{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T17:54:09Z","timestamp":1732038849346},"reference-count":34,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2020,1,6]],"date-time":"2020-01-06T00:00:00Z","timestamp":1578268800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61402092","61374178","61603182"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["N171704004"],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Entropy"],"abstract":"In graph theory, Hamiltonian path refers to the path that visits each vertex exactly once. In this paper, we designed a method to generate random Hamiltonian path within digital images, which is equivalent to permutation in image encryption. By these means, building a Hamiltonian path across bit planes can shuffle the distribution of the pixel\u2019s bits. Furthermore, a similar thought can be applied for the substitution of pixel\u2019s grey levels. To ensure the randomness of the generated Hamiltonian path, an adjusted Bernoulli map is proposed. By adopting these novel techniques, a bit-level image encryption scheme was devised. Evaluation of simulation results proves that the proposed scheme reached fair performance. In addition, a common flaw in calculating correlation coefficients of adjacent pixels was pinpointed by us. After enhancement, correlation coefficient becomes a stricter criterion for image encryption algorithms.<\/jats:p>","DOI":"10.3390\/e22010073","type":"journal-article","created":{"date-parts":[[2020,1,6]],"date-time":"2020-01-06T15:34:46Z","timestamp":1578324886000},"page":"73","source":"Crossref","is-referenced-by-count":18,"title":["An Image Encryption Algorithm Based on Random Hamiltonian Path"],"prefix":"10.3390","volume":"22","author":[{"given":"Wei","family":"Zhang","sequence":"first","affiliation":[{"name":"Software College, Northeastern University, No.11, Lane 3, Wenhua Road, Shenyang 110819, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-7431-5951","authenticated-orcid":false,"given":"Shuwen","family":"Wang","sequence":"additional","affiliation":[{"name":"Software College, Northeastern University, No.11, Lane 3, Wenhua Road, Shenyang 110819, China"}]},{"given":"Weijie","family":"Han","sequence":"additional","affiliation":[{"name":"Software College, Northeastern University, No.11, Lane 3, Wenhua Road, Shenyang 110819, China"}]},{"given":"Hai","family":"Yu","sequence":"additional","affiliation":[{"name":"Software College, Northeastern University, No.11, Lane 3, Wenhua Road, Shenyang 110819, China"}]},{"given":"Zhiliang","family":"Zhu","sequence":"additional","affiliation":[{"name":"Software College, Northeastern University, No.11, Lane 3, Wenhua Road, Shenyang 110819, China"}]}],"member":"1968","published-online":{"date-parts":[[2020,1,6]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1007\/s13319-014-0029-0","article-title":"A literature review on image encryption techniques","volume":"5","author":"Khan","year":"2014","journal-title":"3D Res."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1016\/j.ins.2014.11.018","article-title":"2D sine logistic modulation map for image encryption","volume":"297","author":"Hua","year":"2015","journal-title":"Inf. Sci."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1016\/j.ins.2015.08.013","article-title":"2D Sudoku associated bijections for image scrambling","volume":"327","author":"Wu","year":"2016","journal-title":"Inf. Sci."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"2067","DOI":"10.1007\/s11071-015-2465-7","article-title":"Chaotic image encryption algorithm using wave-line permutation and block diffusion","volume":"83","author":"Ye","year":"2016","journal-title":"Nonlinear Dyn."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.ins.2018.11.010","article-title":"A novel image cipher based on 3D bit matrix and latin cubes","volume":"478","author":"Xu","year":"2019","journal-title":"Inf. Sci."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"314","DOI":"10.1016\/j.ins.2015.10.027","article-title":"Circular inter-intra bit-level permutation and chaos-based image encryption","volume":"355","author":"Diaconu","year":"2016","journal-title":"Inf. Sci."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"584","DOI":"10.1016\/j.cnsns.2012.08.010","article-title":"A symmetric color image encryption algorithm using the intrinsic features of bit distributions","volume":"18","author":"Zhang","year":"2013","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1016\/j.sigpro.2017.08.020","article-title":"A novel bit-level image encryption algorithm based on 2D-LICM hyperchaotic map","volume":"143","author":"Cao","year":"2018","journal-title":"Signal Process."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Hua, Z., Zhou, Y., and Chen, C.L.P. (2013, January 11\u201314). A new series-wound framework for generating 1D chaotic maps. Proceedings of the 2013 IEEE Digital Signal Processing and Signal Processing Education Meeting, Napa, CA, USA.","DOI":"10.1109\/DSP-SPE.2013.6642576"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1016\/j.sigpro.2018.01.026","article-title":"Integrated chaotic systems for image encryption","volume":"147","author":"Lan","year":"2018","journal-title":"Signal Process."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1016\/j.sigpro.2017.03.011","article-title":"A new color image encryption using combination of the 1D chaotic map","volume":"138","author":"Pak","year":"2017","journal-title":"Signal Process."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"3039","DOI":"10.1016\/j.sigpro.2013.04.021","article-title":"Image encryption using a new parametric switching chaotic system","volume":"93","author":"Zhou","year":"2013","journal-title":"Signal Process."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Chapaneri, S., Chapaneri, R., and Sarode, T. (2014, January 4\u20135). Evaluation of Chaotic Map Lattice Systems for Image Encryption. Proceedings of the 2014 International Conference on Circuits, Systems, Communication and Information Technology Applications (CSCITA), Mumbai, India.","DOI":"10.1109\/CSCITA.2014.6839235"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"2456","DOI":"10.1016\/j.cnsns.2009.09.023","article-title":"Image encryption using chaotic coupled map lattices with time-varying delays","volume":"15","author":"Tang","year":"2010","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/0022-247X(69)90209-1","article-title":"The Konigsberg bridges problem generalized","volume":"25","author":"Bellman","year":"1969","journal-title":"J. Math. Anal. Appl."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1016\/0020-0190(93)90033-6","article-title":"Inclusion and exclusion algorithm for the Hamiltonian path problem","volume":"47","author":"Bax","year":"1993","journal-title":"Inf. Process. Lett."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1016\/0020-0190(81)90048-X","article-title":"The edge Hamiltonian path problem is NP-complete","volume":"13","author":"Bertossi","year":"1981","journal-title":"Inf. Process. Lett."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1016\/0166-218X(92)00170-Q","article-title":"Solution of the knight\u2019s Hamiltonian path problem on chessboards","volume":"50","author":"Conrad","year":"1994","journal-title":"Discret. Appl. Math."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"33","DOI":"10.7151\/dmgt.1004","article-title":"Problems remaining NP-complete for sparse or dense graphs","volume":"15","author":"Schiermeyer","year":"1995","journal-title":"Discuss. Math. Gr. Theory"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1186\/1754-1611-3-11","article-title":"Solving a hamiltonian path problem with a bacterial computer","volume":"3","author":"Baumgardner","year":"2009","journal-title":"J. Biol. Eng."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1007\/s11047-007-9042-z","article-title":"Solving the Hamiltonian path problem with a light-based computer","volume":"7","author":"Oltean","year":"2007","journal-title":"Nat. Comput."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Zhang, W., Zhu, Z., and Yu, H. (2019). A symmetric image encryption algorithm based on a coupled logistic\u2013bernoulli map and cellular automata diffusion strategy. Entropy, 21.","DOI":"10.3390\/e21050504"},{"key":"ref_23","first-page":"1054","article-title":"Pseudorandom number generator based on the Bernoulli map on cubic algebraic integers","volume":"28","author":"Saito","year":"2017","journal-title":"Chaos Interdiscip. J. Nonlinear Sci."},{"key":"ref_24","unstructured":"Dong, L., Yong, Z., Ji, L., and Han, X. (2014, January 15\u201316). Study on the Pass Rate of NIST SP800-22 Statistical Test Suite. Proceedings of the 2014 Tenth International Conference on Computational Intelligence and Security (CIS), Kunming, China."},{"key":"ref_25","unstructured":"(2019, December 02). The USC-SIPI Image Database. Available online: http:\/\/sipi.usc.edu\/database\/database.php."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"2129","DOI":"10.1142\/S0218127406015970","article-title":"Some basic cryptographic requirements for chaos-based cryptosystems","volume":"16","author":"Alvarez","year":"2006","journal-title":"Int. J. Bifurc. Chaos"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.matcom.2004.09.001","article-title":"The strict avalanche criterion randomness test","volume":"68","author":"Castro","year":"2005","journal-title":"Math. Comput. Simul."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1016\/j.ins.2018.03.055","article-title":"The unified image encryption algorithm based on chaos and cubic S-Box","volume":"450","author":"Zhang","year":"2018","journal-title":"Inf. Sci."},{"key":"ref_29","first-page":"31","article-title":"NPCR and UACI randomness tests for image encryption","volume":"7714","author":"Wu","year":"2011","journal-title":"Cyber J. Multidiscip. J. Sci. Technol. J. Sel. Areas Telecommun."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1016\/j.cnsns.2014.09.011","article-title":"A new security solution to JPEG using hyper-chaotic system and modified zigzag scan coding","volume":"22","author":"Ji","year":"2015","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"725","DOI":"10.1016\/j.patcog.2003.08.011","article-title":"Image and video encryption using SCAN patterns","volume":"37","author":"Maniccam","year":"2004","journal-title":"Pattern Recognit."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Ramasamy, P., Ranganathan, V., Kadry, S., Dama\u0161evi\u010dius, R., and Bla\u017eauskas, T. (2019). An image encryption scheme based on block scrambling, modified zigzag transformation and key generation using enhanced logistic\u2014Tent map. Entropy, 21.","DOI":"10.3390\/e21070656"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Richter, T. (2015, January 7\u20139). Lossless coding extensions for JPEG. Proceedings of the Data Compression Conference, Snowbird, UT, USA.","DOI":"10.1109\/DCC.2015.11"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1016\/j.sigpro.2018.02.007","article-title":"An image encryption algorithm based on chaotic system and compressive sensing","volume":"148","author":"Chai","year":"2018","journal-title":"Signal Process."}],"container-title":["Entropy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1099-4300\/22\/1\/73\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,23]],"date-time":"2024-06-23T10:55:09Z","timestamp":1719140109000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1099-4300\/22\/1\/73"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,6]]},"references-count":34,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2020,1]]}},"alternative-id":["e22010073"],"URL":"https:\/\/doi.org\/10.3390\/e22010073","relation":{},"ISSN":["1099-4300"],"issn-type":[{"value":"1099-4300","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,1,6]]}}}