{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,6]],"date-time":"2024-10-06T01:13:26Z","timestamp":1728177206849},"reference-count":50,"publisher":"MDPI AG","issue":"8","license":[{"start":{"date-parts":[[2022,8,10]],"date-time":"2022-08-10T00:00:00Z","timestamp":1660089600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Natural Science Foundation of China","award":["61961037"]},{"name":"Industrial Support Plan of Education Department of Gansu Province","award":["2021CYZC-30"]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Entropy"],"abstract":"Information security has become a focal topic in the information and digital age. How to realize secure transmission and the secure storage of image data is a major research focus of information security. Aiming at this hot topic, in order to improve the security of image data transmission, this paper proposes an image encryption algorithm based on improved Arnold transform and a chaotic pulse-coupled neural network. Firstly, the oscillatory reset voltage is introduced into the uncoupled impulse neural network, which makes the uncoupled impulse neural network exhibit chaotic characteristics. The chaotic sequence is generated by multiple iterations of the chaotic pulse-coupled neural network, and then the image is pre-encrypted by XOR operation with the generated chaotic sequence. Secondly, using the improved Arnold transform, the pre-encrypted image is scrambled to further improve the scrambling degree and encryption effect of the pre-encrypted image so as to obtain the final ciphertext image. Finally, the security analysis and experimental simulation of the encrypted image are carried out. The results of quantitative evaluation show that the proposed algorithm has a better encryption effect than the partial encryption algorithm. The algorithm is highly sensitive to keys and plaintexts, has a large key space, and can effectively resist differential attacks and attacks such as noise and clipping.<\/jats:p>","DOI":"10.3390\/e24081103","type":"journal-article","created":{"date-parts":[[2022,8,11]],"date-time":"2022-08-11T05:58:30Z","timestamp":1660197510000},"page":"1103","source":"Crossref","is-referenced-by-count":16,"title":["A Novel Image Encryption Algorithm Based on Improved Arnold Transform and Chaotic Pulse-Coupled Neural Network"],"prefix":"10.3390","volume":"24","author":[{"given":"Jinhong","family":"Ye","sequence":"first","affiliation":[{"name":"College of Physics and Electronic Engineering, Northwest Normal University, Lanzhou 730070, China"},{"name":"Engineering Research Center of Gansu Province for Intelligent Information Technology and Application, Lanzhou 730070, China"}]},{"given":"Xiangyu","family":"Deng","sequence":"additional","affiliation":[{"name":"College of Physics and Electronic Engineering, Northwest Normal University, Lanzhou 730070, China"},{"name":"Engineering Research Center of Gansu Province for Intelligent Information Technology and Application, Lanzhou 730070, China"}]},{"given":"Aijia","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Physics and Electronic Engineering, Northwest Normal University, Lanzhou 730070, China"},{"name":"Engineering Research Center of Gansu Province for Intelligent Information Technology and Application, Lanzhou 730070, China"}]},{"given":"Haiyue","family":"Yu","sequence":"additional","affiliation":[{"name":"College of Physics and Electronic Engineering, Northwest Normal University, Lanzhou 730070, China"},{"name":"Engineering Research Center of Gansu Province for Intelligent Information Technology and Application, Lanzhou 730070, China"}]}],"member":"1968","published-online":{"date-parts":[[2022,8,10]]},"reference":[{"key":"ref_1","first-page":"102811","article-title":"Bottom-boosting differential evolution based digital image security analysis","volume":"61","author":"Ghai","year":"2021","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1007\/s11831-018-9298-8","article-title":"A Comprehensive Review on Image Encryption Techniques","volume":"27","author":"Kaur","year":"2020","journal-title":"Arch. Comput. Methods Eng. State Art Rev."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"042020","DOI":"10.1088\/1757-899X\/677\/4\/042020","article-title":"An Improved Arnold Image Scrambling Algorithm","volume":"677","author":"Liang","year":"2019","journal-title":"IOP Conf. Ser. Mater. Sci. Eng."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"110962","DOI":"10.1016\/j.chaos.2021.110962","article-title":"An image encryption algorithm based on dynamic row scrambling and Zigzag transformation","volume":"147","author":"Wang","year":"2021","journal-title":"Chaos Solitons Fractals"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"18479","DOI":"10.1007\/s11042-021-10631-7","article-title":"Image encryption scheme with bit-level scrambling and multiplication diffusion","volume":"80","author":"Li","year":"2021","journal-title":"Multimed. Tools Appl."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"107326","DOI":"10.1016\/j.optlastec.2021.107326","article-title":"An efficient color\/grayscale image encryption scheme based on hybrid chaotic maps","volume":"143","author":"Khalil","year":"2021","journal-title":"Opt. Laser Technol."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"107252","DOI":"10.1016\/j.optlastec.2021.107252","article-title":"Image encryption algorithm based on 2D hyperchaotic map","volume":"142","author":"Gao","year":"2021","journal-title":"Opt. Laser Technol."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Ghosh, G., Anand, D., Verma, S., Rawat, D.B., Shafi, J., Marsza\u0142ek, Z., and Wo\u017aniak, M. (2021). Secure Surveillance Systems Using Partial-Regeneration-Based Non-Dominated Optimization and 5D-Chaotic Map. Symmetry, 13.","DOI":"10.3390\/sym13081447"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Hussain, R., Karbhari, Y., Ijaz, M.F., Wo\u017aniak, M., Singh, P.K., and Sarkar, R. (2021). Revise-Net: Exploiting Reverse Attention Mechanism for Salient Object Detection. Remote Sens., 13.","DOI":"10.3390\/rs13234941"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Etoundi, C.M.L., Nkapkop, J.D.D., Tsafack, N., Ngono, J.M., Ele, P., Wozniak, M., Shafi, J., and Ijaz, M.F. (2022). A Novel Compound-Coupled Hyperchaotic Map for Image Encryption. Symmetry, 14.","DOI":"10.3390\/sym14030493"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"933","DOI":"10.1080\/09500340.2020.1789233","article-title":"Colour-image encryption based on 2D discrete wavelet transform and 3D logistic chaotic map","volume":"67","author":"Joshi","year":"2020","journal-title":"J. Mod. Opt."},{"key":"ref_12","first-page":"97","article-title":"PCNN model analysis and its automatic parameters determination in image segmentation and edge detection","volume":"23","author":"Deng","year":"2014","journal-title":"Chin. J. Electron."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1162\/neco.1990.2.3.293","article-title":"Feature linking via synchronization among distributed assemblies: Simulations of results from cat visual cortex","volume":"2","author":"Eckhorn","year":"1990","journal-title":"Neural Comput."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"480","DOI":"10.1109\/72.761706","article-title":"PCNN models and applications","volume":"10","author":"Johnson","year":"1999","journal-title":"IEEE Trans. Neural Netw."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"103467","DOI":"10.1016\/j.bspc.2021.103467","article-title":"A retinal blood vessel segmentation based on improved D-MNet and pulse-coupled neural network","volume":"73","author":"Deng","year":"2022","journal-title":"Biomed. Signal Process. Control"},{"key":"ref_16","first-page":"133","article-title":"Signal tracking of the chaotic system of pulse coupled neural network","volume":"46","author":"De","year":"2010","journal-title":"J. Lanzhou Univ. (Nat. Sci.)"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"106392","DOI":"10.1016\/j.optlaseng.2020.106392","article-title":"Optical color image encryption based on Hadamard single-pixel imaging and Arnold transformation","volume":"137","author":"Qu","year":"2021","journal-title":"Opt. Lasers Eng."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"106139","DOI":"10.1016\/j.optlaseng.2020.106139","article-title":"Triple color image encryption based on 2D multiple parameter fractional discrete Fourier transform and 3D Arnold transform","volume":"133","author":"Joshi","year":"2020","journal-title":"Opt. Lasers Eng."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"72465","DOI":"10.1109\/ACCESS.2021.3079319","article-title":"Robust and Secure Digital Image Watermarking Technique Using Arnold Transform and Memristive Chaotic Oscillators","volume":"11","author":"Sehra","year":"2021","journal-title":"IEEE Access"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"102465","DOI":"10.1016\/j.bspc.2021.102465","article-title":"A modified salp swarm algorithm (SSA) combined with a chaotic coupled map lattices (CML) approach for the secured encryption and compression of medical images during data transmission","volume":"66","author":"Selvi","year":"2021","journal-title":"Biomed. Signal Process. Control"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Chen, Y., Xie, S., and Zhang, J. (2022). A Hybrid Domain Image Encryption Algorithm Based on Improved Henon Map. Entropy, 24.","DOI":"10.3390\/e24020287"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Hosny, K.M., Kamal, S.T., Darwish, M.M., and Papakostas, G.A. (2021). New Image Encryption Algorithm Using Hyperchaotic System and Fibonacci Q-Matrix. Electronics, 10.","DOI":"10.3390\/electronics10091066"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1016\/j.cnsns.2013.06.017","article-title":"Pseudo random number generator based on quantum chaotic map","volume":"19","author":"Akhshani","year":"2014","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1016\/j.sigpro.2019.06.010","article-title":"An overview of encryption algorithms in color images","volume":"164","author":"Hmg","year":"2019","journal-title":"Signal Process."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Wang, Y., Chen, L., Yu, K., Gao, Y., and Ma, Y. (2022). An Image Encryption Scheme Based on Logistic Quantum Chaos. Entropy, 24.","DOI":"10.3390\/e24020251"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1007\/s11071-016-3030-8","article-title":"An image encryption scheme based on chaotic tent map","volume":"87","author":"Li","year":"2017","journal-title":"Nonlinear Dyn."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"745","DOI":"10.1007\/s11071-018-4391-y","article-title":"An efficient pixel-level chaotic image encryption algorithm","volume":"94","author":"Ye","year":"2018","journal-title":"Nonlinear Dyn."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1049\/iet-ipr.2018.5900","article-title":"Novel image encryption algorithm based on improved logistic map","volume":"13","author":"Li","year":"2019","journal-title":"IET Image Process."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"106837","DOI":"10.1016\/j.optlastec.2020.106837","article-title":"A chaotic image encryption algorithm based on random dynamic mixing","volume":"138","author":"Wang","year":"2021","journal-title":"Opt. Laser Technol."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"22135","DOI":"10.1007\/s11042-021-10807-1","article-title":"A novel image encryption algorithm based on improved key selection and digital chaotic map","volume":"80","author":"Xiang","year":"2021","journal-title":"Multimed. Tools Appl."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"2807","DOI":"10.1007\/s11071-021-06422-2","article-title":"Quantum logistic image encryption algorithm based on SHA-3 and RSA","volume":"104","author":"Ye","year":"2021","journal-title":"Nonlinear Dyn."},{"key":"ref_32","first-page":"352","article-title":"Image encryption using q-deformed logistic map\u2013ScienceDirect","volume":"552","year":"2020","journal-title":"Inf. Sci."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"126683","DOI":"10.1016\/j.optcom.2020.126683","article-title":"Exploiting optical chaos for double images encryption with compressive sensing and double random phase encoding","volume":"484","author":"Jiang","year":"2021","journal-title":"Opt. Commun."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Wu, Z., Pan, P., Sun, C., and Zhao, B. (2021). Plaintext-Related Dynamic Key Chaotic Image Encryption Algorithm. Entropy, 23.","DOI":"10.3390\/e23091159"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1016\/j.patrec.2016.04.019","article-title":"A new adaptive filtering method for removing salt and pepper noise based on multilayered PCNN","volume":"79","author":"Deng","year":"2016","journal-title":"Pattern Recognit. Lett."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"25433","DOI":"10.1007\/s11042-021-10884-2","article-title":"Image compression and encryption algorithm based on compressive sensing and nonlinear diffusion","volume":"80","author":"Liu","year":"2021","journal-title":"Multimed. Tools Appl."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"116246","DOI":"10.1016\/j.image.2021.116246","article-title":"Image encryption based on compressed sensing and DNA encoding","volume":"95","author":"Wang","year":"2021","journal-title":"Signal Process. Image Commun."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"107580","DOI":"10.1016\/j.sigpro.2020.107580","article-title":"A visually secure image encryption scheme based on semi-tensor product compressed sensing-ScienceDirect","volume":"173","author":"Wen","year":"2020","journal-title":"Signal Process."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"19129","DOI":"10.1007\/s11042-020-08718-8","article-title":"A new design of cryptosystem based on S-box and chaotic permutation","volume":"79","author":"Farah","year":"2020","journal-title":"Multimed. Tools Appl."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1016\/j.image.2019.08.014","article-title":"Image encryption using block cipher and chaotic sequences-ScienceDirect","volume":"79","author":"Artiles","year":"2019","journal-title":"Signal Process. Image Commun."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"13792","DOI":"10.1109\/ACCESS.2020.2966264","article-title":"Image Encryption Algorithm Based on Logistic and Two-Dimensional Lorenz","volume":"8","author":"Li","year":"2020","journal-title":"IEEE Access"},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"105854","DOI":"10.1016\/j.optlastec.2019.105854","article-title":"A chaotic image encryption algorithm based on improved Joseph traversal and cyclic shift function","volume":"122","author":"Wang","year":"2020","journal-title":"Opt. Laser Technol."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"20263","DOI":"10.1007\/s11042-020-08879-6","article-title":"A new set of image encryption algorithms based on discrete orthogonal moments and Chaos theory","volume":"79","author":"Kamrani","year":"2020","journal-title":"Multimed. Tools Appl."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"723","DOI":"10.1016\/j.matcom.2021.06.012","article-title":"A novel image encryption algorithm based on SPWLCM and DNA coding","volume":"190","author":"Zhang","year":"2021","journal-title":"Math. Comput. Simul."},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Musanna, F., Dangwal, D., and Kumar, S. (2021). Novel image encryption algorithm using fractional chaos and cellular neural network. J. Ambient. Intell. Humaniz. Comput., prepublish.","DOI":"10.1007\/s12652-021-02982-8"},{"key":"ref_46","first-page":"9","article-title":"Image Encryption Algorithm of Based on Variable Step Length Josephus Traversing and DNA Dynamic Coding","volume":"42","author":"Niu","year":"2020","journal-title":"J. Electron. Inf. Technol."},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"409","DOI":"10.1080\/09500340.2021.1900440","article-title":"Image encryption based on adversarial neural cryptography and SHA controlled chaos","volume":"68","author":"Wu","year":"2021","journal-title":"J. Mod. Opt."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"403","DOI":"10.1016\/j.ins.2018.12.048","article-title":"Cosine-transform-based chaotic system for image encryption","volume":"480","author":"Hua","year":"2019","journal-title":"Inf. Sci."},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"107484","DOI":"10.1016\/j.sigpro.2020.107484","article-title":"A novel image encryption scheme based on conservative hyperchaotic system and closed-loop diffusion between blocks","volume":"171","author":"Zhou","year":"2020","journal-title":"Signal Process."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1016\/j.sigpro.2018.06.008","article-title":"Image encryption using 2D H\u00e9non-Sine map and DNA approach","volume":"153","author":"Wu","year":"2018","journal-title":"Signal Process."}],"container-title":["Entropy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1099-4300\/24\/8\/1103\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,3]],"date-time":"2024-08-03T17:57:29Z","timestamp":1722707849000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1099-4300\/24\/8\/1103"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,10]]},"references-count":50,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2022,8]]}},"alternative-id":["e24081103"],"URL":"https:\/\/doi.org\/10.3390\/e24081103","relation":{},"ISSN":["1099-4300"],"issn-type":[{"type":"electronic","value":"1099-4300"}],"subject":[],"published":{"date-parts":[[2022,8,10]]}}}