<?xml version="1.0" encoding="utf-8"?><!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.0 20120330//EN" "JATS-journalpublishing1.dtd"><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">INFORMATICA</journal-id>
<journal-title-group><journal-title>Informatica</journal-title></journal-title-group>
<issn pub-type="epub">1822-8844</issn>
<issn pub-type="ppub">0868-4952</issn>
<issn-l>0868-4952</issn-l>
<publisher>
<publisher-name>Vilnius University</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">INFOR426</article-id>
<article-id pub-id-type="doi">10.15388/20-INFOR426</article-id>
<article-categories><subj-group subj-group-type="heading">
<subject>Research Article</subject></subj-group></article-categories>
<title-group>
<article-title>Efficient Image Encryption Scheme Based on 4-Dimensional Chaotic Maps</article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name><surname>Kanso</surname><given-names>Ali</given-names></name><email xlink:href="ali.kanso@ku.edu.kw">ali.kanso@ku.edu.kw</email><xref ref-type="aff" rid="j_infor426_aff_001"/><xref ref-type="corresp" rid="cor1">∗</xref><bio>
<p><bold>A. Kanso</bold> is an associate professor of mathematics at Kuwait University, Kuwait. He received his BSc degree in mathematics from Queen Mary and Westfield College (University of London), in 1994. He earned his MSc degree in applied computing technology in the Electronic Engineering Department of Middlesex University, in 1996. In 1999 he obtained his PhD in mathematics from Royal Holloway and Bedford New College (University of London). His research interests include chaos-based encryption systems, information hiding, hash functions, secret sharing, and graph theory.</p></bio>
</contrib>
<contrib contrib-type="author">
<name><surname>Ghebleh</surname><given-names>Mohammad</given-names></name><email xlink:href="mohammad.ghebleh@ku.edu.kw">mohammad.ghebleh@ku.edu.kw</email><xref ref-type="aff" rid="j_infor426_aff_001"/><bio>
<p><bold>M. Ghebleh</bold> is an associate professor of mathematics at Kuwait University, Kuwait. He received his BSc and MSc in mathematics from Sharif University of Technology, Tehran, Iran (1997 and 1999), and his PhD in mathematics from Simon Fraser University, Burnaby, British Columbia, Canada (2007). His research interests include graph theory, combinatorics, and digital security topics such as encryption, data hiding, hash functions, and secret sharing.</p></bio>
</contrib>
<contrib contrib-type="author">
<name><surname>Alazemi</surname><given-names>Abdullah</given-names></name><email xlink:href="abdullah.alazemi@ku.edu.kw">abdullah.alazemi@ku.edu.kw</email><xref ref-type="aff" rid="j_infor426_aff_001"/><bio>
<p><bold>A. Alazemi</bold> is an associate professor of mathematics at Kuwait University, Kuwait. He received his BSc in mathematics from Kuwait University, Kuwait. He earned his MSc and PhD in mathematics from Colorado State University, Colorado, the United States (2004 and 2007). His research interests include incidence structures, classification problems, spectral graph theory, graph theory, combinatorics and algebra.</p></bio>
</contrib>
<aff id="j_infor426_aff_001">Department of Mathematics, <institution>Kuwait University</institution>, P.O. Box 5969, Safat 13060, <country>Kuwait</country></aff>
</contrib-group>
<author-notes>
<corresp id="cor1"><label>∗</label>Corresponding author.</corresp>
</author-notes>
<pub-date pub-type="ppub"><year>2020</year></pub-date>
<pub-date pub-type="epub"><day>24</day><month>9</month><year>2020</year></pub-date>
<volume>31</volume><issue>4</issue><fpage>793</fpage><lpage>820</lpage>
<history>
<date date-type="received"><month>2</month><year>2020</year></date>
<date date-type="accepted"><month>8</month><year>2020</year></date>
</history>
<permissions><copyright-statement>© 2020 Vilnius University</copyright-statement><copyright-year>2020</copyright-year>
<license license-type="open-access" xlink:href="http://creativecommons.org/licenses/by/4.0/">
<license-p>Open access article under the <ext-link ext-link-type="uri" xlink:href="http://creativecommons.org/licenses/by/4.0/">CC BY</ext-link> license.</license-p></license></permissions>
<abstract>
<p>This paper proposes a new family of 4-dimensional chaotic cat maps. This family is then used in the design of a novel block-based image encryption scheme. This scheme is composed of two independent phases, a robust light shuffling phase and a masking phase which operate on image-blocks. It utilizes measures of central tendency to mix blocks of the image at hand to enhance security against a number of cryptanalytic attacks. The mixing is designed so that while encryption is highly sensitive to the secret key and the input image, decryption is robust against noise and cropping of the cipher-image. Empirical results show high performance of the suggested scheme and its robustness against well-known cryptanalytic attacks. Furthermore, comparisons with existing image encryption methods are presented which demonstrate the superiority of the proposed scheme.</p>
</abstract>
<kwd-group>
<label>Key words</label>
<kwd>cryptography</kwd>
<kwd>chaos</kwd>
<kwd>cat map</kwd>
<kwd>pseudorandom numbers</kwd>
<kwd>image encryption</kwd>
</kwd-group>
</article-meta>
</front>
<body>
<sec id="j_infor426_s_001">
<label>1</label>
<title>Introduction</title>
<p>The rapid growth in multimedia applications has led to the vast spread of multimedia information across public networks. As a consequence, such information has become vulnerable to eavesdropping. Therefore, the need for safeguarding algorithms has become of major concern. Digital images are amongst the most popular digital media, they are found in a number of applications including military, medical and geographical applications. Due to this wide range of applications, research for developing efficient safeguarding algorithms has grasped the attention of scientists and engineers more than ever.</p>
<p>Cryptography is a field of mathematics and computer science that provide many security services including encryption and data hiding. Data hiding is a process that intends to hide secret information within cover media in such a way that an eavesdropper is incapable to detect the presence of such information within the carrier. On the contrary, encryption is a process that transforms secret information into scrambled data which is totally meaningless to an eavesdropper (Katz <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor426_ref_028">1996</xref>; Rijmen and Daemen, <xref ref-type="bibr" rid="j_infor426_ref_042">2001</xref>; Rivest <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor426_ref_043">1978</xref>). Both techniques require a secret key that entitles the recipient to recover back the secret information. One disadvantage of data hiding techniques is that most schemes hide the raw data within the cover media (Cheddad <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor426_ref_007">2010</xref>; Mao and Qin, <xref ref-type="bibr" rid="j_infor426_ref_039">2013</xref>; Ghebleh and Kanso, <xref ref-type="bibr" rid="j_infor426_ref_014">2014</xref>; Tang <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor426_ref_049">2014</xref>). Furthermore, secret images of large sizes require quite large carriers. Due to some inherent characteristics of digital images such as bulk data capacity, high redundancy and correlation between adjacent pixels, conventional encryption schemes such as the Data Encryption Standard (DES) (Katz <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor426_ref_028">1996</xref>), the Advanced Encryption Standard (AES) (Rijmen and Daemen, <xref ref-type="bibr" rid="j_infor426_ref_042">2001</xref>), the Rivest, Shamir and Adleman’s scheme (RSA) (Rivest <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor426_ref_043">1978</xref>) are unsuitable for the encryption of digital images.</p>
<p>Chaotic systems have a number of important characteristics such as high sensitive dependence on initial conditions and control parameters, large keyspace, unpredictability, ergodicity, and mixing property. Furthermore, with suitable control parameters and initial conditions, they can generate random looking sequences indistinguishable from random sequences. Confusion and diffusion are two important properties of any suitable encryption scheme (Shannon, <xref ref-type="bibr" rid="j_infor426_ref_045">1949</xref>). In image encryption, confusion makes the relationship between the cipher-image and the secret key as complex as possible. That is, the impact of a tiny change to the secret key results in a major change in the cipher-image. On the other hand, diffusion makes the statistical relationship between the plain-image and the cipher-image as complex as possible. That is, the impact of a tiny change in the plain-image results in a major change in the cipher-image. This complexity can be obtained by a number of permutations and substitutions. Owing to the strong relationship between the properties of chaotic systems and Shannon’s principles of confusion and diffusion (Shannon, <xref ref-type="bibr" rid="j_infor426_ref_045">1949</xref>), which are ideal properties in the design of a strong image encryption scheme, chaotic systems have become promising building blocks in the construction of such schemes. In 1998, Fridrich (<xref ref-type="bibr" rid="j_infor426_ref_011">1998</xref>) presented an elegant chaos-based image encryption scheme that consists of two phases: a shuffling phase to confuse the relationship between the cipher-image and the plain-image, and a masking phase to spread a small change in the plain-image throughout the whole cipher-image. Despite the fact that Fridrich’s scheme is shown to suffer from security issues under chosen cipher-image scenario (Solak <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor426_ref_046">2010</xref>; Xie <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor426_ref_057">2017</xref>), Fridrich’s approach has been adopted in the designs of most proposed chaos-based image encryption schemes. Throughout the last two decades, a number of chaos-based image encryption schemes have been developed (Chen <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor426_ref_008">2004</xref>; Guan <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor426_ref_017">2005</xref>; Behnia <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor426_ref_004">2008</xref>; Zhang <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor426_ref_059">2010</xref>; Liu Y. <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor426_ref_038">2016</xref>; Hua <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor426_ref_021">2015</xref>; Kanso and Ghebleh, <xref ref-type="bibr" rid="j_infor426_ref_024">2012</xref>, <xref ref-type="bibr" rid="j_infor426_ref_026">2015a</xref>; Khan <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor426_ref_030">2017</xref>; Fu <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor426_ref_013">2018</xref>; Khan and Shah, <xref ref-type="bibr" rid="j_infor426_ref_029">2015</xref>). Chen <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor426_ref_008">2004</xref>) proposed an image encryption scheme that employs a 3-dimensional (3D) cat map. However, Chen et al.’s scheme (Chen <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor426_ref_008">2004</xref>) is shown to be vulnerable to differential attacks (Li and Chen, <xref ref-type="bibr" rid="j_infor426_ref_032">2008</xref>; Wang <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor426_ref_051">2005</xref>). Guan <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor426_ref_017">2005</xref>) proposed an image encryption scheme based on Arnold cat map and Chen’s chaotic system. Cokal and Solak (<xref ref-type="bibr" rid="j_infor426_ref_009">2009</xref>) proved that this scheme suffers from security weaknesses under chosen plain-image and known plain-image scenarios. Behnia <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor426_ref_004">2008</xref>) proposed a new kind of image encryption scheme based on composition of trigonometric chaotic maps. However, this scheme is shown to suffer from security issues under chosen plain-image scenario and differential attacks (Li <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor426_ref_033">2010</xref>). Zhang <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor426_ref_059">2010</xref>) proposed an image encryption scheme based on DNA addition in conjunction with two chaotic logistic maps. Hermassi <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor426_ref_019">2014</xref>) revealed a number of flaws including non-invertibility of Zhang et al.’s scheme (Zhang <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor426_ref_059">2010</xref>). In Zhu (<xref ref-type="bibr" rid="j_infor426_ref_063">2012</xref>), Zhu proposed an image encryption scheme based on improved hyper-chaotic sequences. Li <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor426_ref_034">2013</xref>) showed that Zhu’s scheme can be broken with only one known plain-image. In Liu Y. <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor426_ref_038">2016</xref>), a hyper-chaos-based image encryption algorithm with linear feedback shift registers is proposed. Zhang <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor426_ref_060">2017</xref>) showed that this scheme has some flaws due to weak security of the diffusion process and it is vulnerable to differential attacks. Hua <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor426_ref_021">2015</xref>) introduced a new 2D sine logistic modulation map and proposed a chaotic magic transform image encryption scheme. Kanso and Ghebleh (<xref ref-type="bibr" rid="j_infor426_ref_024">2012</xref>) proposed an image encryption scheme based on 3D cat map. In Kanso and Ghebleh (<xref ref-type="bibr" rid="j_infor426_ref_026">2015a</xref>), a new family of 4D cat maps is proposed together with an image encryption scheme for medical applications. Khan <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor426_ref_030">2017</xref>) proposed a chaos-based image encryption scheme that utilizes a non-linear chaotic algorithm for destroying correlation and diffusion in plain-image. In Fu <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor426_ref_013">2018</xref>), Fu et al. proposed an algorithm based on a 4D hyper-chaotic system in conjunction with the hash function SHA-224. In addition to the aforementioned schemes, the research committee has proposed a number of schemes such as those presented in Wang <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor426_ref_052">2015</xref>), Zhou <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor426_ref_062">2014</xref>), Xu <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor426_ref_058">2016</xref>), Liu <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor426_ref_037">2016</xref>), Hua and Zhou (<xref ref-type="bibr" rid="j_infor426_ref_020">2017</xref>), Zhou <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor426_ref_061">2013</xref>), Wu <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor426_ref_055">2014</xref>), Cao <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor426_ref_005">2018</xref>), Hua <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor426_ref_023">2019</xref>), Khan <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor426_ref_030">2017</xref>), Fu <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor426_ref_013">2018</xref>), Liu <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor426_ref_036">2019</xref>), Sun <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor426_ref_048">2020</xref>), Hemdan <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor426_ref_018">2019</xref>) and references therein.</p>
<p>Among the large number of image encryption schemes that have appeared in the literature, security flaws in some of these schemes have been revealed by the cryptographic community. Furthermore, the rapid advancement of digital media technology demands the attention of researchers to develop fast and efficient image encryption schemes. Arnold’s cat map (Arnol’d and Avez, <xref ref-type="bibr" rid="j_infor426_ref_002">1968</xref>) is one of the most studied 2D chaotic maps. Due to its characteristics, it has been widely used in a number of cryptographic applications (Guan <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor426_ref_017">2005</xref>; Xiao <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor426_ref_056">2009</xref>; Fu <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor426_ref_012">2011</xref>; Ghebleh <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor426_ref_016">2014b</xref>; Soleymani <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor426_ref_047">2014</xref>; Kanso and Ghebleh, <xref ref-type="bibr" rid="j_infor426_ref_026">2015a</xref>,b). Furthermore, a number of generalizations of the 2D cat map have appeared in the literature (Chen <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor426_ref_008">2004</xref>; Kanso and Ghebleh, <xref ref-type="bibr" rid="j_infor426_ref_025">2013</xref>). In this paper, we propose a new family of 4D chaotic cat maps that is an extension of the generalization suggested in Kanso and Ghebleh (<xref ref-type="bibr" rid="j_infor426_ref_025">2013</xref>) for use in cryptographic applications. The objective of this proposal is to increase the number of control parameters in the coefficient matrix defining the 4D cat map which in turn increases the size of the keyspace of any cryptographic scheme adopting the generalization. We then propose an image encryption scheme based on members of this family. The proposed scheme follows Fridrich’s approach. It is composed of a light shuffling phase and a masking phase, which operate on image-blocks. The shuffling phase preforms a circular shift on the rows and columns of the image at hand in conjunction with a zigzag ordering algorithm. The masking phase uses pseudorandom sequences generated by the proposed 4D cat map for diffusion of the resulting shuffle-image. Furthermore, the masking phase applies measures of central tendency to enhance security against a number of cryptanalytic attacks such as differential attacks. The mixing is designed so that while encryption is highly sensitive to the secret key and the input image, decryption is robust against noise and cropping of the cipher-image. Simulation results are presented to demonstrate the high performance of the proposed scheme and its high security level.</p>
<p>The main contributions of this work are as follows:</p>
<list>
<list-item id="j_infor426_li_001">
<label>•</label>
<p>The method is simple and efficient.</p>
</list-item>
<list-item id="j_infor426_li_002">
<label>•</label>
<p>The encryption scheme is highly sensitive to its key and input image, while the decryption scheme is robust against various alternations such as noise and cropping of cipher-image.</p>
</list-item>
<list-item id="j_infor426_li_003">
<label>•</label>
<p>The method is block-based. Based on the block size, there is a tradeoff between the security and the speed of the proposed scheme. However, simulations show that the chosen block size makes the scheme robust to existing attacks, insensitive to cipher-image attacks, and faster than existing schemes.</p>
</list-item>
</list>
<p>The paper is organized as follows: Section <xref rid="j_infor426_s_002">2</xref> presents the proposed family of 4D cat maps. In Section <xref rid="j_infor426_s_003">3</xref>, we give a detailed description of the proposed image encryption scheme. We also demonstrate the randomness of matrices generated by successive iterations of the proposed 4D cat map. Section <xref rid="j_infor426_s_008">4</xref> showcases the efficiency of the proposed scheme. It also presents simulation results that demonstrate the robustness of the proposed scheme against statistical attacks. In Section <xref rid="j_infor426_s_015">5</xref>, we further analyse the security of the proposed scheme. In Section <xref rid="j_infor426_s_020">6</xref>, we showcase the superiority of the proposed scheme over some of the existing schemes. Finally, we end the paper with some concluding remarks.</p>
</sec>
<sec id="j_infor426_s_002">
<label>2</label>
<title>The 4-Dimensional Cat Map</title>
<p>Arnold’s cat map (Arnol’d and Avez, <xref ref-type="bibr" rid="j_infor426_ref_002">1968</xref>) is a chaotic map defined on the torus <inline-formula id="j_infor426_ineq_001"><alternatives>
<mml:math><mml:msup><mml:mrow><mml:mi mathvariant="double-struck">R</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msup><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:msup><mml:mrow><mml:mi mathvariant="double-struck">Z</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msup></mml:math>
<tex-math><![CDATA[${\mathbb{R}^{2}}/{\mathbb{Z}^{2}}$]]></tex-math></alternatives></inline-formula> by 
<disp-formula id="j_infor426_eq_001">
<alternatives>
<mml:math display="block"><mml:mtable displaystyle="true"><mml:mtr><mml:mtd><mml:mi mathvariant="normal">Γ</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="italic">x</mml:mi><mml:mo mathvariant="normal">,</mml:mo><mml:mi mathvariant="italic">y</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo><mml:mo>=</mml:mo><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="italic">x</mml:mi><mml:mo>+</mml:mo><mml:mi mathvariant="italic">y</mml:mi><mml:mo mathvariant="normal">,</mml:mo><mml:mspace width="0.1667em"/><mml:mi mathvariant="italic">x</mml:mi><mml:mo>+</mml:mo><mml:mn>2</mml:mn><mml:mi mathvariant="italic">y</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo><mml:mspace width="0.3em"/><mml:mo>mod</mml:mo><mml:mspace width="0.3em"/><mml:mn>1</mml:mn><mml:mo>.</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math>
<tex-math><![CDATA[\[ \Gamma (x,y)=(x+y,\hspace{0.1667em}x+2y)\hspace{0.3em}\mathrm{mod} \hspace{0.3em}1.\]]]></tex-math></alternatives>
</disp-formula> 
The discrete cat map can be defined accordingly by 
<disp-formula id="j_infor426_eq_002">
<alternatives>
<mml:math display="block"><mml:mtable displaystyle="true"><mml:mtr><mml:mtd><mml:mfenced separators="" open="[" close="]"><mml:mrow><mml:mtable equalrows="false" equalcolumns="false" columnalign="center"><mml:mtr><mml:mtd class="array"><mml:msub><mml:mrow><mml:mi mathvariant="italic">x</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">n</mml:mi><mml:mo>+</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:mtd></mml:mtr><mml:mtr><mml:mtd class="array"><mml:msub><mml:mrow><mml:mi mathvariant="italic">y</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">n</mml:mi><mml:mo>+</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:mtd></mml:mtr></mml:mtable></mml:mrow></mml:mfenced><mml:mo>=</mml:mo><mml:mfenced separators="" open="[" close="]"><mml:mrow><mml:mtable columnspacing="4.0pt" equalrows="false" columnlines="none" equalcolumns="false" columnalign="center center"><mml:mtr><mml:mtd class="array"><mml:mn>1</mml:mn></mml:mtd><mml:mtd class="array"><mml:mn>1</mml:mn></mml:mtd></mml:mtr><mml:mtr><mml:mtd class="array"><mml:mn>1</mml:mn></mml:mtd><mml:mtd class="array"><mml:mn>2</mml:mn></mml:mtd></mml:mtr></mml:mtable></mml:mrow></mml:mfenced><mml:mfenced separators="" open="[" close="]"><mml:mrow><mml:mtable equalrows="false" equalcolumns="false" columnalign="center"><mml:mtr><mml:mtd class="array"><mml:msub><mml:mrow><mml:mi mathvariant="italic">x</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">n</mml:mi></mml:mrow></mml:msub></mml:mtd></mml:mtr><mml:mtr><mml:mtd class="array"><mml:msub><mml:mrow><mml:mi mathvariant="italic">y</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">n</mml:mi></mml:mrow></mml:msub></mml:mtd></mml:mtr></mml:mtable></mml:mrow></mml:mfenced><mml:mspace width="0.3em"/><mml:mo>mod</mml:mo><mml:mspace width="0.3em"/><mml:mn>1</mml:mn><mml:mo mathvariant="normal">,</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math>
<tex-math><![CDATA[\[ \left[\begin{array}{c}{x_{n+1}}\\ {} {y_{n+1}}\end{array}\right]=\left[\begin{array}{c@{\hskip4.0pt}c}1& 1\\ {} 1& 2\end{array}\right]\left[\begin{array}{c}{x_{n}}\\ {} {y_{n}}\end{array}\right]\hspace{0.3em}\mathrm{mod} \hspace{0.3em}1,\]]]></tex-math></alternatives>
</disp-formula> 
which starting from any initial state <inline-formula id="j_infor426_ineq_002"><alternatives>
<mml:math><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">x</mml:mi></mml:mrow><mml:mrow><mml:mn>0</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">y</mml:mi></mml:mrow><mml:mrow><mml:mn>0</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math>
<tex-math><![CDATA[$({x_{0}},{y_{0}})$]]></tex-math></alternatives></inline-formula> defines an infinite sequence of 2-vectors. This map can be generalized (Chen <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor426_ref_008">2004</xref>) using two positive integer parameters <italic>a</italic> and <italic>b</italic> as 
<disp-formula id="j_infor426_eq_003">
<label>(1)</label><alternatives>
<mml:math display="block"><mml:mtable displaystyle="true"><mml:mtr><mml:mtd><mml:mfenced separators="" open="[" close="]"><mml:mrow><mml:mtable equalrows="false" equalcolumns="false" columnalign="center"><mml:mtr><mml:mtd class="array"><mml:msub><mml:mrow><mml:mi mathvariant="italic">x</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">n</mml:mi><mml:mo>+</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:mtd></mml:mtr><mml:mtr><mml:mtd class="array"><mml:msub><mml:mrow><mml:mi mathvariant="italic">y</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">n</mml:mi><mml:mo>+</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:mtd></mml:mtr></mml:mtable></mml:mrow></mml:mfenced><mml:mo>=</mml:mo><mml:mfenced separators="" open="[" close="]"><mml:mrow><mml:mtable columnspacing="4.0pt" equalrows="false" columnlines="none" equalcolumns="false" columnalign="center center"><mml:mtr><mml:mtd class="array"><mml:mn>1</mml:mn></mml:mtd><mml:mtd class="array"><mml:mi mathvariant="italic">a</mml:mi></mml:mtd></mml:mtr><mml:mtr><mml:mtd class="array"><mml:mi mathvariant="italic">b</mml:mi></mml:mtd><mml:mtd class="array"><mml:mi mathvariant="italic">a</mml:mi><mml:mi mathvariant="italic">b</mml:mi><mml:mo>+</mml:mo><mml:mn>1</mml:mn></mml:mtd></mml:mtr></mml:mtable></mml:mrow></mml:mfenced><mml:mfenced separators="" open="[" close="]"><mml:mrow><mml:mtable equalrows="false" equalcolumns="false" columnalign="center"><mml:mtr><mml:mtd class="array"><mml:msub><mml:mrow><mml:mi mathvariant="italic">x</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">n</mml:mi></mml:mrow></mml:msub></mml:mtd></mml:mtr><mml:mtr><mml:mtd class="array"><mml:msub><mml:mrow><mml:mi mathvariant="italic">y</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">n</mml:mi></mml:mrow></mml:msub></mml:mtd></mml:mtr></mml:mtable></mml:mrow></mml:mfenced><mml:mspace width="0.3em"/><mml:mo>mod</mml:mo><mml:mspace width="0.3em"/><mml:mn>1</mml:mn><mml:mo>.</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math>
<tex-math><![CDATA[\[ \left[\begin{array}{c}{x_{n+1}}\\ {} {y_{n+1}}\end{array}\right]=\left[\begin{array}{c@{\hskip4.0pt}c}1& a\\ {} b& ab+1\end{array}\right]\left[\begin{array}{c}{x_{n}}\\ {} {y_{n}}\end{array}\right]\hspace{0.3em}\mathrm{mod} \hspace{0.3em}1.\]]]></tex-math></alternatives>
</disp-formula> 
Further generalizations of this map to higher dimensions are also known (Chen <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor426_ref_008">2004</xref>; Kanso and Ghebleh, <xref ref-type="bibr" rid="j_infor426_ref_025">2013</xref>). Chen <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor426_ref_008">2004</xref>) proposed a generalization of the 2D cat map into a 3D cat map, where the coefficient matrix consists of six control parameters. Kanso and Ghebleh (<xref ref-type="bibr" rid="j_infor426_ref_025">2013</xref>) extended the generalization of the 2D cat map into a 4D cat map, where the coefficient matrix consists of four control parameters. Despite existing generalizations, in this paper we extend the generalization of the 4D cat map suggested in Kanso and Ghebleh (<xref ref-type="bibr" rid="j_infor426_ref_025">2013</xref>) so that the number of control parameters of the coefficient matrix increases to twelve positive integers. The increase in the number of control parameters is very beneficial to cryptographic applications since it leads to a larger keyspace of the cryptographic scheme.</p>
<p>We consider the following path to define a new <inline-formula id="j_infor426_ineq_003"><alternatives>
<mml:math><mml:mn>4</mml:mn><mml:mo>×</mml:mo><mml:mn>4</mml:mn></mml:math>
<tex-math><![CDATA[$4\times 4$]]></tex-math></alternatives></inline-formula> coefficient matrix for a 4D cat map. The building blocks for this definition are maps which fix two coordinates and apply Eq. (<xref rid="j_infor426_eq_003">1</xref>) to the other two coordinates. More specifically, we use the six matrices 
<disp-formula id="j_infor426_eq_004">
<alternatives>
<mml:math display="block"><mml:mtable displaystyle="true" columnalign="right left" columnspacing="0pt"><mml:mtr><mml:mtd class="align-odd"/><mml:mtd class="align-even"><mml:msub><mml:mrow><mml:mi mathvariant="italic">M</mml:mi></mml:mrow><mml:mrow><mml:mn>12</mml:mn></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mfenced separators="" open="[" close="]"><mml:mrow><mml:mtable columnspacing="4.0pt 4.0pt 4.0pt" equalrows="false" columnlines="none none none" equalcolumns="false" columnalign="center center center center"><mml:mtr><mml:mtd class="array"><mml:mn>1</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:msub><mml:mrow><mml:mi mathvariant="italic">a</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>0</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>0</mml:mn></mml:mtd></mml:mtr><mml:mtr><mml:mtd class="array"><mml:msub><mml:mrow><mml:mi mathvariant="italic">b</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:msub><mml:mrow><mml:mi mathvariant="italic">a</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:msub><mml:mrow><mml:mi mathvariant="italic">b</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo>+</mml:mo><mml:mn>1</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>0</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>0</mml:mn></mml:mtd></mml:mtr><mml:mtr><mml:mtd class="array"><mml:mn>0</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>0</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>1</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>0</mml:mn></mml:mtd></mml:mtr><mml:mtr><mml:mtd class="array"><mml:mn>0</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>0</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>0</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>1</mml:mn></mml:mtd></mml:mtr></mml:mtable></mml:mrow></mml:mfenced><mml:mo mathvariant="normal">,</mml:mo><mml:mspace width="2em"/><mml:msub><mml:mrow><mml:mi mathvariant="italic">M</mml:mi></mml:mrow><mml:mrow><mml:mn>23</mml:mn></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mfenced separators="" open="[" close="]"><mml:mrow><mml:mtable columnspacing="4.0pt 4.0pt 4.0pt" equalrows="false" columnlines="none none none" equalcolumns="false" columnalign="center center center center"><mml:mtr><mml:mtd class="array"><mml:mn>1</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>0</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>0</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>0</mml:mn></mml:mtd></mml:mtr><mml:mtr><mml:mtd class="array"><mml:mn>0</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>1</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:msub><mml:mrow><mml:mi mathvariant="italic">a</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>0</mml:mn></mml:mtd></mml:mtr><mml:mtr><mml:mtd class="array"><mml:mn>0</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:msub><mml:mrow><mml:mi mathvariant="italic">b</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:msub><mml:mrow><mml:mi mathvariant="italic">a</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:msub><mml:mrow><mml:mi mathvariant="italic">b</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mo>+</mml:mo><mml:mn>1</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>0</mml:mn></mml:mtd></mml:mtr><mml:mtr><mml:mtd class="array"><mml:mn>0</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>0</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>0</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>1</mml:mn></mml:mtd></mml:mtr></mml:mtable></mml:mrow></mml:mfenced><mml:mo mathvariant="normal">,</mml:mo></mml:mtd></mml:mtr><mml:mtr><mml:mtd class="align-odd"/><mml:mtd class="align-even"><mml:msub><mml:mrow><mml:mi mathvariant="italic">M</mml:mi></mml:mrow><mml:mrow><mml:mn>34</mml:mn></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mfenced separators="" open="[" close="]"><mml:mrow><mml:mtable columnspacing="4.0pt 4.0pt 4.0pt" equalrows="false" columnlines="none none none" equalcolumns="false" columnalign="center center center center"><mml:mtr><mml:mtd class="array"><mml:mn>1</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>0</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>0</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>0</mml:mn></mml:mtd></mml:mtr><mml:mtr><mml:mtd class="array"><mml:mn>0</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>1</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>0</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>0</mml:mn></mml:mtd></mml:mtr><mml:mtr><mml:mtd class="array"><mml:mn>0</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>0</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>1</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:msub><mml:mrow><mml:mi mathvariant="italic">a</mml:mi></mml:mrow><mml:mrow><mml:mn>3</mml:mn></mml:mrow></mml:msub></mml:mtd></mml:mtr><mml:mtr><mml:mtd class="array"><mml:mn>0</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>0</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:msub><mml:mrow><mml:mi mathvariant="italic">b</mml:mi></mml:mrow><mml:mrow><mml:mn>3</mml:mn></mml:mrow></mml:msub><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:msub><mml:mrow><mml:mi mathvariant="italic">a</mml:mi></mml:mrow><mml:mrow><mml:mn>3</mml:mn></mml:mrow></mml:msub><mml:msub><mml:mrow><mml:mi mathvariant="italic">b</mml:mi></mml:mrow><mml:mrow><mml:mn>3</mml:mn></mml:mrow></mml:msub><mml:mo>+</mml:mo><mml:mn>1</mml:mn></mml:mtd></mml:mtr></mml:mtable></mml:mrow></mml:mfenced><mml:mo mathvariant="normal">,</mml:mo><mml:mspace width="2em"/><mml:msub><mml:mrow><mml:mi mathvariant="italic">M</mml:mi></mml:mrow><mml:mrow><mml:mn>41</mml:mn></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mfenced separators="" open="[" close="]"><mml:mrow><mml:mtable columnspacing="4.0pt 4.0pt 4.0pt" equalrows="false" columnlines="none none none" equalcolumns="false" columnalign="center center center center"><mml:mtr><mml:mtd class="array"><mml:msub><mml:mrow><mml:mi mathvariant="italic">a</mml:mi></mml:mrow><mml:mrow><mml:mn>4</mml:mn></mml:mrow></mml:msub><mml:msub><mml:mrow><mml:mi mathvariant="italic">b</mml:mi></mml:mrow><mml:mrow><mml:mn>4</mml:mn></mml:mrow></mml:msub><mml:mo>+</mml:mo><mml:mn>1</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>0</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>0</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:msub><mml:mrow><mml:mi mathvariant="italic">b</mml:mi></mml:mrow><mml:mrow><mml:mn>4</mml:mn></mml:mrow></mml:msub></mml:mtd></mml:mtr><mml:mtr><mml:mtd class="array"><mml:mn>0</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>1</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>0</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>0</mml:mn></mml:mtd></mml:mtr><mml:mtr><mml:mtd class="array"><mml:mn>0</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>0</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>1</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>0</mml:mn></mml:mtd></mml:mtr><mml:mtr><mml:mtd class="array"><mml:msub><mml:mrow><mml:mi mathvariant="italic">a</mml:mi></mml:mrow><mml:mrow><mml:mn>4</mml:mn></mml:mrow></mml:msub><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>0</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>0</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>1</mml:mn></mml:mtd></mml:mtr></mml:mtable></mml:mrow></mml:mfenced><mml:mo mathvariant="normal">,</mml:mo></mml:mtd></mml:mtr><mml:mtr><mml:mtd class="align-odd"/><mml:mtd class="align-even"><mml:msub><mml:mrow><mml:mi mathvariant="italic">M</mml:mi></mml:mrow><mml:mrow><mml:mn>31</mml:mn></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mfenced separators="" open="[" close="]"><mml:mrow><mml:mtable columnspacing="4.0pt 4.0pt 4.0pt" equalrows="false" columnlines="none none none" equalcolumns="false" columnalign="center center center center"><mml:mtr><mml:mtd class="array"><mml:msub><mml:mrow><mml:mi mathvariant="italic">a</mml:mi></mml:mrow><mml:mrow><mml:mn>5</mml:mn></mml:mrow></mml:msub><mml:msub><mml:mrow><mml:mi mathvariant="italic">b</mml:mi></mml:mrow><mml:mrow><mml:mn>5</mml:mn></mml:mrow></mml:msub><mml:mo>+</mml:mo><mml:mn>1</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>0</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:msub><mml:mrow><mml:mi mathvariant="italic">a</mml:mi></mml:mrow><mml:mrow><mml:mn>5</mml:mn></mml:mrow></mml:msub><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>0</mml:mn></mml:mtd></mml:mtr><mml:mtr><mml:mtd class="array"><mml:mn>0</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>1</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>0</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>0</mml:mn></mml:mtd></mml:mtr><mml:mtr><mml:mtd class="array"><mml:msub><mml:mrow><mml:mi mathvariant="italic">b</mml:mi></mml:mrow><mml:mrow><mml:mn>5</mml:mn></mml:mrow></mml:msub><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>0</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>1</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>0</mml:mn></mml:mtd></mml:mtr><mml:mtr><mml:mtd class="array"><mml:mn>0</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>0</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>0</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>1</mml:mn></mml:mtd></mml:mtr></mml:mtable></mml:mrow></mml:mfenced><mml:mo mathvariant="normal">,</mml:mo><mml:mspace width="1em"/><mml:mtext>and</mml:mtext><mml:mspace width="1em"/><mml:msub><mml:mrow><mml:mi mathvariant="italic">M</mml:mi></mml:mrow><mml:mrow><mml:mn>24</mml:mn></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mfenced separators="" open="[" close="]"><mml:mrow><mml:mtable columnspacing="4.0pt 4.0pt 4.0pt" equalrows="false" columnlines="none none none" equalcolumns="false" columnalign="center center center center"><mml:mtr><mml:mtd class="array"><mml:mn>1</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>0</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>0</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>0</mml:mn></mml:mtd></mml:mtr><mml:mtr><mml:mtd class="array"><mml:mn>0</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>1</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>0</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:msub><mml:mrow><mml:mi mathvariant="italic">a</mml:mi></mml:mrow><mml:mrow><mml:mn>6</mml:mn></mml:mrow></mml:msub></mml:mtd></mml:mtr><mml:mtr><mml:mtd class="array"><mml:mn>0</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>0</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>1</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>0</mml:mn></mml:mtd></mml:mtr><mml:mtr><mml:mtd class="array"><mml:mn>0</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:msub><mml:mrow><mml:mi mathvariant="italic">b</mml:mi></mml:mrow><mml:mrow><mml:mn>6</mml:mn></mml:mrow></mml:msub><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>0</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:msub><mml:mrow><mml:mi mathvariant="italic">a</mml:mi></mml:mrow><mml:mrow><mml:mn>6</mml:mn></mml:mrow></mml:msub><mml:msub><mml:mrow><mml:mi mathvariant="italic">b</mml:mi></mml:mrow><mml:mrow><mml:mn>6</mml:mn></mml:mrow></mml:msub><mml:mo>+</mml:mo><mml:mn>1</mml:mn></mml:mtd></mml:mtr></mml:mtable></mml:mrow></mml:mfenced><mml:mo mathvariant="normal">,</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math>
<tex-math><![CDATA[\[\begin{aligned}{}& {M_{12}}=\left[\begin{array}{c@{\hskip4.0pt}c@{\hskip4.0pt}c@{\hskip4.0pt}c}1\hspace{1em}& {a_{1}}\hspace{1em}& 0\hspace{1em}& 0\\ {} {b_{1}}\hspace{1em}& {a_{1}}{b_{1}}+1\hspace{1em}& 0\hspace{1em}& 0\\ {} 0\hspace{1em}& 0\hspace{1em}& 1\hspace{1em}& 0\\ {} 0\hspace{1em}& 0\hspace{1em}& 0\hspace{1em}& 1\end{array}\right],\hspace{2em}{M_{23}}=\left[\begin{array}{c@{\hskip4.0pt}c@{\hskip4.0pt}c@{\hskip4.0pt}c}1\hspace{1em}& 0\hspace{1em}& 0\hspace{1em}& 0\\ {} 0\hspace{1em}& 1\hspace{1em}& {a_{2}}\hspace{1em}& 0\\ {} 0\hspace{1em}& {b_{2}}\hspace{1em}& {a_{2}}{b_{2}}+1\hspace{1em}& 0\\ {} 0\hspace{1em}& 0\hspace{1em}& 0\hspace{1em}& 1\end{array}\right],\\ {} & {M_{34}}=\left[\begin{array}{c@{\hskip4.0pt}c@{\hskip4.0pt}c@{\hskip4.0pt}c}1\hspace{1em}& 0\hspace{1em}& 0\hspace{1em}& 0\\ {} 0\hspace{1em}& 1\hspace{1em}& 0\hspace{1em}& 0\\ {} 0\hspace{1em}& 0\hspace{1em}& 1\hspace{1em}& {a_{3}}\\ {} 0\hspace{1em}& 0\hspace{1em}& {b_{3}}\hspace{1em}& {a_{3}}{b_{3}}+1\end{array}\right],\hspace{2em}{M_{41}}=\left[\begin{array}{c@{\hskip4.0pt}c@{\hskip4.0pt}c@{\hskip4.0pt}c}{a_{4}}{b_{4}}+1\hspace{1em}& 0\hspace{1em}& 0\hspace{1em}& {b_{4}}\\ {} 0\hspace{1em}& 1\hspace{1em}& 0\hspace{1em}& 0\\ {} 0\hspace{1em}& 0\hspace{1em}& 1\hspace{1em}& 0\\ {} {a_{4}}\hspace{1em}& 0\hspace{1em}& 0\hspace{1em}& 1\end{array}\right],\\ {} & {M_{31}}=\left[\begin{array}{c@{\hskip4.0pt}c@{\hskip4.0pt}c@{\hskip4.0pt}c}{a_{5}}{b_{5}}+1\hspace{1em}& 0\hspace{1em}& {a_{5}}\hspace{1em}& 0\\ {} 0\hspace{1em}& 1\hspace{1em}& 0\hspace{1em}& 0\\ {} {b_{5}}\hspace{1em}& 0\hspace{1em}& 1\hspace{1em}& 0\\ {} 0\hspace{1em}& 0\hspace{1em}& 0\hspace{1em}& 1\end{array}\right],\hspace{1em}\text{and}\hspace{1em}{M_{24}}=\left[\begin{array}{c@{\hskip4.0pt}c@{\hskip4.0pt}c@{\hskip4.0pt}c}1\hspace{1em}& 0\hspace{1em}& 0\hspace{1em}& 0\\ {} 0\hspace{1em}& 1\hspace{1em}& 0\hspace{1em}& {a_{6}}\\ {} 0\hspace{1em}& 0\hspace{1em}& 1\hspace{1em}& 0\\ {} 0\hspace{1em}& {b_{6}}\hspace{1em}& 0\hspace{1em}& {a_{6}}{b_{6}}+1\end{array}\right],\end{aligned}\]]]></tex-math></alternatives>
</disp-formula> 
where <inline-formula id="j_infor426_ineq_004"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">a</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:mo>…</mml:mo><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">a</mml:mi></mml:mrow><mml:mrow><mml:mn>6</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">b</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:mo>…</mml:mo><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">b</mml:mi></mml:mrow><mml:mrow><mml:mn>6</mml:mn></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${a_{1}},\dots ,{a_{6}},{b_{1}},\dots ,{b_{6}}$]]></tex-math></alternatives></inline-formula> are constant positive integers. Note that each <inline-formula id="j_infor426_ineq_005"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">M</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi><mml:mi mathvariant="italic">j</mml:mi></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${M_{ij}}$]]></tex-math></alternatives></inline-formula> is obtained from the identity matrix <inline-formula id="j_infor426_ineq_006"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">I</mml:mi></mml:mrow><mml:mrow><mml:mn>4</mml:mn></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${I_{4}}$]]></tex-math></alternatives></inline-formula> via replacing a <inline-formula id="j_infor426_ineq_007"><alternatives>
<mml:math><mml:mn>2</mml:mn><mml:mo>×</mml:mo><mml:mn>2</mml:mn></mml:math>
<tex-math><![CDATA[$2\times 2$]]></tex-math></alternatives></inline-formula> principal minor by the coefficient matrix of Eq. (<xref rid="j_infor426_eq_003">1</xref>) using parameters <inline-formula id="j_infor426_ineq_008"><alternatives>
<mml:math><mml:mi mathvariant="italic">a</mml:mi><mml:mo>=</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">a</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">k</mml:mi></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[$a={a_{k}}$]]></tex-math></alternatives></inline-formula> and <inline-formula id="j_infor426_ineq_009"><alternatives>
<mml:math><mml:mi mathvariant="italic">b</mml:mi><mml:mo>=</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">b</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">k</mml:mi></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[$b={b_{k}}$]]></tex-math></alternatives></inline-formula>. The <inline-formula id="j_infor426_ineq_010"><alternatives>
<mml:math><mml:mn>4</mml:mn><mml:mo>×</mml:mo><mml:mn>4</mml:mn></mml:math>
<tex-math><![CDATA[$4\times 4$]]></tex-math></alternatives></inline-formula> coefficient matrix is now defined to be 
<disp-formula id="j_infor426_eq_005">
<label>(2)</label><alternatives>
<mml:math display="block"><mml:mtable displaystyle="true"><mml:mtr><mml:mtd><mml:mi mathvariant="italic">A</mml:mi><mml:mo>=</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">M</mml:mi></mml:mrow><mml:mrow><mml:mn>12</mml:mn></mml:mrow></mml:msub><mml:msub><mml:mrow><mml:mi mathvariant="italic">M</mml:mi></mml:mrow><mml:mrow><mml:mn>23</mml:mn></mml:mrow></mml:msub><mml:msub><mml:mrow><mml:mi mathvariant="italic">M</mml:mi></mml:mrow><mml:mrow><mml:mn>34</mml:mn></mml:mrow></mml:msub><mml:msub><mml:mrow><mml:mi mathvariant="italic">M</mml:mi></mml:mrow><mml:mrow><mml:mn>41</mml:mn></mml:mrow></mml:msub><mml:msub><mml:mrow><mml:mi mathvariant="italic">M</mml:mi></mml:mrow><mml:mrow><mml:mn>31</mml:mn></mml:mrow></mml:msub><mml:msub><mml:mrow><mml:mi mathvariant="italic">M</mml:mi></mml:mrow><mml:mrow><mml:mn>24</mml:mn></mml:mrow></mml:msub><mml:mo>.</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math>
<tex-math><![CDATA[\[ A={M_{12}}{M_{23}}{M_{34}}{M_{41}}{M_{31}}{M_{24}}.\]]]></tex-math></alternatives>
</disp-formula> 
In turn, this matrix can be used in defining the 4D cat map 
<disp-formula id="j_infor426_eq_006">
<label>(3)</label><alternatives>
<mml:math display="block"><mml:mtable displaystyle="true"><mml:mtr><mml:mtd><mml:mfenced separators="" open="[" close="]"><mml:mrow><mml:mtable equalrows="false" equalcolumns="false" columnalign="center"><mml:mtr><mml:mtd class="array"><mml:msub><mml:mrow><mml:mi mathvariant="italic">x</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">n</mml:mi><mml:mo>+</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:mtd></mml:mtr><mml:mtr><mml:mtd class="array"><mml:msub><mml:mrow><mml:mi mathvariant="italic">y</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">n</mml:mi><mml:mo>+</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:mtd></mml:mtr><mml:mtr><mml:mtd class="array"><mml:msub><mml:mrow><mml:mi mathvariant="italic">z</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">n</mml:mi><mml:mo>+</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:mtd></mml:mtr><mml:mtr><mml:mtd class="array"><mml:msub><mml:mrow><mml:mi mathvariant="italic">w</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">n</mml:mi><mml:mo>+</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:mtd></mml:mtr></mml:mtable></mml:mrow></mml:mfenced><mml:mo>=</mml:mo><mml:mi mathvariant="italic">A</mml:mi><mml:mfenced separators="" open="[" close="]"><mml:mrow><mml:mtable equalrows="false" equalcolumns="false" columnalign="center"><mml:mtr><mml:mtd class="array"><mml:msub><mml:mrow><mml:mi mathvariant="italic">x</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">n</mml:mi></mml:mrow></mml:msub></mml:mtd></mml:mtr><mml:mtr><mml:mtd class="array"><mml:msub><mml:mrow><mml:mi mathvariant="italic">y</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">n</mml:mi></mml:mrow></mml:msub></mml:mtd></mml:mtr><mml:mtr><mml:mtd class="array"><mml:msub><mml:mrow><mml:mi mathvariant="italic">z</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">n</mml:mi></mml:mrow></mml:msub></mml:mtd></mml:mtr><mml:mtr><mml:mtd class="array"><mml:msub><mml:mrow><mml:mi mathvariant="italic">w</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">n</mml:mi></mml:mrow></mml:msub></mml:mtd></mml:mtr></mml:mtable></mml:mrow></mml:mfenced><mml:mspace width="0.3em"/><mml:mo>mod</mml:mo><mml:mspace width="0.3em"/><mml:mn>1</mml:mn><mml:mo>.</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math>
<tex-math><![CDATA[\[ \left[\begin{array}{c}{x_{n+1}}\\ {} {y_{n+1}}\\ {} {z_{n+1}}\\ {} {w_{n+1}}\end{array}\right]=A\left[\begin{array}{c}{x_{n}}\\ {} {y_{n}}\\ {} {z_{n}}\\ {} {w_{n}}\end{array}\right]\hspace{0.3em}\mathrm{mod} \hspace{0.3em}1.\]]]></tex-math></alternatives>
</disp-formula>
</p>
<p>It is easy to see that each matrix <inline-formula id="j_infor426_ineq_011"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">M</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi><mml:mi mathvariant="italic">j</mml:mi></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${M_{ij}}$]]></tex-math></alternatives></inline-formula> has determinant 1, thus <inline-formula id="j_infor426_ineq_012"><alternatives>
<mml:math><mml:mo movablelimits="false">det</mml:mo><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="italic">A</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:math>
<tex-math><![CDATA[$\det (A)=1$]]></tex-math></alternatives></inline-formula>. On the other hand, since this construction involves no subtraction, and since all its parameters are positive integers, each entry of the matrix <italic>A</italic> of Eq. (<xref rid="j_infor426_eq_005">2</xref>) is greater than or equal to its corresponding entry in the matrix <inline-formula id="j_infor426_ineq_013"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">A</mml:mi></mml:mrow><mml:mrow><mml:mn>0</mml:mn></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${A_{0}}$]]></tex-math></alternatives></inline-formula> obtained with all parameters set to 1: 
<disp-formula id="j_infor426_eq_007">
<alternatives>
<mml:math display="block"><mml:mtable displaystyle="true"><mml:mtr><mml:mtd><mml:msub><mml:mrow><mml:mi mathvariant="italic">A</mml:mi></mml:mrow><mml:mrow><mml:mn>0</mml:mn></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mfenced separators="" open="[" close="]"><mml:mrow><mml:mtable columnspacing="4.0pt 4.0pt 4.0pt" equalrows="false" columnlines="none none none" equalcolumns="false" columnalign="center center center center"><mml:mtr><mml:mtd class="array"><mml:mn>7</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>3</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>4</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>5</mml:mn></mml:mtd></mml:mtr><mml:mtr><mml:mtd class="array"><mml:mn>10</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>5</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>6</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>8</mml:mn></mml:mtd></mml:mtr><mml:mtr><mml:mtd class="array"><mml:mn>6</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>3</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>4</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>5</mml:mn></mml:mtd></mml:mtr><mml:mtr><mml:mtd class="array"><mml:mn>5</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>2</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>3</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>4</mml:mn></mml:mtd></mml:mtr></mml:mtable></mml:mrow></mml:mfenced><mml:mo>.</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math>
<tex-math><![CDATA[\[ {A_{0}}=\left[\begin{array}{c@{\hskip4.0pt}c@{\hskip4.0pt}c@{\hskip4.0pt}c}7\hspace{1em}& 3\hspace{1em}& 4\hspace{1em}& 5\\ {} 10\hspace{1em}& 5\hspace{1em}& 6\hspace{1em}& 8\\ {} 6\hspace{1em}& 3\hspace{1em}& 4\hspace{1em}& 5\\ {} 5\hspace{1em}& 2\hspace{1em}& 3\hspace{1em}& 4\end{array}\right].\]]]></tex-math></alternatives>
</disp-formula> 
In particular, <inline-formula id="j_infor426_ineq_014"><alternatives>
<mml:math><mml:mi mathvariant="normal">tr</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="italic">A</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo><mml:mo>⩾</mml:mo><mml:mi mathvariant="normal">tr</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">A</mml:mi></mml:mrow><mml:mrow><mml:mn>0</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo><mml:mo>=</mml:mo><mml:mn>20</mml:mn></mml:math>
<tex-math><![CDATA[$\mathrm{tr}(A)\geqslant \mathrm{tr}({A_{0}})=20$]]></tex-math></alternatives></inline-formula>. Now if <inline-formula id="j_infor426_ineq_015"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">λ</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">λ</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">λ</mml:mi></mml:mrow><mml:mrow><mml:mn>3</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">λ</mml:mi></mml:mrow><mml:mrow><mml:mn>4</mml:mn></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${\lambda _{1}},{\lambda _{2}},{\lambda _{3}},{\lambda _{4}}$]]></tex-math></alternatives></inline-formula> denote the (possibly complex) eigenvalues of <italic>A</italic>, then 
<disp-formula id="j_infor426_eq_008">
<alternatives>
<mml:math display="block"><mml:mtable displaystyle="true"><mml:mtr><mml:mtd><mml:msub><mml:mrow><mml:mi mathvariant="italic">λ</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:msub><mml:mrow><mml:mi mathvariant="italic">λ</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:msub><mml:mrow><mml:mi mathvariant="italic">λ</mml:mi></mml:mrow><mml:mrow><mml:mn>3</mml:mn></mml:mrow></mml:msub><mml:msub><mml:mrow><mml:mi mathvariant="italic">λ</mml:mi></mml:mrow><mml:mrow><mml:mn>4</mml:mn></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mo movablelimits="false">det</mml:mo><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="italic">A</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo><mml:mo>=</mml:mo><mml:mn>1</mml:mn><mml:mo mathvariant="normal">,</mml:mo><mml:mspace width="1em"/><mml:mtext>and</mml:mtext><mml:mspace width="1em"/><mml:msub><mml:mrow><mml:mi mathvariant="italic">λ</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo>+</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">λ</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mo>+</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">λ</mml:mi></mml:mrow><mml:mrow><mml:mn>3</mml:mn></mml:mrow></mml:msub><mml:mo>+</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">λ</mml:mi></mml:mrow><mml:mrow><mml:mn>4</mml:mn></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mi mathvariant="normal">tr</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="italic">A</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo><mml:mo>⩾</mml:mo><mml:mn>20.</mml:mn></mml:mtd></mml:mtr></mml:mtable></mml:math>
<tex-math><![CDATA[\[ {\lambda _{1}}{\lambda _{2}}{\lambda _{3}}{\lambda _{4}}=\det (A)=1,\hspace{1em}\text{and}\hspace{1em}{\lambda _{1}}+{\lambda _{2}}+{\lambda _{3}}+{\lambda _{4}}=\mathrm{tr}(A)\geqslant 20.\]]]></tex-math></alternatives>
</disp-formula> 
Thus at least one eigenvalue of <italic>A</italic> has modulus greater than 1, which justifies chaotic behaviour of the map of Eq. (<xref rid="j_infor426_eq_006">3</xref>). See Ott (<xref ref-type="bibr" rid="j_infor426_ref_040">2002</xref>), Hua <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor426_ref_022">2017</xref>), Wang <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor426_ref_050">2018</xref>) for more information.</p>
<p>For all the experimental results presented in this work, we use the values 
<disp-formula id="j_infor426_eq_009">
<alternatives>
<mml:math display="block"><mml:mtable displaystyle="true" columnalign="right left" columnspacing="0pt"><mml:mtr><mml:mtd class="align-odd"/><mml:mtd class="align-even"><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">a</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">a</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">a</mml:mi></mml:mrow><mml:mrow><mml:mn>3</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">a</mml:mi></mml:mrow><mml:mrow><mml:mn>4</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">a</mml:mi></mml:mrow><mml:mrow><mml:mn>5</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">a</mml:mi></mml:mrow><mml:mrow><mml:mn>6</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo><mml:mo>=</mml:mo><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mn>1</mml:mn><mml:mo mathvariant="normal">,</mml:mo><mml:mn>2</mml:mn><mml:mo mathvariant="normal">,</mml:mo><mml:mn>3</mml:mn><mml:mo mathvariant="normal">,</mml:mo><mml:mn>1</mml:mn><mml:mo mathvariant="normal">,</mml:mo><mml:mn>7</mml:mn><mml:mo mathvariant="normal">,</mml:mo><mml:mn>11</mml:mn><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo><mml:mspace width="1em"/><mml:mtext>and</mml:mtext></mml:mtd></mml:mtr><mml:mtr><mml:mtd class="align-odd"/><mml:mtd class="align-even"><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">b</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">b</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">b</mml:mi></mml:mrow><mml:mrow><mml:mn>3</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">b</mml:mi></mml:mrow><mml:mrow><mml:mn>4</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">b</mml:mi></mml:mrow><mml:mrow><mml:mn>5</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">b</mml:mi></mml:mrow><mml:mrow><mml:mn>6</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo><mml:mo>=</mml:mo><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mn>2</mml:mn><mml:mo mathvariant="normal">,</mml:mo><mml:mn>1</mml:mn><mml:mo mathvariant="normal">,</mml:mo><mml:mn>3</mml:mn><mml:mo mathvariant="normal">,</mml:mo><mml:mn>5</mml:mn><mml:mo mathvariant="normal">,</mml:mo><mml:mn>3</mml:mn><mml:mo mathvariant="normal">,</mml:mo><mml:mn>3</mml:mn><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math>
<tex-math><![CDATA[\[\begin{aligned}{}& ({a_{1}},{a_{2}},{a_{3}},{a_{4}},{a_{5}},{a_{6}})=(1,2,3,1,7,11)\hspace{1em}\text{and}\\ {} & ({b_{1}},{b_{2}},{b_{3}},{b_{4}},{b_{5}},{b_{6}})=(2,1,3,5,3,3)\end{aligned}\]]]></tex-math></alternatives>
</disp-formula> 
for the control parameters of the 4D cat map, while yield the coefficients matrix 
<disp-formula id="j_infor426_eq_010">
<label>(4)</label><alternatives>
<mml:math display="block"><mml:mtable displaystyle="true"><mml:mtr><mml:mtd><mml:mi mathvariant="italic">A</mml:mi><mml:mo>=</mml:mo><mml:mfenced separators="" open="[" close="]"><mml:mrow><mml:mtable columnspacing="4.0pt 4.0pt 4.0pt" equalrows="false" columnlines="none none none" equalcolumns="false" columnalign="center center center center"><mml:mtr><mml:mtd class="array"><mml:mn>270</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>34</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>86</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>385</mml:mn></mml:mtd></mml:mtr><mml:mtr><mml:mtd class="array"><mml:mn>678</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>87</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>216</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>985</mml:mn></mml:mtd></mml:mtr><mml:mtr><mml:mtd class="array"><mml:mn>207</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>28</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>66</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>317</mml:mn></mml:mtd></mml:mtr><mml:mtr><mml:mtd class="array"><mml:mn>229</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>30</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>73</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>340</mml:mn></mml:mtd></mml:mtr></mml:mtable></mml:mrow></mml:mfenced><mml:mo mathvariant="normal">,</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math>
<tex-math><![CDATA[\[ A=\left[\begin{array}{c@{\hskip4.0pt}c@{\hskip4.0pt}c@{\hskip4.0pt}c}270\hspace{1em}& 34\hspace{1em}& 86\hspace{1em}& 385\\ {} 678\hspace{1em}& 87\hspace{1em}& 216\hspace{1em}& 985\\ {} 207\hspace{1em}& 28\hspace{1em}& 66\hspace{1em}& 317\\ {} 229\hspace{1em}& 30\hspace{1em}& 73\hspace{1em}& 340\end{array}\right],\]]]></tex-math></alternatives>
</disp-formula> 
whose eigenvalues are 
<disp-formula id="j_infor426_eq_011">
<alternatives>
<mml:math display="block"><mml:mtable displaystyle="true"><mml:mtr><mml:mtd><mml:msub><mml:mrow><mml:mi mathvariant="italic">λ</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo stretchy="false">≈</mml:mo><mml:mn>758.8966</mml:mn><mml:mo mathvariant="normal">,</mml:mo><mml:mspace width="2em"/><mml:msub><mml:mrow><mml:mi mathvariant="italic">λ</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mo stretchy="false">≈</mml:mo><mml:mn>4.1140</mml:mn><mml:mo mathvariant="normal">,</mml:mo><mml:mspace width="1em"/><mml:mtext>and</mml:mtext><mml:mspace width="1em"/><mml:msub><mml:mrow><mml:mi mathvariant="italic">λ</mml:mi></mml:mrow><mml:mrow><mml:mn>3</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">λ</mml:mi></mml:mrow><mml:mrow><mml:mn>4</mml:mn></mml:mrow></mml:msub><mml:mo stretchy="false">≈</mml:mo><mml:mo>−</mml:mo><mml:mn>0.0053</mml:mn><mml:mo>±</mml:mo><mml:mn>0.0171</mml:mn><mml:mspace width="0.1667em"/><mml:mi mathvariant="italic">i</mml:mi><mml:mo>.</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math>
<tex-math><![CDATA[\[ {\lambda _{1}}\approx 758.8966,\hspace{2em}{\lambda _{2}}\approx 4.1140,\hspace{1em}\text{and}\hspace{1em}{\lambda _{3}},{\lambda _{4}}\approx -0.0053\pm 0.0171\hspace{0.1667em}i.\]]]></tex-math></alternatives>
</disp-formula> 
Since <italic>A</italic> has more than one eigenvalue greater than 1, the 4D cat map of Eq. (<xref rid="j_infor426_eq_006">3</xref>) exhibits hyper-chaotic behaviour (Hua <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor426_ref_022">2017</xref>).</p>
</sec>
<sec id="j_infor426_s_003">
<label>3</label>
<title>Description of the Proposed Scheme Pr-IES</title>
<p>In this work, we propose an image encryption scheme that follows Fridrich’s approach. The proposed scheme consists of three phases (i) a preprocessing phase for reshaping the input image, (ii) a shuffling phase for destroying any correlation between adjacent intensity values, and (iii) a masking phase that acts on the shuffle-image to change its intensity values in such a way that a tiny change in one intensity value spreads out to almost all intensity values in the cipher-image. Algorithm <xref rid="j_infor426_fig_001">1</xref> depicts the phases of the proposed image encryption scheme.</p>
<fig id="j_infor426_fig_001">
<label>Algorithm 1</label>
<caption>
<p>The proposed image encryption scheme Pr-IES</p>
</caption>
<graphic xlink:href="infor426_g001.jpg"/>
</fig>
<sec id="j_infor426_s_004">
<label>3.1</label>
<title>The Preprocessing Phase</title>
<p>The size of the input image plays an important role in the performance of the proposed scheme. In the preprocessing phase, the input image <italic>J</italic>, typically a 2D (for grayscale images) or 3D (for colour images) array of bytes, is reshaped into an almost square 2D matrix <inline-formula id="j_infor426_ineq_016"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">J</mml:mi></mml:mrow><mml:mrow><mml:mn>0</mml:mn></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${J_{0}}$]]></tex-math></alternatives></inline-formula>. This step is necessary if the number of rows of the 2D matrix is more than twice the number of columns or vice versa. If this condition is not attainable (e.g. if the number of rows and columns of <italic>J</italic> are primes far apart), then a padding scheme can be applied to the input image. We refer to the number of rows and columns of the resulting matrix <inline-formula id="j_infor426_ineq_017"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">J</mml:mi></mml:mrow><mml:mrow><mml:mn>0</mml:mn></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${J_{0}}$]]></tex-math></alternatives></inline-formula> from the preprocessing phase by <italic>m</italic> and <italic>n</italic>, respectively.</p>
</sec>
<sec id="j_infor426_s_005">
<label>3.2</label>
<title>The Shuffling Phase</title>
<p>This phase aims to destroy correlations between adjacent pixels in the input image. It performs an <inline-formula id="j_infor426_ineq_018"><alternatives>
<mml:math><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="italic">a</mml:mi><mml:mo mathvariant="normal">,</mml:mo><mml:mi mathvariant="italic">b</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math>
<tex-math><![CDATA[$(a,b)$]]></tex-math></alternatives></inline-formula>-circular shift on the matrix at hand in conjunction with a zigzag reordering of the entries. By an <inline-formula id="j_infor426_ineq_019"><alternatives>
<mml:math><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="italic">a</mml:mi><mml:mo mathvariant="normal">,</mml:mo><mml:mi mathvariant="italic">b</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math>
<tex-math><![CDATA[$(a,b)$]]></tex-math></alternatives></inline-formula>-circular shift we mean shifting all entries of the matrix <inline-formula id="j_infor426_ineq_020"><alternatives>
<mml:math><mml:mi mathvariant="italic">a</mml:mi><mml:mo>−</mml:mo><mml:mn>1</mml:mn></mml:math>
<tex-math><![CDATA[$a-1$]]></tex-math></alternatives></inline-formula> places up and <inline-formula id="j_infor426_ineq_021"><alternatives>
<mml:math><mml:mi mathvariant="italic">b</mml:mi><mml:mo>−</mml:mo><mml:mn>1</mml:mn></mml:math>
<tex-math><![CDATA[$b-1$]]></tex-math></alternatives></inline-formula> places left, so that the <inline-formula id="j_infor426_ineq_022"><alternatives>
<mml:math><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="italic">a</mml:mi><mml:mo mathvariant="normal">,</mml:mo><mml:mi mathvariant="italic">b</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math>
<tex-math><![CDATA[$(a,b)$]]></tex-math></alternatives></inline-formula>-entry is moved to the <inline-formula id="j_infor426_ineq_023"><alternatives>
<mml:math><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mn>1</mml:mn><mml:mo mathvariant="normal">,</mml:mo><mml:mn>1</mml:mn><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math>
<tex-math><![CDATA[$(1,1)$]]></tex-math></alternatives></inline-formula> position. Note that entries exiting the matrix from the top or from the left, enter from the opposite side in a circular fashion. This phase requires <inline-formula id="j_infor426_ineq_024"><alternatives>
<mml:math><mml:mn>2</mml:mn><mml:mi mathvariant="italic">r</mml:mi></mml:math>
<tex-math><![CDATA[$2r$]]></tex-math></alternatives></inline-formula> pseudorandom numbers, where <italic>r</italic> is the number of rounds. These numbers can be obtained from a chaotic map such as the skew tent map 
<disp-formula id="j_infor426_eq_012">
<alternatives>
<mml:math display="block"><mml:mtable displaystyle="true"><mml:mtr><mml:mtd><mml:msub><mml:mrow><mml:mi mathvariant="italic">u</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi><mml:mo>+</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mfenced separators="" open="{" close=""><mml:mrow><mml:mtable columnspacing="4.0pt" equalrows="false" columnlines="none" equalcolumns="false" columnalign="left left"><mml:mtr><mml:mtd class="array"><mml:mstyle displaystyle="false"><mml:mfrac><mml:mrow><mml:msub><mml:mrow><mml:mi mathvariant="italic">u</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mrow><mml:mi mathvariant="italic">p</mml:mi></mml:mrow></mml:mfrac></mml:mstyle><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mtext>if</mml:mtext><mml:mspace width="2.5pt"/><mml:msub><mml:mrow><mml:mi mathvariant="italic">u</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub><mml:mo>⩽</mml:mo><mml:mi mathvariant="italic">p</mml:mi><mml:mo mathvariant="normal">,</mml:mo></mml:mtd></mml:mtr><mml:mtr><mml:mtd class="array"><mml:mstyle displaystyle="false"><mml:mfrac><mml:mrow><mml:mn>1</mml:mn><mml:mo>−</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">u</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mrow><mml:mn>1</mml:mn><mml:mo>−</mml:mo><mml:mi mathvariant="italic">p</mml:mi></mml:mrow></mml:mfrac></mml:mstyle><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mtext>if</mml:mtext><mml:mspace width="2.5pt"/><mml:msub><mml:mrow><mml:mi mathvariant="italic">u</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub><mml:mo mathvariant="normal">&gt;</mml:mo><mml:mi mathvariant="italic">p</mml:mi><mml:mo mathvariant="normal">,</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:mrow></mml:mfenced></mml:mtd></mml:mtr></mml:mtable></mml:math>
<tex-math><![CDATA[\[ {u_{i+1}}=\left\{\begin{array}{l@{\hskip4.0pt}l}\frac{{u_{i}}}{p}\hspace{1em}& \text{if}\hspace{2.5pt}{u_{i}}\leqslant p,\\ {} \frac{1-{u_{i}}}{1-p}\hspace{1em}& \text{if}\hspace{2.5pt}{u_{i}}>p,\end{array}\right.\]]]></tex-math></alternatives>
</disp-formula> 
where <inline-formula id="j_infor426_ineq_025"><alternatives>
<mml:math><mml:mi mathvariant="italic">p</mml:mi><mml:mo stretchy="false">∈</mml:mo><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mn>0</mml:mn><mml:mo mathvariant="normal">,</mml:mo><mml:mn>1</mml:mn><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math>
<tex-math><![CDATA[$p\in (0,1)$]]></tex-math></alternatives></inline-formula> is a control parameter and <inline-formula id="j_infor426_ineq_026"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">u</mml:mi></mml:mrow><mml:mrow><mml:mn>0</mml:mn></mml:mrow></mml:msub><mml:mo stretchy="false">∈</mml:mo><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mn>0</mml:mn><mml:mo mathvariant="normal">,</mml:mo><mml:mn>1</mml:mn><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math>
<tex-math><![CDATA[${u_{0}}\in (0,1)$]]></tex-math></alternatives></inline-formula>. The skew tent map is widely used in cryptographic applications (Alvarez and Li, <xref ref-type="bibr" rid="j_infor426_ref_001">2006</xref>; Ghebleh <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor426_ref_015">2014a</xref>). Algorithm <xref rid="j_infor426_fig_002">2</xref> depicts the shuffling phase of the proposed image encryption scheme.</p>
<fig id="j_infor426_fig_002">
<label>Algorithm 2</label>
<caption>
<p>The shuffling of the matrix <inline-formula id="j_infor426_ineq_027"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">J</mml:mi></mml:mrow><mml:mrow><mml:mn>0</mml:mn></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${J_{0}}$]]></tex-math></alternatives></inline-formula></p>
</caption>
<graphic xlink:href="infor426_g002.jpg"/>
</fig>
<p>To illustrate the shuffling phase, we present a one round toy example on the <inline-formula id="j_infor426_ineq_028"><alternatives>
<mml:math><mml:mn>4</mml:mn><mml:mo>×</mml:mo><mml:mn>5</mml:mn></mml:math>
<tex-math><![CDATA[$4\times 5$]]></tex-math></alternatives></inline-formula> matrix 
<disp-formula id="j_infor426_eq_013">
<alternatives>
<mml:math display="block"><mml:mtable displaystyle="true"><mml:mtr><mml:mtd><mml:msub><mml:mrow><mml:mi mathvariant="italic">P</mml:mi></mml:mrow><mml:mrow><mml:mn>0</mml:mn></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">J</mml:mi></mml:mrow><mml:mrow><mml:mn>0</mml:mn></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mfenced separators="" open="[" close="]"><mml:mrow><mml:mtable columnspacing="4.0pt 4.0pt 4.0pt 4.0pt" equalrows="false" columnlines="none none none none" equalcolumns="false" columnalign="center center center center center"><mml:mtr><mml:mtd class="array"><mml:mn>1</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>2</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>3</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>4</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>5</mml:mn></mml:mtd></mml:mtr><mml:mtr><mml:mtd class="array"><mml:mn>6</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>7</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>8</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>9</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>10</mml:mn></mml:mtd></mml:mtr><mml:mtr><mml:mtd class="array"><mml:mn>11</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>12</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>13</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>14</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>15</mml:mn></mml:mtd></mml:mtr><mml:mtr><mml:mtd class="array"><mml:mn>16</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>17</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>18</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>19</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>20</mml:mn></mml:mtd></mml:mtr></mml:mtable></mml:mrow></mml:mfenced><mml:mo>.</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math>
<tex-math><![CDATA[\[ {P_{0}}={J_{0}}=\left[\begin{array}{c@{\hskip4.0pt}c@{\hskip4.0pt}c@{\hskip4.0pt}c@{\hskip4.0pt}c}1\hspace{1em}& 2\hspace{1em}& 3\hspace{1em}& 4\hspace{1em}& 5\\ {} 6\hspace{1em}& 7\hspace{1em}& 8\hspace{1em}& 9\hspace{1em}& 10\\ {} 11\hspace{1em}& 12\hspace{1em}& 13\hspace{1em}& 14\hspace{1em}& 15\\ {} 16\hspace{1em}& 17\hspace{1em}& 18\hspace{1em}& 19\hspace{1em}& 20\end{array}\right].\]]]></tex-math></alternatives>
</disp-formula> 
Suppose <inline-formula id="j_infor426_ineq_029"><alternatives>
<mml:math><mml:mi mathvariant="italic">a</mml:mi><mml:mo>=</mml:mo><mml:mn>4</mml:mn></mml:math>
<tex-math><![CDATA[$a=4$]]></tex-math></alternatives></inline-formula> and <inline-formula id="j_infor426_ineq_030"><alternatives>
<mml:math><mml:mi mathvariant="italic">b</mml:mi><mml:mo>=</mml:mo><mml:mn>3</mml:mn></mml:math>
<tex-math><![CDATA[$b=3$]]></tex-math></alternatives></inline-formula>. Performing a <inline-formula id="j_infor426_ineq_031"><alternatives>
<mml:math><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mn>4</mml:mn><mml:mo mathvariant="normal">,</mml:mo><mml:mn>3</mml:mn><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math>
<tex-math><![CDATA[$(4,3)$]]></tex-math></alternatives></inline-formula>–circular shift on the matrix <inline-formula id="j_infor426_ineq_032"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">J</mml:mi></mml:mrow><mml:mrow><mml:mn>0</mml:mn></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${J_{0}}$]]></tex-math></alternatives></inline-formula> gives 
<disp-formula id="j_infor426_eq_014">
<alternatives>
<mml:math display="block"><mml:mtable displaystyle="true"><mml:mtr><mml:mtd><mml:msub><mml:mrow><mml:mi mathvariant="italic">T</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mfenced separators="" open="[" close="]"><mml:mrow><mml:mtable columnspacing="4.0pt 4.0pt 4.0pt 4.0pt" equalrows="false" columnlines="none none none none" equalcolumns="false" columnalign="center center center center center"><mml:mtr><mml:mtd class="array"><mml:mn>18</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>19</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>20</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>16</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>17</mml:mn></mml:mtd></mml:mtr><mml:mtr><mml:mtd class="array"><mml:mn>3</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>4</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>5</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>1</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>2</mml:mn></mml:mtd></mml:mtr><mml:mtr><mml:mtd class="array"><mml:mn>8</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>9</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>10</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>6</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>7</mml:mn></mml:mtd></mml:mtr><mml:mtr><mml:mtd class="array"><mml:mn>13</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>14</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>15</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>11</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>12</mml:mn></mml:mtd></mml:mtr></mml:mtable></mml:mrow></mml:mfenced><mml:mo>.</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math>
<tex-math><![CDATA[\[ {T_{1}}=\left[\begin{array}{c@{\hskip4.0pt}c@{\hskip4.0pt}c@{\hskip4.0pt}c@{\hskip4.0pt}c}18\hspace{1em}& 19\hspace{1em}& 20\hspace{1em}& 16\hspace{1em}& 17\\ {} 3\hspace{1em}& 4\hspace{1em}& 5\hspace{1em}& 1\hspace{1em}& 2\\ {} 8\hspace{1em}& 9\hspace{1em}& 10\hspace{1em}& 6\hspace{1em}& 7\\ {} 13\hspace{1em}& 14\hspace{1em}& 15\hspace{1em}& 11\hspace{1em}& 12\end{array}\right].\]]]></tex-math></alternatives>
</disp-formula>
</p>
<p>Traverse <inline-formula id="j_infor426_ineq_033"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">T</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${T_{1}}$]]></tex-math></alternatives></inline-formula> in a zigzag order as follows</p><graphic xlink:href="infor426_g003.jpg"/>
<p>This gives the 1D array 
<disp-formula id="j_infor426_eq_015">
<alternatives>
<mml:math display="block"><mml:mtable displaystyle="true"><mml:mtr><mml:mtd><mml:msub><mml:mrow><mml:mi mathvariant="italic">T</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mo fence="true" stretchy="false">[</mml:mo><mml:mn>18</mml:mn><mml:mspace width="2.5pt"/><mml:mspace width="2.5pt"/><mml:mn>19</mml:mn><mml:mspace width="2.5pt"/><mml:mspace width="2.5pt"/><mml:mn>3</mml:mn><mml:mspace width="2.5pt"/><mml:mspace width="2.5pt"/><mml:mn>8</mml:mn><mml:mspace width="2.5pt"/><mml:mspace width="2.5pt"/><mml:mn>4</mml:mn><mml:mspace width="2.5pt"/><mml:mspace width="2.5pt"/><mml:mn>20</mml:mn><mml:mspace width="2.5pt"/><mml:mspace width="2.5pt"/><mml:mn>16</mml:mn><mml:mspace width="2.5pt"/><mml:mspace width="2.5pt"/><mml:mn>5</mml:mn><mml:mspace width="2.5pt"/><mml:mspace width="2.5pt"/><mml:mn>9</mml:mn><mml:mspace width="2.5pt"/><mml:mspace width="2.5pt"/><mml:mn>13</mml:mn><mml:mspace width="2.5pt"/><mml:mspace width="2.5pt"/><mml:mn>14</mml:mn><mml:mspace width="2.5pt"/><mml:mspace width="2.5pt"/><mml:mn>10</mml:mn><mml:mspace width="2.5pt"/><mml:mspace width="2.5pt"/><mml:mn>1</mml:mn><mml:mspace width="2.5pt"/><mml:mspace width="2.5pt"/><mml:mn>17</mml:mn><mml:mspace width="2.5pt"/><mml:mspace width="2.5pt"/><mml:mn>2</mml:mn><mml:mspace width="2.5pt"/><mml:mspace width="2.5pt"/><mml:mn>6</mml:mn><mml:mspace width="2.5pt"/><mml:mspace width="2.5pt"/><mml:mn>15</mml:mn><mml:mspace width="2.5pt"/><mml:mspace width="2.5pt"/><mml:mn>11</mml:mn><mml:mspace width="2.5pt"/><mml:mspace width="2.5pt"/><mml:mn>7</mml:mn><mml:mspace width="2.5pt"/><mml:mspace width="2.5pt"/><mml:mn>12</mml:mn><mml:mo fence="true" stretchy="false">]</mml:mo><mml:mo>.</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math>
<tex-math><![CDATA[\[ {T_{2}}=[18\hspace{2.5pt}\hspace{2.5pt}19\hspace{2.5pt}\hspace{2.5pt}3\hspace{2.5pt}\hspace{2.5pt}8\hspace{2.5pt}\hspace{2.5pt}4\hspace{2.5pt}\hspace{2.5pt}20\hspace{2.5pt}\hspace{2.5pt}16\hspace{2.5pt}\hspace{2.5pt}5\hspace{2.5pt}\hspace{2.5pt}9\hspace{2.5pt}\hspace{2.5pt}13\hspace{2.5pt}\hspace{2.5pt}14\hspace{2.5pt}\hspace{2.5pt}10\hspace{2.5pt}\hspace{2.5pt}1\hspace{2.5pt}\hspace{2.5pt}17\hspace{2.5pt}\hspace{2.5pt}2\hspace{2.5pt}\hspace{2.5pt}6\hspace{2.5pt}\hspace{2.5pt}15\hspace{2.5pt}\hspace{2.5pt}11\hspace{2.5pt}\hspace{2.5pt}7\hspace{2.5pt}\hspace{2.5pt}12].\]]]></tex-math></alternatives>
</disp-formula> 
Reshaping <inline-formula id="j_infor426_ineq_034"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">T</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${T_{2}}$]]></tex-math></alternatives></inline-formula> back to <inline-formula id="j_infor426_ineq_035"><alternatives>
<mml:math><mml:mn>4</mml:mn><mml:mo>×</mml:mo><mml:mn>5</mml:mn></mml:math>
<tex-math><![CDATA[$4\times 5$]]></tex-math></alternatives></inline-formula> matrix yields 
<disp-formula id="j_infor426_eq_016">
<alternatives>
<mml:math display="block"><mml:mtable displaystyle="true"><mml:mtr><mml:mtd><mml:msub><mml:mrow><mml:mi mathvariant="italic">P</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mfenced separators="" open="[" close="]"><mml:mrow><mml:mtable columnspacing="4.0pt 4.0pt 4.0pt 4.0pt" equalrows="false" columnlines="none none none none" equalcolumns="false" columnalign="center center center center center"><mml:mtr><mml:mtd class="array"><mml:mn>18</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>4</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>9</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>1</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>15</mml:mn></mml:mtd></mml:mtr><mml:mtr><mml:mtd class="array"><mml:mn>19</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>20</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>13</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>17</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>11</mml:mn></mml:mtd></mml:mtr><mml:mtr><mml:mtd class="array"><mml:mn>3</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>16</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>14</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>2</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>7</mml:mn></mml:mtd></mml:mtr><mml:mtr><mml:mtd class="array"><mml:mn>8</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>5</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>10</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>6</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>12</mml:mn></mml:mtd></mml:mtr></mml:mtable></mml:mrow></mml:mfenced><mml:mo>.</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math>
<tex-math><![CDATA[\[ {P_{1}}=\left[\begin{array}{c@{\hskip4.0pt}c@{\hskip4.0pt}c@{\hskip4.0pt}c@{\hskip4.0pt}c}18\hspace{1em}& 4\hspace{1em}& 9\hspace{1em}& 1\hspace{1em}& 15\\ {} 19\hspace{1em}& 20\hspace{1em}& 13\hspace{1em}& 17\hspace{1em}& 11\\ {} 3\hspace{1em}& 16\hspace{1em}& 14\hspace{1em}& 2\hspace{1em}& 7\\ {} 8\hspace{1em}& 5\hspace{1em}& 10\hspace{1em}& 6\hspace{1em}& 12\end{array}\right].\]]]></tex-math></alternatives>
</disp-formula>
</p>
</sec>
<sec id="j_infor426_s_006">
<label>3.3</label>
<title>The Masking Phase</title>
<p>The masking phase acts on the shuffled matrix <inline-formula id="j_infor426_ineq_036"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">J</mml:mi></mml:mrow><mml:mrow><mml:mtext>shuffled</mml:mtext></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${J_{\text{shuffled}}}$]]></tex-math></alternatives></inline-formula>. It masks the rows and columns of <inline-formula id="j_infor426_ineq_037"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">J</mml:mi></mml:mrow><mml:mrow><mml:mtext>shuffled</mml:mtext></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${J_{\text{shuffled}}}$]]></tex-math></alternatives></inline-formula> using entries of matrices <inline-formula id="j_infor426_ineq_038"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="normal">Ω</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="normal">Ω</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:mo>…</mml:mo><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="normal">Ω</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">s</mml:mi></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${\Omega _{1}},{\Omega _{2}},\dots ,{\Omega _{s}}$]]></tex-math></alternatives></inline-formula> consisting of pseudorandom bytes (integers in <inline-formula id="j_infor426_ineq_039"><alternatives>
<mml:math><mml:mo fence="true" stretchy="false">[</mml:mo><mml:mn>0</mml:mn><mml:mo mathvariant="normal">,</mml:mo><mml:mn>255</mml:mn><mml:mo fence="true" stretchy="false">]</mml:mo></mml:math>
<tex-math><![CDATA[$[0,255]$]]></tex-math></alternatives></inline-formula>) derived from output sequences of the 4D cat map defined in Eq. (<xref rid="j_infor426_eq_006">3</xref>). More specifically, each <inline-formula id="j_infor426_ineq_040"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="normal">Ω</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">k</mml:mi></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${\Omega _{k}}$]]></tex-math></alternatives></inline-formula> is a <inline-formula id="j_infor426_ineq_041"><alternatives>
<mml:math><mml:mn>4</mml:mn><mml:mo>×</mml:mo><mml:mi>ℓ</mml:mi></mml:math>
<tex-math><![CDATA[$4\times \ell $]]></tex-math></alternatives></inline-formula> matrix of bytes where <inline-formula id="j_infor426_ineq_042"><alternatives>
<mml:math><mml:mn>4</mml:mn><mml:mi>ℓ</mml:mi></mml:math>
<tex-math><![CDATA[$4\ell $]]></tex-math></alternatives></inline-formula> is greater than or equal to the number of entries of <inline-formula id="j_infor426_ineq_043"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">J</mml:mi></mml:mrow><mml:mrow><mml:mtext>shuffled</mml:mtext></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${J_{\text{shuffled}}}$]]></tex-math></alternatives></inline-formula>. Columns of <inline-formula id="j_infor426_ineq_044"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="normal">Ω</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${\Omega _{1}}$]]></tex-math></alternatives></inline-formula> are generated via iterations of the 4D cat map with chosen control parameters. For <inline-formula id="j_infor426_ineq_045"><alternatives>
<mml:math><mml:mn>2</mml:mn><mml:mo>⩽</mml:mo><mml:mi mathvariant="italic">k</mml:mi><mml:mo>⩽</mml:mo><mml:mi mathvariant="italic">s</mml:mi></mml:math>
<tex-math><![CDATA[$2\leqslant k\leqslant s$]]></tex-math></alternatives></inline-formula>, we define <inline-formula id="j_infor426_ineq_046"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="normal">Ω</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">k</mml:mi></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${\Omega _{k}}$]]></tex-math></alternatives></inline-formula> by applying a (possibly different) 4D cat map to columns of <inline-formula id="j_infor426_ineq_047"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="normal">Ω</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">k</mml:mi><mml:mo>−</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${\Omega _{k-1}}$]]></tex-math></alternatives></inline-formula>. It is demonstrated in Subsection <xref rid="j_infor426_s_007">3.4</xref> that this transition of matrices preserves pseudorandomness of entries. The masking phase also mixes the rows and the columns of the image at hand using measures of central tendency. Algorithm (<xref rid="j_infor426_fig_003">3</xref>) presents a detailed description of the masking phase.</p>
<fig id="j_infor426_fig_003">
<label>Algorithm 3</label>
<caption>
<p>Generation of the scrambled matrix <inline-formula id="j_infor426_ineq_048"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">J</mml:mi></mml:mrow><mml:mrow><mml:mtext>masked</mml:mtext></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${J_{\text{masked}}}$]]></tex-math></alternatives></inline-formula></p>
</caption>
<graphic xlink:href="infor426_g004.jpg"/>
</fig>
</sec>
<sec id="j_infor426_s_007">
<label>3.4</label>
<title>Randomness of the Masking Matrices</title>
<p>In Bassham <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor426_ref_003">2010</xref>), the National Institute of Standards and Technology (NIST) proposes a Statistical Test Suite (STS) which is one of the most popular tools for validation of random number generators and pseudorandom number generators for cryptographic applications. To assess randomness of their entries, we subject the matrices <inline-formula id="j_infor426_ineq_049"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="normal">Ω</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="normal">Ω</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:mo>…</mml:mo><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="normal">Ω</mml:mi></mml:mrow><mml:mrow><mml:mn>50</mml:mn></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${\Omega _{1}},{\Omega _{2}},\dots ,{\Omega _{50}}$]]></tex-math></alternatives></inline-formula> constructed in 50 rounds of Algorithm <xref rid="j_infor426_fig_003">3</xref> to the STS. These matrices are computed using the 4D cat map coefficient matrix <italic>A</italic> of Eq. (<xref rid="j_infor426_eq_006">3</xref>) which is used also as the transition matrix in all rounds. That is, <inline-formula id="j_infor426_ineq_050"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">A</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">A</mml:mi></mml:mrow><mml:mrow><mml:mn>3</mml:mn></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mo stretchy="false">⋯</mml:mo><mml:mo>=</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">A</mml:mi></mml:mrow><mml:mrow><mml:mn>50</mml:mn></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mi mathvariant="italic">A</mml:mi></mml:math>
<tex-math><![CDATA[${A_{2}}={A_{3}}=\cdots ={A_{50}}=A$]]></tex-math></alternatives></inline-formula>. Further parameters used in the generation of these matrices are <inline-formula id="j_infor426_ineq_051"><alternatives>
<mml:math><mml:mi mathvariant="italic">m</mml:mi><mml:mo>=</mml:mo><mml:mn>256</mml:mn></mml:math>
<tex-math><![CDATA[$m=256$]]></tex-math></alternatives></inline-formula>, <inline-formula id="j_infor426_ineq_052"><alternatives>
<mml:math><mml:mi mathvariant="italic">n</mml:mi><mml:mo>=</mml:mo><mml:mn>512</mml:mn></mml:math>
<tex-math><![CDATA[$n=512$]]></tex-math></alternatives></inline-formula>, and randomized initial condition <inline-formula id="j_infor426_ineq_053"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="bold">x</mml:mi></mml:mrow><mml:mrow><mml:mn>0</mml:mn></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${\mathbf{x}_{0}}$]]></tex-math></alternatives></inline-formula>. Hence each <inline-formula id="j_infor426_ineq_054"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="normal">Ω</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">k</mml:mi></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${\Omega _{k}}$]]></tex-math></alternatives></inline-formula> is a <inline-formula id="j_infor426_ineq_055"><alternatives>
<mml:math><mml:mn>4</mml:mn><mml:mo>×</mml:mo><mml:mn>32768</mml:mn></mml:math>
<tex-math><![CDATA[$4\times 32768$]]></tex-math></alternatives></inline-formula> matrix, which is passed to the STS as a sequence of 1048576 bits. Table <xref rid="j_infor426_tab_001">1</xref> presents the results generated by the STS. On the basis of these results, we conclude that the matrices <inline-formula id="j_infor426_ineq_056"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="normal">Ω</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="normal">Ω</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:mo>…</mml:mo><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="normal">Ω</mml:mi></mml:mrow><mml:mrow><mml:mn>50</mml:mn></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${\Omega _{1}},{\Omega _{2}},\dots ,{\Omega _{50}}$]]></tex-math></alternatives></inline-formula> all possess excellent randomness properties.</p>
<table-wrap id="j_infor426_tab_001">
<label>Table 1</label>
<caption>
<p>Statistical Test Suite results for a matrix <inline-formula id="j_infor426_ineq_057"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="normal">Ω</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${\Omega _{1}}$]]></tex-math></alternatives></inline-formula> and 49 of its consecutive cat transition matrices <inline-formula id="j_infor426_ineq_058"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="normal">Ω</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="normal">Ω</mml:mi></mml:mrow><mml:mrow><mml:mn>3</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:mo>…</mml:mo><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="normal">Ω</mml:mi></mml:mrow><mml:mrow><mml:mn>50</mml:mn></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${\Omega _{2}},{\Omega _{3}},\dots ,{\Omega _{50}}$]]></tex-math></alternatives></inline-formula> as described in <xref rid="j_infor426_s_007">3.4</xref>. Each matrix is processed as a sequence of 1048576 bits. According to the STS documentation, a minimum pass rate for each statistical test is 96%.</p>
</caption>
<table>
<thead>
<tr>
<td rowspan="2" style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Statistical test</td>
<td colspan="2" style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Set of matrices</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><italic>P</italic>-value</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">Result</td>
</tr>
</thead>
<tbody>
<tr>
<td style="vertical-align: top; text-align: left">Frequency</td>
<td style="vertical-align: top; text-align: left">0.455937</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor426_ineq_059"><alternatives>
<mml:math><mml:mn>50</mml:mn><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mn>50</mml:mn></mml:math>
<tex-math><![CDATA[$50/50$]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Block-frequency</td>
<td style="vertical-align: top; text-align: left">0.983453</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor426_ineq_060"><alternatives>
<mml:math><mml:mn>49</mml:mn><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mn>50</mml:mn></mml:math>
<tex-math><![CDATA[$49/50$]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Cumulative-sums (forward)</td>
<td style="vertical-align: top; text-align: left">0.350485</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor426_ineq_061"><alternatives>
<mml:math><mml:mn>50</mml:mn><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mn>50</mml:mn></mml:math>
<tex-math><![CDATA[$50/50$]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Cumulative-sums (reverse)</td>
<td style="vertical-align: top; text-align: left">0.383827</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor426_ineq_062"><alternatives>
<mml:math><mml:mn>50</mml:mn><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mn>50</mml:mn></mml:math>
<tex-math><![CDATA[$50/50$]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Runs</td>
<td style="vertical-align: top; text-align: left">0.779188</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor426_ineq_063"><alternatives>
<mml:math><mml:mn>49</mml:mn><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mn>50</mml:mn></mml:math>
<tex-math><![CDATA[$49/50$]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Longest-runs</td>
<td style="vertical-align: top; text-align: left">0.191687</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor426_ineq_064"><alternatives>
<mml:math><mml:mn>48</mml:mn><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mn>48</mml:mn></mml:math>
<tex-math><![CDATA[$48/48$]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Rank</td>
<td style="vertical-align: top; text-align: left">0.616305</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor426_ineq_065"><alternatives>
<mml:math><mml:mn>50</mml:mn><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mn>50</mml:mn></mml:math>
<tex-math><![CDATA[$50/50$]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">FFT</td>
<td style="vertical-align: top; text-align: left">0.494392</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor426_ineq_066"><alternatives>
<mml:math><mml:mn>50</mml:mn><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mn>50</mml:mn></mml:math>
<tex-math><![CDATA[$50/50$]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Non-overlapping-templates</td>
<td style="vertical-align: top; text-align: left">0.616305</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor426_ineq_067"><alternatives>
<mml:math><mml:mn>50</mml:mn><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mn>50</mml:mn></mml:math>
<tex-math><![CDATA[$50/50$]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Overlapping-templates</td>
<td style="vertical-align: top; text-align: left">0.289667</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor426_ineq_068"><alternatives>
<mml:math><mml:mn>50</mml:mn><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mn>50</mml:mn></mml:math>
<tex-math><![CDATA[$50/50$]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Universal</td>
<td style="vertical-align: top; text-align: left">0.494392</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor426_ineq_069"><alternatives>
<mml:math><mml:mn>50</mml:mn><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mn>50</mml:mn></mml:math>
<tex-math><![CDATA[$50/50$]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Approximate entropy</td>
<td style="vertical-align: top; text-align: left">0.657933</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor426_ineq_070"><alternatives>
<mml:math><mml:mn>50</mml:mn><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mn>50</mml:mn></mml:math>
<tex-math><![CDATA[$50/50$]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Random-excursions</td>
<td style="vertical-align: top; text-align: left">0.324180</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor426_ineq_071"><alternatives>
<mml:math><mml:mn>33</mml:mn><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mn>33</mml:mn></mml:math>
<tex-math><![CDATA[$33/33$]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Random-excursions variant</td>
<td style="vertical-align: top; text-align: left">0.706149</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor426_ineq_072"><alternatives>
<mml:math><mml:mn>33</mml:mn><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mn>33</mml:mn></mml:math>
<tex-math><![CDATA[$33/33$]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Serial 1</td>
<td style="vertical-align: top; text-align: left">0.383827</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor426_ineq_073"><alternatives>
<mml:math><mml:mn>48</mml:mn><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mn>50</mml:mn></mml:math>
<tex-math><![CDATA[$48/50$]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Serial 2</td>
<td style="vertical-align: top; text-align: left">0.816537</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor426_ineq_074"><alternatives>
<mml:math><mml:mn>48</mml:mn><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mn>50</mml:mn></mml:math>
<tex-math><![CDATA[$48/50$]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">Linear-complexity</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.213309</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><inline-formula id="j_infor426_ineq_075"><alternatives>
<mml:math><mml:mn>49</mml:mn><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mn>50</mml:mn></mml:math>
<tex-math><![CDATA[$49/50$]]></tex-math></alternatives></inline-formula></td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
</sec>
<sec id="j_infor426_s_008">
<label>4</label>
<title>Statistical Analysis of Cipher-Images</title>
<p>In this section, we showcase the efficiency of the proposed scheme. We then evaluate the randomness of cipher-images corresponding to standard test images. Furthermore, we consider cipher-images corresponding to bank of test plain-images.</p>
<sec id="j_infor426_s_009">
<label>4.1</label>
<title>Test Images and Parameters</title>
<p>This section shows the efficiency of the proposed image encryption scheme Pr-IES. Figure <xref rid="j_infor426_fig_004">1</xref> depicts standard grayscale test images Barbara of size <inline-formula id="j_infor426_ineq_076"><alternatives>
<mml:math><mml:mn>256</mml:mn><mml:mo>×</mml:mo><mml:mn>256</mml:mn></mml:math>
<tex-math><![CDATA[$256\times 256$]]></tex-math></alternatives></inline-formula>, Lena of size <inline-formula id="j_infor426_ineq_077"><alternatives>
<mml:math><mml:mn>512</mml:mn><mml:mo>×</mml:mo><mml:mn>512</mml:mn></mml:math>
<tex-math><![CDATA[$512\times 512$]]></tex-math></alternatives></inline-formula> and Elaine of size <inline-formula id="j_infor426_ineq_078"><alternatives>
<mml:math><mml:mn>1024</mml:mn><mml:mspace width="2.5pt"/><mml:mo>×</mml:mo><mml:mspace width="2.5pt"/><mml:mn>1024</mml:mn></mml:math>
<tex-math><![CDATA[$1024\hspace{2.5pt}\times \hspace{2.5pt}1024$]]></tex-math></alternatives></inline-formula>.</p>
<fig id="j_infor426_fig_004">
<label>Fig. 1</label>
<caption>
<p>Test plain-images Barbara of size <inline-formula id="j_infor426_ineq_079"><alternatives>
<mml:math><mml:mn>256</mml:mn><mml:mo>×</mml:mo><mml:mn>256</mml:mn></mml:math>
<tex-math><![CDATA[$256\times 256$]]></tex-math></alternatives></inline-formula>, Lena of size <inline-formula id="j_infor426_ineq_080"><alternatives>
<mml:math><mml:mn>512</mml:mn><mml:mo>×</mml:mo><mml:mn>512</mml:mn></mml:math>
<tex-math><![CDATA[$512\times 512$]]></tex-math></alternatives></inline-formula> and Elaine of size <inline-formula id="j_infor426_ineq_081"><alternatives>
<mml:math><mml:mn>1024</mml:mn><mml:mo>×</mml:mo><mml:mn>1024</mml:mn></mml:math>
<tex-math><![CDATA[$1024\times 1024$]]></tex-math></alternatives></inline-formula>.</p>
</caption>
<graphic xlink:href="infor426_g005.jpg"/>
</fig>
<p>Figure <xref rid="j_infor426_fig_005">2</xref> presents the shuffle-images corresponding to the test images Barbara, Lena and Elaine for <inline-formula id="j_infor426_ineq_082"><alternatives>
<mml:math><mml:mi mathvariant="italic">r</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn><mml:mo mathvariant="normal">,</mml:mo><mml:mn>2</mml:mn><mml:mo mathvariant="normal">,</mml:mo><mml:mn>3</mml:mn></mml:math>
<tex-math><![CDATA[$r=1,2,3$]]></tex-math></alternatives></inline-formula> and 4. It is evident that for <inline-formula id="j_infor426_ineq_083"><alternatives>
<mml:math><mml:mi mathvariant="italic">r</mml:mi><mml:mo mathvariant="normal">&gt;</mml:mo><mml:mn>3</mml:mn></mml:math>
<tex-math><![CDATA[$r>3$]]></tex-math></alternatives></inline-formula> the shuffle-images show no pattern. On the basis of these results and the fact that a shuffle-image is almost free of correlation for <inline-formula id="j_infor426_ineq_084"><alternatives>
<mml:math><mml:mi mathvariant="italic">r</mml:mi><mml:mo>=</mml:mo><mml:mn>5</mml:mn></mml:math>
<tex-math><![CDATA[$r=5$]]></tex-math></alternatives></inline-formula> (as shown in Fig. <xref rid="j_infor426_fig_006">3</xref>), we consider the number of rounds for the shuffling phase to be set to 5. Similarly, it is shown in Section <xref rid="j_infor426_s_015">5</xref> that the image encryption scheme Pr-IES is robust against differential attacks when the number of rounds for the masking phase <inline-formula id="j_infor426_ineq_085"><alternatives>
<mml:math><mml:mi mathvariant="italic">s</mml:mi><mml:mo mathvariant="normal">&gt;</mml:mo><mml:mn>3</mml:mn></mml:math>
<tex-math><![CDATA[$s>3$]]></tex-math></alternatives></inline-formula>. Thus, <inline-formula id="j_infor426_ineq_086"><alternatives>
<mml:math><mml:mi mathvariant="italic">r</mml:mi><mml:mo>=</mml:mo><mml:mi mathvariant="italic">s</mml:mi><mml:mo>=</mml:mo><mml:mn>5</mml:mn></mml:math>
<tex-math><![CDATA[$r=s=5$]]></tex-math></alternatives></inline-formula> is ideal for the robustness of the proposed encryption scheme.</p>
<fig id="j_infor426_fig_005">
<label>Fig. 2</label>
<caption>
<p>The shuffle-images corresponding to the test images Barbara, Lena and Elaine.</p>
</caption>
<graphic xlink:href="infor426_g006.jpg"/>
</fig>
<p>Figure <xref rid="j_infor426_fig_006">3</xref> depicts the shuffle-images and cipher-images corresponding to the test plain-images Barbara, Lena and Elaine, with <inline-formula id="j_infor426_ineq_087"><alternatives>
<mml:math><mml:mi mathvariant="italic">r</mml:mi><mml:mo>=</mml:mo><mml:mi mathvariant="italic">s</mml:mi><mml:mo>=</mml:mo><mml:mn>5</mml:mn></mml:math>
<tex-math><![CDATA[$r=s=5$]]></tex-math></alternatives></inline-formula>. It is evident that one cannot distinguish between the cipher-images and a random image.</p>
<fig id="j_infor426_fig_006">
<label>Fig. 3</label>
<caption>
<p>The shuffle-images (top) and cipher-images (bottom) for <inline-formula id="j_infor426_ineq_088"><alternatives>
<mml:math><mml:mi mathvariant="italic">r</mml:mi><mml:mo>=</mml:mo><mml:mi mathvariant="italic">s</mml:mi><mml:mo>=</mml:mo><mml:mn>5</mml:mn></mml:math>
<tex-math><![CDATA[$r=s=5$]]></tex-math></alternatives></inline-formula> corresponding to the test plain-images Barbara, Lena and Elaine. The decipher-images are identical to the plain-images.</p>
</caption>
<graphic xlink:href="infor426_g007.jpg"/>
</fig>
</sec>
<sec id="j_infor426_s_010">
<label>4.2</label>
<title>Histogram Analysis</title>
<p>Histogram analysis is an important test which shows the distribution of the intensity values of the pixels within an image. A secure image encryption scheme produces cipher-images whose pixel intensity values are uniformly distributed in the interval <inline-formula id="j_infor426_ineq_089"><alternatives>
<mml:math><mml:mo fence="true" stretchy="false">[</mml:mo><mml:mn>0</mml:mn><mml:mo mathvariant="normal">,</mml:mo><mml:mn>255</mml:mn><mml:mo fence="true" stretchy="false">]</mml:mo></mml:math>
<tex-math><![CDATA[$[0,255]$]]></tex-math></alternatives></inline-formula>. It is evident from Fig. <xref rid="j_infor426_fig_007">4</xref>, which depicts the histograms of the test images Barbara, Lena, Elaine and their corresponding cipher-images, that the histograms of the cipher-images are almost flat and hence show no useful information about the plain-images. Furthermore, the average pixel intensity of the cipher-images is approximately 127.50, which is the ideal value. Moreover, Table <xref rid="j_infor426_tab_002">2</xref> reports the chi-square test (Kwok and Tang, <xref ref-type="bibr" rid="j_infor426_ref_031">2007</xref>) for cipher-images and random images. It is evident that the chi-square measures for cipher-images are similar to those of random images and they are less than the upper bound 293 for a significance level 0.05.</p>
<table-wrap id="j_infor426_tab_002">
<label>Table 2</label>
<caption>
<p>The chi-square test results for the cipher-images corresponding to the test images Barbara, Lena and Elaine. This table also reports the chi-square value for a random image.</p>
</caption>
<table>
<thead>
<tr>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Cipher-image</td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin"><inline-formula id="j_infor426_ineq_090"><alternatives>
<mml:math><mml:msubsup><mml:mrow><mml:mi mathvariant="italic">χ</mml:mi></mml:mrow><mml:mrow><mml:mtext>test</mml:mtext></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msubsup></mml:math>
<tex-math><![CDATA[${\chi _{\text{test}}^{2}}$]]></tex-math></alternatives></inline-formula></td>
</tr>
</thead>
<tbody>
<tr>
<td style="vertical-align: top; text-align: left">Cipher-Barbara</td>
<td style="vertical-align: top; text-align: left">262.5859</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Cipher-Lena</td>
<td style="vertical-align: top; text-align: left">248.8477</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Cipher-Elaine</td>
<td style="vertical-align: top; text-align: left">222.1147</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">Random image</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">235.4453</td>
</tr>
</tbody>
</table>
</table-wrap>
<fig id="j_infor426_fig_007">
<label>Fig. 4</label>
<caption>
<p>Histograms of the test images Barbara, Lena and Elaine (top) and their corresponding cipher-images (bottom).</p>
</caption>
<graphic xlink:href="infor426_g008.jpg"/>
</fig>
</sec>
<sec id="j_infor426_s_011">
<label>4.3</label>
<title>Correlation Analysis of Adjacent Pixels</title>
<p>A secure image encryption scheme generates cipher-images almost free of any correlation. The correlation coefficients <inline-formula id="j_infor426_ineq_091"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">r</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="bold">xy</mml:mi></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${r_{\mathbf{xy}}}$]]></tex-math></alternatives></inline-formula> between <italic>N</italic> pairs of randomly chosen adjacent pixels <inline-formula id="j_infor426_ineq_092"><alternatives>
<mml:math><mml:mi mathvariant="bold">x</mml:mi><mml:mo>=</mml:mo><mml:msubsup><mml:mrow><mml:mo fence="true" stretchy="false">{</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">x</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub><mml:mo fence="true" stretchy="false">}</mml:mo></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:mi mathvariant="italic">N</mml:mi></mml:mrow></mml:msubsup></mml:math>
<tex-math><![CDATA[$\mathbf{x}={\{{x_{i}}\}_{i=1}^{N}}$]]></tex-math></alternatives></inline-formula> and <inline-formula id="j_infor426_ineq_093"><alternatives>
<mml:math><mml:mi mathvariant="bold">y</mml:mi><mml:mo>=</mml:mo><mml:msubsup><mml:mrow><mml:mo fence="true" stretchy="false">{</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">y</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub><mml:mo fence="true" stretchy="false">}</mml:mo></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:mi mathvariant="italic">N</mml:mi></mml:mrow></mml:msubsup></mml:math>
<tex-math><![CDATA[$\mathbf{y}={\{{y_{i}}\}_{i=1}^{N}}$]]></tex-math></alternatives></inline-formula> in a given image is defined by 
<disp-formula id="j_infor426_eq_017">
<alternatives>
<mml:math display="block"><mml:mtable displaystyle="true"><mml:mtr><mml:mtd><mml:msub><mml:mrow><mml:mi mathvariant="italic">r</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="bold">xy</mml:mi></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mstyle displaystyle="true"><mml:mfrac><mml:mrow><mml:mi mathvariant="normal">cov</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="bold">x</mml:mi><mml:mo mathvariant="normal">,</mml:mo><mml:mi mathvariant="bold">y</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:mrow><mml:mrow><mml:msub><mml:mrow><mml:mi mathvariant="italic">σ</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="bold">x</mml:mi></mml:mrow></mml:msub><mml:msub><mml:mrow><mml:mi mathvariant="italic">σ</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="bold">y</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:mfrac></mml:mstyle><mml:mo mathvariant="normal">,</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math>
<tex-math><![CDATA[\[ {r_{\mathbf{xy}}}=\frac{\mathrm{cov}(\mathbf{x},\mathbf{y})}{{\sigma _{\mathbf{x}}}{\sigma _{\mathbf{y}}}},\]]]></tex-math></alternatives>
</disp-formula> 
where <inline-formula id="j_infor426_ineq_094"><alternatives>
<mml:math><mml:mi mathvariant="normal">cov</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="bold">x</mml:mi><mml:mo mathvariant="normal">,</mml:mo><mml:mi mathvariant="bold">y</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo><mml:mo>=</mml:mo><mml:mstyle displaystyle="false"><mml:mfrac><mml:mrow><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:mi mathvariant="italic">N</mml:mi></mml:mrow></mml:mfrac></mml:mstyle><mml:msubsup><mml:mrow><mml:mo largeop="false" movablelimits="false">∑</mml:mo></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:mi mathvariant="italic">N</mml:mi></mml:mrow></mml:msubsup><mml:mo maxsize="1.19em" minsize="1.19em" fence="true" mathvariant="normal">(</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">x</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub><mml:mo>−</mml:mo><mml:mi mathvariant="italic">E</mml:mi><mml:mo fence="true" stretchy="false">[</mml:mo><mml:mi mathvariant="bold">x</mml:mi><mml:mo fence="true" stretchy="false">]</mml:mo><mml:mo maxsize="1.19em" minsize="1.19em" fence="true" mathvariant="normal">)</mml:mo><mml:mo maxsize="1.19em" minsize="1.19em" fence="true" mathvariant="normal">(</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">y</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub><mml:mo>−</mml:mo><mml:mi mathvariant="italic">E</mml:mi><mml:mo fence="true" stretchy="false">[</mml:mo><mml:mi mathvariant="bold">y</mml:mi><mml:mo fence="true" stretchy="false">]</mml:mo><mml:mo maxsize="1.19em" minsize="1.19em" fence="true" mathvariant="normal">)</mml:mo></mml:math>
<tex-math><![CDATA[$\mathrm{cov}(\mathbf{x},\mathbf{y})=\frac{1}{N}{\textstyle\sum _{i=1}^{N}}\big({x_{i}}-E[\mathbf{x}]\big)\big({y_{i}}-E[\mathbf{y}]\big)$]]></tex-math></alternatives></inline-formula>, <inline-formula id="j_infor426_ineq_095"><alternatives>
<mml:math><mml:mi mathvariant="italic">E</mml:mi><mml:mo fence="true" stretchy="false">[</mml:mo><mml:mi mathvariant="bold">x</mml:mi><mml:mo fence="true" stretchy="false">]</mml:mo></mml:math>
<tex-math><![CDATA[$E[\mathbf{x}]$]]></tex-math></alternatives></inline-formula> and <inline-formula id="j_infor426_ineq_096"><alternatives>
<mml:math><mml:mi mathvariant="italic">E</mml:mi><mml:mo fence="true" stretchy="false">[</mml:mo><mml:mi mathvariant="bold">y</mml:mi><mml:mo fence="true" stretchy="false">]</mml:mo></mml:math>
<tex-math><![CDATA[$E[\mathbf{y}]$]]></tex-math></alternatives></inline-formula> are the expected values of the samples <bold>x</bold> and <bold>y</bold> respectively, and <inline-formula id="j_infor426_ineq_097"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">σ</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="bold">x</mml:mi></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${\sigma _{\mathbf{x}}}$]]></tex-math></alternatives></inline-formula> and <inline-formula id="j_infor426_ineq_098"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">σ</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="bold">y</mml:mi></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${\sigma _{\mathbf{y}}}$]]></tex-math></alternatives></inline-formula> are their standard deviations.</p>
<p>Table <xref rid="j_infor426_tab_003">3</xref> reports the correlation coefficients for cipher-images corresponding to the test plain-images Barbara, Lena and Elaine. Furthermore, the table presents the correlation coefficients of the shuffle-images corresponding to the test images. It is evident from this table that the correlation coefficients of the cipher-images and the shuffle-images are almost zero. Hence, the cipher-images are almost free of any correlation.</p>
<table-wrap id="j_infor426_tab_003">
<label>Table 3</label>
<caption>
<p>Correlation coefficients of the test plain-images, shuffle-images and cipher-images for <inline-formula id="j_infor426_ineq_099"><alternatives>
<mml:math><mml:mi mathvariant="italic">N</mml:mi><mml:mo>=</mml:mo><mml:mn>10000</mml:mn></mml:math>
<tex-math><![CDATA[$N=10000$]]></tex-math></alternatives></inline-formula>.</p>
</caption>
<table>
<thead>
<tr>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Image</td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Adjacency</td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Plain-image</td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Shuffle-image</td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Cipher-image</td>
</tr>
</thead>
<tbody>
<tr>
<td style="vertical-align: top; text-align: left">Barbara</td>
<td style="vertical-align: top; text-align: left">Horizontal</td>
<td style="vertical-align: top; text-align: left">0.956279</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor426_ineq_100"><alternatives>
<mml:math><mml:mo>−</mml:mo><mml:mn>0.006150</mml:mn></mml:math>
<tex-math><![CDATA[$-0.006150$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor426_ineq_101"><alternatives>
<mml:math><mml:mo>−</mml:mo><mml:mn>0.017363</mml:mn></mml:math>
<tex-math><![CDATA[$-0.017363$]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"/>
<td style="vertical-align: top; text-align: left">Vertical</td>
<td style="vertical-align: top; text-align: left">0.971464</td>
<td style="vertical-align: top; text-align: left">0.003786</td>
<td style="vertical-align: top; text-align: left">0.007816</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"/>
<td style="vertical-align: top; text-align: left">Diagonal</td>
<td style="vertical-align: top; text-align: left">0.935520</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor426_ineq_102"><alternatives>
<mml:math><mml:mo>−</mml:mo><mml:mn>0.002700</mml:mn></mml:math>
<tex-math><![CDATA[$-0.002700$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor426_ineq_103"><alternatives>
<mml:math><mml:mo>−</mml:mo><mml:mn>0.016839</mml:mn></mml:math>
<tex-math><![CDATA[$-0.016839$]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Lena</td>
<td style="vertical-align: top; text-align: left">Horizontal</td>
<td style="vertical-align: top; text-align: left">0.972826</td>
<td style="vertical-align: top; text-align: left">0.006197</td>
<td style="vertical-align: top; text-align: left">0.001692</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"/>
<td style="vertical-align: top; text-align: left">Vertical</td>
<td style="vertical-align: top; text-align: left">0.986398</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor426_ineq_104"><alternatives>
<mml:math><mml:mo>−</mml:mo><mml:mn>0.019941</mml:mn></mml:math>
<tex-math><![CDATA[$-0.019941$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">0.020036</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"/>
<td style="vertical-align: top; text-align: left">Diagonal</td>
<td style="vertical-align: top; text-align: left">0.962357</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor426_ineq_105"><alternatives>
<mml:math><mml:mo>−</mml:mo><mml:mn>0.015373</mml:mn></mml:math>
<tex-math><![CDATA[$-0.015373$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor426_ineq_106"><alternatives>
<mml:math><mml:mo>−</mml:mo><mml:mn>0.004486</mml:mn></mml:math>
<tex-math><![CDATA[$-0.004486$]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Elaine</td>
<td style="vertical-align: top; text-align: left">Horizontal</td>
<td style="vertical-align: top; text-align: left">0.994613</td>
<td style="vertical-align: top; text-align: left">0.015765</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor426_ineq_107"><alternatives>
<mml:math><mml:mo>−</mml:mo><mml:mn>0.009980</mml:mn></mml:math>
<tex-math><![CDATA[$-0.009980$]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"/>
<td style="vertical-align: top; text-align: left">Vertical</td>
<td style="vertical-align: top; text-align: left">0.993920</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor426_ineq_108"><alternatives>
<mml:math><mml:mo>−</mml:mo><mml:mn>0.004081</mml:mn></mml:math>
<tex-math><![CDATA[$-0.004081$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">0.008746</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"/>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">Diagonal</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.989842</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.003508</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><inline-formula id="j_infor426_ineq_109"><alternatives>
<mml:math><mml:mo>−</mml:mo><mml:mn>0.009003</mml:mn></mml:math>
<tex-math><![CDATA[$-0.009003$]]></tex-math></alternatives></inline-formula></td>
</tr>
</tbody>
</table>
</table-wrap>
<p>Figure <xref rid="j_infor426_fig_008">5</xref> depicts a plot of the points <inline-formula id="j_infor426_ineq_110"><alternatives>
<mml:math><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">x</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">y</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math>
<tex-math><![CDATA[$({x_{i}},{y_{i}})$]]></tex-math></alternatives></inline-formula>, where <inline-formula id="j_infor426_ineq_111"><alternatives>
<mml:math><mml:mn>1</mml:mn><mml:mo>⩽</mml:mo><mml:mi mathvariant="italic">i</mml:mi><mml:mo>⩽</mml:mo><mml:mn>10000</mml:mn></mml:math>
<tex-math><![CDATA[$1\leqslant i\leqslant 10000$]]></tex-math></alternatives></inline-formula>, in the plain-image Lena and its corresponding shuffle-image and cipher-image. It is evident from this figure that the cipher-image is almost free of any correlation between the values of <inline-formula id="j_infor426_ineq_112"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">x</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${x_{i}}$]]></tex-math></alternatives></inline-formula> and <inline-formula id="j_infor426_ineq_113"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">y</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${y_{i}}$]]></tex-math></alternatives></inline-formula>. The cipher-images corresponding to the plain-images Barbara and Elaine have similar behaviour, hence are omitted.</p>
<fig id="j_infor426_fig_008">
<label>Fig. 5</label>
<caption>
<p>Point plots of the intensity values of randomly chosen pairs of horizontally, vertically and diagonally adjacent pixels in the plain-image Lena (top), its corresponding shuffle-image (middle) and cipher-image (bottom).</p>
</caption>
<graphic xlink:href="infor426_g009.jpg"/>
</fig>
</sec>
<sec id="j_infor426_s_012">
<label>4.4</label>
<title>Information entropy analysis</title>
<p>Information entropy (Shannon, <xref ref-type="bibr" rid="j_infor426_ref_044">1948</xref>) is an important measure for evaluating the strength of an image encryption scheme. It measures the distribution of gray-values in an image. The entropy <inline-formula id="j_infor426_ineq_114"><alternatives>
<mml:math><mml:mi mathvariant="italic">H</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="bold">s</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math>
<tex-math><![CDATA[$H(\mathbf{s})$]]></tex-math></alternatives></inline-formula> of a source <bold>s</bold> emitting 256 symbols <inline-formula id="j_infor426_ineq_115"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">s</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">s</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:mo>…</mml:mo><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">s</mml:mi></mml:mrow><mml:mrow><mml:mn>256</mml:mn></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${s_{1}},{s_{2}},\dots ,{s_{256}}$]]></tex-math></alternatives></inline-formula> is defined by 
<disp-formula id="j_infor426_eq_018">
<alternatives>
<mml:math display="block"><mml:mtable displaystyle="true"><mml:mtr><mml:mtd><mml:mi mathvariant="italic">H</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="italic">s</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo><mml:mo>=</mml:mo><mml:mo>−</mml:mo>
<mml:munderover accentunder="false" accent="false"><mml:mrow><mml:mstyle displaystyle="true"><mml:mo largeop="true" movablelimits="false">∑</mml:mo></mml:mstyle></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:mn>256</mml:mn></mml:mrow></mml:munderover><mml:mi mathvariant="italic">P</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">s</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo><mml:mspace width="0.1667em"/><mml:msub><mml:mrow><mml:mo movablelimits="false">log</mml:mo></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mi mathvariant="italic">P</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">s</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo><mml:mo mathvariant="normal">,</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math>
<tex-math><![CDATA[\[ H(s)=-{\sum \limits_{i=1}^{256}}P({s_{i}})\hspace{0.1667em}{\log _{2}}P({s_{i}}),\]]]></tex-math></alternatives>
</disp-formula> 
where <inline-formula id="j_infor426_ineq_116"><alternatives>
<mml:math><mml:mi mathvariant="italic">P</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">s</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math>
<tex-math><![CDATA[$P({s_{i}})$]]></tex-math></alternatives></inline-formula> represents the probability of occurrence of <inline-formula id="j_infor426_ineq_117"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">s</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${s_{i}}$]]></tex-math></alternatives></inline-formula>. For a random source <bold>s</bold>, <inline-formula id="j_infor426_ineq_118"><alternatives>
<mml:math><mml:mi mathvariant="italic">H</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="bold">s</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo><mml:mo>=</mml:mo><mml:mn>8</mml:mn></mml:math>
<tex-math><![CDATA[$H(\mathbf{s})=8$]]></tex-math></alternatives></inline-formula>. Table <xref rid="j_infor426_tab_004">4</xref> reports the entropy measures for the test plain-images and their corresponding cipher-images. The reported measures are very close to the ideal value 8. Hence, the proposed scheme is robust against entropy attacks.</p>
<table-wrap id="j_infor426_tab_004">
<label>Table 4</label>
<caption>
<p>Entropy measures for the test plain-images Barbara, Lena, Elaine and their corresponding cipher-images.</p>
</caption>
<table>
<thead>
<tr>
<td rowspan="2" style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Image</td>
<td colspan="2" style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Entropy</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">Plain-image</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">Cipher-image</td>
</tr>
</thead>
<tbody>
<tr>
<td style="vertical-align: top; text-align: left">Barbara</td>
<td style="vertical-align: top; text-align: left">7.6019</td>
<td style="vertical-align: top; text-align: left">7.9971</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Lena</td>
<td style="vertical-align: top; text-align: left">7.4455</td>
<td style="vertical-align: top; text-align: left">7.9993</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">Elaine</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">7.5029</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">7.9998</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>To further showcase the randomness of the proposed image encryption scheme we measure the entropy over local cipher-images blocks (Wu <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor426_ref_054">2013</xref>). Table <xref rid="j_infor426_tab_005">5</xref> reports the mean of entropy measures over local cipher-images blocks, where the block sizes are <inline-formula id="j_infor426_ineq_119"><alternatives>
<mml:math><mml:mn>16</mml:mn><mml:mo>×</mml:mo><mml:mn>16</mml:mn></mml:math>
<tex-math><![CDATA[$16\times 16$]]></tex-math></alternatives></inline-formula>, <inline-formula id="j_infor426_ineq_120"><alternatives>
<mml:math><mml:mn>32</mml:mn><mml:mo>×</mml:mo><mml:mn>32</mml:mn></mml:math>
<tex-math><![CDATA[$32\times 32$]]></tex-math></alternatives></inline-formula> and <inline-formula id="j_infor426_ineq_121"><alternatives>
<mml:math><mml:mn>64</mml:mn><mml:mo>×</mml:mo><mml:mn>64</mml:mn></mml:math>
<tex-math><![CDATA[$64\times 64$]]></tex-math></alternatives></inline-formula>. It is evident from this table that the reported measures are close to the theoretical mean of Shannon entropy measures for a random image, that is 7.174966353, 7.808756571 and 7.954588734 for <inline-formula id="j_infor426_ineq_122"><alternatives>
<mml:math><mml:mn>16</mml:mn><mml:mo>×</mml:mo><mml:mn>16</mml:mn></mml:math>
<tex-math><![CDATA[$16\times 16$]]></tex-math></alternatives></inline-formula>, <inline-formula id="j_infor426_ineq_123"><alternatives>
<mml:math><mml:mn>32</mml:mn><mml:mo>×</mml:mo><mml:mn>32</mml:mn></mml:math>
<tex-math><![CDATA[$32\times 32$]]></tex-math></alternatives></inline-formula> and <inline-formula id="j_infor426_ineq_124"><alternatives>
<mml:math><mml:mn>64</mml:mn><mml:mo>×</mml:mo><mml:mn>64</mml:mn></mml:math>
<tex-math><![CDATA[$64\times 64$]]></tex-math></alternatives></inline-formula> blocks, respectively (Wu <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor426_ref_054">2013</xref>). Table <xref rid="j_infor426_tab_005">5</xref> also includes the mean of local entropy measures for a random image and its corresponding cipher-image.</p>
<table-wrap id="j_infor426_tab_005">
<label>Table 5</label>
<caption>
<p>Average entropy of image blocks.</p>
</caption>
<table>
<thead>
<tr>
<td rowspan="2" style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Image</td>
<td colspan="3" style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Plain-image</td>
<td colspan="3" style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Cipher-image</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><inline-formula id="j_infor426_ineq_125"><alternatives>
<mml:math><mml:mn>16</mml:mn><mml:mo>×</mml:mo><mml:mn>16</mml:mn></mml:math>
<tex-math><![CDATA[$16\times 16$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><inline-formula id="j_infor426_ineq_126"><alternatives>
<mml:math><mml:mn>32</mml:mn><mml:mo>×</mml:mo><mml:mn>32</mml:mn></mml:math>
<tex-math><![CDATA[$32\times 32$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><inline-formula id="j_infor426_ineq_127"><alternatives>
<mml:math><mml:mn>64</mml:mn><mml:mo>×</mml:mo><mml:mn>64</mml:mn></mml:math>
<tex-math><![CDATA[$64\times 64$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><inline-formula id="j_infor426_ineq_128"><alternatives>
<mml:math><mml:mn>16</mml:mn><mml:mo>×</mml:mo><mml:mn>16</mml:mn></mml:math>
<tex-math><![CDATA[$16\times 16$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><inline-formula id="j_infor426_ineq_129"><alternatives>
<mml:math><mml:mn>32</mml:mn><mml:mo>×</mml:mo><mml:mn>32</mml:mn></mml:math>
<tex-math><![CDATA[$32\times 32$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><inline-formula id="j_infor426_ineq_130"><alternatives>
<mml:math><mml:mn>64</mml:mn><mml:mo>×</mml:mo><mml:mn>64</mml:mn></mml:math>
<tex-math><![CDATA[$64\times 64$]]></tex-math></alternatives></inline-formula></td>
</tr>
</thead>
<tbody>
<tr>
<td style="vertical-align: top; text-align: left">Barbara</td>
<td style="vertical-align: top; text-align: left">5.7160</td>
<td style="vertical-align: top; text-align: left">6.5322</td>
<td style="vertical-align: top; text-align: left">7.0868</td>
<td style="vertical-align: top; text-align: left">7.1766</td>
<td style="vertical-align: top; text-align: left">7.8076</td>
<td style="vertical-align: top; text-align: left">7.9549</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Lena</td>
<td style="vertical-align: top; text-align: left">4.9910</td>
<td style="vertical-align: top; text-align: left">5.6328</td>
<td style="vertical-align: top; text-align: left">6.2260</td>
<td style="vertical-align: top; text-align: left">7.1763</td>
<td style="vertical-align: top; text-align: left">7.8098</td>
<td style="vertical-align: top; text-align: left">7.9550</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Elaine</td>
<td style="vertical-align: top; text-align: left">4.7618</td>
<td style="vertical-align: top; text-align: left">5.3754</td>
<td style="vertical-align: top; text-align: left">5.9626</td>
<td style="vertical-align: top; text-align: left">7.1759</td>
<td style="vertical-align: top; text-align: left">7.8095</td>
<td style="vertical-align: top; text-align: left">7.9546</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">Random</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">7.1750</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">7.8097</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">7.9542</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">7.1738</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">7.8090</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">7.9542</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec id="j_infor426_s_013">
<label>4.5</label>
<title>Randomness Analysis</title>
<p>In this section, we evaluate the randomness of cipher-images generated by the proposed scheme Pr-IES using the STS proposed by the National Institute for Standards and Technology (NIST) (Bassham <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor426_ref_003">2010</xref>). For this regard, we consider the first 100 images from the test bank of images in BOWS2 (<xref ref-type="bibr" rid="j_infor426_ref_064">2019</xref>). We encrypt each <inline-formula id="j_infor426_ineq_131"><alternatives>
<mml:math><mml:mn>512</mml:mn><mml:mo>×</mml:mo><mml:mn>512</mml:mn></mml:math>
<tex-math><![CDATA[$512\times 512$]]></tex-math></alternatives></inline-formula> image by the proposed scheme, and subject the resulting cipher-image to the STS. Each cipher-image consists of 2097152 bits and is processed in STS as a single sequence. Table <xref rid="j_infor426_tab_006">6</xref> reports the STS results for a collection of 100 cipher-images, each of length 2097152 bits. According to documentation of the STS documentation (Bassham <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor426_ref_003">2010</xref>), the minimum pass rate for each test is 96%. Thus, it is evident that the cipher-images pass all 15 test and hence, they possess very good randomness properties.</p>
<table-wrap id="j_infor426_tab_006">
<label>Table 6</label>
<caption>
<p>Statistical Test Suite results for 100 cipher-images, each of length 2097152 bits.</p>
</caption>
<table>
<thead>
<tr>
<td rowspan="2" style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Statistical test</td>
<td colspan="2" style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Cipher-images</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><italic>P</italic>-value</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">Result</td>
</tr>
</thead>
<tbody>
<tr>
<td style="vertical-align: top; text-align: left">Frequency</td>
<td style="vertical-align: top; text-align: left">0.911413</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor426_ineq_132"><alternatives>
<mml:math><mml:mn>98</mml:mn><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mn>100</mml:mn></mml:math>
<tex-math><![CDATA[$98/100$]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Block-frequency</td>
<td style="vertical-align: top; text-align: left">0.366918</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor426_ineq_133"><alternatives>
<mml:math><mml:mn>100</mml:mn><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mn>100</mml:mn></mml:math>
<tex-math><![CDATA[$100/100$]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Cumulative-sums (forward)</td>
<td style="vertical-align: top; text-align: left">0.924076</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor426_ineq_134"><alternatives>
<mml:math><mml:mn>97</mml:mn><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mn>100</mml:mn></mml:math>
<tex-math><![CDATA[$97/100$]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Cumulative-sums (reverse)</td>
<td style="vertical-align: top; text-align: left">0.851383</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor426_ineq_135"><alternatives>
<mml:math><mml:mn>98</mml:mn><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mn>100</mml:mn></mml:math>
<tex-math><![CDATA[$98/100$]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Runs</td>
<td style="vertical-align: top; text-align: left">0.334538</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor426_ineq_136"><alternatives>
<mml:math><mml:mn>100</mml:mn><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mn>100</mml:mn></mml:math>
<tex-math><![CDATA[$100/100$]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Longest-runs</td>
<td style="vertical-align: top; text-align: left">0.419021</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor426_ineq_137"><alternatives>
<mml:math><mml:mn>99</mml:mn><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mn>100</mml:mn></mml:math>
<tex-math><![CDATA[$99/100$]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Rank</td>
<td style="vertical-align: top; text-align: left">0.816537</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor426_ineq_138"><alternatives>
<mml:math><mml:mn>99</mml:mn><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mn>100</mml:mn></mml:math>
<tex-math><![CDATA[$99/100$]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">FFT</td>
<td style="vertical-align: top; text-align: left">0.108791</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor426_ineq_139"><alternatives>
<mml:math><mml:mn>99</mml:mn><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mn>100</mml:mn></mml:math>
<tex-math><![CDATA[$99/100$]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Non-overlapping-templates</td>
<td style="vertical-align: top; text-align: left">0.897763</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor426_ineq_140"><alternatives>
<mml:math><mml:mn>100</mml:mn><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mn>100</mml:mn></mml:math>
<tex-math><![CDATA[$100/100$]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Overlapping-templates</td>
<td style="vertical-align: top; text-align: left">0.739918</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor426_ineq_141"><alternatives>
<mml:math><mml:mn>100</mml:mn><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mn>100</mml:mn></mml:math>
<tex-math><![CDATA[$100/100$]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Universal</td>
<td style="vertical-align: top; text-align: left">0.994250</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor426_ineq_142"><alternatives>
<mml:math><mml:mn>98</mml:mn><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mn>100</mml:mn></mml:math>
<tex-math><![CDATA[$98/100$]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Approximate entropy</td>
<td style="vertical-align: top; text-align: left">0.657933</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor426_ineq_143"><alternatives>
<mml:math><mml:mn>98</mml:mn><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mn>100</mml:mn></mml:math>
<tex-math><![CDATA[$98/100$]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Random-excursions</td>
<td style="vertical-align: top; text-align: left">0.534146</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor426_ineq_144"><alternatives>
<mml:math><mml:mn>72</mml:mn><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mn>72</mml:mn></mml:math>
<tex-math><![CDATA[$72/72$]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Random-excursions variant</td>
<td style="vertical-align: top; text-align: left">0.846579</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor426_ineq_145"><alternatives>
<mml:math><mml:mn>72</mml:mn><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mn>72</mml:mn></mml:math>
<tex-math><![CDATA[$72/72$]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Serial 1</td>
<td style="vertical-align: top; text-align: left">0.719747</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor426_ineq_146"><alternatives>
<mml:math><mml:mn>99</mml:mn><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mn>100</mml:mn></mml:math>
<tex-math><![CDATA[$99/100$]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Serial 2</td>
<td style="vertical-align: top; text-align: left">0.191687</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor426_ineq_147"><alternatives>
<mml:math><mml:mn>99</mml:mn><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mn>100</mml:mn></mml:math>
<tex-math><![CDATA[$99/100$]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">Linear-complexity</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.289667</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><inline-formula id="j_infor426_ineq_148"><alternatives>
<mml:math><mml:mn>99</mml:mn><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mn>100</mml:mn></mml:math>
<tex-math><![CDATA[$99/100$]]></tex-math></alternatives></inline-formula></td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec id="j_infor426_s_014">
<label>4.6</label>
<title>Speed Analysis</title>
<p>In this section, we report the running speed of the proposed image encryption scheme Pr-IES in MATLAB on a desktop machine with an Intel® Core™ i7-4770 processor and 8GB of memory, running Windows 10. Table <xref rid="j_infor426_tab_007">7</xref> reports the running time for encrypting the test images by the proposed scheme. Furthermore, Fig. <xref rid="j_infor426_fig_009">6</xref> shows a sample of the running times for encrypting grayscale images of different sizes by the proposed image encryption scheme with <inline-formula id="j_infor426_ineq_149"><alternatives>
<mml:math><mml:mi mathvariant="italic">r</mml:mi><mml:mo>=</mml:mo><mml:mi mathvariant="italic">s</mml:mi><mml:mo>=</mml:mo><mml:mn>5</mml:mn></mml:math>
<tex-math><![CDATA[$r=s=5$]]></tex-math></alternatives></inline-formula>.</p>
<table-wrap id="j_infor426_tab_007">
<label>Table 7</label>
<caption>
<p>Running time of the proposed encryption scheme.</p>
</caption>
<table>
<thead>
<tr>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Size</td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Encryption time in seconds</td>
</tr>
</thead>
<tbody>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor426_ineq_150"><alternatives>
<mml:math><mml:mn>256</mml:mn><mml:mo>×</mml:mo><mml:mn>256</mml:mn></mml:math>
<tex-math><![CDATA[$256\times 256$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">0.0644554</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor426_ineq_151"><alternatives>
<mml:math><mml:mn>512</mml:mn><mml:mo>×</mml:mo><mml:mn>512</mml:mn></mml:math>
<tex-math><![CDATA[$512\times 512$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">0.2422222</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><inline-formula id="j_infor426_ineq_152"><alternatives>
<mml:math><mml:mn>1024</mml:mn><mml:mo>×</mml:mo><mml:mn>1024</mml:mn></mml:math>
<tex-math><![CDATA[$1024\times 1024$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">1.0021399</td>
</tr>
</tbody>
</table>
</table-wrap>
<fig id="j_infor426_fig_009">
<label>Fig. 6</label>
<caption>
<p>Encryption time versus image size.</p>
</caption>
<graphic xlink:href="infor426_g010.jpg"/>
</fig>
</sec>
</sec>
<sec id="j_infor426_s_015">
<label>5</label>
<title>Security Analysis</title>
<p>In this section, we evaluate the security level of the proposed scheme. We show that the proposed scheme Pr-IES is highly sensitive to a slight modification in the plain-image. We further show that the scheme has a large keyspace, and it is highly sensitive to its secret key and control parameters. Moreover, we analyse the security of the proposed scheme under cipher-image scenario and chosen plain-image scenario. In addition to that, we demonstrate the robustness of its decryption to various alterations in the cipher-image.</p>
<sec id="j_infor426_s_016">
<label>5.1</label>
<title>Differential analysis</title>
<p>Differential analysis of an image encryption scheme investigates the affect of a slight modification in the plain-image on the corresponding cipher-image. In this section, we measure the sensitivity of the proposed image encryption against slight modification in the plain-image. The Number of Pixels Change Rate (NPCR) and Unified Average Changing Intensity (UACI) are two measures used to evaluate the strength of image encryption schemes against differential attacks (Wu <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor426_ref_053">2011</xref>). Suppose <inline-formula id="j_infor426_ineq_153"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">C</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${C_{1}}$]]></tex-math></alternatives></inline-formula> and <inline-formula id="j_infor426_ineq_154"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">C</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${C_{2}}$]]></tex-math></alternatives></inline-formula> are two <inline-formula id="j_infor426_ineq_155"><alternatives>
<mml:math><mml:mi mathvariant="italic">m</mml:mi><mml:mo>×</mml:mo><mml:mi mathvariant="italic">n</mml:mi></mml:math>
<tex-math><![CDATA[$m\times n$]]></tex-math></alternatives></inline-formula> matrices, then the NPCR and UACI between <inline-formula id="j_infor426_ineq_156"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">C</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${C_{1}}$]]></tex-math></alternatives></inline-formula> and <inline-formula id="j_infor426_ineq_157"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">C</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${C_{2}}$]]></tex-math></alternatives></inline-formula> are given by 
<disp-formula id="j_infor426_eq_019">
<alternatives>
<mml:math display="block"><mml:mtable displaystyle="true"><mml:mtr><mml:mtd><mml:mtext>NPCR</mml:mtext><mml:mo>=</mml:mo><mml:mstyle displaystyle="true"><mml:mfrac><mml:mrow><mml:msub><mml:mrow><mml:mo largeop="false" movablelimits="false">∑</mml:mo></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi><mml:mo mathvariant="normal">,</mml:mo><mml:mi mathvariant="italic">j</mml:mi></mml:mrow></mml:msub><mml:mi mathvariant="italic">D</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="italic">i</mml:mi><mml:mo mathvariant="normal">,</mml:mo><mml:mi mathvariant="italic">j</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:mrow><mml:mrow><mml:mi mathvariant="italic">m</mml:mi><mml:mo>×</mml:mo><mml:mi mathvariant="italic">n</mml:mi></mml:mrow></mml:mfrac></mml:mstyle><mml:mo mathvariant="normal">,</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math>
<tex-math><![CDATA[\[ \text{NPCR}=\frac{{\textstyle\sum _{i,j}}D(i,j)}{m\times n},\]]]></tex-math></alternatives>
</disp-formula> 
where 
<disp-formula id="j_infor426_eq_020">
<alternatives>
<mml:math display="block"><mml:mtable displaystyle="true"><mml:mtr><mml:mtd><mml:mi mathvariant="italic">D</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="italic">i</mml:mi><mml:mo mathvariant="normal">,</mml:mo><mml:mi mathvariant="italic">j</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo><mml:mo>=</mml:mo><mml:mfenced separators="" open="{" close=""><mml:mrow><mml:mtable columnspacing="4.0pt" equalrows="false" columnlines="none" equalcolumns="false" columnalign="left left"><mml:mtr><mml:mtd class="array"><mml:mn>1</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mtext>if</mml:mtext><mml:mspace width="2.5pt"/><mml:msub><mml:mrow><mml:mi mathvariant="italic">C</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="italic">i</mml:mi><mml:mo mathvariant="normal">,</mml:mo><mml:mi mathvariant="italic">j</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo><mml:mo stretchy="false">≠</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">C</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="italic">i</mml:mi><mml:mo mathvariant="normal">,</mml:mo><mml:mi mathvariant="italic">j</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo><mml:mo mathvariant="normal">,</mml:mo></mml:mtd></mml:mtr><mml:mtr><mml:mtd class="array"><mml:mn>0</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mtext>otherwise</mml:mtext><mml:mo mathvariant="normal">,</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:mrow></mml:mfenced></mml:mtd></mml:mtr></mml:mtable></mml:math>
<tex-math><![CDATA[\[ D(i,j)=\left\{\begin{array}{l@{\hskip4.0pt}l}1\hspace{1em}& \text{if}\hspace{2.5pt}{C_{1}}(i,j)\ne {C_{2}}(i,j),\\ {} 0\hspace{1em}& \text{otherwise},\end{array}\right.\]]]></tex-math></alternatives>
</disp-formula> 
and 
<disp-formula id="j_infor426_eq_021">
<alternatives>
<mml:math display="block"><mml:mtable displaystyle="true"><mml:mtr><mml:mtd><mml:mtext>UACI</mml:mtext><mml:mo>=</mml:mo><mml:mstyle displaystyle="true"><mml:mfrac><mml:mrow><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:mi mathvariant="italic">m</mml:mi><mml:mo>×</mml:mo><mml:mi mathvariant="italic">n</mml:mi></mml:mrow></mml:mfrac></mml:mstyle><mml:munder><mml:mrow><mml:mstyle displaystyle="true"><mml:mo largeop="true" movablelimits="false">∑</mml:mo></mml:mstyle></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi><mml:mo mathvariant="normal">,</mml:mo><mml:mi mathvariant="italic">j</mml:mi></mml:mrow></mml:munder><mml:mstyle displaystyle="true"><mml:mfrac><mml:mrow><mml:mo stretchy="false">|</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">C</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="italic">i</mml:mi><mml:mo mathvariant="normal">,</mml:mo><mml:mi mathvariant="italic">j</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo><mml:mo>−</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">C</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="italic">i</mml:mi><mml:mo mathvariant="normal">,</mml:mo><mml:mi mathvariant="italic">j</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo><mml:mo stretchy="false">|</mml:mo></mml:mrow><mml:mrow><mml:mn>255</mml:mn></mml:mrow></mml:mfrac></mml:mstyle><mml:mo>.</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math>
<tex-math><![CDATA[\[ \text{UACI}=\frac{1}{m\times n}\sum \limits_{i,j}\frac{|{C_{1}}(i,j)-{C_{2}}(i,j)|}{255}.\]]]></tex-math></alternatives>
</disp-formula>
</p>
<p>According to Wu <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor426_ref_053">2011</xref>), the theoretical ideal NPCR and UACI measures for <inline-formula id="j_infor426_ineq_158"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">C</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${C_{1}}$]]></tex-math></alternatives></inline-formula> and <inline-formula id="j_infor426_ineq_159"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">C</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${C_{2}}$]]></tex-math></alternatives></inline-formula> to be random-like in comparison are approximately <inline-formula id="j_infor426_ineq_160"><alternatives>
<mml:math><mml:mn>99.6094</mml:mn><mml:mi mathvariant="normal">%</mml:mi></mml:math>
<tex-math><![CDATA[$99.6094\% $]]></tex-math></alternatives></inline-formula> and <inline-formula id="j_infor426_ineq_161"><alternatives>
<mml:math><mml:mn>33.4635</mml:mn><mml:mi mathvariant="normal">%</mml:mi></mml:math>
<tex-math><![CDATA[$33.4635\% $]]></tex-math></alternatives></inline-formula>, respectively. Furthermore, Table <xref rid="j_infor426_tab_008">8</xref> reports the acceptance intervals for the null hypothesis with different significance levels for the NPCR and UACI measures.</p>
<table-wrap id="j_infor426_tab_008">
<label>Table 8</label>
<caption>
<p>Acceptance intervals for the null hypothesis with different levels of significance (Wu <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor426_ref_053">2011</xref>).</p>
</caption>
<table>
<thead>
<tr>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Parameter</td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Size</td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">0.05-level</td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">0.01-level</td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">0.001-level</td>
</tr>
</thead>
<tbody>
<tr>
<td rowspan="3" style="vertical-align: top; text-align: left">NPCR</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor426_ineq_162"><alternatives>
<mml:math><mml:mn>256</mml:mn><mml:mo>×</mml:mo><mml:mn>256</mml:mn></mml:math>
<tex-math><![CDATA[$256\times 256$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor426_ineq_163"><alternatives>
<mml:math><mml:mo fence="true" stretchy="false">[</mml:mo><mml:mn>99.5693</mml:mn><mml:mo mathvariant="normal">,</mml:mo><mml:mn>100</mml:mn><mml:mo fence="true" stretchy="false">]</mml:mo></mml:math>
<tex-math><![CDATA[$[99.5693,100]$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor426_ineq_164"><alternatives>
<mml:math><mml:mo fence="true" stretchy="false">[</mml:mo><mml:mn>99.5527</mml:mn><mml:mo mathvariant="normal">,</mml:mo><mml:mn>100</mml:mn><mml:mo fence="true" stretchy="false">]</mml:mo></mml:math>
<tex-math><![CDATA[$[99.5527,100]$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor426_ineq_165"><alternatives>
<mml:math><mml:mo fence="true" stretchy="false">[</mml:mo><mml:mn>99.5341</mml:mn><mml:mo mathvariant="normal">,</mml:mo><mml:mn>100</mml:mn><mml:mo fence="true" stretchy="false">]</mml:mo></mml:math>
<tex-math><![CDATA[$[99.5341,100]$]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor426_ineq_166"><alternatives>
<mml:math><mml:mn>512</mml:mn><mml:mo>×</mml:mo><mml:mn>512</mml:mn></mml:math>
<tex-math><![CDATA[$512\times 512$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor426_ineq_167"><alternatives>
<mml:math><mml:mo fence="true" stretchy="false">[</mml:mo><mml:mn>99.5893</mml:mn><mml:mo mathvariant="normal">,</mml:mo><mml:mn>100</mml:mn><mml:mo fence="true" stretchy="false">]</mml:mo></mml:math>
<tex-math><![CDATA[$[99.5893,100]$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor426_ineq_168"><alternatives>
<mml:math><mml:mo fence="true" stretchy="false">[</mml:mo><mml:mn>99.5810</mml:mn><mml:mo mathvariant="normal">,</mml:mo><mml:mn>100</mml:mn><mml:mo fence="true" stretchy="false">]</mml:mo></mml:math>
<tex-math><![CDATA[$[99.5810,100]$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor426_ineq_169"><alternatives>
<mml:math><mml:mo fence="true" stretchy="false">[</mml:mo><mml:mn>99.5717</mml:mn><mml:mo mathvariant="normal">,</mml:mo><mml:mn>100</mml:mn><mml:mo fence="true" stretchy="false">]</mml:mo></mml:math>
<tex-math><![CDATA[$[99.5717,100]$]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor426_ineq_170"><alternatives>
<mml:math><mml:mn>1024</mml:mn><mml:mo>×</mml:mo><mml:mn>1024</mml:mn></mml:math>
<tex-math><![CDATA[$1024\times 1024$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor426_ineq_171"><alternatives>
<mml:math><mml:mo fence="true" stretchy="false">[</mml:mo><mml:mn>99.5994</mml:mn><mml:mo mathvariant="normal">,</mml:mo><mml:mn>100</mml:mn><mml:mo fence="true" stretchy="false">]</mml:mo></mml:math>
<tex-math><![CDATA[$[99.5994,100]$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor426_ineq_172"><alternatives>
<mml:math><mml:mo fence="true" stretchy="false">[</mml:mo><mml:mn>99.5952</mml:mn><mml:mo mathvariant="normal">,</mml:mo><mml:mn>100</mml:mn><mml:mo fence="true" stretchy="false">]</mml:mo></mml:math>
<tex-math><![CDATA[$[99.5952,100]$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor426_ineq_173"><alternatives>
<mml:math><mml:mo fence="true" stretchy="false">[</mml:mo><mml:mn>99.5906</mml:mn><mml:mo mathvariant="normal">,</mml:mo><mml:mn>100</mml:mn><mml:mo fence="true" stretchy="false">]</mml:mo></mml:math>
<tex-math><![CDATA[$[99.5906,100]$]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td rowspan="3" style="vertical-align: top; text-align: left; border-bottom: solid thin">UACI</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor426_ineq_174"><alternatives>
<mml:math><mml:mn>256</mml:mn><mml:mo>×</mml:mo><mml:mn>256</mml:mn></mml:math>
<tex-math><![CDATA[$256\times 256$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor426_ineq_175"><alternatives>
<mml:math><mml:mo fence="true" stretchy="false">[</mml:mo><mml:mn>33.2824</mml:mn><mml:mo mathvariant="normal">,</mml:mo><mml:mn>33.6447</mml:mn><mml:mo fence="true" stretchy="false">]</mml:mo></mml:math>
<tex-math><![CDATA[$[33.2824,33.6447]$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor426_ineq_176"><alternatives>
<mml:math><mml:mo fence="true" stretchy="false">[</mml:mo><mml:mn>33.2255</mml:mn><mml:mo mathvariant="normal">,</mml:mo><mml:mn>33.7016</mml:mn><mml:mo fence="true" stretchy="false">]</mml:mo></mml:math>
<tex-math><![CDATA[$[33.2255,33.7016]$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor426_ineq_177"><alternatives>
<mml:math><mml:mo fence="true" stretchy="false">[</mml:mo><mml:mn>33.1594</mml:mn><mml:mo mathvariant="normal">,</mml:mo><mml:mn>33.7677</mml:mn><mml:mo fence="true" stretchy="false">]</mml:mo></mml:math>
<tex-math><![CDATA[$[33.1594,33.7677]$]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor426_ineq_178"><alternatives>
<mml:math><mml:mn>512</mml:mn><mml:mo>×</mml:mo><mml:mn>512</mml:mn></mml:math>
<tex-math><![CDATA[$512\times 512$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor426_ineq_179"><alternatives>
<mml:math><mml:mo fence="true" stretchy="false">[</mml:mo><mml:mn>33.3730</mml:mn><mml:mo mathvariant="normal">,</mml:mo><mml:mn>33.5541</mml:mn><mml:mo fence="true" stretchy="false">]</mml:mo></mml:math>
<tex-math><![CDATA[$[33.3730,33.5541]$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor426_ineq_180"><alternatives>
<mml:math><mml:mo fence="true" stretchy="false">[</mml:mo><mml:mn>33.3445</mml:mn><mml:mo mathvariant="normal">,</mml:mo><mml:mn>33.5826</mml:mn><mml:mo fence="true" stretchy="false">]</mml:mo></mml:math>
<tex-math><![CDATA[$[33.3445,33.5826]$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor426_ineq_181"><alternatives>
<mml:math><mml:mo fence="true" stretchy="false">[</mml:mo><mml:mn>33.3115</mml:mn><mml:mo mathvariant="normal">,</mml:mo><mml:mn>33.6156</mml:mn><mml:mo fence="true" stretchy="false">]</mml:mo></mml:math>
<tex-math><![CDATA[$[33.3115,33.6156]$]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><inline-formula id="j_infor426_ineq_182"><alternatives>
<mml:math><mml:mn>1024</mml:mn><mml:mo>×</mml:mo><mml:mn>1024</mml:mn></mml:math>
<tex-math><![CDATA[$1024\times 1024$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><inline-formula id="j_infor426_ineq_183"><alternatives>
<mml:math><mml:mo fence="true" stretchy="false">[</mml:mo><mml:mn>33.4183</mml:mn><mml:mo mathvariant="normal">,</mml:mo><mml:mn>33.5088</mml:mn><mml:mo fence="true" stretchy="false">]</mml:mo></mml:math>
<tex-math><![CDATA[$[33.4183,33.5088]$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><inline-formula id="j_infor426_ineq_184"><alternatives>
<mml:math><mml:mo fence="true" stretchy="false">[</mml:mo><mml:mn>33.4040</mml:mn><mml:mo mathvariant="normal">,</mml:mo><mml:mn>33.5231</mml:mn><mml:mo fence="true" stretchy="false">]</mml:mo></mml:math>
<tex-math><![CDATA[$[33.4040,33.5231]$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><inline-formula id="j_infor426_ineq_185"><alternatives>
<mml:math><mml:mo fence="true" stretchy="false">[</mml:mo><mml:mn>33.3875</mml:mn><mml:mo mathvariant="normal">,</mml:mo><mml:mn>33.5396</mml:mn><mml:mo fence="true" stretchy="false">]</mml:mo></mml:math>
<tex-math><![CDATA[$[33.3875,33.5396]$]]></tex-math></alternatives></inline-formula></td>
</tr>
</tbody>
</table>
</table-wrap>
<p>We evaluate the robustness of the proposed image encryption scheme by considering two plain-images <inline-formula id="j_infor426_ineq_186"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">P</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${P_{1}}$]]></tex-math></alternatives></inline-formula> and <inline-formula id="j_infor426_ineq_187"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">P</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${P_{2}}$]]></tex-math></alternatives></inline-formula>, where <inline-formula id="j_infor426_ineq_188"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">P</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${P_{1}}$]]></tex-math></alternatives></inline-formula> and <inline-formula id="j_infor426_ineq_189"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">P</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${P_{2}}$]]></tex-math></alternatives></inline-formula> differ in a single bit. We encrypt <inline-formula id="j_infor426_ineq_190"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">P</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${P_{1}}$]]></tex-math></alternatives></inline-formula> and <inline-formula id="j_infor426_ineq_191"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">P</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${P_{2}}$]]></tex-math></alternatives></inline-formula> using the proposed image encryption scheme, with the same secret key and parameters, to get cipher-images <inline-formula id="j_infor426_ineq_192"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">C</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${C_{1}}$]]></tex-math></alternatives></inline-formula> and <inline-formula id="j_infor426_ineq_193"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">C</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${C_{2}}$]]></tex-math></alternatives></inline-formula>, respectively. We then compute the NPCR and UACI measures between <inline-formula id="j_infor426_ineq_194"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">C</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${C_{1}}$]]></tex-math></alternatives></inline-formula> and <inline-formula id="j_infor426_ineq_195"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">C</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${C_{2}}$]]></tex-math></alternatives></inline-formula>. For each test image Barbara, Lena and Elaine, we repeat this test 100 times, where each time we flip the least significant bit of a randomly selected intensity value in the plain-image (including the first and the last intensity value). The minimum, mean and maximum NPCR and UACI measures of the ciphers-images of the original plain-image for each of the 100 cipher-images resulting from a slight modification to the original plain-image are reported in Table <xref rid="j_infor426_tab_009">9</xref>.</p>
<table-wrap id="j_infor426_tab_009">
<label>Table 9</label>
<caption>
<p>NPCR and UACI measures between cipher-images <inline-formula id="j_infor426_ineq_196"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">C</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${C_{1}}$]]></tex-math></alternatives></inline-formula> and <inline-formula id="j_infor426_ineq_197"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">C</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${C_{2}}$]]></tex-math></alternatives></inline-formula> corresponding to the test images Barbara, Lena and Elaine, with slight modifications.</p>
</caption>
<table>
<thead>
<tr>
<td rowspan="2" style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Measures</td>
<td colspan="3" style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Cipher-images of Barbara</td>
<td colspan="3" style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Cipher-images of Lena</td>
<td colspan="3" style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Cipher-images of Elaine</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">Min</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">Mean</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">Max</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">Min</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">Mean</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">Max</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">Min</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">Mean</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">Max</td>
</tr>
</thead>
<tbody>
<tr>
<td style="vertical-align: top; text-align: left">NPCR</td>
<td style="vertical-align: top; text-align: left">99.5483</td>
<td style="vertical-align: top; text-align: left">99.6093</td>
<td style="vertical-align: top; text-align: left">99.6796</td>
<td style="vertical-align: top; text-align: left">99.5819</td>
<td style="vertical-align: top; text-align: left">99.6110</td>
<td style="vertical-align: top; text-align: left">99.6399</td>
<td style="vertical-align: top; text-align: left">99.5972</td>
<td style="vertical-align: top; text-align: left">99.6089</td>
<td style="vertical-align: top; text-align: left">99.6252</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">UACI</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">33.2820</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">33.4913</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">33.6932</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">33.3231</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">33.4388</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">33.5638</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">33.4136</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">33.4649</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">33.5160</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>We further evaluate the robustness of the proposed scheme by subjecting each of the first 100 test images from (BOWS2) to the plain-image sensitivity test. For each plain-image we repeat the test 100 times, where each time we make a change to the least significant bit of a randomly chosen intensity value of the original plain-image. It turns out that the pass rate for the NPCR is <inline-formula id="j_infor426_ineq_198"><alternatives>
<mml:math><mml:mn>99.85</mml:mn><mml:mi mathvariant="normal">%</mml:mi></mml:math>
<tex-math><![CDATA[$99.85\% $]]></tex-math></alternatives></inline-formula> and that for the UACI is <inline-formula id="j_infor426_ineq_199"><alternatives>
<mml:math><mml:mn>99.93</mml:mn><mml:mi mathvariant="normal">%</mml:mi></mml:math>
<tex-math><![CDATA[$99.93\% $]]></tex-math></alternatives></inline-formula>. Figure <xref rid="j_infor426_fig_010">7</xref> depicts a point plot, where each point corresponds to an NPCR/UACI measure resulting from repeating the sensitivity test 100 times for each of the 100 images from (BOWS2). It is evident from this figure that the proposed scheme is robust against plain-image sensitivity.</p>
<fig id="j_infor426_fig_010">
<label>Fig. 7</label>
<caption>
<p>NPCR (left) and UACI (right) measures for plain-image sensitivity of the proposed scheme. Each point represent an NPCR/UACI measure resulting from repeating the test 100 for each test image in (BOWS2).</p>
</caption>
<graphic xlink:href="infor426_g011.jpg"/>
</fig>
</sec>
<sec id="j_infor426_s_017">
<label>5.2</label>
<title>Keyspace</title>
<p>The secret key <inline-formula id="j_infor426_ineq_200"><alternatives>
<mml:math><mml:mi mathvariant="double-struck">K</mml:mi></mml:math>
<tex-math><![CDATA[$\mathbb{K}$]]></tex-math></alternatives></inline-formula> of the proposed scheme is composed of two doubles <inline-formula id="j_infor426_ineq_201"><alternatives>
<mml:math><mml:mi mathvariant="italic">p</mml:mi><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">u</mml:mi></mml:mrow><mml:mrow><mml:mn>0</mml:mn></mml:mrow></mml:msub><mml:mo stretchy="false">∈</mml:mo><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mn>0</mml:mn><mml:mo mathvariant="normal">,</mml:mo><mml:mn>1</mml:mn><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math>
<tex-math><![CDATA[$p,{u_{0}}\in (0,1)$]]></tex-math></alternatives></inline-formula> for the shuffling phase, as well as control parameters and initial conditions of the 4D cat map(s) used in the masking phase. In the latter, there are at least 12 positive integers (for control parameters) and four doubles in <inline-formula id="j_infor426_ineq_202"><alternatives>
<mml:math><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mn>0</mml:mn><mml:mo mathvariant="normal">,</mml:mo><mml:mn>1</mml:mn><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math>
<tex-math><![CDATA[$(0,1)$]]></tex-math></alternatives></inline-formula>. Under the assumption that 64-bit doubles and 8-bit integers are used to initialize the cat map, and with the commonly used precision of <inline-formula id="j_infor426_ineq_203"><alternatives>
<mml:math><mml:msup><mml:mrow><mml:mn>10</mml:mn></mml:mrow><mml:mrow><mml:mo>−</mml:mo><mml:mn>14</mml:mn></mml:mrow></mml:msup></mml:math>
<tex-math><![CDATA[${10^{-14}}$]]></tex-math></alternatives></inline-formula> for 64-bit doubles, the secret key of the proposed scheme has size at least <inline-formula id="j_infor426_ineq_204"><alternatives>
<mml:math><mml:msup><mml:mrow><mml:mfenced separators="" open="(" close=")"><mml:mrow><mml:msup><mml:mrow><mml:mn>2</mml:mn></mml:mrow><mml:mrow><mml:mn>8</mml:mn></mml:mrow></mml:msup></mml:mrow></mml:mfenced></mml:mrow><mml:mrow><mml:mn>12</mml:mn></mml:mrow></mml:msup><mml:mo>·</mml:mo><mml:msup><mml:mrow><mml:mfenced separators="" open="(" close=")"><mml:mrow><mml:msup><mml:mrow><mml:mn>10</mml:mn></mml:mrow><mml:mrow><mml:mn>14</mml:mn></mml:mrow></mml:msup></mml:mrow></mml:mfenced></mml:mrow><mml:mrow><mml:mn>6</mml:mn></mml:mrow></mml:msup><mml:mo mathvariant="normal">&gt;</mml:mo><mml:msup><mml:mrow><mml:mn>2</mml:mn></mml:mrow><mml:mrow><mml:mn>375</mml:mn></mml:mrow></mml:msup></mml:math>
<tex-math><![CDATA[${\left({2^{8}}\right)^{12}}\cdot {\left({10^{14}}\right)^{6}}>{2^{375}}$]]></tex-math></alternatives></inline-formula>. This number renders key search attacks impractical. The keyspace may further expand if we consider distinct transition matrices <inline-formula id="j_infor426_ineq_205"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">A</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">A</mml:mi></mml:mrow><mml:mrow><mml:mn>3</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:mo>…</mml:mo><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">A</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">s</mml:mi></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${A_{2}},{A_{3}},\dots ,{A_{s}}$]]></tex-math></alternatives></inline-formula> in Algorithm (<xref rid="j_infor426_fig_003">3</xref>). In such a case the size of the keyspace becomes <inline-formula id="j_infor426_ineq_206"><alternatives>
<mml:math><mml:msup><mml:mrow><mml:mfenced separators="" open="(" close=")"><mml:mrow><mml:msup><mml:mrow><mml:mn>2</mml:mn></mml:mrow><mml:mrow><mml:mn>8</mml:mn></mml:mrow></mml:msup></mml:mrow></mml:mfenced></mml:mrow><mml:mrow><mml:mn>12</mml:mn><mml:mi mathvariant="italic">s</mml:mi></mml:mrow></mml:msup><mml:mo>·</mml:mo><mml:msup><mml:mrow><mml:mfenced separators="" open="(" close=")"><mml:mrow><mml:msup><mml:mrow><mml:mn>10</mml:mn></mml:mrow><mml:mrow><mml:mn>14</mml:mn></mml:mrow></mml:msup></mml:mrow></mml:mfenced></mml:mrow><mml:mrow><mml:mn>6</mml:mn></mml:mrow></mml:msup></mml:math>
<tex-math><![CDATA[${\left({2^{8}}\right)^{12s}}\cdot {\left({10^{14}}\right)^{6}}$]]></tex-math></alternatives></inline-formula>, which with <inline-formula id="j_infor426_ineq_207"><alternatives>
<mml:math><mml:mi mathvariant="italic">s</mml:mi><mml:mo>=</mml:mo><mml:mn>5</mml:mn></mml:math>
<tex-math><![CDATA[$s=5$]]></tex-math></alternatives></inline-formula> yields a keyspace of size larger than <inline-formula id="j_infor426_ineq_208"><alternatives>
<mml:math><mml:mo mathvariant="normal">&gt;</mml:mo><mml:msup><mml:mrow><mml:mn>2</mml:mn></mml:mrow><mml:mrow><mml:mn>759</mml:mn></mml:mrow></mml:msup></mml:math>
<tex-math><![CDATA[$>{2^{759}}$]]></tex-math></alternatives></inline-formula>.</p>
<p>Figure <xref rid="j_infor426_fig_011">8</xref> depicts the bitwise xor (exclusive or) of two cipher-images <inline-formula id="j_infor426_ineq_209"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">C</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${C_{1}}$]]></tex-math></alternatives></inline-formula> and <inline-formula id="j_infor426_ineq_210"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">C</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${C_{2}}$]]></tex-math></alternatives></inline-formula> corresponding to the test image Lena with slightly different keys <inline-formula id="j_infor426_ineq_211"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="double-struck">K</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${\mathbb{K}_{1}}$]]></tex-math></alternatives></inline-formula> and <inline-formula id="j_infor426_ineq_212"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="double-struck">K</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${\mathbb{K}_{2}}$]]></tex-math></alternatives></inline-formula>. Figure <xref rid="j_infor426_fig_012">9</xref> shows histograms of the images presented in Fig. <xref rid="j_infor426_fig_011">8</xref>. Furthermore, Table <xref rid="j_infor426_tab_010">10</xref> reports the NPCR and UACI measures between cipher-images <inline-formula id="j_infor426_ineq_213"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">C</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${C_{1}}$]]></tex-math></alternatives></inline-formula> and <inline-formula id="j_infor426_ineq_214"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">C</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${C_{2}}$]]></tex-math></alternatives></inline-formula> of the three test images Barbara, Lena and Elaine generated using slightly different keys.</p>
<p>The experimental results presented in Fig. <xref rid="j_infor426_fig_011">8</xref>, Fig. <xref rid="j_infor426_fig_012">9</xref>, and Table <xref rid="j_infor426_tab_010">10</xref> demonstrate high sensitivity of the proposed scheme to its secret key, hence its robustness against key search attacks.</p>
<fig id="j_infor426_fig_011">
<label>Fig. 8</label>
<caption>
<p>Bitwise xor between cipher-images <inline-formula id="j_infor426_ineq_215"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">C</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${C_{1}}$]]></tex-math></alternatives></inline-formula> and <inline-formula id="j_infor426_ineq_216"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">C</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${C_{2}}$]]></tex-math></alternatives></inline-formula> corresponding to Lena with <inline-formula id="j_infor426_ineq_217"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="double-struck">K</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${\mathbb{K}_{1}}$]]></tex-math></alternatives></inline-formula> and <inline-formula id="j_infor426_ineq_218"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="double-struck">K</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${\mathbb{K}_{2}}$]]></tex-math></alternatives></inline-formula>. Left: <inline-formula id="j_infor426_ineq_219"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="double-struck">K</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${\mathbb{K}_{2}}$]]></tex-math></alternatives></inline-formula> differs from <inline-formula id="j_infor426_ineq_220"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="double-struck">K</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${\mathbb{K}_{1}}$]]></tex-math></alternatives></inline-formula> by <inline-formula id="j_infor426_ineq_221"><alternatives>
<mml:math><mml:msup><mml:mrow><mml:mn>10</mml:mn></mml:mrow><mml:mrow><mml:mo>−</mml:mo><mml:mn>14</mml:mn></mml:mrow></mml:msup></mml:math>
<tex-math><![CDATA[${10^{-14}}$]]></tex-math></alternatives></inline-formula> in one component of the initial condition of the 4D cat map. Right: <inline-formula id="j_infor426_ineq_222"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="double-struck">K</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${\mathbb{K}_{2}}$]]></tex-math></alternatives></inline-formula> differs from <inline-formula id="j_infor426_ineq_223"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="double-struck">K</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${\mathbb{K}_{1}}$]]></tex-math></alternatives></inline-formula> in the least significant bit of one control parameter of the 4D cat map.</p>
</caption>
<graphic xlink:href="infor426_g012.jpg"/>
</fig>
<fig id="j_infor426_fig_012">
<label>Fig. 9</label>
<caption>
<p>Histograms of the two images of Fig. <xref rid="j_infor426_fig_011">8</xref>, respectively.</p>
</caption>
<graphic xlink:href="infor426_g013.jpg"/>
</fig>
</sec>
<sec id="j_infor426_s_018">
<label>5.3</label>
<title>Cipher-Image and Plain-Image Analysis</title>
<p>In this section, we show that the proposed scheme is robust against cipher-image and plain-image analysis. In a cipher-image attack, the intruder has only access to the cipher-image. Since the above tests show that no useful information about the plain-image can be gained from the corresponding cipher-image, we conclude that the proposed scheme is robust against this type of attack. In a plain-image attack, the intruder can choose any part of the plain-image and request its corresponding cipher-image part. The aim of this attack is to reconstruct some other plain-image parts. The fact that the chaotic map possesses the one-way property due to floating point errors makes the inverse computation very difficult. Furthermore, since the proposed scheme is highly dependent on its secret key, one cannot predict further outputs of the 4D cat map. Thus, the scheme is robust against this type of attacks.</p>
<table-wrap id="j_infor426_tab_010">
<label>Table 10</label>
<caption>
<p>NPCR and UACI measures between cipher-images <inline-formula id="j_infor426_ineq_224"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">C</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${C_{1}}$]]></tex-math></alternatives></inline-formula> and <inline-formula id="j_infor426_ineq_225"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">C</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${C_{2}}$]]></tex-math></alternatives></inline-formula> corresponding to the test images Barbara, Lena and Elaine, with slight modifications in the secret key.</p>
</caption>
<table>
<thead>
<tr>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Measures</td>
<td colspan="2" style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Cipher-images of Barbara</td>
<td colspan="2" style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Cipher-images of Lena</td>
<td colspan="2" style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Cipher-images of Elaine</td>
</tr>
</thead>
<tbody>
<tr>
<td style="vertical-align: top; text-align: left">NPCR</td>
<td style="vertical-align: top; text-align: left">99.6338</td>
<td style="vertical-align: top; text-align: left">99.6124</td>
<td style="vertical-align: top; text-align: left">99.6002</td>
<td style="vertical-align: top; text-align: left">99.6101</td>
<td style="vertical-align: top; text-align: left">99.6215</td>
<td style="vertical-align: top; text-align: left">99.6066</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">UACI</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">33.6906</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">33.4831</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">33.3946</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">33.4988</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">33.4807</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">33.4435</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec id="j_infor426_s_019">
<label>5.4</label>
<title>Robustness to Noise and Data Loss</title>
<p>Earlier, we have shown that the proposed scheme is highly sensitive to its secret key, and it is also highly sensitive to a tiny change in its input plain-image. That is, a change in a plain-image intensity value spreads over all intensity values in the corresponding cipher-image. In this section, we show that a change in intensity values in the cipher-image affects only few intensity values in the corresponding plain-image. The importance of this feature is that with distortion of cipher-images due to salt and pepper noise or data loss one can still successfully recover the corresponding plain-image. Figure <xref rid="j_infor426_fig_013">10</xref> depicts median filtered recovered plain-image Lena resulting from subjecting its corresponding cipher-image to salt and pepper noise for different levels of added noise. Figure <xref rid="j_infor426_fig_014">11</xref> depicts the median filtered recovered plain-image Lena resulting from subjecting its corresponding cipher-image to data loss for different sizes of data loss.</p>
<fig id="j_infor426_fig_013">
<label>Fig. 10</label>
<caption>
<p>The reconstructed plain-image Lena resulting from subjecting its corresponding cipher-image to a <inline-formula id="j_infor426_ineq_226"><alternatives>
<mml:math><mml:mn>1</mml:mn><mml:mi mathvariant="normal">%</mml:mi></mml:math>
<tex-math><![CDATA[$1\% $]]></tex-math></alternatives></inline-formula>, <inline-formula id="j_infor426_ineq_227"><alternatives>
<mml:math><mml:mn>2</mml:mn><mml:mi mathvariant="normal">%</mml:mi></mml:math>
<tex-math><![CDATA[$2\% $]]></tex-math></alternatives></inline-formula>, <inline-formula id="j_infor426_ineq_228"><alternatives>
<mml:math><mml:mn>3</mml:mn><mml:mi mathvariant="normal">%</mml:mi></mml:math>
<tex-math><![CDATA[$3\% $]]></tex-math></alternatives></inline-formula> and <inline-formula id="j_infor426_ineq_229"><alternatives>
<mml:math><mml:mn>4</mml:mn><mml:mi mathvariant="normal">%</mml:mi></mml:math>
<tex-math><![CDATA[$4\% $]]></tex-math></alternatives></inline-formula> salt and pepper noise.</p>
</caption>
<graphic xlink:href="infor426_g014.jpg"/>
</fig>
<fig id="j_infor426_fig_014">
<label>Fig. 11</label>
<caption>
<p>The reconstructed plain-image Lena (bottom) resulting from subjecting its corresponding cipher-image to a <inline-formula id="j_infor426_ineq_230"><alternatives>
<mml:math><mml:mn>10</mml:mn><mml:mi mathvariant="normal">%</mml:mi></mml:math>
<tex-math><![CDATA[$10\% $]]></tex-math></alternatives></inline-formula>, <inline-formula id="j_infor426_ineq_231"><alternatives>
<mml:math><mml:mn>25</mml:mn><mml:mi mathvariant="normal">%</mml:mi></mml:math>
<tex-math><![CDATA[$25\% $]]></tex-math></alternatives></inline-formula>, <inline-formula id="j_infor426_ineq_232"><alternatives>
<mml:math><mml:mn>50</mml:mn><mml:mi mathvariant="normal">%</mml:mi></mml:math>
<tex-math><![CDATA[$50\% $]]></tex-math></alternatives></inline-formula> and <inline-formula id="j_infor426_ineq_233"><alternatives>
<mml:math><mml:mn>75</mml:mn><mml:mi mathvariant="normal">%</mml:mi></mml:math>
<tex-math><![CDATA[$75\% $]]></tex-math></alternatives></inline-formula> data loss (top).</p>
</caption>
<graphic xlink:href="infor426_g015.jpg"/>
</fig>
</sec>
</sec>
<sec id="j_infor426_s_020">
<label>6</label>
<title>Comparison with Existing Work</title>
<p>In this section, we compare the performance of the proposed scheme Pr-IES with existing ones. Figure <xref rid="j_infor426_fig_015">12</xref> presents NPCR and UACI measures for cipher-images corresponding to 25 test images in Test-images (<xref ref-type="bibr" rid="j_infor426_ref_066">2019</xref>) for a number of existing schemes. There are 7 test images of size <inline-formula id="j_infor426_ineq_234"><alternatives>
<mml:math><mml:mn>256</mml:mn><mml:mo>×</mml:mo><mml:mn>256</mml:mn></mml:math>
<tex-math><![CDATA[$256\times 256$]]></tex-math></alternatives></inline-formula> (top), 15 of size <inline-formula id="j_infor426_ineq_235"><alternatives>
<mml:math><mml:mn>512</mml:mn><mml:mo>×</mml:mo><mml:mn>512</mml:mn></mml:math>
<tex-math><![CDATA[$512\times 512$]]></tex-math></alternatives></inline-formula> (middle) and 3 of size <inline-formula id="j_infor426_ineq_236"><alternatives>
<mml:math><mml:mn>1024</mml:mn><mml:mo>×</mml:mo><mml:mn>1024</mml:mn></mml:math>
<tex-math><![CDATA[$1024\times 1024$]]></tex-math></alternatives></inline-formula> (bottom). Figure <xref rid="j_infor426_fig_015">12</xref> shows that the pass rate for the proposed scheme is <inline-formula id="j_infor426_ineq_237"><alternatives>
<mml:math><mml:mn>25</mml:mn><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mn>25</mml:mn></mml:math>
<tex-math><![CDATA[$25/25$]]></tex-math></alternatives></inline-formula> with <inline-formula id="j_infor426_ineq_238"><alternatives>
<mml:math><mml:mi mathvariant="italic">α</mml:mi><mml:mo>=</mml:mo><mml:mn>0.05</mml:mn></mml:math>
<tex-math><![CDATA[$\alpha =0.05$]]></tex-math></alternatives></inline-formula> significance level for the NPCR and UACI measures. Table <xref rid="j_infor426_tab_011">11</xref> reports the schemes under comparison and the pass rate of each scheme.</p>
<table-wrap id="j_infor426_tab_011">
<label>Table 11</label>
<caption>
<p>The NPCR and UACI pass rates of the proposed scheme and some existing schemes. The pass rates for the schemes under comparison are quoted from Hua <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor426_ref_023">2019</xref>).</p>
</caption>
<table>
<thead>
<tr>
<td rowspan="2" style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Scheme</td>
<td colspan="2" style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Pass rate</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">NPCR</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">UACI</td>
</tr>
</thead>
<tbody>
<tr>
<td style="vertical-align: top; text-align: left">WWZ (Wang <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor426_ref_052">2015</xref>)</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor426_ineq_239"><alternatives>
<mml:math><mml:mn>23</mml:mn><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mn>25</mml:mn></mml:math>
<tex-math><![CDATA[$23/25$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor426_ineq_240"><alternatives>
<mml:math><mml:mn>22</mml:mn><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mn>25</mml:mn></mml:math>
<tex-math><![CDATA[$22/25$]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">ZBC1 (Zhou <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor426_ref_062">2014</xref>)</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor426_ineq_241"><alternatives>
<mml:math><mml:mn>15</mml:mn><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mn>25</mml:mn></mml:math>
<tex-math><![CDATA[$15/25$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor426_ineq_242"><alternatives>
<mml:math><mml:mn>6</mml:mn><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mn>25</mml:mn></mml:math>
<tex-math><![CDATA[$6/25$]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">XLLH (Xu <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor426_ref_058">2016</xref>)</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor426_ineq_243"><alternatives>
<mml:math><mml:mn>23</mml:mn><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mn>25</mml:mn></mml:math>
<tex-math><![CDATA[$23/25$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor426_ineq_244"><alternatives>
<mml:math><mml:mn>23</mml:mn><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mn>25</mml:mn></mml:math>
<tex-math><![CDATA[$23/25$]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">LSZ (Liu <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor426_ref_037">2016</xref>)</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor426_ineq_245"><alternatives>
<mml:math><mml:mn>23</mml:mn><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mn>25</mml:mn></mml:math>
<tex-math><![CDATA[$23/25$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor426_ineq_246"><alternatives>
<mml:math><mml:mn>23</mml:mn><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mn>25</mml:mn></mml:math>
<tex-math><![CDATA[$23/25$]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">HZ (Hua and Zhou, <xref ref-type="bibr" rid="j_infor426_ref_020">2017</xref>)</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor426_ineq_247"><alternatives>
<mml:math><mml:mn>24</mml:mn><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mn>25</mml:mn></mml:math>
<tex-math><![CDATA[$24/25$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor426_ineq_248"><alternatives>
<mml:math><mml:mn>24</mml:mn><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mn>25</mml:mn></mml:math>
<tex-math><![CDATA[$24/25$]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">ZBC2 (Zhou <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor426_ref_061">2013</xref>)</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor426_ineq_249"><alternatives>
<mml:math><mml:mn>23</mml:mn><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mn>25</mml:mn></mml:math>
<tex-math><![CDATA[$23/25$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor426_ineq_250"><alternatives>
<mml:math><mml:mn>7</mml:mn><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mn>25</mml:mn></mml:math>
<tex-math><![CDATA[$7/25$]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">WZNA (Wu <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor426_ref_055">2014</xref>)</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor426_ineq_251"><alternatives>
<mml:math><mml:mn>23</mml:mn><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mn>25</mml:mn></mml:math>
<tex-math><![CDATA[$23/25$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor426_ineq_252"><alternatives>
<mml:math><mml:mn>22</mml:mn><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mn>25</mml:mn></mml:math>
<tex-math><![CDATA[$22/25$]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">CSL (Cao <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor426_ref_005">2018</xref>)</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor426_ineq_253"><alternatives>
<mml:math><mml:mn>24</mml:mn><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mn>25</mml:mn></mml:math>
<tex-math><![CDATA[$24/25$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor426_ineq_254"><alternatives>
<mml:math><mml:mn>25</mml:mn><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mn>25</mml:mn></mml:math>
<tex-math><![CDATA[$25/25$]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">HZH (Hua <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor426_ref_023">2019</xref>)</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor426_ineq_255"><alternatives>
<mml:math><mml:mn>25</mml:mn><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mn>25</mml:mn></mml:math>
<tex-math><![CDATA[$25/25$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor426_ineq_256"><alternatives>
<mml:math><mml:mn>25</mml:mn><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mn>25</mml:mn></mml:math>
<tex-math><![CDATA[$25/25$]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">Pr-IES</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><inline-formula id="j_infor426_ineq_257"><alternatives>
<mml:math><mml:mn>25</mml:mn><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mn>25</mml:mn></mml:math>
<tex-math><![CDATA[$25/25$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><inline-formula id="j_infor426_ineq_258"><alternatives>
<mml:math><mml:mn>25</mml:mn><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mn>25</mml:mn></mml:math>
<tex-math><![CDATA[$25/25$]]></tex-math></alternatives></inline-formula></td>
</tr>
</tbody>
</table>
</table-wrap>
<fig id="j_infor426_fig_015">
<label>Fig. 12</label>
<caption>
<p>NPCR (left) and UACI (right) measures for cipher-images generated by existing image encryption schemes and the proposed scheme. The measures for existing schemes are obtained from Hua <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor426_ref_023">2019</xref>).</p>
</caption>
<graphic xlink:href="infor426_g016.jpg"/>
</fig>
<p>We further compare the correlation coefficients between adjacent pixels of the proposed scheme and existing ones. Figure <xref rid="j_infor426_fig_016">13</xref> depicts the correlation coefficients between adjacent intensity values in the horizontal, vertical and diagonal directions for the test image Lena and its corresponding cipher-images generated by the proposed scheme and existing schemes. Note the schemes proposed in Fu <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor426_ref_012">2011</xref>) and Liao <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor426_ref_035">2010</xref>) are referred to by FLMLC and LLZ, respectively.</p>
<fig id="j_infor426_fig_016">
<label>Fig. 13</label>
<caption>
<p>Adjacent intensity values correlation coefficients for the test image Lena and corresponding cipher-images generated by existing schemes and the proposed scheme. The values for existing schemes are obtained from Hua <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor426_ref_023">2019</xref>).</p>
</caption>
<graphic xlink:href="infor426_g017.jpg"/>
</fig>
<p>Table <xref rid="j_infor426_tab_012">12</xref> reports the running time in seconds for encrypting a single image with some existing schemes and the proposed scheme. The reported running times for the schemes under comparison are quoted from Hua <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor426_ref_023">2019</xref>). According to Hua <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor426_ref_023">2019</xref>), the reported running times for existing schemes are obtained on a computer under the following environments: Intel® Core™ i7-7700 CPU @3.60 GHz and 8 GB of memory, running Windows 10 operating system. While the reported running times for the proposed scheme Pr-IES are obtained on a desktop machine with an Intel® Core™ i7-4770 processor @3.40 GHz and 8GB of memory, running Windows 10 operating system.</p>
<table-wrap id="j_infor426_tab_012">
<label>Table 12</label>
<caption>
<p>Running time in seconds for encrypting a single image by existing schemes and the proposed encryption scheme Pr-IES. The running times for the schemes under comparison are quoted from Hua <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor426_ref_023">2019</xref>) used under license CC BY-NC-ND 4.0 (License, <xref ref-type="bibr" rid="j_infor426_ref_065">2020</xref>).</p>
</caption>
<table>
<thead>
<tr>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Image size</td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin"><inline-formula id="j_infor426_ineq_259"><alternatives>
<mml:math><mml:mn>128</mml:mn><mml:mo>×</mml:mo><mml:mn>128</mml:mn></mml:math>
<tex-math><![CDATA[$128\times 128$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin"><inline-formula id="j_infor426_ineq_260"><alternatives>
<mml:math><mml:mn>256</mml:mn><mml:mo>×</mml:mo><mml:mn>256</mml:mn></mml:math>
<tex-math><![CDATA[$256\times 256$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin"><inline-formula id="j_infor426_ineq_261"><alternatives>
<mml:math><mml:mn>512</mml:mn><mml:mo>×</mml:mo><mml:mn>512</mml:mn></mml:math>
<tex-math><![CDATA[$512\times 512$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin"><inline-formula id="j_infor426_ineq_262"><alternatives>
<mml:math><mml:mn>1024</mml:mn><mml:mo>×</mml:mo><mml:mn>1024</mml:mn></mml:math>
<tex-math><![CDATA[$1024\times 1024$]]></tex-math></alternatives></inline-formula></td>
</tr>
</thead>
<tbody>
<tr>
<td style="vertical-align: top; text-align: left">(Diaconu, <xref ref-type="bibr" rid="j_infor426_ref_010">2016</xref>)</td>
<td style="vertical-align: top; text-align: left">0.0579</td>
<td style="vertical-align: top; text-align: left">0.2224</td>
<td style="vertical-align: top; text-align: left">0.9731</td>
<td style="vertical-align: top; text-align: left">3.8377</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">(Ping <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor426_ref_041">2018</xref>)</td>
<td style="vertical-align: top; text-align: left">0.0902</td>
<td style="vertical-align: top; text-align: left">0.3440</td>
<td style="vertical-align: top; text-align: left">1.3357</td>
<td style="vertical-align: top; text-align: left">5.3223</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">(Chai <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor426_ref_006">2017</xref>)</td>
<td style="vertical-align: top; text-align: left">0.2757</td>
<td style="vertical-align: top; text-align: left">0.9810</td>
<td style="vertical-align: top; text-align: left">3.8539</td>
<td style="vertical-align: top; text-align: left">15.4565</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">(Hua and Zhou, <xref ref-type="bibr" rid="j_infor426_ref_020">2017</xref>)</td>
<td style="vertical-align: top; text-align: left">0.1531</td>
<td style="vertical-align: top; text-align: left">0.6347</td>
<td style="vertical-align: top; text-align: left">2.4913</td>
<td style="vertical-align: top; text-align: left">9.9185</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">(Xu <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor426_ref_058">2016</xref>)</td>
<td style="vertical-align: top; text-align: left">0.0247</td>
<td style="vertical-align: top; text-align: left">0.1164</td>
<td style="vertical-align: top; text-align: left">0.4924</td>
<td style="vertical-align: top; text-align: left">20.144</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">(Zhou <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor426_ref_062">2014</xref>)</td>
<td style="vertical-align: top; text-align: left">0.0933</td>
<td style="vertical-align: top; text-align: left">0.3843</td>
<td style="vertical-align: top; text-align: left">1.4824</td>
<td style="vertical-align: top; text-align: left">5.8175</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">(Liao <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor426_ref_035">2010</xref>)</td>
<td style="vertical-align: top; text-align: left">0.0323</td>
<td style="vertical-align: top; text-align: left">0.1440</td>
<td style="vertical-align: top; text-align: left">0.5510</td>
<td style="vertical-align: top; text-align: left">2.0864</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">(Hua <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor426_ref_023">2019</xref>)</td>
<td style="vertical-align: top; text-align: left">0.0244</td>
<td style="vertical-align: top; text-align: left">0.0949</td>
<td style="vertical-align: top; text-align: left">0.4010</td>
<td style="vertical-align: top; text-align: left">1.9857</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">Pr-IES</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.0217</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.0645</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.2422</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">1.0021</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>It is evident from the obtained results that the proposed scheme has superiority over existing schemes and competitive with others.</p>
</sec>
<sec id="j_infor426_s_021">
<label>7</label>
<title>Conclusion</title>
<p>We propose a new family of 4D chaotic cat maps. As an application of these maps, we present a novel block-based image encryption scheme utilizing them. This scheme consists of a light shuffling phase and a masking phase which uses measures of central tendency for mixing the image blocks. While encryption is highly sensitive to the secret key and the input image, decryption is robust against noise and cropping of the cipher-image. Simulations show that the proposed scheme generates cipher-images possessing high randomness properties. Furthermore, the scheme is shown to be robust against differential cryptanalysis. With respect to existing works, the proposed scheme is shown to have superior performance over existing image encryption algorithms and to be competitive with others.</p>
</sec>
</body>
<back>
<ack id="j_infor426_ack_001">
<title>Acknowledgements</title>
<p>The authors are grateful to the anonymous referees whose remarks helped improve the presentation of this work.</p></ack>
<ref-list id="j_infor426_reflist_001">
<title>References</title>
<ref id="j_infor426_ref_001">
<mixed-citation publication-type="journal"><string-name><surname>Alvarez</surname>, <given-names>G.</given-names></string-name>, <string-name><surname>Li</surname>, <given-names>S.</given-names></string-name> (<year>2006</year>). <article-title>Some basic cryptographic requirements for chaos-based cryptosystems</article-title>. <source>International Journal of Bifurcation and Chaos</source>, <volume>16</volume>(<issue>08</issue>), <fpage>2129</fpage>–<lpage>2151</lpage>.</mixed-citation>
</ref>
<ref id="j_infor426_ref_002">
<mixed-citation publication-type="book"><string-name><surname>Arnol’d</surname>, <given-names>V.I.</given-names></string-name>, <string-name><surname>Avez</surname>, <given-names>A.</given-names></string-name> (<year>1968</year>). <source>Ergodic Problems of Classical Mechanics</source>. WA Benjamin.</mixed-citation>
</ref>
<ref id="j_infor426_ref_003">
<mixed-citation publication-type="other"><string-name><surname>Bassham</surname>, <given-names>L.E.</given-names> <suffix>III.</suffix></string-name>, <string-name><surname>Rukhin</surname>, <given-names>A.L.</given-names></string-name>, <string-name><surname>Soto</surname>, <given-names>J.</given-names></string-name>, <string-name><surname>Nechvatal</surname>, <given-names>J.R.</given-names></string-name>, <string-name><surname>Smid</surname>, <given-names>M.E.</given-names></string-name>, <string-name><surname>Barker</surname>, <given-names>E.B.</given-names></string-name>, <string-name><surname>Leigh</surname>, <given-names>S.D.</given-names></string-name>, <string-name><surname>Levenson</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Vangel</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Banks</surname>, <given-names>D.L.</given-names></string-name> (2010). Sp 800-22 rev. 1a. A statistical test suite for random and pseudorandom number generators for cryptographic applications.</mixed-citation>
</ref>
<ref id="j_infor426_ref_004">
<mixed-citation publication-type="journal"><string-name><surname>Behnia</surname>, <given-names>S.</given-names></string-name>, <string-name><surname>Akhshani</surname>, <given-names>A.</given-names></string-name>, <string-name><surname>Mahmodi</surname>, <given-names>H.</given-names></string-name>, <string-name><surname>Akhavan</surname>, <given-names>A.</given-names></string-name> (<year>2008</year>). <article-title>Chaotic cryptographic scheme based on composition maps</article-title>. <source>International Journal of Bifurcation and Chaos</source>, <volume>18</volume>(<issue>01</issue>), <fpage>251</fpage>–<lpage>261</lpage>.</mixed-citation>
</ref>
<ref id="j_infor426_ref_005">
<mixed-citation publication-type="journal"><string-name><surname>Cao</surname>, <given-names>C.</given-names></string-name>, <string-name><surname>Sun</surname>, <given-names>K.</given-names></string-name>, <string-name><surname>Liu</surname>, <given-names>W.</given-names></string-name> (<year>2018</year>). <article-title>A novel bit-level image encryption algorithm based on 2D-LICM hyperchaotic map</article-title>. <source>Signal Processing</source>, <volume>143</volume>, <fpage>122</fpage>–<lpage>133</lpage>.</mixed-citation>
</ref>
<ref id="j_infor426_ref_006">
<mixed-citation publication-type="journal"><string-name><surname>Chai</surname>, <given-names>X.</given-names></string-name>, <string-name><surname>Chen</surname>, <given-names>Y.</given-names></string-name>, <string-name><surname>Broyde</surname>, <given-names>L.</given-names></string-name> (<year>2017</year>). <article-title>A novel chaos-based image encryption algorithm using DNA sequence operations</article-title>. <source>Optics and Lasers in Engineering</source>, <volume>88</volume>, <fpage>197</fpage>–<lpage>213</lpage>.</mixed-citation>
</ref>
<ref id="j_infor426_ref_007">
<mixed-citation publication-type="journal"><string-name><surname>Cheddad</surname>, <given-names>A.</given-names></string-name>, <string-name><surname>Condell</surname>, <given-names>J.</given-names></string-name>, <string-name><surname>Curran</surname>, <given-names>K.</given-names></string-name>, <string-name><surname>Mc Kevitt</surname>, <given-names>P.</given-names></string-name> (<year>2010</year>). <article-title>Digital image steganography: survey and analysis of current methods</article-title>. <source>Signal Processing</source>, <volume>90</volume>(<issue>3</issue>), <fpage>727</fpage>–<lpage>752</lpage>.</mixed-citation>
</ref>
<ref id="j_infor426_ref_008">
<mixed-citation publication-type="journal"><string-name><surname>Chen</surname>, <given-names>G.</given-names></string-name>, <string-name><surname>Mao</surname>, <given-names>Y.</given-names></string-name>, <string-name><surname>Chui</surname>, <given-names>C.K.</given-names></string-name> (<year>2004</year>). <article-title>A symmetric image encryption scheme based on 3D chaotic cat maps</article-title>. <source>Chaos, Solitons &amp; Fractals</source>, <volume>21</volume>(<issue>3</issue>), <fpage>749</fpage>–<lpage>761</lpage>.</mixed-citation>
</ref>
<ref id="j_infor426_ref_009">
<mixed-citation publication-type="journal"><string-name><surname>Cokal</surname>, <given-names>C.</given-names></string-name>, <string-name><surname>Solak</surname>, <given-names>E.</given-names></string-name> (<year>2009</year>). <article-title>Cryptanalysis of a chaos-based image encryption algorithm</article-title>. <source>Physics Letters A</source>, <volume>373</volume>(<issue>15</issue>), <fpage>1357</fpage>–<lpage>1360</lpage>.</mixed-citation>
</ref>
<ref id="j_infor426_ref_010">
<mixed-citation publication-type="journal"><string-name><surname>Diaconu</surname>, <given-names>A.-V.</given-names></string-name> (<year>2016</year>). <article-title>Circular inter-intra pixels bit-level permutation and chaos-based image encryption</article-title>. <source>Information Sciences</source>, <volume>355</volume>, <fpage>314</fpage>–<lpage>327</lpage>.</mixed-citation>
</ref>
<ref id="j_infor426_ref_011">
<mixed-citation publication-type="journal"><string-name><surname>Fridrich</surname>, <given-names>J.</given-names></string-name> (<year>1998</year>). <article-title>Symmetric ciphers based on two-dimensional chaotic maps</article-title>. <source>International Journal of Bifurcation and Chaos</source>, <volume>8</volume>(<issue>06</issue>), <fpage>1259</fpage>–<lpage>1284</lpage>.</mixed-citation>
</ref>
<ref id="j_infor426_ref_012">
<mixed-citation publication-type="journal"><string-name><surname>Fu</surname>, <given-names>C.</given-names></string-name>, <string-name><surname>Lin</surname>, <given-names>B-b.</given-names></string-name>, <string-name><surname>Miao</surname>, <given-names>Y-s.</given-names></string-name>, <string-name><surname>Liu</surname>, <given-names>X.</given-names></string-name>, <string-name><surname>Chen</surname>, <given-names>J-j.</given-names></string-name> (<year>2011</year>). <article-title>A novel chaos-based bit-level permutation scheme for digital image encryption</article-title>. <source>Optics Communications</source>, <volume>284</volume>(<issue>23</issue>), <fpage>5415</fpage>–<lpage>5423</lpage>.</mixed-citation>
</ref>
<ref id="j_infor426_ref_013">
<mixed-citation publication-type="journal"><string-name><surname>Fu</surname>, <given-names>C.</given-names></string-name>, <string-name><surname>Zhang</surname>, <given-names>G.-Y.</given-names></string-name>, <string-name><surname>Zhu</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Chen</surname>, <given-names>J.-X.</given-names></string-name>, <string-name><surname>Lei</surname>, <given-names>W.-M.</given-names></string-name> (<year>2018</year>). <article-title>A fast chaos-based colour image encryption algorithm using a hash function</article-title>. <source>Informatica</source>, <volume>29</volume>(<issue>4</issue>), <fpage>651</fpage>–<lpage>673</lpage>.</mixed-citation>
</ref>
<ref id="j_infor426_ref_014">
<mixed-citation publication-type="journal"><string-name><surname>Ghebleh</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Kanso</surname>, <given-names>A.</given-names></string-name> (<year>2014</year>). <article-title>A robust chaotic algorithm for digital image steganography</article-title>. <source>Communications in Nonlinear Science and Numerical Simulation</source>, <volume>19</volume>(<issue>6</issue>), <fpage>1898</fpage>–<lpage>1907</lpage>.</mixed-citation>
</ref>
<ref id="j_infor426_ref_015">
<mixed-citation publication-type="journal"><string-name><surname>Ghebleh</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Kanso</surname>, <given-names>A.</given-names></string-name>, <string-name><surname>Noura</surname>, <given-names>H.</given-names></string-name> (<year>2014</year>a). <article-title>An image encryption scheme based on irregularly decimated chaotic maps</article-title>. <source>Signal Processing: Image Communication</source>, <volume>29</volume>(<issue>5</issue>), <fpage>618</fpage>–<lpage>627</lpage>.</mixed-citation>
</ref>
<ref id="j_infor426_ref_016">
<mixed-citation publication-type="journal"><string-name><surname>Ghebleh</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Kanso</surname>, <given-names>A.</given-names></string-name>, <string-name><surname>Own</surname>, <given-names>H.S.</given-names></string-name> (<year>2014</year>b). <article-title>A blind chaos-based watermarking technique</article-title>. <source>Security and Communication Networks</source>, <volume>7</volume>(<issue>4</issue>), <fpage>800</fpage>–<lpage>811</lpage>.</mixed-citation>
</ref>
<ref id="j_infor426_ref_017">
<mixed-citation publication-type="journal"><string-name><surname>Guan</surname>, <given-names>Z.-H.</given-names></string-name>, <string-name><surname>Huang</surname>, <given-names>F.</given-names></string-name>, <string-name><surname>Guan</surname>, <given-names>W.</given-names></string-name> (<year>2005</year>). <article-title>Chaos-based image encryption algorithm</article-title>. <source>Physics Letters A</source>, <volume>346</volume>(<issue>1–3</issue>), <fpage>153</fpage>–<lpage>157</lpage>.</mixed-citation>
</ref>
<ref id="j_infor426_ref_018">
<mixed-citation publication-type="journal"><string-name><surname>Hemdan</surname>, <given-names>A.M.</given-names></string-name>, <string-name><surname>Faragallah</surname>, <given-names>O.S.</given-names></string-name>, <string-name><surname>Elshakankiry</surname>, <given-names>O.</given-names></string-name>, <string-name><surname>Elmhalaway</surname>, <given-names>A.</given-names></string-name> (<year>2019</year>). <article-title>A fast hybrid image cryptosystem based on random generator and modified logistic map</article-title>. <source>Multimedia Tools and Applications</source>, <volume>78</volume>(<issue>12</issue>), <fpage>16177</fpage>–<lpage>16193</lpage>.</mixed-citation>
</ref>
<ref id="j_infor426_ref_019">
<mixed-citation publication-type="journal"><string-name><surname>Hermassi</surname>, <given-names>H.</given-names></string-name>, <string-name><surname>Belazi</surname>, <given-names>A.</given-names></string-name>, <string-name><surname>Rhouma</surname>, <given-names>R.</given-names></string-name>, <string-name><surname>Belghith</surname>, <given-names>S.M.</given-names></string-name> (<year>2014</year>). <article-title>Security analysis of an image encryption algorithm based on a DNA addition combining with chaotic maps</article-title>. <source>Multimedia Tools and Applications</source>, <volume>72</volume>(<issue>3</issue>), <fpage>2211</fpage>–<lpage>2224</lpage>.</mixed-citation>
</ref>
<ref id="j_infor426_ref_020">
<mixed-citation publication-type="journal"><string-name><surname>Hua</surname>, <given-names>Z.</given-names></string-name>, <string-name><surname>Zhou</surname>, <given-names>Y.</given-names></string-name> (<year>2017</year>). <article-title>Design of image cipher using block-based scrambling and image filtering</article-title>. <source>Information Sciences</source>, <volume>396</volume>, <fpage>97</fpage>–<lpage>113</lpage>.</mixed-citation>
</ref>
<ref id="j_infor426_ref_021">
<mixed-citation publication-type="journal"><string-name><surname>Hua</surname>, <given-names>Z.</given-names></string-name>, <string-name><surname>Zhou</surname>, <given-names>Y.</given-names></string-name>, <string-name><surname>Pun</surname>, <given-names>C.-M.</given-names></string-name>, <string-name><surname>Chen</surname>, <given-names>C.P.</given-names></string-name> (<year>2015</year>). <article-title>2D Sine Logistic modulation map for image encryption</article-title>. <source>Information Sciences</source>, <volume>297</volume>, <fpage>80</fpage>–<lpage>94</lpage>.</mixed-citation>
</ref>
<ref id="j_infor426_ref_022">
<mixed-citation publication-type="journal"><string-name><surname>Hua</surname>, <given-names>Z.</given-names></string-name>, <string-name><surname>Yi</surname>, <given-names>S.</given-names></string-name>, <string-name><surname>Zhou</surname>, <given-names>Y.</given-names></string-name>, <string-name><surname>Li</surname>, <given-names>C.</given-names></string-name>, <string-name><surname>Wu</surname>, <given-names>Y.</given-names></string-name> (<year>2017</year>). <article-title>Designing hyperchaotic cat maps with any desired number of positive Lyapunov exponents</article-title>. <source>IEEE Transactions on Cybernetics</source>, <volume>48</volume>(<issue>2</issue>), <fpage>463</fpage>–<lpage>473</lpage>.</mixed-citation>
</ref>
<ref id="j_infor426_ref_023">
<mixed-citation publication-type="journal"><string-name><surname>Hua</surname>, <given-names>Z.</given-names></string-name>, <string-name><surname>Zhou</surname>, <given-names>Y.</given-names></string-name>, <string-name><surname>Huang</surname>, <given-names>H.</given-names></string-name> (<year>2019</year>). <article-title>Cosine-transform-based chaotic system for image encryption</article-title>. <source>Information Sciences</source>, <volume>480</volume>, <fpage>403</fpage>–<lpage>419</lpage>.</mixed-citation>
</ref>
<ref id="j_infor426_ref_024">
<mixed-citation publication-type="journal"><string-name><surname>Kanso</surname>, <given-names>A.</given-names></string-name>, <string-name><surname>Ghebleh</surname>, <given-names>M.</given-names></string-name> (<year>2012</year>). <article-title>A novel image encryption algorithm based on a 3D chaotic map</article-title>. <source>Communications in Nonlinear Science and Numerical Simulation</source>, <volume>17</volume>(<issue>7</issue>), <fpage>2943</fpage>–<lpage>2959</lpage>.</mixed-citation>
</ref>
<ref id="j_infor426_ref_025">
<mixed-citation publication-type="journal"><string-name><surname>Kanso</surname>, <given-names>A.</given-names></string-name>, <string-name><surname>Ghebleh</surname>, <given-names>M.</given-names></string-name> (<year>2013</year>). <article-title>A fast and efficient chaos-based keyed hash function</article-title>. <source>Communications in Nonlinear Science and Numerical Simulation</source>, <volume>18</volume>(<issue>1</issue>), <fpage>109</fpage>–<lpage>123</lpage>.</mixed-citation>
</ref>
<ref id="j_infor426_ref_026">
<mixed-citation publication-type="journal"><string-name><surname>Kanso</surname>, <given-names>A.</given-names></string-name>, <string-name><surname>Ghebleh</surname>, <given-names>M.</given-names></string-name> (<year>2015</year>a). <article-title>An efficient and robust image encryption scheme for medical applications</article-title>. <source>Communications in Nonlinear Science and Numerical Simulation</source>, <volume>24</volume>(<issue>1–3</issue>), <fpage>98</fpage>–<lpage>116</lpage>.</mixed-citation>
</ref>
<ref id="j_infor426_ref_027">
<mixed-citation publication-type="journal"><string-name><surname>Kanso</surname>, <given-names>A.</given-names></string-name>, <string-name><surname>Ghebleh</surname>, <given-names>M.</given-names></string-name> (<year>2015</year>b). <article-title>A structure-based chaotic hashing scheme</article-title>. <source>Nonlinear Dynamics</source>, <volume>81</volume>(<issue>1–2</issue>), <fpage>27</fpage>–<lpage>40</lpage>.</mixed-citation>
</ref>
<ref id="j_infor426_ref_028">
<mixed-citation publication-type="book"><string-name><surname>Katz</surname>, <given-names>J.</given-names></string-name>, <string-name><surname>Menezes</surname>, <given-names>A.J.</given-names></string-name>, <string-name><surname>Van Oorschot</surname>, <given-names>P.C.</given-names></string-name>, <string-name><surname>Vanstone</surname>, <given-names>S.A.</given-names></string-name> (<year>1996</year>). <source>Handbook of Applied Cryptography</source>. <publisher-name>CRC Press</publisher-name>.</mixed-citation>
</ref>
<ref id="j_infor426_ref_029">
<mixed-citation publication-type="journal"><string-name><surname>Khan</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Shah</surname>, <given-names>T.</given-names></string-name> (<year>2015</year>). <article-title>An efficient chaotic image encryption scheme</article-title>. <source>Neural Computing and Applications</source>, <volume>26</volume>(<issue>5</issue>), <fpage>1137</fpage>–<lpage>1148</lpage>.</mixed-citation>
</ref>
<ref id="j_infor426_ref_030">
<mixed-citation publication-type="journal"><string-name><surname>Khan</surname>, <given-names>J.S.</given-names></string-name>, <string-name><surname>Khan</surname>, <given-names>M.A.</given-names></string-name>, <string-name><surname>Ahmad</surname>, <given-names>J.</given-names></string-name>, <string-name><surname>Hwang</surname>, <given-names>S.O.</given-names></string-name>, <string-name><surname>Ahmed</surname>, <given-names>W.</given-names></string-name> (<year>2017</year>). <article-title>An improved image encryption scheme based on a non-linear chaotic algorithm and substitution boxes</article-title>. <source>Informatica</source>, <volume>28</volume>(<issue>4</issue>), <fpage>629</fpage>–<lpage>649</lpage>.</mixed-citation>
</ref>
<ref id="j_infor426_ref_031">
<mixed-citation publication-type="journal"><string-name><surname>Kwok</surname>, <given-names>H.</given-names></string-name>, <string-name><surname>Tang</surname>, <given-names>W.K.</given-names></string-name> (<year>2007</year>). <article-title>A fast image encryption system based on chaotic maps with finite precision representation</article-title>. <source>Chaos, Solitons &amp; Fractals</source>, <volume>32</volume>(<issue>4</issue>), <fpage>1518</fpage>–<lpage>1529</lpage>.</mixed-citation>
</ref>
<ref id="j_infor426_ref_032">
<mixed-citation publication-type="chapter"><string-name><surname>Li</surname>, <given-names>C.</given-names></string-name>, <string-name><surname>Chen</surname>, <given-names>G.</given-names></string-name> (<year>2008</year>). <chapter-title>On the security of a class of image encryption schemes</chapter-title>. In: <source>2008 IEEE International Symposium on Circuits and Systems</source>. <publisher-name>IEEE</publisher-name>, pp. <fpage>3290</fpage>–<lpage>3293</lpage>.</mixed-citation>
</ref>
<ref id="j_infor426_ref_033">
<mixed-citation publication-type="journal"><string-name><surname>Li</surname>, <given-names>C.</given-names></string-name>, <string-name><surname>Arroyo</surname>, <given-names>D.</given-names></string-name>, <string-name><surname>Lo</surname>, <given-names>K.-T.</given-names></string-name> (<year>2010</year>). <article-title>Breaking a chaotic cryptographic scheme based on composition maps</article-title>. <source>International Journal of Bifurcation and Chaos</source>, <volume>20</volume>(<issue>08</issue>), <fpage>2561</fpage>–<lpage>2568</lpage>.</mixed-citation>
</ref>
<ref id="j_infor426_ref_034">
<mixed-citation publication-type="journal"><string-name><surname>Li</surname>, <given-names>C.</given-names></string-name>, <string-name><surname>Liu</surname>, <given-names>Y.</given-names></string-name>, <string-name><surname>Xie</surname>, <given-names>T.</given-names></string-name>, <string-name><surname>Chen</surname>, <given-names>M.Z.</given-names></string-name> (<year>2013</year>). <article-title>Breaking a novel image encryption scheme based on improved hyperchaotic sequences</article-title>. <source>Nonlinear Dynamics</source>, <volume>73</volume>(<issue>3</issue>), <fpage>2083</fpage>–<lpage>2089</lpage>.</mixed-citation>
</ref>
<ref id="j_infor426_ref_035">
<mixed-citation publication-type="journal"><string-name><surname>Liao</surname>, <given-names>X.</given-names></string-name>, <string-name><surname>Lai</surname>, <given-names>S.</given-names></string-name>, <string-name><surname>Zhou</surname>, <given-names>Q.</given-names></string-name> (<year>2010</year>). <article-title>A novel image encryption algorithm based on self-adaptive wave transmission</article-title>. <source>Signal Processing</source>, <volume>90</volume>(<issue>9</issue>), <fpage>2714</fpage>–<lpage>2722</lpage>.</mixed-citation>
</ref>
<ref id="j_infor426_ref_036">
<mixed-citation publication-type="journal"><string-name><surname>Liu</surname>, <given-names>H.</given-names></string-name>, <string-name><surname>Zhang</surname>, <given-names>Y.</given-names></string-name>, <string-name><surname>Kadir</surname>, <given-names>A.</given-names></string-name>, <string-name><surname>Xu</surname>, <given-names>Y.</given-names></string-name> (<year>2019</year>). <article-title>Image encryption using complex hyper chaotic system by injecting impulse into parameters</article-title>. <source>Applied Mathematics and Computation</source>, <volume>360</volume>, <fpage>83</fpage>–<lpage>93</lpage>.</mixed-citation>
</ref>
<ref id="j_infor426_ref_037">
<mixed-citation publication-type="journal"><string-name><surname>Liu</surname>, <given-names>W.</given-names></string-name>, <string-name><surname>Sun</surname>, <given-names>K.</given-names></string-name>, <string-name><surname>Zhu</surname>, <given-names>C.</given-names></string-name> (<year>2016</year>). <article-title>A fast image encryption algorithm based on chaotic map</article-title>. <source>Optics and Lasers in Engineering</source>, <volume>84</volume>, <fpage>26</fpage>–<lpage>36</lpage>.</mixed-citation>
</ref>
<ref id="j_infor426_ref_038">
<mixed-citation publication-type="journal"><string-name><surname>Liu</surname>, <given-names>Y.</given-names></string-name>, <string-name><surname>Tong</surname>, <given-names>X.</given-names></string-name>, <string-name><surname>Ma</surname>, <given-names>J.</given-names></string-name> (<year>2016</year>). <article-title>Image encryption algorithm based on hyper-chaotic system and dynamic S-box</article-title>. <source>Multimedia Tools and Applications</source>, <volume>75</volume>(<issue>13</issue>), <fpage>7739</fpage>–<lpage>7759</lpage>.</mixed-citation>
</ref>
<ref id="j_infor426_ref_039">
<mixed-citation publication-type="journal"><string-name><surname>Mao</surname>, <given-names>Q.</given-names></string-name>, <string-name><surname>Qin</surname>, <given-names>C.</given-names></string-name> (<year>2013</year>). <article-title>A novel turbo unequal error protection scheme for image steganography</article-title>. <source>Informatica</source>, <volume>24</volume>(<issue>4</issue>), <fpage>561</fpage>–<lpage>576</lpage>.</mixed-citation>
</ref>
<ref id="j_infor426_ref_040">
<mixed-citation publication-type="book"><string-name><surname>Ott</surname>, <given-names>E.</given-names></string-name> (<year>2002</year>). <source>Chaos in Dynamical Systems</source>. <publisher-name>Cambridge University Press</publisher-name>.</mixed-citation>
</ref>
<ref id="j_infor426_ref_041">
<mixed-citation publication-type="journal"><string-name><surname>Ping</surname>, <given-names>P.</given-names></string-name>, <string-name><surname>Xu</surname>, <given-names>F.</given-names></string-name>, <string-name><surname>Mao</surname>, <given-names>Y.</given-names></string-name>, <string-name><surname>Wang</surname>, <given-names>Z.</given-names></string-name> (<year>2018</year>). <article-title>Designing permutation–substitution image encryption networks with Henon map</article-title>. <source>Neurocomputing</source>, <volume>283</volume>, <fpage>53</fpage>–<lpage>63</lpage>.</mixed-citation>
</ref>
<ref id="j_infor426_ref_042">
<mixed-citation publication-type="chapter"><string-name><surname>Rijmen</surname>, <given-names>V.</given-names></string-name>, <string-name><surname>Daemen</surname>, <given-names>J.</given-names></string-name> (<year>2001</year>). <chapter-title>Advanced encryption standard</chapter-title>. In: <source>Proceedings of Federal Information Processing Standards Publications, National Institute of Standards and Technology</source>, pp. <fpage>19</fpage>–<lpage>22</lpage></mixed-citation>
</ref>
<ref id="j_infor426_ref_043">
<mixed-citation publication-type="journal"><string-name><surname>Rivest</surname>, <given-names>R.L.</given-names></string-name>, <string-name><surname>Shamir</surname>, <given-names>A.</given-names></string-name>, <string-name><surname>Adleman</surname>, <given-names>L.</given-names></string-name> (<year>1978</year>). <article-title>A method for obtaining digital signatures and public-key cryptosystems</article-title>. <source>Communications of the ACM</source>, <volume>21</volume>(<issue>2</issue>), <fpage>120</fpage>–<lpage>126</lpage>.</mixed-citation>
</ref>
<ref id="j_infor426_ref_044">
<mixed-citation publication-type="journal"><string-name><surname>Shannon</surname>, <given-names>C.E.</given-names></string-name> (<year>1948</year>). <article-title>A mathematical theory of communication</article-title>. <source>Bell System Technical Journal</source>, <volume>27</volume>(<issue>3</issue>), <fpage>379</fpage>–<lpage>423</lpage>.</mixed-citation>
</ref>
<ref id="j_infor426_ref_045">
<mixed-citation publication-type="journal"><string-name><surname>Shannon</surname>, <given-names>C.E.</given-names></string-name> (<year>1949</year>). <article-title>Communication theory of secrecy systems</article-title>. <source>Bell System Technical Journal</source>, <volume>28</volume>(<issue>4</issue>), <fpage>656</fpage>–<lpage>715</lpage>.</mixed-citation>
</ref>
<ref id="j_infor426_ref_046">
<mixed-citation publication-type="journal"><string-name><surname>Solak</surname>, <given-names>E.</given-names></string-name>, <string-name><surname>Çokal</surname>, <given-names>C.</given-names></string-name>, <string-name><surname>Yildiz</surname>, <given-names>O.T.</given-names></string-name>, <string-name><surname>Biyikoğlu</surname>, <given-names>T.</given-names></string-name> (<year>2010</year>). <article-title>Cryptanalysis of Fridrich’s chaotic image encryption</article-title>. <source>International Journal of Bifurcation and Chaos</source>, <volume>20</volume>(<issue>05</issue>), <fpage>1405</fpage>–<lpage>1413</lpage>.</mixed-citation>
</ref>
<ref id="j_infor426_ref_047">
<mixed-citation publication-type="other"><string-name><surname>Soleymani</surname>, <given-names>A.</given-names></string-name>, <string-name><surname>Nordin</surname>, <given-names>M.J.</given-names></string-name>, <string-name><surname>Sundararajan</surname>, <given-names>E.</given-names></string-name> (2014). A chaotic cryptosystem for images based on henon and arnold cat map. <italic>The Scientific World Journal</italic>, <italic>2014</italic>.</mixed-citation>
</ref>
<ref id="j_infor426_ref_048">
<mixed-citation publication-type="journal"><string-name><surname>Sun</surname>, <given-names>Y-J.</given-names></string-name>, <string-name><surname>Zhang</surname>, <given-names>H.</given-names></string-name>, <string-name><surname>Wang</surname>, <given-names>X-Y.</given-names></string-name>, <string-name><surname>Wang</surname>, <given-names>X-Q.</given-names></string-name>, <string-name><surname>Yan</surname>, <given-names>P-F.</given-names></string-name> (<year>2020</year>). <article-title>2D non-adjacent coupled map lattice with q and its applications in image encryption</article-title>. <source>Applied Mathematics and Computation</source>, <volume>373</volume>, <elocation-id>125039</elocation-id>.</mixed-citation>
</ref>
<ref id="j_infor426_ref_049">
<mixed-citation publication-type="journal"><string-name><surname>Tang</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Hu</surname>, <given-names>J.</given-names></string-name>, <string-name><surname>Song</surname>, <given-names>W.</given-names></string-name> (<year>2014</year>). <article-title>A high capacity image steganography using multi-layer embedding</article-title>. <source>Optik-International Journal for Light and Electron Optics</source>, <volume>125</volume>(<issue>15</issue>), <fpage>3972</fpage>–<lpage>3976</lpage>.</mixed-citation>
</ref>
<ref id="j_infor426_ref_050">
<mixed-citation publication-type="journal"><string-name><surname>Wang</surname>, <given-names>C.</given-names></string-name>, <string-name><surname>Fan</surname>, <given-names>C.</given-names></string-name>, <string-name><surname>Ding</surname>, <given-names>Q.</given-names></string-name> (<year>2018</year>). <article-title>Constructing discrete chaotic systems with positive Lyapunov exponents</article-title>. <source>International Journal of Bifurcation and Chaos</source>, <volume>28</volume>(<issue>07</issue>), <elocation-id>1850084</elocation-id>.</mixed-citation>
</ref>
<ref id="j_infor426_ref_051">
<mixed-citation publication-type="journal"><string-name><surname>Wang</surname>, <given-names>K.</given-names></string-name>, <string-name><surname>Pei</surname></string-name>, <string-name><surname>Zou</surname>, <given-names>L.</given-names></string-name>, <string-name><surname>Song</surname>, <given-names>A.</given-names></string-name>, <string-name><surname>He</surname>, <given-names>Z.</given-names></string-name> (<year>2005</year>). <article-title>On the security of 3D cat map based symmetric image encryption scheme</article-title>. <source>Physics Letters A</source>, <volume>343</volume>(<issue>6</issue>), <fpage>432</fpage>–<lpage>439</lpage>.</mixed-citation>
</ref>
<ref id="j_infor426_ref_052">
<mixed-citation publication-type="journal"><string-name><surname>Wang</surname>, <given-names>X.</given-names></string-name>, <string-name><surname>Wang</surname>, <given-names>Q.</given-names></string-name>, <string-name><surname>Zhang</surname>, <given-names>Y.</given-names></string-name> (<year>2015</year>). <article-title>A fast image algorithm based on rows and columns switch</article-title>. <source>Nonlinear Dynamics</source>, <volume>79</volume>(<issue>2</issue>), <fpage>1141</fpage>–<lpage>1149</lpage>.</mixed-citation>
</ref>
<ref id="j_infor426_ref_053">
<mixed-citation publication-type="journal"><string-name><surname>Wu</surname>, <given-names>Y.</given-names></string-name>, <string-name><surname>Noonan</surname>, <given-names>J.P.</given-names></string-name>, <string-name><surname>Agaian</surname>, <given-names>S.</given-names></string-name> (<year>2011</year>). <article-title>NPCR and UACI randomness tests for image encryption</article-title>. <source>Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT)</source>, <volume>1</volume>(<issue>2</issue>), <fpage>31</fpage>–<lpage>38</lpage>.</mixed-citation>
</ref>
<ref id="j_infor426_ref_054">
<mixed-citation publication-type="journal"><string-name><surname>Wu</surname>, <given-names>Y.</given-names></string-name>, <string-name><surname>Zhou</surname>, <given-names>Y.</given-names></string-name>, <string-name><surname>Saveriades</surname>, <given-names>G.</given-names></string-name>, <string-name><surname>Agaian</surname>, <given-names>S.</given-names></string-name>, <string-name><surname>Noonan</surname>, <given-names>J.P.</given-names></string-name>, <string-name><surname>Natarajan</surname>, <given-names>P.</given-names></string-name> (<year>2013</year>). <article-title>Local shannon entropy measure with statistical tests for image randomness</article-title>. <source>Information Sciences</source>, <volume>222</volume>, <fpage>323</fpage>–<lpage>342</lpage>.</mixed-citation>
</ref>
<ref id="j_infor426_ref_055">
<mixed-citation publication-type="journal"><string-name><surname>Wu</surname>, <given-names>Y.</given-names></string-name>, <string-name><surname>Zhou</surname>, <given-names>Y.</given-names></string-name>, <string-name><surname>Noonan</surname>, <given-names>J.P.</given-names></string-name>, <string-name><surname>Agaian</surname>, <given-names>S.</given-names></string-name> (<year>2014</year>). <article-title>Design of image cipher using latin squares</article-title>. <source>Information Sciences</source>, <volume>264</volume>, <fpage>317</fpage>–<lpage>339</lpage>.</mixed-citation>
</ref>
<ref id="j_infor426_ref_056">
<mixed-citation publication-type="journal"><string-name><surname>Xiao</surname>, <given-names>D.</given-names></string-name>, <string-name><surname>Liao</surname>, <given-names>X.</given-names></string-name>, <string-name><surname>Wei</surname>, <given-names>P.</given-names></string-name> (<year>2009</year>). <article-title>Analysis and improvement of a chaos-based image encryption algorithm</article-title>. <source>Chaos, Solitons &amp; Fractals</source>, <volume>40</volume>(<issue>5</issue>), <fpage>2191</fpage>–<lpage>2199</lpage>.</mixed-citation>
</ref>
<ref id="j_infor426_ref_057">
<mixed-citation publication-type="journal"><string-name><surname>Xie</surname>, <given-names>E.Y.</given-names></string-name>, <string-name><surname>Li</surname>, <given-names>C.</given-names></string-name>, <string-name><surname>Yu</surname>, <given-names>S.</given-names></string-name>, <string-name><surname>Lü</surname>, <given-names>J.</given-names></string-name> (<year>2017</year>). <article-title>On the cryptanalysis of Fridrich’s chaotic image encryption scheme</article-title>. <source>Signal Processing</source>, <volume>132</volume>, <fpage>150</fpage>–<lpage>154</lpage>.</mixed-citation>
</ref>
<ref id="j_infor426_ref_058">
<mixed-citation publication-type="journal"><string-name><surname>Xu</surname>, <given-names>L.</given-names></string-name>, <string-name><surname>Li</surname>, <given-names>Z.</given-names></string-name>, <string-name><surname>Li</surname>, <given-names>J.</given-names></string-name>, <string-name><surname>Hua</surname>, <given-names>W.</given-names></string-name> (<year>2016</year>). <article-title>A novel bit-level image encryption algorithm based on chaotic maps</article-title>. <source>Optics and Lasers in Engineering</source>, <volume>78</volume>, <fpage>17</fpage>–<lpage>25</lpage>.</mixed-citation>
</ref>
<ref id="j_infor426_ref_059">
<mixed-citation publication-type="journal"><string-name><surname>Zhang</surname>, <given-names>Q.</given-names></string-name>, <string-name><surname>Guo</surname>, <given-names>L.</given-names></string-name>, <string-name><surname>Wei</surname>, <given-names>X.</given-names></string-name> (<year>2010</year>). <article-title>Image encryption using DNA addition combining with chaotic maps</article-title>. <source>Mathematical and Computer Modelling</source>, <volume>52</volume>(<issue>11–12</issue>), <fpage>2028</fpage>–<lpage>2035</lpage>.</mixed-citation>
</ref>
<ref id="j_infor426_ref_060">
<mixed-citation publication-type="journal"><string-name><surname>Zhang</surname>, <given-names>X.</given-names></string-name>, <string-name><surname>Nie</surname>, <given-names>W.</given-names></string-name>, <string-name><surname>Ma</surname>, <given-names>Y.</given-names></string-name>, <string-name><surname>Tian</surname>, <given-names>Q.</given-names></string-name> (<year>2017</year>). <article-title>Cryptanalysis and improvement of an image encryption algorithm based on hyper-chaotic system and dynamic S-box</article-title>. <source>Multimedia Tools and Applications</source>, <volume>76</volume>(<issue>14</issue>), <fpage>15641</fpage>–<lpage>15659</lpage>.</mixed-citation>
</ref>
<ref id="j_infor426_ref_061">
<mixed-citation publication-type="journal"><string-name><surname>Zhou</surname>, <given-names>Y.</given-names></string-name>, <string-name><surname>Bao</surname>, <given-names>L.</given-names></string-name>, <string-name><surname>Chen</surname>, <given-names>C.P.</given-names></string-name> (<year>2013</year>). <article-title>Image encryption using a new parametric switching chaotic system</article-title>. <source>Signal Processing</source>, <volume>93</volume>(<issue>11</issue>), <fpage>3039</fpage>–<lpage>3052</lpage>.</mixed-citation>
</ref>
<ref id="j_infor426_ref_062">
<mixed-citation publication-type="journal"><string-name><surname>Zhou</surname>, <given-names>Y.</given-names></string-name>, <string-name><surname>Bao</surname>, <given-names>L.</given-names></string-name>, <string-name><surname>Chen</surname>, <given-names>C.P.</given-names></string-name> (<year>2014</year>). <article-title>A new 1D chaotic system for image encryption</article-title>. <source>Signal Processing</source>, <volume>97</volume>, <fpage>172</fpage>–<lpage>182</lpage>.</mixed-citation>
</ref>
<ref id="j_infor426_ref_063">
<mixed-citation publication-type="journal"><string-name><surname>Zhu</surname>, <given-names>C.</given-names></string-name> (<year>2012</year>). <article-title>A novel image encryption scheme based on improved hyperchaotic sequences</article-title>. <source>Optics Communications</source>, <volume>285</volume>(<issue>1</issue>), <fpage>29</fpage>–<lpage>37</lpage>.</mixed-citation>
</ref>
<ref id="j_infor426_ref_064">
<mixed-citation publication-type="other">The 2nd BOWS contest. <uri>http://bows2.ec-lille.fr.</uri> Accessed: 2019-12-14.</mixed-citation>
</ref>
<ref id="j_infor426_ref_065">
<mixed-citation publication-type="other">Attribution-noncommercial-noderivatives 4.0 international (CC BY-NC-ND 4.0). <uri>https://creativecommons.org/licenses/by-nc-nd/4.0/</uri>. Accessed: 2020-02-20.</mixed-citation>
</ref>
<ref id="j_infor426_ref_066">
<mixed-citation publication-type="other">Signal and Image Processing Institute: Miscellaneous volume. <uri>http://sipi.usc.edu/database/database.php?volume=misc</uri>, Accessed: 2019-12-14.</mixed-citation>
</ref>
</ref-list>
</back>
</article>