml:mn>
<mml:mi mathvariant="italic">b</mml:mi>
<mml:mi mathvariant="italic">i</mml:mi>
<mml:mi mathvariant="italic">n</mml:mi>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mi mathvariant="italic">I</mml:mi>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mi mathvariant="italic">i</mml:mi>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mi mathvariant="italic">j</mml:mi>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>8</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
<mml:mo mathvariant="normal">,</mml:mo>
</mml:mtd>
</mml:mtr>
</mml:mtable></mml:math><tex-math><![CDATA[\[ {I^{\prime }}=dec2bin(I(i,j),8),\]]]></tex-math></alternatives>
</disp-formula> 
where <italic>i</italic> and <italic>j</italic> are the positions of pixel value plaintext image <italic>I</italic> and 8 represents that the binary number are in range of 8 bits.</p>
<p>Split 8 bits pixels value into 4 bits frames, i.e. MSBs and LSBs. <disp-formula-group id="j_info1160_dg_001">
<disp-formula id="j_info1160_eq_005">
<label>(4)</label><alternatives><mml:math display="block">
<mml:mtable displaystyle="true" columnalign="left">
<mml:mtr>
<mml:mtd class="align-odd">
<mml:mi mathvariant="italic">MSBs</mml:mi>
<mml:mo>=</mml:mo>
<mml:msup>
<mml:mrow>
<mml:mi mathvariant="italic">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mo>′</mml:mo>
</mml:mrow>
</mml:msup>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>4</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
<mml:mo mathvariant="normal">,</mml:mo>
</mml:mtd>
</mml:mtr>
</mml:mtable></mml:math><tex-math><![CDATA[\[ \mathit{MSBs}={I^{\prime }}(1,4),\]]]></tex-math></alternatives>
</disp-formula>
<disp-formula id="j_info1160_eq_006">
<label>(5)</label><alternatives><mml:math display="block">
<mml:mtable displaystyle="true" columnalign="left">
<mml:mtr>
<mml:mtd class="align-odd">
<mml:mi mathvariant="italic">LSBs</mml:mi>
<mml:mo>=</mml:mo>
<mml:msup>
<mml:mrow>
<mml:mi mathvariant="italic">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mo>′</mml:mo>
</mml:mrow>
</mml:msup>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>5</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>8</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
<mml:mo>.</mml:mo>
</mml:mtd>
</mml:mtr>
</mml:mtable></mml:math><tex-math><![CDATA[\[ \mathit{LSBs}={I^{\prime }}(5,8).\]]]></tex-math></alternatives>
</disp-formula>
</disp-formula-group> The binary value of MSBs and LSBs are again converted to decimal value, where the decimal value of MSBs and LSBs represent the row and column positions, respectively.</p>
<p>The Amir’s scheme utilizes chaotic behaviour of the Logistic map and uses more than one substitution box. Logistic chaotic map generates random values that randomly select S-box which is employed in the substitution process. The proposed modification is as follows:</p>
<p>Random values obtained from Eq. (<xref rid="j_info1160_eq_002">2</xref>) are multiplied with a higher number, i.e. <inline-formula id="j_info1160_ineq_013"><alternatives><mml:math>
<mml:msup>
<mml:mrow>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>10</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mn>14</mml:mn>
</mml:mrow>
</mml:msup></mml:math><tex-math><![CDATA[${(10)^{14}}$]]></tex-math></alternatives></inline-formula> and stored in a variable <italic>Y</italic>. Pixels values obtained via the Amir’s scheme are XORed with <italic>Y</italic> to get <italic>Z</italic>. In order to restrict values between 0–255, modulo 256 operation is applied and obtained results are stored as a final ciphertext image <italic>C</italic>. The stepwise flowchart for the proposed algorithm is shown in Fig. <xref rid="j_info1160_fig_003">3</xref>. The decryption process is reverse of the aforementioned scheme. All the steps shown in Fig. <xref rid="j_info1160_fig_003">3</xref> can be applied in reverse order to obtain the plaintext Cameraman image <italic>I</italic> from encrypted Cameraman image <italic>C</italic>.</p>
<fig id="j_info1160_fig_003">
<label>Fig. 3</label>
<caption>
<p>Flowchart for proposed encryption algorithm.</p>
</caption>
<graphic xlink:href="info1160_g003.jpg"/>
</fig>
</sec>
<sec id="j_info1160_s_007">
<label>4</label>
<title>Results and Comparative Analysis</title>
<p>Comparison needs to be done between the results of the Amir’s scheme (Anees <italic>et al.</italic>, <xref ref-type="bibr" rid="j_info1160_ref_008">2014a</xref>), Li’s scheme (Li <italic>et al.</italic>, <xref ref-type="bibr" rid="j_info1160_ref_031">2017</xref>) and the proposed scheme. The Li’s scheme is based on single dimension Skew tent chaotic map which cannot resist many differential attacks. In our proposed scheme, the Logistic chaotic map is utilized for the selection of S-box only. This would allow supporting the effectiveness of the proposed algorithm. As shown in Figs. <xref rid="j_info1160_fig_006">6</xref>, <xref rid="j_info1160_fig_007">7</xref>, <xref rid="j_info1160_fig_010">10</xref> and <xref rid="j_info1160_fig_011">11</xref>, results are improved visually. To strengthen this argument, comparative results of the two algorithms are shown in Tables <xref rid="j_info1160_tab_001">1</xref>, <xref rid="j_info1160_tab_002">2</xref>, <xref rid="j_info1160_tab_003">3</xref> and <xref rid="j_info1160_tab_004">4</xref>. As the correlation coefficients improve, similarity between the plaintext image and the ciphertext image decreases. Mathematically, correlation coefficients can be calculated as 
<disp-formula id="j_info1160_eq_007">
<label>(6)</label><alternatives><mml:math display="block">
<mml:mtable displaystyle="true">
<mml:mtr>
<mml:mtd>
<mml:mi mathvariant="italic">C</mml:mi>
<mml:mo>.</mml:mo>
<mml:mspace width="2.5pt"/>
<mml:mi mathvariant="italic">C</mml:mi>
<mml:mo>=</mml:mo><mml:mstyle displaystyle="true">
<mml:mfrac>
<mml:mrow>
<mml:mi mathvariant="italic">Cov</mml:mi>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mi mathvariant="italic">x</mml:mi>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mi mathvariant="italic">y</mml:mi>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:msqrt>
<mml:mrow>
<mml:mi mathvariant="italic">VAR</mml:mi>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mi mathvariant="italic">x</mml:mi>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
<mml:mo>×</mml:mo>
<mml:mi mathvariant="italic">VAR</mml:mi>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mi mathvariant="italic">y</mml:mi>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
</mml:mrow>
</mml:msqrt>
</mml:mrow>
</mml:mfrac>
</mml:mstyle>
<mml:mo mathvariant="normal">,</mml:mo>
</mml:mtd>
</mml:mtr>
</mml:mtable></mml:math><tex-math><![CDATA[\[ C.\hspace{2.5pt}C=\frac{\mathit{Cov}(x,y)}{\sqrt{\mathit{VAR}(x)\times \mathit{VAR}(y)}},\]]]></tex-math></alternatives>
</disp-formula> 
where 
<disp-formula id="j_info1160_eq_008">
<alternatives><mml:math display="block">
<mml:mtable displaystyle="true" columnalign="left">
<mml:mtr>
<mml:mtd class="align-odd">
<mml:mi mathvariant="italic">VAR</mml:mi>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mi mathvariant="italic">x</mml:mi>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
<mml:mo>=</mml:mo><mml:mstyle displaystyle="true">
<mml:mfrac>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">N</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:mstyle>
<mml:munderover accentunder="false" accent="false">
<mml:mrow>
<mml:mstyle displaystyle="true">
<mml:mo largeop="true" movablelimits="false">∑</mml:mo></mml:mstyle>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">i</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">N</mml:mi>
</mml:mrow>
</mml:munderover>
<mml:msup>
<mml:mrow>
<mml:mo maxsize="1.19em" minsize="1.19em" fence="true" mathvariant="normal">(</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">i</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>−</mml:mo>
<mml:mi mathvariant="italic">E</mml:mi>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mi mathvariant="italic">x</mml:mi>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
<mml:mo maxsize="1.19em" minsize="1.19em" fence="true" mathvariant="normal">)</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msup>
<mml:mo mathvariant="normal">,</mml:mo>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd class="align-odd">
<mml:mi mathvariant="italic">Cov</mml:mi>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mi mathvariant="italic">x</mml:mi>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mi mathvariant="italic">y</mml:mi>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
<mml:mo>=</mml:mo><mml:mstyle displaystyle="true">
<mml:mfrac>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">N</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:mstyle>
<mml:munderover accentunder="false" accent="false">
<mml:mrow>
<mml:mstyle displaystyle="true">
<mml:mo largeop="true" movablelimits="false">∑</mml:mo></mml:mstyle>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">i</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">N</mml:mi>
</mml:mrow>
</mml:munderover>
<mml:mo maxsize="1.19em" minsize="1.19em" fence="true" mathvariant="normal">(</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">i</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>−</mml:mo>
<mml:mi mathvariant="italic">E</mml:mi>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mi mathvariant="italic">x</mml:mi>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
<mml:mo maxsize="1.19em" minsize="1.19em" fence="true" mathvariant="normal">)</mml:mo>
<mml:mo maxsize="1.19em" minsize="1.19em" fence="true" mathvariant="normal">(</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">y</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">i</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>−</mml:mo>
<mml:mi mathvariant="italic">E</mml:mi>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mi mathvariant="italic">y</mml:mi>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
<mml:mo maxsize="1.19em" minsize="1.19em" fence="true" mathvariant="normal">)</mml:mo>
<mml:mo>.</mml:mo>
</mml:mtd>
</mml:mtr>
</mml:mtable></mml:math><tex-math><![CDATA[\[\begin{array}{l}\displaystyle \mathit{VAR}(x)=\frac{1}{N}{\sum \limits_{i=1}^{N}}{\big({x_{i}}-E(x)\big)^{2}},\\ {} \displaystyle \mathit{Cov}(x,y)=\frac{1}{N}{\sum \limits_{i=1}^{N}}\big({x_{i}}-E(x)\big)\big({y_{i}}-E(y)\big).\end{array}\]]]></tex-math></alternatives>
</disp-formula>
</p>
<fig id="j_info1160_fig_004">
<label>Fig. 4</label>
<caption>
<p>Encryption and histogram of gray scale Cameraman image via Amir’s algorithm.</p>
</caption>
<graphic xlink:href="info1160_g004.jpg"/>
</fig>
<fig id="j_info1160_fig_005">
<label>Fig. 5</label>
<caption>
<p>Encryption and histogram of binary Cameraman image via Amir’s algorithm.</p>
</caption>
<graphic xlink:href="info1160_g005.jpg"/>
</fig>
<fig id="j_info1160_fig_006">
<label>Fig. 6</label>
<caption>
<p>Encryption and histogram of gray scale Cameraman image via proposed scheme.</p>
</caption>
<graphic xlink:href="info1160_g006.jpg"/>
</fig>
<fig id="j_info1160_fig_007">
<label>Fig. 7</label>
<caption>
<p>Encryption and histogram of binary Cameraman image via proposed scheme.</p>
</caption>
<graphic xlink:href="info1160_g007.jpg"/>
</fig>
<fig id="j_info1160_fig_008">
<label>Fig. 8</label>
<caption>
<p>Encryption and histogram of gray scale Pepper image via Amir’s algorithm.</p>
</caption>
<graphic xlink:href="info1160_g008.jpg"/>
</fig>
<fig id="j_info1160_fig_009">
<label>Fig. 9</label>
<caption>
<p>Encryption and histogram of binary Pepper image via Amir’s algorithm.</p>
</caption>
<graphic xlink:href="info1160_g009.jpg"/>
</fig>
<fig id="j_info1160_fig_010">
<label>Fig. 10</label>
<caption>
<p>Encryption and histogram of gray scale Pepper image via proposed scheme.</p>
</caption>
<graphic xlink:href="info1160_g010.jpg"/>
</fig>
<fig id="j_info1160_fig_011">
<label>Fig. 11</label>
<caption>
<p>Encryption and histogram of binary Pepper image via proposed scheme.</p>
</caption>
<graphic xlink:href="info1160_g011.jpg"/>
</fig>
<p>In the above equation, <italic>E</italic> stands for expected value operator. From Fig. <xref rid="j_info1160_fig_012">12</xref>, one can see that the original plaintext Cameraman image has correlation in horizontal, vertical and diagonal directions, respectively. When the Cameraman image is encrypted via the proposed scheme, a disorder distribution without regular pattern appears shown in Fig. <xref rid="j_info1160_fig_013">13</xref>. Special attention must be given to the information entropy analysis, where the value of the security parameter approaches to 8 in the proposed algorithm. Entropy value close to 8 is considered as ideal which was proposed in the Shannon theory of information entropy. Entropy is the measure of unpredictability of the information content. The closer the value of entropy to ideal value, i.e. 8 bits, the more effective is the algorithm. As outlined in the problem statement, our objective is to improve the encryption results for a binary image. The entropy value has significantly increased from 2 to around 7.9. Mathematically, entropy can be written as: 
<disp-formula id="j_info1160_eq_009">
<label>(7)</label><alternatives><mml:math display="block">
<mml:mtable displaystyle="true">
<mml:mtr>
<mml:mtd>
<mml:mi mathvariant="italic">H</mml:mi>
<mml:mo>=</mml:mo>
<mml:mo>−</mml:mo><mml:mstyle displaystyle="true">
<mml:mo largeop="true" movablelimits="false">∑</mml:mo></mml:mstyle>
<mml:mi mathvariant="italic">p</mml:mi>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">i</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mo movablelimits="false">log</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mi mathvariant="italic">p</mml:mi>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">i</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
<mml:mo mathvariant="normal">,</mml:mo>
</mml:mtd>
</mml:mtr>
</mml:mtable></mml:math><tex-math><![CDATA[\[ H=-\sum p({x_{i}}){\log _{2}}p({x_{i}}),\]]]></tex-math></alternatives>
</disp-formula> 
where <inline-formula id="j_info1160_ineq_014"><alternatives><mml:math>
<mml:mi mathvariant="italic">p</mml:mi>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">i</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math><tex-math><![CDATA[$p({x_{i}})$]]></tex-math></alternatives></inline-formula> is the probability of random variable <italic>x</italic> at <italic>i</italic>th index. Key sensitivity describes the percentage change resulting from a single bit change in the key on the decryption process or the difference in the two cipher images. The results show that the value of the parameter increases significantly, making it difficult to retrieve the contents of the plain image. Likewise, values for Peak Signal to Noise Ratio (PSNR) have also improved. Mathematically, PSNR can be defined as: 
<disp-formula id="j_info1160_eq_010">
<label>(8)</label><alternatives><mml:math display="block">
<mml:mtable displaystyle="true">
<mml:mtr>
<mml:mtd>
<mml:mi mathvariant="italic">PSNR</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>20</mml:mn>
<mml:mo>×</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mo movablelimits="false">log</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mn>10</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo maxsize="2.03em" minsize="2.03em" fence="true" mathvariant="normal">(</mml:mo><mml:mstyle displaystyle="true">
<mml:mfrac>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">MAX</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mrow>
<mml:msqrt>
<mml:mrow>
<mml:mi mathvariant="italic">MSE</mml:mi>
</mml:mrow>
</mml:msqrt>
</mml:mrow>
</mml:mfrac>
</mml:mstyle>
<mml:mo maxsize="2.03em" minsize="2.03em" fence="true" mathvariant="normal">)</mml:mo>
<mml:mo mathvariant="normal">,</mml:mo>
</mml:mtd>
</mml:mtr>
</mml:mtable></mml:math><tex-math><![CDATA[\[ \mathit{PSNR}=20\times {\log _{10}}\bigg(\frac{{I_{\mathit{MAX}}}}{\sqrt{\mathit{MSE}}}\bigg),\]]]></tex-math></alternatives>
</disp-formula> 
where <inline-formula id="j_info1160_ineq_015"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">MAX</mml:mi>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${I_{\mathit{MAX}}}$]]></tex-math></alternatives></inline-formula> is the maximum pixel value of the plaintext image. Histogram analysis shows that the pixels values of the encrypted image (resulting from the proposed algorithm) are distributed evenly over the entire range, which can be seen from Figs. <xref rid="j_info1160_fig_006">6</xref>(d), <xref rid="j_info1160_fig_007">7</xref>(d), <xref rid="j_info1160_fig_010">10</xref>(d) and <xref rid="j_info1160_fig_011">11</xref>(d). The probability of occurrence of each pixel value is therefore the same. This normalizes the image in such a way that the distribution of the information content is evenly distributed and it does not concentrate over certain values.</p>
<fig id="j_info1160_fig_012">
<label>Fig. 12</label>
<caption>
<p>Plot of randomly chosen adjacent pixel of plaintext Cameraman image at pixel locations <italic>x</italic> and <italic>y</italic> (a) horizontal direction, (b) vertical direction, (c) diagonal direction.</p>
</caption>
<graphic xlink:href="info1160_g012.jpg"/>
</fig>
<fig id="j_info1160_fig_013">
<label>Fig. 13</label>
<caption>
<p>Plot of randomly chosen adjacent pixel of encrypted Cameraman image at pixel locations <italic>x</italic> and <italic>y</italic> (a) horizontal direction, (b) vertical direction, (c) diagonal direction.</p>
</caption>
<graphic xlink:href="info1160_g013.jpg"/>
</fig>
<p>Other parameters like Mean Square Error (MSE), Number of Pixel Change (NPCR) and Uniform Average Change Intensity (UACI) are also calculated. MSE basically measures the cumulative square error between two digital images. MSE can be used to find the avalanche effect. NPCR and UACI are used to check the effect of single pixel change on the whole image. Mostly, for any encryption scheme, a small change in the plaintext image pixel value should cause significant change in the ciphertext image. Mathematically, MSE, NPCR and UACI are written as: <disp-formula-group id="j_info1160_dg_002">
<disp-formula id="j_info1160_eq_011">
<label>(9)</label><alternatives><mml:math display="block">
<mml:mtable displaystyle="true" columnalign="left">
<mml:mtr>
<mml:mtd class="align-odd">
<mml:mi mathvariant="italic">MSE</mml:mi>
<mml:mo>=</mml:mo><mml:mstyle displaystyle="true">
<mml:mfrac>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">M</mml:mi>
<mml:mo>×</mml:mo>
<mml:mi mathvariant="italic">N</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:mstyle>
<mml:munderover accentunder="false" accent="false">
<mml:mrow>
<mml:mstyle displaystyle="true">
<mml:mo largeop="true" movablelimits="false">∑</mml:mo></mml:mstyle>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">i</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>0</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">N</mml:mi>
<mml:mo>−</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:munderover>
<mml:munderover accentunder="false" accent="false">
<mml:mrow>
<mml:mstyle displaystyle="true">
<mml:mo largeop="true" movablelimits="false">∑</mml:mo></mml:mstyle>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">j</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>0</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">M</mml:mi>
<mml:mo>−</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:munderover>
<mml:msup>
<mml:mrow>
<mml:mo maxsize="1.19em" minsize="1.19em" fence="true" mathvariant="normal">(</mml:mo>
<mml:mi mathvariant="italic">C</mml:mi>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mi mathvariant="italic">i</mml:mi>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mi mathvariant="italic">j</mml:mi>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
<mml:mo>−</mml:mo>
<mml:msup>
<mml:mrow>
<mml:mi mathvariant="italic">C</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mo>∗</mml:mo>
</mml:mrow>
</mml:msup>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mi mathvariant="italic">i</mml:mi>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mi mathvariant="italic">j</mml:mi>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
<mml:mo maxsize="1.19em" minsize="1.19em" fence="true" mathvariant="normal">)</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msup>
<mml:mo mathvariant="normal">,</mml:mo>
</mml:mtd>
</mml:mtr>
</mml:mtable></mml:math><tex-math><![CDATA[\[ \mathit{MSE}=\frac{1}{M\times N}{\sum \limits_{i=0}^{N-1}}{\sum \limits_{j=0}^{M-1}}{\big(C(i,j)-{C^{\ast }}(i,j)\big)^{2}},\]]]></tex-math></alternatives>
</disp-formula>
<disp-formula id="j_info1160_eq_012">
<label>(10)</label><alternatives><mml:math display="block">
<mml:mtable displaystyle="true" columnalign="left">
<mml:mtr>
<mml:mtd class="align-odd">
<mml:mi mathvariant="italic">NPCR</mml:mi>
<mml:mo>=</mml:mo><mml:mstyle displaystyle="true">
<mml:mfrac>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mo largeop="false" movablelimits="false">∑</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">i</mml:mi>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mi mathvariant="italic">j</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mi mathvariant="italic">D</mml:mi>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mi mathvariant="italic">i</mml:mi>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mi mathvariant="italic">j</mml:mi>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">M</mml:mi>
<mml:mo>×</mml:mo>
<mml:mi mathvariant="italic">N</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:mstyle>
<mml:mo>×</mml:mo>
<mml:mn>100</mml:mn>
<mml:mi mathvariant="normal">%</mml:mi>
<mml:mo mathvariant="normal">,</mml:mo>
</mml:mtd>
</mml:mtr>
</mml:mtable></mml:math><tex-math><![CDATA[\[ \mathit{NPCR}=\frac{{\textstyle\sum _{i,j}}D(i,j)}{M\times N}\times 100\% ,\]]]></tex-math></alternatives>
</disp-formula>
</disp-formula-group> where 
<disp-formula id="j_info1160_eq_013">
<label>(11)</label><alternatives><mml:math display="block">
<mml:mtable displaystyle="true" columnalign="left">
<mml:mtr>
<mml:mtd class="align-odd">
<mml:mi mathvariant="italic">D</mml:mi>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mi mathvariant="italic">i</mml:mi>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mi mathvariant="italic">j</mml:mi>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
<mml:mo>=</mml:mo>
<mml:mfenced separators="" open="{" close="">
<mml:mrow>
<mml:mtable columnspacing="4.0pt" equalrows="false" columnlines="none" equalcolumns="false" columnalign="left left">
<mml:mtr>
<mml:mtd class="array">
<mml:mn>0</mml:mn>
<mml:mspace width="1em"/>
</mml:mtd>
<mml:mtd class="array">
<mml:mtext>if</mml:mtext>
<mml:mspace width="2.5pt"/>
<mml:mi mathvariant="italic">C</mml:mi>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mi mathvariant="italic">i</mml:mi>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mi mathvariant="italic">j</mml:mi>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
<mml:mo>=</mml:mo>
<mml:msup>
<mml:mrow>
<mml:mi mathvariant="italic">C</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mo>∗</mml:mo>
</mml:mrow>
</mml:msup>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mi mathvariant="italic">i</mml:mi>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mi mathvariant="italic">j</mml:mi>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
<mml:mo mathvariant="normal">,</mml:mo>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd class="array">
<mml:mn>1</mml:mn>
<mml:mspace width="1em"/>
</mml:mtd>
<mml:mtd class="array">
<mml:mtext>otherwise</mml:mtext>
<mml:mo>.</mml:mo>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mfenced>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd class="align-odd">
<mml:mi mathvariant="normal">UACI</mml:mi>
<mml:mo>=</mml:mo><mml:mstyle displaystyle="true">
<mml:mfrac>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">M</mml:mi>
<mml:mo>×</mml:mo>
<mml:mi mathvariant="italic">N</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:mstyle>
<mml:mo maxsize="2.03em" minsize="2.03em" fence="true">[</mml:mo>
<mml:munder>
<mml:mrow>
<mml:mstyle displaystyle="true">
<mml:mo largeop="true" movablelimits="false">∑</mml:mo></mml:mstyle>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">i</mml:mi>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mi mathvariant="italic">j</mml:mi>
</mml:mrow>
</mml:munder><mml:mstyle displaystyle="true">
<mml:mfrac>
<mml:mrow>
<mml:mi mathvariant="italic">C</mml:mi>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mi mathvariant="italic">i</mml:mi>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mi mathvariant="italic">j</mml:mi>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
<mml:mo>−</mml:mo>
<mml:msup>
<mml:mrow>
<mml:mi mathvariant="italic">C</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mo>∗</mml:mo>
</mml:mrow>
</mml:msup>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mi mathvariant="italic">i</mml:mi>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mi mathvariant="italic">j</mml:mi>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mn>255</mml:mn>
</mml:mrow>
</mml:mfrac>
</mml:mstyle>
<mml:mo maxsize="2.03em" minsize="2.03em" fence="true">]</mml:mo>
<mml:mo>×</mml:mo>
<mml:mn>100.</mml:mn>
</mml:mtd>
</mml:mtr>
</mml:mtable></mml:math><tex-math><![CDATA[\[\begin{array}{l}\displaystyle D(i,j)=\left\{\begin{array}{l@{\hskip4.0pt}l}0\hspace{1em}& \text{if}\hspace{2.5pt}C(i,j)={C^{\ast }}(i,j),\\ {} 1\hspace{1em}& \text{otherwise}.\end{array}\right.\\ {} \displaystyle \mathrm{UACI}=\frac{1}{M\times N}\bigg[\sum \limits_{i,j}\frac{C(i,j)-{C^{\ast }}(i,j)}{255}\bigg]\times 100.\end{array}\]]]></tex-math></alternatives>
</disp-formula> 
Here, <italic>M</italic> and <italic>N</italic> denote the number of rows and columns, respectively. <inline-formula id="j_info1160_ineq_016"><alternatives><mml:math>
<mml:mi mathvariant="italic">C</mml:mi>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mi mathvariant="italic">i</mml:mi>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mi mathvariant="italic">j</mml:mi>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math><tex-math><![CDATA[$C(i,j)$]]></tex-math></alternatives></inline-formula> corresponds to ciphertext image pixel at <italic>i</italic>th row and <italic>j</italic>th column position and <inline-formula id="j_info1160_ineq_017"><alternatives><mml:math>
<mml:msup>
<mml:mrow>
<mml:mi mathvariant="italic">C</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mo>∗</mml:mo>
</mml:mrow>
</mml:msup>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mi mathvariant="italic">i</mml:mi>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mi mathvariant="italic">j</mml:mi>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math><tex-math><![CDATA[${C^{\ast }}(i,j)$]]></tex-math></alternatives></inline-formula> corresponds to the ciphertext image pixel at <italic>i</italic>th row and <italic>j</italic>th column position; they differ by only a single bit. Similarly, quality analysis is also done to figure out the quality of the proposed image encryption scheme. The quality of an algorithm can be calculated via Irregular Deviation <inline-formula id="j_info1160_ineq_018"><alternatives><mml:math>
<mml:mi mathvariant="italic">I</mml:mi>
<mml:mo>−</mml:mo>
<mml:mi mathvariant="italic">D</mml:mi></mml:math><tex-math><![CDATA[$I-D$]]></tex-math></alternatives></inline-formula> and Deviation from Uniform Histogram <inline-formula id="j_info1160_ineq_019"><alternatives><mml:math>
<mml:mi mathvariant="italic">D</mml:mi>
<mml:mo>−</mml:mo>
<mml:mi mathvariant="italic">P</mml:mi></mml:math><tex-math><![CDATA[$D-P$]]></tex-math></alternatives></inline-formula>. Mathematically, these parameters can be defined as: <disp-formula-group id="j_info1160_dg_003">
<disp-formula id="j_info1160_eq_014">
<label>(12)</label><alternatives><mml:math display="block">
<mml:mtable displaystyle="true" columnalign="left">
<mml:mtr>
<mml:mtd class="align-odd">
<mml:mi mathvariant="italic">I</mml:mi>
<mml:mo>−</mml:mo>
<mml:mi mathvariant="italic">D</mml:mi>
<mml:mo>=</mml:mo>
<mml:munderover accentunder="false" accent="false">
<mml:mrow>
<mml:mstyle displaystyle="true">
<mml:mo largeop="true" movablelimits="false">∑</mml:mo></mml:mstyle>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">i</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>0</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mn>255</mml:mn>
</mml:mrow>
</mml:munderover>
<mml:mo maxsize="1.19em" minsize="1.19em" fence="true" mathvariant="normal">(</mml:mo>
<mml:mo stretchy="false">|</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">H</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">i</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>−</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">A</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">h</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo stretchy="false">|</mml:mo>
<mml:mo maxsize="1.19em" minsize="1.19em" fence="true" mathvariant="normal">)</mml:mo>
<mml:mo mathvariant="normal">,</mml:mo>
</mml:mtd>
</mml:mtr>
</mml:mtable></mml:math><tex-math><![CDATA[\[ I-D={\sum \limits_{i=0}^{255}}\big(|{H_{i}}-{A_{h}}|\big),\]]]></tex-math></alternatives>
</disp-formula>
<disp-formula id="j_info1160_eq_015">
<label>(13)</label><alternatives><mml:math display="block">
<mml:mtable displaystyle="true" columnalign="left">
<mml:mtr>
<mml:mtd class="align-odd">
<mml:mi mathvariant="italic">D</mml:mi>
<mml:mo>−</mml:mo>
<mml:mi mathvariant="italic">P</mml:mi>
<mml:mo>=</mml:mo><mml:mstyle displaystyle="true">
<mml:mfrac>
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mo largeop="false" movablelimits="false">∑</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">i</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>0</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mn>255</mml:mn>
</mml:mrow>
</mml:msubsup>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mo stretchy="false">|</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">H</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">E</mml:mi>
<mml:mi mathvariant="italic">i</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>−</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">H</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">E</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo stretchy="false">|</mml:mo>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">M</mml:mi>
<mml:mo>×</mml:mo>
<mml:mi mathvariant="italic">N</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:mstyle>
<mml:mo mathvariant="normal">,</mml:mo>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd class="align-odd">
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">H</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">E</mml:mi>
<mml:mi mathvariant="italic">i</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>=</mml:mo>
<mml:mfenced separators="" open="{" close="">
<mml:mrow>
<mml:mtable columnspacing="4.0pt" equalrows="false" columnlines="none" equalcolumns="false" columnalign="left left">
<mml:mtr>
<mml:mtd class="array">
<mml:mstyle displaystyle="false">
<mml:mfrac>
<mml:mrow>
<mml:mi mathvariant="italic">M</mml:mi>
<mml:mo>×</mml:mo>
<mml:mi mathvariant="italic">N</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>256</mml:mn>
</mml:mrow>
</mml:mfrac>
</mml:mstyle>
<mml:mspace width="1em"/>
</mml:mtd>
<mml:mtd class="array">
<mml:mtext>if</mml:mtext>
<mml:mspace width="2.5pt"/>
<mml:mn>0</mml:mn>
<mml:mo>⩽</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">E</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">i</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>⩽</mml:mo>
<mml:mn>255</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd class="array">
<mml:mn>0</mml:mn>
<mml:mspace width="1em"/>
</mml:mtd>
<mml:mtd class="array">
<mml:mtext>elsewhere</mml:mtext>
<mml:mo mathvariant="normal">,</mml:mo>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mfenced>
</mml:mtd>
</mml:mtr>
</mml:mtable></mml:math><tex-math><![CDATA[\[\begin{array}{l}\displaystyle D-P=\frac{{\textstyle\textstyle\sum _{i=0}^{255}}(|{H_{Ei}}-{H_{E}}|)}{M\times N},\\ {} \displaystyle {H_{Ei}}=\left\{\begin{array}{l@{\hskip4.0pt}l}\frac{M\times N}{256}\hspace{1em}& \text{if}\hspace{2.5pt}0\leqslant {E_{i}}\leqslant 255,\\ {} 0\hspace{1em}& \text{elsewhere},\end{array}\right.\end{array}\]]]></tex-math></alternatives>
</disp-formula>
</disp-formula-group> where <inline-formula id="j_info1160_ineq_020"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">H</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">i</mml:mi>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${H_{i}}$]]></tex-math></alternatives></inline-formula> computes the amplitude of histogram difference between plaintext image and encrypted image at index <italic>i</italic> and <inline-formula id="j_info1160_ineq_021"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">A</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">h</mml:mi>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${A_{h}}$]]></tex-math></alternatives></inline-formula> calculates the average sum of histogram values. <inline-formula id="j_info1160_ineq_022"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">H</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">E</mml:mi>
<mml:mi mathvariant="italic">i</mml:mi>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${H_{Ei}}$]]></tex-math></alternatives></inline-formula> is the ideal while <inline-formula id="j_info1160_ineq_023"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">H</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">E</mml:mi>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${H_{E}}$]]></tex-math></alternatives></inline-formula> is the real histogram value of encrypted image at index <italic>i</italic>. Smaller value of <inline-formula id="j_info1160_ineq_024"><alternatives><mml:math>
<mml:mi mathvariant="italic">I</mml:mi>
<mml:mo>−</mml:mo>
<mml:mi mathvariant="italic">D</mml:mi></mml:math><tex-math><![CDATA[$I-D$]]></tex-math></alternatives></inline-formula> and <inline-formula id="j_info1160_ineq_025"><alternatives><mml:math>
<mml:mi mathvariant="italic">D</mml:mi>
<mml:mo>−</mml:mo>
<mml:mi mathvariant="italic">P</mml:mi></mml:math><tex-math><![CDATA[$D-P$]]></tex-math></alternatives></inline-formula> represents the high quality of an image encryption scheme. Likewise, contrast analysis is also carried out to allow an observer to strongly recognize the entity in texture of an image. Mathematically, contrast can be computed as: 
<disp-formula id="j_info1160_eq_016">
<label>(14)</label><alternatives><mml:math display="block">
<mml:mtable displaystyle="true">
<mml:mtr>
<mml:mtd>
<mml:mi mathvariant="italic">C</mml:mi>
<mml:mo>=</mml:mo>
<mml:munder>
<mml:mrow>
<mml:mstyle displaystyle="true">
<mml:mo largeop="true" movablelimits="false">∑</mml:mo></mml:mstyle>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">i</mml:mi>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mi mathvariant="italic">j</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:munder>
<mml:mi mathvariant="italic">N</mml:mi>
<mml:mo stretchy="false">|</mml:mo>
<mml:mi mathvariant="italic">i</mml:mi>
<mml:mo>−</mml:mo>
<mml:mi mathvariant="italic">j</mml:mi>
<mml:msup>
<mml:mrow>
<mml:mo stretchy="false">|</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msup>
<mml:mo>×</mml:mo>
<mml:mi mathvariant="normal">Γ</mml:mi>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mi mathvariant="italic">i</mml:mi>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mi mathvariant="italic">j</mml:mi>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
<mml:mo mathvariant="normal">,</mml:mo>
</mml:mtd>
</mml:mtr>
</mml:mtable></mml:math><tex-math><![CDATA[\[ C=\sum \limits_{i,j=1}N|i-j{|^{2}}\times \Gamma (i,j),\]]]></tex-math></alternatives>
</disp-formula> 
where <inline-formula id="j_info1160_ineq_026"><alternatives><mml:math>
<mml:mi mathvariant="normal">Γ</mml:mi>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mi mathvariant="italic">i</mml:mi>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mi mathvariant="italic">j</mml:mi>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math><tex-math><![CDATA[$\Gamma (i,j)$]]></tex-math></alternatives></inline-formula> represents the number of Gray-Level Co-Occurrence Matrices (GLCM). High contrast value shows that the image gray levels are considerably different. Using the aforementioned parameters, we compute the simulation results for our encryption scheme. Simulation results of gray and binary images for both Cameraman and Pepper images are shown from Tables <xref rid="j_info1160_tab_001">1</xref> to <xref rid="j_info1160_tab_004">4</xref>. All simulation results are in favour of the proposed scheme. Apart from tabular values, we have also shown the correlation plots for the plaintext and ciphertext Cameraman image in Figs. <xref rid="j_info1160_fig_012">12</xref> and <xref rid="j_info1160_fig_013">13</xref>, respectively. From these plots, one can see lower correlation between adjacent pixels.</p>
<table-wrap id="j_info1160_tab_001">
<label>Table 1</label>
<caption>
<p>Evaluation of the proposed scheme for gray scale Cameraman image.</p>
</caption>
<table>
<thead>
<tr>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Parameter</td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">(Anees <italic>et al.</italic>, <xref ref-type="bibr" rid="j_info1160_ref_008">2014a</xref>)</td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">(Li <italic>et al.</italic>, <xref ref-type="bibr" rid="j_info1160_ref_031">2017</xref>)</td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Proposed</td>
</tr>
</thead>
<tbody>
<tr>
<td style="vertical-align: top; text-align: left">MSE</td>
<td style="vertical-align: top; text-align: left">38.3683</td>
<td style="vertical-align: top; text-align: left">40.3293</td>
<td style="vertical-align: top; text-align: left"><bold>40.3774</bold></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">PSNR</td>
<td style="vertical-align: top; text-align: left">16.8046</td>
<td style="vertical-align: top; text-align: left">6.7754</td>
<td style="vertical-align: top; text-align: left"><bold>16.8233</bold></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Entropy (H)</td>
<td style="vertical-align: top; text-align: left">7.9000</td>
<td style="vertical-align: top; text-align: left">7.9901</td>
<td style="vertical-align: top; text-align: left"><bold>7.9966</bold></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">NPCR</td>
<td style="vertical-align: top; text-align: left">98.8251</td>
<td style="vertical-align: top; text-align: left">9.545</td>
<td style="vertical-align: top; text-align: left"><bold>99.4537</bold></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">UACI</td>
<td style="vertical-align: top; text-align: left">33.1335</td>
<td style="vertical-align: top; text-align: left">33.1907</td>
<td style="vertical-align: top; text-align: left"><bold>33.6723</bold></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">I-D</td>
<td style="vertical-align: top; text-align: left">48,834</td>
<td style="vertical-align: top; text-align: left">44,765</td>
<td style="vertical-align: top; text-align: left"><bold>39,003</bold></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">D-P</td>
<td style="vertical-align: top; text-align: left">0.3446</td>
<td style="vertical-align: top; text-align: left">0.3290</td>
<td style="vertical-align: top; text-align: left"><bold>0.0678</bold></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Contrast</td>
<td style="vertical-align: top; text-align: left">7.9935</td>
<td style="vertical-align: top; text-align: left">8.6755</td>
<td style="vertical-align: top; text-align: left"><bold>10.0678</bold></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Key Sensitivity Difference</td>
<td style="vertical-align: top; text-align: left">66.2567</td>
<td style="vertical-align: top; text-align: left">99.5453</td>
<td style="vertical-align: top; text-align: left"><bold>99.6353</bold></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Horizontal Direction Corr Coff</td>
<td style="vertical-align: top; text-align: left"><bold>−0.0171</bold></td>
<td style="vertical-align: top; text-align: left">0.0132</td>
<td style="vertical-align: top; text-align: left">0.0536</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Vertical Direction Corr Coff</td>
<td style="vertical-align: top; text-align: left">0.0449</td>
<td style="vertical-align: top; text-align: left">0.0019</td>
<td style="vertical-align: top; text-align: left"><bold>−0.0047</bold></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Diagonal Direction Corr Coff</td>
<td style="vertical-align: top; text-align: left">0.0250</td>
<td style="vertical-align: top; text-align: left">0.0141</td>
<td style="vertical-align: top; text-align: left"><bold>0.0089</bold></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">Time (Second)</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><bold>7.46</bold></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">7.88</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">7.50</td>
</tr>
</tbody>
</table>
</table-wrap>
<table-wrap id="j_info1160_tab_002">
<label>Table 2</label>
<caption>
<p>Evaluation of the proposed scheme for binary Cameraman image.</p>
</caption>
<table>
<thead>
<tr>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Parameter</td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">(Anees <italic>et al.</italic>, <xref ref-type="bibr" rid="j_info1160_ref_008">2014a</xref>)</td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">(Li <italic>et al.</italic>, <xref ref-type="bibr" rid="j_info1160_ref_031">2017</xref>)</td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Proposed scheme</td>
</tr>
</thead>
<tbody>
<tr>
<td style="vertical-align: top; text-align: left">MSE</td>
<td style="vertical-align: top; text-align: left">39.0926</td>
<td style="vertical-align: top; text-align: left">40.0739</td>
<td style="vertical-align: top; text-align: left"><bold>40.4153</bold></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">PSNR</td>
<td style="vertical-align: top; text-align: left">8.3952</td>
<td style="vertical-align: top; text-align: left">8.7952</td>
<td style="vertical-align: top; text-align: left"><bold>9.4948</bold></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Entropy (H)</td>
<td style="vertical-align: top; text-align: left">2.2599</td>
<td style="vertical-align: top; text-align: left">7.8867</td>
<td style="vertical-align: top; text-align: left"><bold>7.9973</bold></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">NPCR</td>
<td style="vertical-align: top; text-align: left">66.7236</td>
<td style="vertical-align: top; text-align: left">98.5453</td>
<td style="vertical-align: top; text-align: left"><bold>99.2365</bold></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">UACI</td>
<td style="vertical-align: top; text-align: left">24.31205</td>
<td style="vertical-align: top; text-align: left">33.2334</td>
<td style="vertical-align: top; text-align: left"><bold>33.8234</bold></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">I-D</td>
<td style="vertical-align: top; text-align: left">122,876</td>
<td style="vertical-align: top; text-align: left">98,745</td>
<td style="vertical-align: top; text-align: left"><bold>20,554</bold></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">D-P</td>
<td style="vertical-align: top; text-align: left">2.0021</td>
<td style="vertical-align: top; text-align: left">0.5587</td>
<td style="vertical-align: top; text-align: left"><bold>0.0512</bold></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Contrast</td>
<td style="vertical-align: top; text-align: left">5.7745</td>
<td style="vertical-align: top; text-align: left">7.8876</td>
<td style="vertical-align: top; text-align: left"><bold>10.1254</bold></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Key Sensitivity Difference</td>
<td style="vertical-align: top; text-align: left">66.3325</td>
<td style="vertical-align: top; text-align: left">98.4867</td>
<td style="vertical-align: top; text-align: left"><bold>99.0452</bold></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Horizontal Direction Corr Coff</td>
<td style="vertical-align: top; text-align: left">0.0091</td>
<td style="vertical-align: top; text-align: left">0.0099</td>
<td style="vertical-align: top; text-align: left">−<bold>0.0046</bold></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Vertical Direction Corr Coff</td>
<td style="vertical-align: top; text-align: left">0.0918</td>
<td style="vertical-align: top; text-align: left">0.0418</td>
<td style="vertical-align: top; text-align: left"><bold>−0.0122</bold></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Diagonal Direction Corr Coff</td>
<td style="vertical-align: top; text-align: left">0.0443</td>
<td style="vertical-align: top; text-align: left">0.5280</td>
<td style="vertical-align: top; text-align: left"><bold>0.0328</bold></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">Time (Second)</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><bold>7.48</bold></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">7.67</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">7.51</td>
</tr>
</tbody>
</table>
</table-wrap>
<table-wrap id="j_info1160_tab_003">
<label>Table 3</label>
<caption>
<p>Evaluation of the proposed scheme for gray scale Pepper image.</p>
</caption>
<table>
<thead>
<tr>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Parameter</td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">(Anees <italic>et al.</italic>, <xref ref-type="bibr" rid="j_info1160_ref_008">2014a</xref>)</td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">(Li <italic>et al.</italic>, <xref ref-type="bibr" rid="j_info1160_ref_031">2017</xref>)</td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Proposed</td>
</tr>
</thead>
<tbody>
<tr>
<td style="vertical-align: top; text-align: left">MSE</td>
<td style="vertical-align: top; text-align: left">39.4456</td>
<td style="vertical-align: top; text-align: left">40.6745</td>
<td style="vertical-align: top; text-align: left"><bold>40.8832</bold></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">PSNR</td>
<td style="vertical-align: top; text-align: left">15.9943</td>
<td style="vertical-align: top; text-align: left">16.0045</td>
<td style="vertical-align: top; text-align: left"><bold>16.8809</bold></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Entropy (H)</td>
<td style="vertical-align: top; text-align: left">7.9102</td>
<td style="vertical-align: top; text-align: left">7.9811</td>
<td style="vertical-align: top; text-align: left"><bold>7.9977</bold></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">NPCR</td>
<td style="vertical-align: top; text-align: left">98.7824</td>
<td style="vertical-align: top; text-align: left">97.6535</td>
<td style="vertical-align: top; text-align: left"><bold>99.5562</bold></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">UACI</td>
<td style="vertical-align: top; text-align: left">33.2564</td>
<td style="vertical-align: top; text-align: left">33.3326</td>
<td style="vertical-align: top; text-align: left"><bold>33.7529</bold></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">I-D</td>
<td style="vertical-align: top; text-align: left">118,654</td>
<td style="vertical-align: top; text-align: left">100,342</td>
<td style="vertical-align: top; text-align: left"><bold>25,231</bold></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">D-P</td>
<td style="vertical-align: top; text-align: left">1.6432</td>
<td style="vertical-align: top; text-align: left">0.7653</td>
<td style="vertical-align: top; text-align: left"><bold>0.0923</bold></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Contrast</td>
<td style="vertical-align: top; text-align: left">8.4312</td>
<td style="vertical-align: top; text-align: left">8.6523</td>
<td style="vertical-align: top; text-align: left"><bold>9.5678</bold></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Key Sensitivity Difference</td>
<td style="vertical-align: top; text-align: left">66.4432</td>
<td style="vertical-align: top; text-align: left">99.6231</td>
<td style="vertical-align: top; text-align: left"><bold>99.6489</bold></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Horizontal Direction Corr Coff</td>
<td style="vertical-align: top; text-align: left">0.0282</td>
<td style="vertical-align: top; text-align: left">0.0331</td>
<td style="vertical-align: top; text-align: left"><bold>0.0127</bold></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Vertical Direction Corr Coff</td>
<td style="vertical-align: top; text-align: left">0.0481</td>
<td style="vertical-align: top; text-align: left">0.0220</td>
<td style="vertical-align: top; text-align: left"><bold>0.0065</bold></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Diagonal Direction Corr Coff</td>
<td style="vertical-align: top; text-align: left">0.0502</td>
<td style="vertical-align: top; text-align: left">0.0328</td>
<td style="vertical-align: top; text-align: left"><bold>0.0142</bold></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">Time (Second)</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><bold>7.41</bold></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">7.63</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">7.45</td>
</tr>
</tbody>
</table>
</table-wrap>
<table-wrap id="j_info1160_tab_004">
<label>Table 4</label>
<caption>
<p>Evaluation of the proposed scheme for binary scale Pepper image.</p>
</caption>
<table>
<thead>
<tr>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Parameter</td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">(Anees <italic>et al.</italic>, <xref ref-type="bibr" rid="j_info1160_ref_008">2014a</xref>)</td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">(Li <italic>et al.</italic>, <xref ref-type="bibr" rid="j_info1160_ref_031">2017</xref>)</td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Proposed</td>
</tr>
</thead>
<tbody>
<tr>
<td style="vertical-align: top; text-align: left">MSE</td>
<td style="vertical-align: top; text-align: left">38.0543</td>
<td style="vertical-align: top; text-align: left">40.1643</td>
<td style="vertical-align: top; text-align: left"><bold>40.4687</bold></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">PSNR</td>
<td style="vertical-align: top; text-align: left">8.0065</td>
<td style="vertical-align: top; text-align: left">8.4186</td>
<td style="vertical-align: top; text-align: left"><bold>9.5196</bold></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Entropy (H)</td>
<td style="vertical-align: top; text-align: left">2.3290</td>
<td style="vertical-align: top; text-align: left">7.7156</td>
<td style="vertical-align: top; text-align: left"><bold>7.9920</bold></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">NPCR</td>
<td style="vertical-align: top; text-align: left">66.6729</td>
<td style="vertical-align: top; text-align: left">98.6112</td>
<td style="vertical-align: top; text-align: left"><bold>99.5300</bold></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">UACI</td>
<td style="vertical-align: top; text-align: left">27.6599</td>
<td style="vertical-align: top; text-align: left">33.7232</td>
<td style="vertical-align: top; text-align: left"><bold>33.8823</bold></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">I-D</td>
<td style="vertical-align: top; text-align: left">121,115</td>
<td style="vertical-align: top; text-align: left">101,659</td>
<td style="vertical-align: top; text-align: left"><bold>21,772</bold></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">D-P</td>
<td style="vertical-align: top; text-align: left">1.7991</td>
<td style="vertical-align: top; text-align: left">0.5834</td>
<td style="vertical-align: top; text-align: left"><bold>0.1402</bold></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Contrast</td>
<td style="vertical-align: top; text-align: left">3.5234</td>
<td style="vertical-align: top; text-align: left">7.3332</td>
<td style="vertical-align: top; text-align: left"><bold>9.6645</bold></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Key Sensitivity Difference</td>
<td style="vertical-align: top; text-align: left">66.7705</td>
<td style="vertical-align: top; text-align: left">98.5522</td>
<td style="vertical-align: top; text-align: left"><bold>99.3001</bold></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Horizontal Direction Corr Coff</td>
<td style="vertical-align: top; text-align: left">0.0101</td>
<td style="vertical-align: top; text-align: left">0.0221</td>
<td style="vertical-align: top; text-align: left"><bold>0.0058</bold></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Vertical Direction Corr Coff</td>
<td style="vertical-align: top; text-align: left">0.0432</td>
<td style="vertical-align: top; text-align: left">0.0664</td>
<td style="vertical-align: top; text-align: left"><bold>−0.0239</bold></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Diagonal Direction Corr Coff</td>
<td style="vertical-align: top; text-align: left">0.0551</td>
<td style="vertical-align: top; text-align: left">0.1200</td>
<td style="vertical-align: top; text-align: left"><bold>0.0211</bold></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">Time (Second)</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><bold>7.44</bold></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">7.61</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">7.47</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec id="j_info1160_s_008">
<label>5</label>
<title>Conclusion</title>
<p>We proposed a new algorithm on the basis of weaknesses found in the Amir’s scheme. Non-Linear Chaotic Algorithm (NCA) is employed for removing correlation and diffusion in plaintext image. The proposed algorithm enhances the security of the Amir’s scheme. In high correlated images such as binary images, the proposed scheme works very well. Desired results are achieved and performance upgrade is verified by comparing the results with the original scheme. Numbers of security parameters to evaluate the effectiveness of an image encryption algorithm are used to compare both modified and original schemes. These parameters include the correlation, information entropy, Unified Average Change Intensity (UACI), Peak Signal to Noise Ratio (PSNR), key sensitivity difference, avalanche effect and Number of Pixel Change Rate (NPCR). Although the computational complexity of the proposed scheme is a bit higher due to NCA based diffusion, this additional overhead provides higher security for the proposed scheme.</p>
</sec>
</body>
<back>
<ref-list id="j_info1160_reflist_001">
<title>References</title>
<ref id="j_info1160_ref_001">
<mixed-citation publication-type="chapter"><string-name><surname>Acharya</surname>, <given-names>B.</given-names></string-name>, <string-name><surname>Patra</surname>, <given-names>S.K.</given-names></string-name>, <string-name><surname>Panda</surname>, <given-names>G.</given-names></string-name> (<year>2008</year>). <chapter-title>Image encryption by novel cryptosystem using matrix transformation</chapter-title>. In: <source>First International Conference on Emerging Trends in Engineering and Technology, 2008, ICETET’08</source>. <publisher-name>IEEE</publisher-name>, pp. <fpage>77</fpage>–<lpage>81</lpage>.</mixed-citation>
</ref>
<ref id="j_info1160_ref_002">
<mixed-citation publication-type="journal"><string-name><surname>Ahmad</surname>, <given-names>J.</given-names></string-name>, <string-name><surname>Ahmed</surname>, <given-names>F.</given-names></string-name> (<year>2010</year>). <article-title>Efficiency analysis and security evaluation of image encryption schemes</article-title>. <source>Computing</source>, <volume>23</volume>, <fpage>25</fpage>.</mixed-citation>
</ref>
<ref id="j_info1160_ref_003">
<mixed-citation publication-type="journal"><string-name><surname>Ahmad</surname>, <given-names>J.</given-names></string-name>, <string-name><surname>Hwang</surname>, <given-names>S.O.</given-names></string-name> (<year>2015</year>). <article-title>Chaos-based diffusion for highly autocorrelated data in encryption algorithms</article-title>. <source>Nonlinear Dynamics</source>, <volume>82</volume>(<issue>4</issue>), <fpage>1839</fpage>–<lpage>1850</lpage>.</mixed-citation>
</ref>
<ref id="j_info1160_ref_004">
<mixed-citation publication-type="journal"><string-name><surname>Ahmad</surname>, <given-names>J.</given-names></string-name>, <string-name><surname>Hwang</surname>, <given-names>S.O.</given-names></string-name> (<year>2016</year>). <article-title>A secure image encryption scheme based on chaotic maps and affine transformation</article-title>. <source>Multimedia Tools and Applications</source>, <volume>75</volume>(<issue>21</issue>), <fpage>13951</fpage>–<lpage>13976</lpage>.</mixed-citation>
</ref>
<ref id="j_info1160_ref_005">
<mixed-citation publication-type="journal"><string-name><surname>Ahmad</surname>, <given-names>J.</given-names></string-name>, <string-name><surname>Hwang</surname>, <given-names>S.O.</given-names></string-name>, <string-name><surname>Ali</surname>, <given-names>A.</given-names></string-name> (<year>2015</year>). <article-title>An experimental comparison of chaotic and non-chaotic image encryption schemes</article-title>. <source>Wireless Personal Communications</source>, <volume>84</volume>(<issue>2</issue>), <fpage>901</fpage>–<lpage>918</lpage>.</mixed-citation>
</ref>
<ref id="j_info1160_ref_006">
<mixed-citation publication-type="other"><string-name><surname>Ahmad</surname>, <given-names>J.</given-names></string-name>, <string-name><surname>Khan</surname>, <given-names>M.A.</given-names></string-name>, <string-name><surname>Hwang</surname>, <given-names>S.O.</given-names></string-name>, <string-name><surname>Khan</surname>, <given-names>J.S.</given-names></string-name> (2016). A compression sensing and noise-tolerant image encryption scheme based on chaotic maps and orthogonal matrices. <italic>Neural Computing and Applications</italic>, 1–15.</mixed-citation>
</ref>
<ref id="j_info1160_ref_007">
<mixed-citation publication-type="other"><string-name><surname>Ahmad</surname>, <given-names>J.</given-names></string-name>, <string-name><surname>Khan</surname>, <given-names>M.A.</given-names></string-name>, <string-name><surname>Ahmed</surname>, <given-names>F.</given-names></string-name>, <string-name><surname>Khan</surname>, <given-names>J.S.</given-names></string-name> (2017). A novel image encryption scheme based on orthogonal matrix, skew tent map, and XOR operation. <italic>Neural Computing and Applications</italic>, 1–11.</mixed-citation>
</ref>
<ref id="j_info1160_ref_008">
<mixed-citation publication-type="journal"><string-name><surname>Anees</surname>, <given-names>A.</given-names></string-name>, <string-name><surname>Siddiqui</surname>, <given-names>A.M.</given-names></string-name>, <string-name><surname>Ahmed</surname>, <given-names>F.</given-names></string-name> (<year>2014</year>a). <article-title>Chaotic substitution for highly autocorrelated data in encryption algorithm</article-title>. <source>Communications in Nonlinear Science and Numerical Simulation</source>, <volume>19</volume>(<issue>9</issue>), <fpage>3106</fpage>–<lpage>3118</lpage>.</mixed-citation>
</ref>
<ref id="j_info1160_ref_009">
<mixed-citation publication-type="journal"><string-name><surname>Anees</surname>, <given-names>A.</given-names></string-name>, <string-name><surname>Siddiqui</surname>, <given-names>A.M.</given-names></string-name>, <string-name><surname>Ahmed</surname>, <given-names>J.</given-names></string-name>, <string-name><surname>Hussain</surname>, <given-names>I.</given-names></string-name> (<year>2014</year>b). <article-title>A technique for digital steganography using chaotic maps</article-title>. <source>Nonlinear Dynamics</source>, <volume>75</volume>(<issue>4</issue>), <fpage>807</fpage>–<lpage>816</lpage>.</mixed-citation>
</ref>
<ref id="j_info1160_ref_010">
<mixed-citation publication-type="chapter"><string-name><surname>Belkhouche</surname>, <given-names>F.</given-names></string-name>, <string-name><surname>Qidwai</surname>, <given-names>U.</given-names></string-name> (<year>2003</year>). <chapter-title>Binary image encoding using 1D chaotic maps</chapter-title>. In: <source>IEEE Region 5, 2003 Annual Technical Conference</source>. <publisher-name>IEEE</publisher-name>, pp. <fpage>39</fpage>–<lpage>43</lpage>. <comment>2003</comment>.</mixed-citation>
</ref>
<ref id="j_info1160_ref_011">
<mixed-citation publication-type="book"><string-name><surname>Bruce</surname>, <given-names>S.</given-names></string-name> (<year>1996</year>). <source>Applied Cryptography: Protocols, Algorithms, and Source Code in C</source>. <publisher-name>Wiley</publisher-name>, <publisher-loc>New York</publisher-loc>.</mixed-citation>
</ref>
<ref id="j_info1160_ref_012">
<mixed-citation publication-type="journal"><string-name><surname>Chang</surname>, <given-names>C.C.</given-names></string-name>, <string-name><surname>Yu</surname>, <given-names>T.X.</given-names></string-name> (<year>2002</year>). <article-title>Cryptanalysis of an encryption scheme for binary images</article-title>. <source>Pattern Recognition Letters</source>, <volume>23</volume>(<issue>14</issue>), <fpage>1847</fpage>–<lpage>1852</lpage>.</mixed-citation>
</ref>
<ref id="j_info1160_ref_013">
<mixed-citation publication-type="journal"><string-name><surname>Chung</surname>, <given-names>K.L.</given-names></string-name>, <string-name><surname>Chang</surname>, <given-names>L.C.</given-names></string-name> (<year>1998</year>). <article-title>Large encrypting binary images with higher security</article-title>. <source>Pattern Recognition Letters</source>, <volume>19</volume>(<issue>5</issue>), <fpage>461</fpage>–<lpage>468</lpage>.</mixed-citation>
</ref>
<ref id="j_info1160_ref_014">
<mixed-citation publication-type="journal"><string-name><surname>Dawei</surname>, <given-names>Z.</given-names></string-name>, <string-name><surname>Guanrong</surname>, <given-names>C.</given-names></string-name>, <string-name><surname>Wenbo</surname>, <given-names>L.</given-names></string-name> (<year>2004</year>). <article-title>A chaos-based robust wavelet-domain watermarking algorithm</article-title>. <source>Chaos, Solitons &amp; Fractals</source>, <volume>22</volume>(<issue>1</issue>), <fpage>47</fpage>–<lpage>54</lpage>.</mixed-citation>
</ref>
<ref id="j_info1160_ref_015">
<mixed-citation publication-type="journal"><string-name><surname>Gao</surname>, <given-names>H.</given-names></string-name>, <string-name><surname>Zhang</surname>, <given-names>Y.</given-names></string-name>, <string-name><surname>Liang</surname>, <given-names>S.</given-names></string-name>, <string-name><surname>Li</surname>, <given-names>D.</given-names></string-name> (<year>2006</year>). <article-title>A new chaotic algorithm for image encryption</article-title>. <source>Chaos, Solitons &amp; Fractals</source>, <volume>29</volume>(<issue>2</issue>), <fpage>393</fpage>–<lpage>399</lpage>.</mixed-citation>
</ref>
<ref id="j_info1160_ref_016">
<mixed-citation publication-type="chapter"><string-name><surname>Habib</surname>, <given-names>Z.</given-names></string-name>, <string-name><surname>Khan</surname>, <given-names>J.S.</given-names></string-name>, <string-name><surname>Ahmad</surname>, <given-names>J.</given-names></string-name>, <string-name><surname>Khan</surname>, <given-names>M.A.</given-names></string-name>, <string-name><surname>Khan</surname>, <given-names>F.A.</given-names></string-name> (<year>2017</year>). <chapter-title>Secure speech communication algorithm via DCT and TD-ERCS chaotic map</chapter-title>. In: <source>2017 4th International Conference on Electrical and Electronic Engineering (ICEEE)</source>. <publisher-name>IEEE</publisher-name>, pp. <fpage>246</fpage>–<lpage>250</lpage>.</mixed-citation>
</ref>
<ref id="j_info1160_ref_017">
<mixed-citation publication-type="journal"><string-name><surname>Huang</surname>, <given-names>F.</given-names></string-name>, <string-name><surname>Guan</surname>, <given-names>Z.H.</given-names></string-name> (<year>2005</year>). <article-title>Cryptosystem using chaotic keys</article-title>. <source>Chaos, Solitons &amp; Fractals</source>, <volume>23</volume>(<issue>3</issue>), <fpage>851</fpage>–<lpage>855</lpage>.</mixed-citation>
</ref>
<ref id="j_info1160_ref_018">
<mixed-citation publication-type="journal"><string-name><surname>Hussain</surname>, <given-names>I.</given-names></string-name>, <string-name><surname>Shah</surname>, <given-names>T.</given-names></string-name>, <string-name><surname>Gondal</surname>, <given-names>M.A.</given-names></string-name>, <string-name><surname>Mahmood</surname>, <given-names>H.</given-names></string-name> (<year>2012</year>). <article-title>Analysis of S-box in image encryption using root mean square error method</article-title>. <source>Zeitschrift für Naturforschung A</source>, <volume>67</volume>(<issue>6–7</issue>), <fpage>327</fpage>–<lpage>332</lpage>.</mixed-citation>
</ref>
<ref id="j_info1160_ref_019">
<mixed-citation publication-type="journal"><string-name><surname>Hussain</surname>, <given-names>I.</given-names></string-name>, <string-name><surname>Shah</surname>, <given-names>T.</given-names></string-name>, <string-name><surname>Gondal</surname>, <given-names>M.A.</given-names></string-name>, <string-name><surname>Khan</surname>, <given-names>W.A.</given-names></string-name>, <string-name><surname>Mahmood</surname>, <given-names>H.</given-names></string-name> (<year>2013</year>a). <article-title>A group theoretic approach to construct cryptographically strong substitution boxes</article-title>. <source>Neural Computing and Applications</source>, <volume>23</volume>(<issue>1</issue>), <fpage>97</fpage>–<lpage>104</lpage>.</mixed-citation>
</ref>
<ref id="j_info1160_ref_020">
<mixed-citation publication-type="journal"><string-name><surname>Hussain</surname>, <given-names>I.</given-names></string-name>, <string-name><surname>Shah</surname>, <given-names>T.</given-names></string-name>, <string-name><surname>Mahmood</surname>, <given-names>H.</given-names></string-name>, <string-name><surname>Gondal</surname>, <given-names>M.A.</given-names></string-name> (<year>2013</year>b). <article-title>A projective general linear group based algorithm for the construction of substitution box for block ciphers</article-title>. <source>Neural Computing and Applications</source>, <volume>22</volume>(<issue>6</issue>), <fpage>1085</fpage>–<lpage>1093</lpage>.</mixed-citation>
</ref>
<ref id="j_info1160_ref_021">
<mixed-citation publication-type="journal"><string-name><surname>Jakimoski</surname>, <given-names>G.</given-names></string-name>, <string-name><surname>Subbalakshmi</surname>, <given-names>K.P.</given-names></string-name> (<year>2008</year>). <article-title>Cryptanalysis of some multimedia encryption schemes</article-title>. <source>IEEE Transactions on Multimedia</source>, <volume>10</volume>(<issue>3</issue>), <fpage>330</fpage>–<lpage>338</lpage>.</mixed-citation>
</ref>
<ref id="j_info1160_ref_022">
<mixed-citation publication-type="journal"><string-name><surname>Johansson</surname>, <given-names>T.</given-names></string-name>, <string-name><surname>Pasalic</surname>, <given-names>E.</given-names></string-name> (<year>2003</year>). <article-title>A construction of resilient functions with high nonlinearity</article-title>. <source>IEEE Transactions on Information Theory</source>, <volume>49</volume>(<issue>2</issue>), <fpage>494</fpage>–<lpage>501</lpage>.</mixed-citation>
</ref>
<ref id="j_info1160_ref_023">
<mixed-citation publication-type="journal"><string-name><surname>Kam</surname>, <given-names>J.B.</given-names></string-name>, <string-name><surname>Davida</surname>, <given-names>G.I.</given-names></string-name> (<year>1979</year>). <article-title>Structured design of substitution-permutation encryption networks</article-title>. <source>IEEE Transactions on Computers</source>, <volume>10</volume>, <fpage>747</fpage>–<lpage>753</lpage>.</mixed-citation>
</ref>
<ref id="j_info1160_ref_024">
<mixed-citation publication-type="chapter"><string-name><surname>Khan</surname>, <given-names>J.</given-names></string-name>, <string-name><surname>Ahmad</surname>, <given-names>J.</given-names></string-name>, <string-name><surname>Hwang</surname>, <given-names>S.O.</given-names></string-name> (<year>2015</year>a). <chapter-title>An efficient image encryption scheme based on: Henon map, skew tent map and S-Box</chapter-title>. In: <source>2015 6th International Conference on Modeling, Simulation, and Applied Optimization (ICMSAO)</source>. <publisher-name>IEEE</publisher-name>, pp. <fpage>1</fpage>–<lpage>6</lpage>.</mixed-citation>
</ref>
<ref id="j_info1160_ref_025">
<mixed-citation publication-type="chapter"><string-name><surname>Khan</surname>, <given-names>J.S.</given-names></string-name>, <string-name><surname>ur Rehman</surname>, <given-names>A.</given-names></string-name>, <string-name><surname>Ahmad</surname>, <given-names>J.</given-names></string-name>, <string-name><surname>Habib</surname>, <given-names>Z.</given-names></string-name> (<year>2015</year>b). <chapter-title>A new chaos-based secure image encryption scheme using multiple substitution boxes</chapter-title>. In: <source>2015 Conference on Information Assurance and Cyber Security (CIACS)</source>. <publisher-name>IEEE</publisher-name>, pp. <fpage>16</fpage>–<lpage>21</lpage>.</mixed-citation>
</ref>
<ref id="j_info1160_ref_026">
<mixed-citation publication-type="journal"><string-name><surname>Khan</surname>, <given-names>M.A.</given-names></string-name>, <string-name><surname>Ahmad</surname>, <given-names>J.</given-names></string-name>, <string-name><surname>Javaid</surname>, <given-names>Q.</given-names></string-name>, <string-name><surname>Saqib</surname>, <given-names>N.A.</given-names></string-name> (<year>2017</year>a). <article-title>An efficient and secure partial image encryption for wireless multimedia sensor networks using discrete wavelet transform, chaotic maps and substitution box</article-title>. <source>Journal of Modern Optics</source>, <volume>64</volume>(<issue>5</issue>), <fpage>531</fpage>–<lpage>540</lpage>.</mixed-citation>
</ref>
<ref id="j_info1160_ref_027">
<mixed-citation publication-type="journal"><string-name><surname>Khan</surname>, <given-names>J.S.</given-names></string-name>, <string-name><surname>Ahmad</surname>, <given-names>J.</given-names></string-name>, <string-name><surname>Khan</surname>, <given-names>M.A.</given-names></string-name> (<year>2017</year>b). <article-title>TD-ERCS map-based confusion and diffusion of autocorrelated data</article-title>. <source>Nonlinear Dynamics</source>, <volume>87</volume>(<issue>1</issue>), <fpage>93</fpage>–<lpage>107</lpage>.</mixed-citation>
</ref>
<ref id="j_info1160_ref_028">
<mixed-citation publication-type="journal"><string-name><surname>Kurosawa</surname>, <given-names>K.</given-names></string-name>, <string-name><surname>Satoh</surname>, <given-names>T.</given-names></string-name>, <string-name><surname>Yamamoto</surname>, <given-names>K.</given-names></string-name> (<year>1997</year>). <article-title>Highly nonlinearfit-resilient functions</article-title>. <source>Journal of Universal Computer Science</source>, <volume>3</volume>(<issue>6</issue>), <fpage>721</fpage>–<lpage>729</lpage>.</mixed-citation>
</ref>
<ref id="j_info1160_ref_029">
<mixed-citation publication-type="chapter"><string-name><surname>Leong</surname>, <given-names>M.P.</given-names></string-name>, <string-name><surname>Cheung</surname>, <given-names>O.Y.</given-names></string-name>, <string-name><surname>Tsoi</surname>, <given-names>K.H.</given-names></string-name>, <string-name><surname>Leong</surname>, <given-names>P.H.W.</given-names></string-name> (<year>2000</year>). <chapter-title>A bit-serial implementation of the international data encryption algorithm IDEA</chapter-title>. In: <source>2000 IEEE Symposium on Field-Programmable Custom Computing Machines</source>. <publisher-name>IEEE</publisher-name>, pp. <fpage>122</fpage>–<lpage>131</lpage>.</mixed-citation>
</ref>
<ref id="j_info1160_ref_030">
<mixed-citation publication-type="chapter"><string-name><surname>Li</surname>, <given-names>S.</given-names></string-name>, <string-name><surname>Zheng</surname>, <given-names>X.</given-names></string-name> (<year>2002</year>). <chapter-title>Cryptanalysis of a chaotic image encryption method</chapter-title>. In: <source>IEEE International Symposium on Circuits and Systems, , 2002, ISCAS 2002</source>, Vol. <volume>2</volume>. <publisher-name>IEEE</publisher-name>.</mixed-citation>
</ref>
<ref id="j_info1160_ref_031">
<mixed-citation publication-type="journal"><string-name><surname>Li</surname>, <given-names>C.</given-names></string-name>, <string-name><surname>Luo</surname>, <given-names>G.</given-names></string-name>, <string-name><surname>Qin</surname>, <given-names>K.</given-names></string-name>, <string-name><surname>Li</surname>, <given-names>C.</given-names></string-name> (<year>2017</year>). <article-title>An image encryption scheme based on chaotic tent map</article-title>. <source>Nonlinear Dynamics</source>, <volume>87</volume>(<issue>1</issue>), <fpage>127</fpage>–<lpage>133</lpage>.</mixed-citation>
</ref>
<ref id="j_info1160_ref_032">
<mixed-citation publication-type="journal"><string-name><surname>Matthews</surname>, <given-names>R.</given-names></string-name> (<year>1984</year>). <article-title>On the derivation of a ‘Chaotic’ encryption algorithm</article-title>. <source>Cryptologia</source>, <volume>8</volume>(<issue>1</issue>), <fpage>29</fpage>–<lpage>41</lpage>.</mixed-citation>
</ref>
<ref id="j_info1160_ref_033">
<mixed-citation publication-type="chapter"><string-name><surname>Nyberg</surname>, <given-names>K.</given-names></string-name> (<year>1992</year>). <chapter-title>On the construction of highly nonlinear permutations</chapter-title>. In: <source>Workshop on the Theory and Application of of Cryptographic Techniques</source>. <publisher-name>Springer</publisher-name>, <publisher-loc>Berlin, Heidelberg</publisher-loc>, pp. <fpage>92</fpage>–<lpage>98</lpage>.</mixed-citation>
</ref>
<ref id="j_info1160_ref_034">
<mixed-citation publication-type="journal"><string-name><surname>Rehman</surname>, <given-names>A.U.</given-names></string-name>, <string-name><surname>Khan</surname>, <given-names>J.S.</given-names></string-name>, <string-name><surname>Ahmad</surname>, <given-names>J.</given-names></string-name>, <string-name><surname>Hwang</surname>, <given-names>S.O.</given-names></string-name> (<year>2016</year>). <article-title>A new image encryption scheme based on dynamic s-boxes and chaotic maps</article-title>. <source>3D Research</source>, <volume>7</volume>(<issue>1</issue>), <fpage>7</fpage>.</mixed-citation>
</ref>
<ref id="j_info1160_ref_035">
<mixed-citation publication-type="other"><string-name><surname>Schneier</surname>, <given-names>B.</given-names></string-name> (1996). <italic>Protocol Building Blocks. Applied Cryptography</italic>. Second edition. 20th Anniversary Edition, pp. 21–46.</mixed-citation>
</ref>
<ref id="j_info1160_ref_036">
<mixed-citation publication-type="book"><string-name><surname>Stallings</surname>, <given-names>W.</given-names></string-name> (<year>2006</year>). <source>Cryptography and Network Security: Principles and Practices</source>. <publisher-name>Pearson Education India</publisher-name>.</mixed-citation>
</ref>
<ref id="j_info1160_ref_037">
<mixed-citation publication-type="other"><string-name><surname>Weister</surname>, <given-names>A.F.</given-names></string-name>, <string-name><surname>Tavares</surname>, <given-names>S.E.</given-names></string-name> (1986). On the design of S-boxes [A], Dvances in Cryptology-CRYPTO?85 [C].</mixed-citation>
</ref>
<ref id="j_info1160_ref_038">
<mixed-citation publication-type="book"><string-name><surname>William</surname>, <given-names>S.</given-names></string-name> (<year>2006</year>). <source>Cryptography and Network Security: for VTU</source>. <publisher-name>Pearson Education India</publisher-name>.</mixed-citation>
</ref>
<ref id="j_info1160_ref_039">
<mixed-citation publication-type="other"><string-name><surname>Yildiz</surname>, <given-names>S.</given-names></string-name> (2004). <italic>Construction of Substitution Boxes Depending on Linear Block Codes</italic>. Doctoral dissertation, Middle East Technical University.</mixed-citation>
</ref>
<ref id="j_info1160_ref_040">
<mixed-citation publication-type="chapter"><string-name><surname>Younas</surname>, <given-names>M.B.</given-names></string-name>, <string-name><surname>Ahmad</surname>, <given-names>J.</given-names></string-name> (<year>2014</year>). <chapter-title>Comparative analysis of chaotic and non-chaotic image encryption schemes</chapter-title>. In: <source>2014 International Conference on Emerging Technologies (ICET)</source>. <publisher-name>IEEE</publisher-name>, pp. <fpage>81</fpage>–<lpage>86</lpage>.</mixed-citation>
</ref>
</ref-list>
</back>
</article>