Movatterモバイル変換


[0]ホーム

URL:


Next Article in Journal
Events as Elements of Physical Observation: Experimental Evidence
Next Article in Special Issue
Color Image Encryption Based on an Evolutionary Codebook and Chaotic Systems
Previous Article in Journal
Intra-Beam Interference Mitigation for the Downlink Transmission of the RIS-Assisted Hybrid Millimeter Wave System
Previous Article in Special Issue
A Hybrid Cryptosystem Incorporating a New Algorithm for Improved Entropy
 
 
Search for Articles:
Title / Keyword
Author / Affiliation / Email
Journal
Article Type
 
 
Section
Special Issue
Volume
Issue
Number
Page
 
Logical OperatorOperator
Search Text
Search Type
 
add_circle_outline
remove_circle_outline
 
 
Journals
Entropy
Volume 26
Issue 3
10.3390/e26030254
Font Type:
ArialGeorgiaVerdana
Font Size:
AaAaAa
Line Spacing:
Column Width:
Background:
Article

Ann-Dimensional Chaotic Map with Application in Reversible Data Hiding for Medical Images

1
College of Computer Science and Technology, Taiyuan University of Technology, Jinzhong 030600, China
2
College of Software, Taiyuan University of Technology, Jinzhong 030600, China
*
Author to whom correspondence should be addressed.
Entropy2024,26(3), 254;https://doi.org/10.3390/e26030254
Submission received: 9 February 2024 /Revised: 7 March 2024 /Accepted: 9 March 2024 /Published: 13 March 2024

Abstract

:
The drawbacks of a one-dimensional chaotic map are its straightforward structure, abrupt intervals, and ease of signal prediction. Richer performance and a more complicated structure are required for multidimensional chaotic mapping. To address the shortcomings of current chaotic systems, ann-dimensional cosine-transform-based chaotic system (nD-CTBCS) with a chaotic coupling model is suggested in this study. To create chaotic maps of any desired dimension,nD-CTBCS can take advantage of already-existing 1D chaotic maps as seed chaotic maps. Three two-dimensional chaotic maps are provided as examples to illustrate the impact. The findings of the evaluation and experiments demonstrate that the newly created chaotic maps function better, have broader chaotic intervals, and display hyperchaotic behavior. To further demonstrate the practicability ofnD-CTBCS, a reversible data hiding scheme is proposed for the secure communication of medical images. The experimental results show that the proposed method has higher security than the existing methods.

    1. Introduction

    In recent years, nonlinear theory has received more and more attention. As a typical branch of nonlinear theory, chaos theory has been widely used in mathematics, medicine, physics, computer science, astronomy, ecology, and other scientific and engineering fields since its emergence [1]. A nonlinear system exhibiting chaotic behavior should possess high sensitivity, ergodicity, unpredictability, and initial value sensitivity, as per Devaney’s definition [2]. These important properties make it popular in security applications such as audio encryption [3,4], image encryption [5,6,7], image watermarking [8,9], and data hiding [10,11,12]. For these chaotic-based applications, the security largely depends on the performance of the underlying chaotic system.

    1.1. Chaotic Systems-Related Work

    Based on the number of state variables involved, chaotic systems can be loosely classified as one-dimensional chaotic maps or n-dimensional chaotic maps. Simple structure, low computing cost, and convenient hardware are some of the benefits of 1D chaotic mapping. Nevertheless, these benefits are sometimes accompanied by a lack of security. Many one-dimensional chaotic maps exhibit discontinuous chaotic ranges [13], which can cause chaotic behavior to degenerate into regular behavior. Motivated by the shortcomings of current one-dimensional chaotic maps, scientists have started working to enhance one-dimensional chaotic maps’ chaotic performance. Hua et al. [14] coupled two one-dimensional chaotic maps by cosine transform and constructed a one-dimensional cosine chaotic map intensifier. Li et al. [15] built a one-dimensional exponential chaotic map enhancer, increased the input chaotic map’s randomness, and added exponential components to the chaotic system structure. Hu et al. [16] designed a new chaos model UCS, which improved the statistical properties of existing maps and expanded the parameter range by concatenating two 1D chaotic maps and performing modular operations. Mansouri et al. [17] proposed a novel one-dimensional chaotic mapping amplifier (1-DCMA), which enhances the sensitivity of the input one-dimensional chaotic mapping through cosine and logarithm operations.

    1.2. Data Hiding-Related Work

    Data hiding (DH), or data embedding, is a method that allows secret data to be correctly extracted from an original media while preventing any visible distortions. Based on this, the reversible data hiding (RDH) technique is refined, which can both restore the original coverage media losslessly and extract the embedded data without error. These qualities make data concealment a crucial component of many multimedia systems. Prasad et al. [18] designed a steganographic scheme for RGB color images based on a binary lower triangular matrix, which reduces aberrations on steganographic images while maintaining significant visual quality. A non-sensing medical data-hiding system based on multi-resolution singular value decomposition, redundant discrete wavelet transform (RDWT), and non-subsampled shear wave transform (NSST) was created by Anand et al. [19]. The security of the concealment mechanism is guaranteed by the key-based encryption scheme. Based on the Chinese residue theorem, Yu et al. [20] present a new method for hybrid encoding and secret sharing. In particular, a revolutionary iterative encryption is aimed to precisely preserve the spatial correlation of the original block in its encryption block, whereas a hybrid encoding aims to achieve high embedding capacity. High embedding capacity and security are the outcomes of this. Wu et al. [21] proposed a global sorting strategy combining local and global image features for reversible data hiding. For each pixel, its predicted value and local complexity are first calculated based on its local features. Then, according to the predicted value of the image pixels, the image pixels are globally sorted to generate a single sorted pixel sequence. Then, the sorting order of predictors based on location pixel value sorting is split to obtain a more regular two-dimensional histogram. Based on the generated regular histogram, they developed a more effective 2D mapping for data hiding. The experimental results show that the average PSNR after embedding 10,000 bits reaches 63.55 dB, which proves the superiority of the scheme.

    1.3. Contribution of This Work

    Driven by the above work and discussion, this paper proposes anD-CTBCS, which can generate chaotic maps of arbitrary dimensions by using one-dimensional chaotic maps as seed chaotic maps. The performance ofnD-CTBCS is discussed. To verify the validity ofnD-CTBCS, three two-dimensional chaotic maps are generated using multiple one-dimensional chaotic maps as seed chaotic maps. Performance analysis shows that the new chaotic map has hyperchaotic behavior and a more uniformly distributed output. To illustrate the practicability ofnD-CTBCS, this paper proposes a reversible data hiding scheme based on the newly generated chaotic mapping for the secure communication of medical images. The experimental results show that the proposed method has higher embedding capacity and higher security than the existing methods. The main contributions of this paper are as follows.
    • A simple and practicaln-dimensional cosine-transform-based chaotic system (nD-CTBCS) chaotic coupling framework is proposed for generating arbitrary dimensional chaotic maps.
    • Apply multiple 1D chaotic maps tonD-CTBCS to generate three 2D chaotic maps. The performance is evaluated in theory and experiment, and the proposed chaotic map is compared with the most advanced chaotic map, showing excellent performance.
    • A reversible data hiding scheme is proposed for the secure communication of medical images, and the security analysis shows the remarkable performance of the scheme.
    The rest of this article is organized as follows.Section 2 presents the introduction of the proposednD-CTBCS, demonstrates several novel two-dimensional chaotic maps created using thenD-CTBCS, and evaluates the performance metrics of these newly generated chaotic maps.Section 3 gives a comprehensive description of the reversible data-hiding scheme of medical images based on the chaotic system. InSection 4, the performance of the proposed method is verified by experimental results and safety analysis. The last part is the summary of this paper.

    2.n-Dimensional Chaotic Model

    This section first presents then-dimensional cosine-transform-based chaotic system (nD-CTBCS), then generates some new 2D chaos maps throughnD-CTBCS based on some existing 1D chaos maps, and finally analyzes the performance of these new chaotic maps to show the advantages of the model.

    2.1. nD-CTBCS

    nD-CTBCS was created to address issues with chaotic systems that are currently in use. It takesn seed maps to generaten-dimensional chaotic systems, and the sum result of any two seed maps is performed by cosine transform, taking it as the output of the current dimension, iteratively replacing the seed maps of each dimension, and using the output of the current dimension as the input of the next dimension;nD-CTBCS is generated by combining the output ofn dimensions. The mathematical structure ofnD-CTBCS is defined as
    x1,i+1=cosπF1a1,x2,i+F2a2,x2,i+α1                           x2,i+1=cosπF2a2,x1,i+1+F3a3,x3,i+α2                       x3,i+1=cosπF3a3,x2,i+1+F4a4,x4,i+α3                       xn1,i+1=cosπFn1an1,xn2,i+1+Fnan,xn,i+αn1xn,i+1=cosπFnan,xn1,i+1+F1a1,x1,i+αn                  ,
    whereF1a1,F2a2,,Fnan aren seed chaotic maps that are all 1D chaotic maps, anda1,a2,an are the control parameter of the seed maps.xi=x1,i,x2,i,,xn,iT is ann-length vector that is theith observation state of the chaotic model andα1,α2,αn are shifting constants.
    For any given parameter configuration, the cosine transform is a limited operation with complex nonlinearity that can produce chaotic occurrences. Consequently, the following traits of the suggestednD-CTBCS are present.
    • An efficient and straightforward chaotic generation model is the suggestednD-CTBCS model. By merging different seed chaotic maps, users can create chaotic maps in any dimension with flexibility. By switching the positions of the seed chaotic systems, severalnD-CTBCS chaotic systems can be formed during the generation process.
    • The newly generatednD-CTBCS chaotic map can overcome the shortcomings of the existing chaotic interval discontinuity and uneven signal distribution.
    • α1,α2,αn are introduced as the control parameters of thenD-CTBCS chaotic system to expand the parameter space, and the system can exhibit chaos in a large parameter range, while most existing chaotic systems only exhibit chaos in a very narrow parameter range.

    2.2. Examples of 2D Chaotic Map

    To demonstrate the advantages ofnD-CTBCS in generating chaotic maps, we usenD-CTBCS to generate three 2D chaotic maps by using some chaotic maps as seed chaotic maps.
    Firstly, four existing one-dimensional chaotic maps are introduced.
    Logistic map (LM) is the most widely used nonlinear model of dynamic discrete chaotic systems [22], which is mathematically defined as
    xi+1=μ xi1xi,
    whereμ is the system parameter,μ[0,4].
    Sine map [23], fractal map [2], and iterative chaotic map with infinite collapse (ICMIC) [24] are three common one-dimensional dynamic discrete chaotic mappings. The mathematical definition of the sine map is Equation (3).
     xi+1=4sinπxi/a,
    wherea is a system parameter. Whena[0, 1], the mapping is in a chaotic state. The mathematical definition of a fractal map is Equation (4).
    xi+1=1/xi2+0.1bxi,
    whereb is the system parameter. Whenb[0.999, 0.999], the mapping is in a chaotic state. ICMIC is defined as Equation (5).
    xi+1=sin(c/xi),
    wherec is the system parameter. Whenc(0, +), the mapping is in a chaotic state.
    A bifurcation diagram is a tool to visualize the randomness of chaotic systems, and Lyapunov exponents (LE) are an important index to evaluate the chaotic identity of dynamic systems [1]. In this paper, the bifurcation diagram and Lyapunov exponent diagram of the above four one-dimensional chaotic maps are given.
    The first column ofFigure 1 is the bifurcation diagram corresponding to the above four chaos diagrams. It can be seen that one-dimensional chaos mapping has defects such as narrow chaos range and period window. This means that the control parameters will not exhibit chaotic behavior beyond a certain interval. The second column ofFigure 1 shows the Lyapunov exponents (LE) diagram corresponding to the above four chaotic mappings. It can be seen that the LEs of most one-dimensional chaotic systems are slightly greater than zero, but LE is still less than zero, which indicates that there is no chaos phenomenon under some parameters.
    Therefore, this paper does not use the above four one-dimensional chaotic maps directly but uses them as the input of the coupled chaotic system proposed in this paper to construct ann-dimensional chaotic map with better chaotic properties.

    2.2.1. 2D Logistic–Sine Map

    When logistic mapping and sine mapping are selected as the two seed chaotic mappingsF1· andF2· in Equation (1), a new two-dimensional logistics–sine mapping (2D-LSM) is generated, whose mathematical equation is
    xi+1=cosπ4/bsin(πxi)+ayi(1yi)+α1yi+1=cosπaxi+1(1xi+1)+4/bsin(πyi)+α2,
    wherea andb are the two control parameters of logistic mapping and sine mapping, respectively, andα1 andα2 are the newly introduced control parameters. Because the cosine transform is a bounded operation, the parametersa,b,α1, andα2 can have larger values.

    2.2.2. 2D Sine–ICMIC Map

    When sine mapping and ICMIC are selected as the two seed chaotic mappingsF1· andF2· in Equation (1), a new two-dimensional sine–ICMIC mapping (2D-SIM) is generated, whose mathematical equation is
    xi+1=cosπ4/asin(πxi)+sin(b/yi)+α1yi+1=cosπsin(b/xi+1)+4/asin(πyi)+α2,
    wherea andb are the two control parameters of sine mapping and ICMIC, respectively, andα1 andα2 are the newly introduced control parameters. Because the cosine transform is a bounded operation, the parametersa,b,α1, andα2 can have larger values.

    2.2.3. 2D Sine–Fraction Map

    When sine mapping and fraction mapping are selected as the two seed chaotic mappingsF1· andF2· in Equation (1), a new two-dimensional sine–fraction mapping (2D-SFM) is generated, whose mathematical equation is
    xi+1=cosπ4/asin(πxi)+(1/yi2+0.1byi)+α1yi+1=cosπ1/xi+12+0.1bxi+1+4/asin(πyi)+α2,
    wherea andb are the two control parameters of sine mapping and fraction mapping, respectively, andα1 andα2 are the newly introduced control parameters. Because the cosine transform is a bounded operation, the parametersa,b,α1, andα2 can have larger values.

    2.3. Performance Evaluations

    To prove the advantages of 2D-LSM, 2D-SIM, and 2D-SFM, this paper uses a phase diagram, bifurcation diagram, Lyapunov exponents (LE), Permutation entropy (PE), and NIST SP800-22 test for verification.

    2.3.1. Phase Diagram

    Plotting the approach and access points of a two-dimensional dynamic system with fixed parameter settings is performed using the phase space trajectory of a dynamic system [2]. This paper set up the initial parameters of 2D-LSM, 2D-SIM, and 2D-SFM asx0=0.1,y0=0.1,a=0.03,b=0.04,α1=0.05,α2=0.06; the two-dimensional phase space track as shown inFigure 2a–c.
    Figure 2d–f are the 2D phase space trajectory diagrams of 2D-LSCM [25], 2D-LSMCL [26], and 2D-LACM [27], respectively. As can be seen from the figure, the distribution range of 2D-LSM, 2D-SIM, and 2D-SFM is significantly higher than that of 2D-LSCM and 2D-LSMCL. In addition, the distribution uniformity is better than that of 2D-LSCM, 2D-LSMCL, and 2D-LACM. This shows that the new system has superior ergodicity and randomness.

    2.3.2. Bifurcation Diagram

    A bifurcation diagram is a tool for visualizing the randomness of chaotic systems [28]. This paper set up the initial parameters of 2D-LSM, 2D-SIM, and 2D-SFM asx0=0.1,y0=0.1,a=0.03,b=0.04,α1=0.05,α2=0.06; their bifurcation distribution is shown inFigure 3.
    As shown inFigure 3, the bifurcation distribution of 2D-LSM, 2D-SIM, and 2D-SFM does not have defects such as narrow range and period window. This means that chaotic behavior exists in all control parameter ranges.

    2.3.3. Lyapunov Exponents

    The chaotic identity of dynamical systems can be assessed using Lyapunov exponents (LE) and maximum Lyapunov exponents (MLE), two crucial indices. The separation rate of very close trajectories is how LE defines chaos [2]. Mathematically, the following Equation (9) determines the LE of a dynamic systemDx.
    LE=limn1nlnDnx0+δDnx0δ,
    whereδ represents a small positive value. For a dynamic system, its LE is equal to the dimension of its phase plane; a one-dimensional system has one LE, while a multidimensional system has several LEs. Positive Lyapunov exponents indicate a deviation from one-dimensional trajectories, suggesting that the dynamic system may exhibit chaotic behavior. The presence of two or more positive Lyapunov exponents indicates multi-dimensional divergence, potentially leading to hyperchaotic dynamics within the system. Furthermore, a larger positive LE denotes greater sensitivity to initial conditions, since LE characterizes the separation rate of extremely near orbits in chaotic systems [29].
    In this paper, the initial parameters of 2D-LSM, 2D-SIM, and 2D-SFM are set asx0=0.1,y0=0.1,a=0.3,b=0.4,α1=0.5,α2=0.6, and their two Lyapunov exponent distributions are shown inFigure 4. It can be seen that all three systems have two positive LEs, which can exhibit hyperchaotic behavior.
    In addition, the MLE distribution of 2D-LSM, 2D-SIM, 2D-SFM, 2D-LSCM, 2D-LSMCL, and 2D-LACM chaotic systems are shown inFigure 5. It is clear that the MLE values of 2D-LSM, 2D-SIM, and 2D-SFM have no significant window period and are higher than other chaos graphs. This means that the proposed mappings have more complex dynamic properties.

    2.3.4. Permutation Entropy

    A technique for identifying dynamic mutation and randomness in time series is called permutation entropy (PE), which can be used to quantify random noise in signal sequences [30]. PE first creates aK-row matrix by reconstructing the time series. Next, a column index representing each element’s position is created by placing each reconstructed component in ascending order. This column index then creates a set of symbol sequences. Lastly, Equation (10) yields the PE of the time series.
    PEm=i=1KPilnPilnm!,
    wherePi represents the probability of obtaining the reconstructed component according to the symbol sequence, andm represents the embedding dimension.
    PEs of different chaotic maps are shown inFigure 6. It can be seen that PEs of 2D-LSM, 2D-SIM, and 2D-SFM are comparable to those of 2D-LACM. Compared with other chaotic maps, PEs of 2D-LSM, 2D-SIM, and 2D-SFM are all larger and more stable. This shows that 2D-LSM, 2D-SIM, and 2D-SFM have better chaotic performance, and the generated sequences are more random and unpredictable.

    2.3.5. NIST SP800-22 Tests

    The NIST SP800-22 tests contain 15 different tests and recommend103 to107 length sequences for testing [30]. This article uses106 length sequences. When the test value exceeds 0.01, the test sequence is random.
    Table 1 shows results over 0.01, indicating that the six sequences produced by 2D-LSM, 2D-SIM, and 2D-SFM all pass the test and are random.

    3. Reversible Data Hiding

    Information security systems have made extensive use of chaotic systems due to their starting value sensitivity, unpredictability, ergodicity, and numerous other features. Shannon outlined the three fundamental information security systems—encryption, privacy, and hidden systems—in the Monograph on Information Security. This section describes the creation of a reversible data-hiding strategy for the secure transmission of stereoscopic medical images, based on 2D-LSM.
    As shown inFigure 7, the whole structure of the reversible data-hiding scheme based on 2D-LSM mainly consists of five stages: stereo image segmentation, key and chaotic sequence generation, image authentication, EMR authentication, and data hiding. Assuming the grayscale spiral CT imageP is used as the object, these stages can be simply described as follows.

    3.1. Stereo Image Segmentation

    As shown inFigure 8, this section introduces the generation process of a stereoscopic image segmentation mask.
    Step 1: Stereoscopic medical images are evenly divided into three parts: top, middle, and lower.
    Step 2: The first image of these three parts was selected and denoted asPtop,Pmid, andPlow, respectively. The Otsu threshold segmentation method [7] was applied to segmentPtop,Pmid, andPlow to generate three segmentation masks, denoted asM1,M2,M3.
    Step 3: The three segmentation masks are added to obtainM, and the final segmentation maskM is generated according to Equation (11).
    M=1,(M1+M2+M3)>00,(M1+M2+M3)0.
    Step 4: The segmentation maskM was applied to the whole stereoscopic image and divided into a region of interest (ROI) and background region. The ROI was denoted asPROI, and pixels belonging to the background region were discarded.

    3.2. Key and Chaotic Sequence Generation

    The initial value and sequence generation steps of chaotic systems are as follows:
    Step 1: The plaintext informationPtop,Pmid,Plow are taken as the input of the SHA-256 algorithm to obtain the hash valuesK1,K2,K3, which are usually represented by a hexadecimal number of length 64.
    K1k1,k2, k3k64=SHA256(Ptop)K2k1,k2, k3k64=SHA256(Pmid)K3k1,k2, k3k64=SHA256(Plow).
    Step 2: ConvertK1,K2,K3 to 4-bit binary numbers, and then convert each group of eight to decimal numbers, and calculate the XOR according to the Equation (13) to generate a decimal array of length 32.
    key1ka1,ka2, ka3ka32=K1K2key2kb1,kb2, kb3kbb32=K2K3.
    Step 3: The initial parameters of the chaotic system are calculated according to Equation (14).
    x0=(ka1ka2ka16)/256y0=(ka17ka18ka32)/256a=(kb1kb2kb16)/256b=(kb17kb18kb32)/256.
    Step 4: Set the parameterc to 0.5 and the parameterd to 0.6, and substitute the calculatedx0,y0,a,b into the 2D-LSM hyperchaotic system; iteratively generate two random sequences, denotedx,y.

    3.3. Image Authentication

    Double random phase coding (DRPE) is an optical coding technique that is frequently used for picture authentication and encryption. It was first presented by Refregier et al. [31]. Equations (15) and (16) illustrate the double random phase encoding and decoding procedure.
    g(x,y)=FT1FTfx,yexpi2π θx,yexpi2π φu,v,
    fx,y=FT1FTgx,yexpi2πφu,vexpi2πθx,y,
    wheref(x,y) is the original image, andg(x,y) is the encoded image.FT andFT1 represent the Fourier transform and the inverse Fourier transform, respectively.x andy are spatial coordinates, andu andv are frequency domain coordinates.θ(x,y) andφ(u,v) are two sets of two-dimensional normally distributed random numbers in the spatial domain and the frequency domain, whose values are randomly distributed between [0, 1], and the convolution and mean of the two arrays are zero; that is, they are two random white noises that are independent of each other. Therefore,exp(i2πθ(x,y)) andexp[j2πφ(u,v)] are phase masks capable of producing phases between[0, 2π]. The encoding resultg(x,y) is a complex amplitude with amplitude spectrum and phase spectrum. The phase spectrum of the encoding result is extracted as authentication information, and the correlation between the decoded image and the authenticated image can be verified by peak correlation energy.
    Step 1: Calculate the size of the cover imagePtop according to Equation (17).
    m,n=Size(Ptop).
    Step 2: Two random phase plates were constructed, the firstm×n bits of a random sequencex andy were intercepted, reconstructed according to Equation (18).
    θx,y=reshapex1:m×n,m,nφ(u,v)=reshapey1:m×n,m,n.
    Step 3: According to Equation (15), encoding results only retain the phase signalPphase, and discard all amplitude information.
    Step 4: According to Equation (19), the phase signalPphase is binarized.
    Pphase=im2bwPphase.
    Step 5:Pphase is converted into a one-dimensional sequence as the authentication informationAp of the image.

    3.4. EMR Authentication

    Information security-related concerns will have an impact on the management of medical images. Three primary concerns are image source verification, whether the image matches the patient, and preventing the separation of the image from the associated electronic medical record (EMR) [7]. To prevent illegal copying and falsification of EMR data and to ensure that patient data and their corresponding medical images correspond, a QR code has been chosen as the container of the patient electronic medical record report in this paper. The QR code is embedded in stereoscopic medical image data.
    Step 1: According to Equation (20), the QR codePQR is binarized.
    PQR=im2bwPQR.
    Step 2:PQR is converted into a one-dimensional sequence as the authentication informationAe for EMR data.

    3.5. Data Hiding

    M,Ap, andAe as secret information are hidden inPROI.
    Step 1: According to Algorithm 1,PROI is divided into the embeddable regionPROIe and the unembeddable regionPROIn.
    Algorithm 1 Embedded region partitioning algorithm
    Input: Original one-dimensional sequence PROI.
    Output: Embeddable matrices PROIe and non-embeddable sequences PROIn.
    1:m,nsizePROI;
    2:longm×n;
    3:squarelongfloor(sqrt(long));
    4:lengthsquarelong×squarelong;
    5:PROIePROI(1:length);
    6:PROIereshape(PROIe,squarelong,squarelong);
    7:PROInPROI(length+1:end).
    Step 2: The median edge detector (MED) predictor [32] was used to calculate the predicted valuepx(i,j) for each pixelx(i,j) of the embedded regionPROIe.
    Step 3: Convert the values ofx(i,j) andpx(i,j) into an 8-bit binary sequence denoted asxk(i,j) andpxk(i,j), wherek=1,2,,8.
    Step 4: According to the method in Ref. [10],xk(i,j) andpxk(i,j) are compared successively from the most significant bit to the least significant bit until a certain bit is different, the label value of each pixel is recorded, and the theoretical embedding capacity of the entire image is calculated by adding all the label values. For these label values, Huffman coding is used for compression, reducing the amount of auxiliary information and increasing the payload of the image.
    Step 5: According to Equation (21), auxiliary information such as Huffman coding rules and label mapping and secret information such asM,Ap, andAe are embedded intoPROIe.
    PROIe=PROIei,jmod27t+s=0tbs×27s,0t6s=18bs×28s                                      ,7t8,
    wheret is the label value of the current pixel, andbs is the secret information to be embedded.
    Step 6:PROIe is converted into a one-dimensional sequence and joined withPROIn, denoted asPROI.
    Step 7: Equation (22) is used to process chaotic sequencex, and Equation (23) is used to process chaotic sequencey.
    X(i)=modfloorx×1015,s
    Y(i)=modfloory×1015,256
    wheres represents the length of the sequence to be encrypted,i=1,2,,s.
    Step 8: Sort the sequenceX(i), derive the index matrixV, all elements inV are non-repeatable integers ranging from 1 tos, and encryptPROI according to Equation (24).
    CROI(i)=PROI(V(i)Y(V(i))CROI(i1)),
    whereCROI0=0,i=1,2,,s, represents the bit-level XOR operation [5].
    At this point, the data-hiding and encryption process is complete.

    4. Experiments for Simulation

    In this section, a comprehensive evaluation of the proposed reversible data-hiding algorithm is conducted. The assessment encompasses multiple dimensions: visual security analysis, key space analysis, entropy analysis, histogram analysis, correlation analysis, embedding capacity, and the ratio of encoded pixels. All experiments were executed using MATLAB 2016b, running on a machine equipped with an Intel i5 processor and 16 GB of RAM.

    4.1. Visual Security Analysis

    To validate the suggested reversible concealment technique, four sets of stereoscopic medical images are chosen from the TCIA dataset and used in this work. The four sets of images are namedtest1,test2,test3, andtest4. The original stereo image of the four test image groups is shown inFigure 9a–d, the segmentation mask for the four test image groups is shown inFigure 9e–h, the QR code for the four test image groups is shown inFigure 9i–l, and the data-hiding results are shown inFigure 9m–p.
    The key point of reversible data hiding is to recover the original image and secret information without error. The qualitative analysis results of this algorithm are shown inFigure 10. The decoded stereoscopic image, QR code, and authentication image can be retrieved through reverse decoding.
    To assess the reconstructed image quality quantitatively, the following metrics are introduced: the peak signal-to-noise ratio (PSNR) and the mean square error (MSE).
    MSE=1M×Ni=1Mj=1NXi,jYi,j2,
    whereM andN represent the size of the pictureXi,j andYi,j.
    PSNR=10log102n12MSE,
    whereMSE stands for the mean square error as it appears in Equation (25). In order to quantify the correlation between decoded and authenticated images, peak-to-correlation energy (PCE) is introduced. The association between the decrypted image and the verified image is stronger the higher the PCE value [31].
    COx,y=IFTPμ,η·Aξ,νk·eφPμ,ηφAξ,ν,
    whereP(μ,η) andA(ξ,ν) are the 2D Fourier transforms of the decoded imageP and authentication imageA;φPμ,η andφA(ξ,ν) are their phase images. The parameterk is usually set to 0.3.
    As can be seen fromFigure 10 andTable 2, the extracted secret information is the same as the original secret information, and the original image can be completely restored according to the extracted auxiliary information.

    4.2. Key Space Analysis

    To counter brute force attacks, the key space of the algorithm should be expanded as much as possible. When the key space exceeds2100, the system has sufficient ability to resist violent attacks. The key for this work is generated by a hash algorithm, which is an algorithm that maps data of any length to a fixed-length string. SHA-256 is a hash family that generates a hash value of 256 bits in length, usually represented by 64 hexadecimal numbers.
    Three images in the stereoscopic image are recorded asPtop,Pmid, andPlow, which are taken as the input of SHA-256 algorithm, and three hash values of 256 bits in length are generated as the key. Therefore, the key space of this work is2256×3=2768, much larger than2100, and the key space is large enough to resist brute force attack.

    4.3. Information Entropy Analysis

    Shannon established the concept of information entropy, which may be used to reflect the randomness of information sources and describe the degree of information confusion [33]. When it comes to picture security, the better the secrecy and the worse the image recognition effect, the bigger the information entropy. Equation (28) is the information entropy formula.
    Hc=i=02L1Pci×log2Pci,
    wherePci is the statistical likelihood of havingci in a medical image, andci is theith gray quantity in an image.L stands for the gray levels, and an optimal entropy value is eight.
    Table 3 reveals that the entropy of the original image is below 7.1. However, the entropy of the encoded image closely approximates the theoretical maximum of 8. As a result, steganographic and encrypted images are very random, making it harder for adversaries to extract useful information from them. The information entropy of this approach is larger, as can be seen from the comparative findings inTable 3, suggesting that this algorithm has more unpredictability and security.

    4.4. Histogram Analysis

    The frequency of each gray-level pixel in the image is described by the histogram [34]. After several images are encrypted, the histogram distribution of the encrypted image should be relatively similar to prevent an attacker from deriving any crucial information from the floating histogram of the encrypted image. The histogram cannot offer suggestions for statistical analysis when the difference between the histograms is not significant.
    The original image’s histogram, as seen inFigure 11, displays clear peaks and troughs that indicate the image’s statistical analysis characteristics. The uniform distribution of pixel values in the encoded image, on the other hand, significantly lowers the statistical correlation between the pixels among the features and has the benefit of fending off the statistical analysis’s assault.
    The homogeneity of the histogram is statistically assessed in this research using the chi-square test. The more uniform the distribution of the encoded image, the smaller its chi-square test value. The method of measuring chi-squares is
    χ2=256×1256(fpM×N256)2M×N,
    whereM andN represent the image size, andfp represents the number of gray values counted by the histogram.
    The original image and the encoded image’s Chi-square test results are displayed inTable 4. The encoded image’s estimated result is significantly less than 1000, suggesting that the pixel frequency distribution is nearly uniform.

    4.5. Correlation Analysis

    The correlation coefficient between neighboring pair pixels can be formulated as
    γxy=covx,yDyDx,
    wherecovx,y=1Ki=1KxiExyiEy,Dx=1Ki=1KxiEx2,Ex=1Ki=1Kxi.K is the number of pixel pairsxi,yi,xi andyi are the numerical values of two neighboring pair pixels,Ex andEy are the mean values of the two adjoining pair pixels.
    Table 5 displays the correlation coefficients’ quantitative analysis results between the original and encoded images. The encoded image’s correlation coefficients are close to 0 in all directions, while the original image’s correlation coefficients are almost 1 in all directions. A total of 2000 randomly chosen pixels are used in this paper’s qualitative correlation analysis.
    The four colors inFigure 12 correspond to the four directions: horizontal (H), vertical (V), positive diagonal (P), and sub-diagonal diagonal (S). The correlation scatter plots in these directions are displayed. The coded image’s pixels are almost uniformly dispersed, whereas the plaintext image’s are grouped close to the diagonal. It suggests that the plan is resilient to statistical assaults.

    4.6. Embedded Capacity Analysis

    The image’s label map is computed using the MED predictor to provide an accurate prediction value. Huffman coding is used to decrease the auxiliary information, compress the label map, and increase the image’s payload to increase the payload. Conversely, employing the MED predictor can also efficiently decrease the number of reference pixels and raise the number of embedded pixels, thereby enhancing embedded rates (ER). Calculating the image’s total embedded capacity (EC) is possible once the label mapping has been established. Similarly, the length of auxiliary information (AL) can also be computed to determine the size of the net payload using label mapping and Huffman coding principles.
    Table 6 shows the payloads of the four sets of test images. Among them,ER1 represents the theoretical embedding capacity, andER2 represents the embedding capacity after embedding auxiliary information. It can be seen that the amount of auxiliary information is still relatively large, resulting in the actual embedding capacity as not very ideal.

    4.7. Encoded Pixel Ratio Analysis

    This work proposes a selective data concealing and encryption technique that eschews a significant amount of superfluous pixels. Less than 35% of the pixels in this research are encoded, asFigure 13 illustrates. This significantly lowers the computational load and boosts algorithm efficiency.
    Compared with Ref. [7], the pixel encryption ratio in this paper is lower, and the amount of auxiliary information is reduced using fusion and segmentation mask, and the auxiliary information is embedded in the original image, and a complete steganographic encryption algorithm is constructed, which does not require additional space to store auxiliary information.

    5. Conclusions

    This research proposes an n-dimensional CTBCS (nD-CTBCS) chaotic coupling framework that is straightforward and useful for creating chaotic maps of any dimensionality. Three 2D chaotic maps are produced by applying many 1D chaotic maps tonD-CTBCS to illustrate its impact. We compare the proposed chaotic maps with the state-of-the-art chaotic maps. Based on the results, it can be concluded that all of the recently created chaotic maps perform better and display hyperchaotic behavior with broader chaotic intervals. To demonstrate the feasibility ofnD-CTBCS, a reversible data hiding strategy is proposed to facilitate secure medical image communication. The stereoscopic image is divided into regions of interest and regions of disinterest, and the algorithm strategy is performed only on regions of interest, which reduces the number of encrypted pixels and does not require additional space to store auxiliary information. The results show that this method can be safely applied in the field of information transmission. Future work will focus on improving the practical embedding capabilities of reversible data hiding algorithms.

    Author Contributions

    Y.Y.: conceptualization, formal analysis, methodology. R.C.: programming, validation, writing—original draft. X.F.: formal analysis, methodology, data analysis. P.L.: results interpretation, writing—original draft, writing—review and editing. Y.C.: formal analysis, data analysis. H.Z.: results interpretation, writing—original draft. All authors have read and agreed to the published version of the manuscript.

    Funding

    This research was funded by the Key R&D plan in Shanxi Province (Project No. 202102020101007), National Natural Science Foundation of China (Nos: 61702356), Natural Science Foundation of Shanxi Province (Nos: 20210302124050 and 202303021221017).

    Institutional Review Board Statement

    Not applicable.

    Data Availability Statement

    The used datasets are openly available fromhttp://sipi.usc.edu/database/ andhttps://www.cancerimagingarchive.net/. The data used to support the findings of this study are available from the corresponding author upon reasonable request.

    Conflicts of Interest

    The authors declare no conflict of interest.

    Abbreviations

    nD-CTBCSn-dimensional cosine-transform-based chaotic system
    1-DCMAOne-dimensional chaotic mapping amplifier
    DHData hiding
    RDHReversible data hiding
    RDWTRedundant discrete wavelet transform
    NSSTNon-subsampled shear wave transform
    LMLogistic map
    ICMICIterative chaotic map with infinite collapse
    LELyapunov exponents
    MLEMaximum Lyapunov exponent
    PEPermutation entropy
    2D-LSMTwo-dimensional Logistics–sine mapping
    2D-SFMTwo-dimensional Sine–fraction mapping
    2D-SIMTwo-dimensional Sine–ICMIC mapping
    2D-LSCMTwo-dimensional Logistic–Sine–Cosine map
    2D-LSMCLTwo-dimensional Logistic-modulated–Sine-coupling–Logistic chaotic map
    2D-LACMTwo-dimensional Logistic-Adjusted-Chebyshev map
    ROIRegion of interest
    DRPEDouble random phase coding
    EMRElectronic medical record
    MEDMedian edge detector
    PSNRPeak signal-to-noise ratio
    MSEMean square error
    PCEPeak-to-correlation energy
    EREmbedded rates
    ECEmbedded capacity
    ALAuxiliary information

    References

    1. Ding, D.; Wang, W.; Yang, Z.; Hu, Y.; Wang, J.; Wang, M.; Niu, Y.; Zhu, H. An n-dimensional modulo chaotic system with expected Lyapunov exponents and its application in image encryption.Chaos Solitons Fractals2023,174, 113841. [Google Scholar] [CrossRef]
    2. Cao, W.; Cai, H.; Hua, Z. n-Dimensional Chaotic Map with application in secure communication.Chaos Solitons Fractals2022,163, 112519. [Google Scholar] [CrossRef]
    3. Wu, R.; Gao, S.; Wang, X.; Liu, S.; Li, Q.; Erkan, U.; Tang, X. AEA-NCS: An audio encryption algorithm based on a nested chaotic system.Chaos Solitons Fractals2022,165, 112770. [Google Scholar] [CrossRef]
    4. Kumar, A.; Dua, M. Audio encryption using two chaotic map based dynamic diffusion and double DNA encoding.Appl. Acoust.2023,203, 109196. [Google Scholar] [CrossRef]
    5. Teng, L.; Wang, X.; Xian, Y. Image encryption algorithm based on a 2D-CLSS hyperchaotic map using simultaneous permutation and diffusion.Inf. Sci.2022,605, 71–85. [Google Scholar] [CrossRef]
    6. Feng, J.; Wang, J.; Zhu, Y.; Han, K. A Hybrid Chaotic Encryption ASIC with Dynamic Precision for Internet of Things.IEEE Internet Things J.2024,11, 1148–1163. [Google Scholar] [CrossRef]
    7. Zhang, Y.; Xie, H.; Sun, J.; Zhang, H. An efficient multi-level encryption scheme for stereoscopic medical images based on coupled chaotic system and Otsu threshold segmentation.Comput. Biol. Med.2022,146, 105542. [Google Scholar] [CrossRef]
    8. Tan, T.; Zhang, L.; Zhang, M.; Wang, S.; Wang, L.; Zhang, Z.; Liu, S.; Wang, P. Commutative encryption and watermarking algorithm based on compound chaotic systems and zero-watermarking for vector map.Comput. Geosci.2024,184, 105530. [Google Scholar] [CrossRef]
    9. Khallaf, F.; El-Shafai, W.; El-Rabaie, E.S.M.; Soliman, N.F.; El-Samie, F.E.A. A novel hybrid cryptosystem based on DQFrFT watermarking and 3D-CLM encryption for healthcare services.Front. Inf. Technol. Electron. Eng.2023,24, 1045–1061. [Google Scholar] [CrossRef]
    10. Yin, Z.; Xiang, Y.; Zhang, X. Reversible data hiding in encrypted images based on multi-MSB prediction and Huffman coding.IEEE Trans. Multimed.2019,22, 874–884. [Google Scholar] [CrossRef]
    11. Yu, C.; Zhang, X.; Li, G.; Zhan, S.; Tang, Z. Reversible data hiding with adaptive difference recovery for encrypted images.Inf. Sci.2022,584, 89–110. [Google Scholar] [CrossRef]
    12. Yu, C.; Zhang, X.; Zhang, X.; Li, G.; Tang, Z. Reversible data hiding with hierarchical embedding for encrypted images.IEEE Trans. Circuits Syst. Video Technol.2021,32, 451–466. [Google Scholar] [CrossRef]
    13. Hua, Z.; Chen, Y.; Bao, H.; Zhou, Y. Two-dimensional parametric polynomial chaotic system.IEEE Trans. Syst. Man Cybern. Syst.2021,52, 4402–4414. [Google Scholar] [CrossRef]
    14. Hua, Z.; Zhou, Y.; Huang, H. Cosine-transform-based chaotic system for image encryption.Inf. Sci.2019,480, 403–419. [Google Scholar] [CrossRef]
    15. Li, D.; Li, J.; Di, X. A novel exponential one-dimensional chaotic map enhancer and its application in an image encryption scheme using modified ZigZag transform.J. Inf. Secur. Appl.2022,69, 103304. [Google Scholar] [CrossRef]
    16. Hu, G.; Li, B. A uniform chaotic system with extended parameter range for image encryption.Nonlinear Dyn.2021,103, 2819–2840. [Google Scholar] [CrossRef]
    17. Mansouri, A.; Wang, X. A novel one-dimensional chaotic map generator and its application in a new index representation-based image encryption scheme.Inf. Sci.2021,563, 91–110. [Google Scholar] [CrossRef]
    18. Prasad, S.; Pal, A.K.; Mukherjee, S. An RGB Color Image Steganography Scheme by Binary Lower Triangular Matrix.IEEE Trans. Intell. Transp. Syst.2023,24, 6865–6873. [Google Scholar] [CrossRef]
    19. Anand, A.; Singh, A.K.; Zhou, H. ViMDH: Visible-imperceptible medical data hiding for internet of medical things.IEEE Trans. Ind. Inform.2022,19, 849–856. [Google Scholar] [CrossRef]
    20. Yu, C.; Zhang, X.; Qin, C.; Tang, Z. Reversible data hiding in encrypted images with secret sharing and hybrid coding.IEEE Trans. Circuits Syst. Video Technol.2023,33, 6443–6458. [Google Scholar] [CrossRef]
    21. Wu, Y.; Hu, R.; Xiang, S. PVO-Based Reversible Data Hiding Using Global Sorting and Fixed 2D Mapping Modification.IEEE Trans. Circuits Syst. Video Technol.2024,34, 618–631. [Google Scholar] [CrossRef]
    22. He, D.; Parthasarathy, R.; Li, H.; Geng, Z. A Fast Image Encryption Algorithm based on Logistic Mapping and Hyperchaotic Lorenz System for Clear Text Correlation.IEEE Access2023,11, 91441–91453. [Google Scholar] [CrossRef]
    23. Peng, Y.; Lan, Z.; Sun, K.; Xu, W. A simple color image encryption algorithm based on a discrete memristive hyperchaotic map and time-controllable operation.Opt. Laser Technol.2023,165, 109543. [Google Scholar] [CrossRef]
    24. Wang, Q.; Zhang, X.; Zhao, X. Image encryption algorithm based on improved iterative chaotic map with infinite collapses and Gray code.Phys. Scr.2024,99, 025232. [Google Scholar] [CrossRef]
    25. Huang, H. Novel scheme for image encryption combining 2d logistic-sine-cosine map and double random-phase encoding.IEEE Access2019,7, 177988–177996. [Google Scholar] [CrossRef]
    26. Zhu, H.; Zhao, Y.; Song, Y. 2D logistic-modulated-sine-coupling-logistic chaotic map for image encryption.IEEE Access2019,7, 14081–14098. [Google Scholar] [CrossRef]
    27. Liu, L.; Jiang, D.; Wang, X.; Rong, X.; Zhang, R. 2d logistic-adjusted-chebyshev map for visual color image encryption.J. Inf. Secur. Appl.2021,60, 102854. [Google Scholar] [CrossRef]
    28. Erkan, U.; Toktas, A.; Toktas, F.; Alenezi, F. 2D eπ-map for image encryption.Inf. Sci.2022,589, 770–789. [Google Scholar] [CrossRef]
    29. Wolf, A.; Swift, J.B.; Swinney, H.L.; Vastano, J.A. Determining Lyapunov exponents from a time series.Phys. D Nonlinear Phenom.1985,16, 285–317. [Google Scholar] [CrossRef]
    30. Nan, S.X.; Feng, X.F.; Wu, Y.F.; Zhang, H. Remote sensing image compression and encryption based on block compressive sensing and 2D-LCCCM.Nonlinear Dyn.2022,108, 2705–2729. [Google Scholar] [CrossRef]
    31. Zhou, K.; Fan, J.; Fan, H.; Li, M. Secure image encryption scheme using double random-phase encoding and compressed sensing.Opt. Laser Technol.2020,121, 105769. [Google Scholar] [CrossRef]
    32. Weinberger, M.J.; Seroussi, G.; Sapiro, G. The LOCO-I lossless image compression algorithm: Principles and standardization into JPEG-LS.IEEE Trans. Image Process.2000,9, 1309–1324. [Google Scholar] [CrossRef] [PubMed]
    33. Wang, X.; Wang, Y. Multiple medical image encryption algorithm based on scrambling of region of interest and diffusion of odd-even interleaved points.Expert Syst. Appl.2023,213, 118924. [Google Scholar] [CrossRef]
    34. Gao, X.; Mou, J.; Banerjee, S.; Cao, Y.; Xiong, L.; Chen, X. An effective multiple-image encryption algorithm based on 3D cube and hyperchaotic map.J. King Saud Univ.-Comput. Inf. Sci.2022,34, 1535–1551. [Google Scholar] [CrossRef]
    Entropy 26 00254 g001aEntropy 26 00254 g001b
    Figure 1. Bifurcation diagrams of (a) logistic; (c) sine; (e) fraction; (g) ICMIC maps; LEs of (b) logistic; (d) sine; (f) fraction; (h) ICMIC maps.
    Figure 1. Bifurcation diagrams of (a) logistic; (c) sine; (e) fraction; (g) ICMIC maps; LEs of (b) logistic; (d) sine; (f) fraction; (h) ICMIC maps.
    Entropy 26 00254 g001aEntropy 26 00254 g001b
    Entropy 26 00254 g002aEntropy 26 00254 g002b
    Figure 2. 2D trajectories for different 2D chaotic maps: (a) 2D-LSM; (b) 2D-SIM; (c) 2D-SFM; (d) 2D-LSCM; (e) 2D-LSMCL; (f) 2D-LACM.
    Figure 2. 2D trajectories for different 2D chaotic maps: (a) 2D-LSM; (b) 2D-SIM; (c) 2D-SFM; (d) 2D-LSCM; (e) 2D-LSMCL; (f) 2D-LACM.
    Entropy 26 00254 g002aEntropy 26 00254 g002b
    Entropy 26 00254 g003
    Figure 3. Bifurcation diagram for different 2D chaotic maps: (a) 2D-LSM; (b) 2D-SIM; (c) 2D-SFM.
    Figure 3. Bifurcation diagram for different 2D chaotic maps: (a) 2D-LSM; (b) 2D-SIM; (c) 2D-SFM.
    Entropy 26 00254 g003
    Entropy 26 00254 g004
    Figure 4. Two LEs for different 2D chaotic maps: (a)LE1 of 2D-LSM; (b)LE1 of 2D-SIM; (c)LE1 of 2D-SFM; (d)LE2 of 2D-LSM; (e)LE2 of 2D-SIM; (f)LE2 of 2D-SFM.
    Figure 4. Two LEs for different 2D chaotic maps: (a)LE1 of 2D-LSM; (b)LE1 of 2D-SIM; (c)LE1 of 2D-SFM; (d)LE2 of 2D-LSM; (e)LE2 of 2D-SIM; (f)LE2 of 2D-SFM.
    Entropy 26 00254 g004
    Entropy 26 00254 g005
    Figure 5. MLE of different chaotic maps.
    Figure 5. MLE of different chaotic maps.
    Entropy 26 00254 g005
    Entropy 26 00254 g006
    Figure 6. PEs of different chaotic maps.
    Figure 6. PEs of different chaotic maps.
    Entropy 26 00254 g006
    Entropy 26 00254 g007
    Figure 7. The flow chart of the proposed data-hiding algorithm.
    Figure 7. The flow chart of the proposed data-hiding algorithm.
    Entropy 26 00254 g007
    Entropy 26 00254 g008
    Figure 8. Segmentation mask generation process.
    Figure 8. Segmentation mask generation process.
    Entropy 26 00254 g008
    Entropy 26 00254 g009
    Figure 9. Reversible data-hiding results: (a) test1 image; (b) test2 image; (c) test3 image; (d) test4 image; (e) Mask of test1; (f) Mask of test2; (g) Mask of test3; (h) Mask of test4; (i) QR of test1; (j) QR of test2; (k) QR of test3; (l) QR of test4; (m) result of test1; (n) result of test2; (o) result of test3; (p) result of test4.
    Figure 9. Reversible data-hiding results: (a) test1 image; (b) test2 image; (c) test3 image; (d) test4 image; (e) Mask of test1; (f) Mask of test2; (g) Mask of test3; (h) Mask of test4; (i) QR of test1; (j) QR of test2; (k) QR of test3; (l) QR of test4; (m) result of test1; (n) result of test2; (o) result of test3; (p) result of test4.
    Entropy 26 00254 g009
    Entropy 26 00254 g010
    Figure 10. Decoding result: (a) test1 image; (b) test2 image; (c) test3 image; (d) test4 image; (e) QR of test1; (f) QR of test2; (g) QR of test3; (h) QR of test4; (i) authentication image of test1; (j) authentication image of test2; (k) authentication image of test3; (l) authentication image of test4; (m) PCE of test1; (n) PCE of test2; (o) PCE of test3; (p) PCE of test4.
    Figure 10. Decoding result: (a) test1 image; (b) test2 image; (c) test3 image; (d) test4 image; (e) QR of test1; (f) QR of test2; (g) QR of test3; (h) QR of test4; (i) authentication image of test1; (j) authentication image of test2; (k) authentication image of test3; (l) authentication image of test4; (m) PCE of test1; (n) PCE of test2; (o) PCE of test3; (p) PCE of test4.
    Entropy 26 00254 g010
    Entropy 26 00254 g011aEntropy 26 00254 g011b
    Figure 11. Histogram analysis: (a) histogram of test1; (b) histogram of encoded test1; (c) histogram of test2; (d) histogram of encoded test2; (e) histogram of test3; (f) histogram of encoded test3; (g) histogram of test4; (h) histogram of encoded test4.
    Figure 11. Histogram analysis: (a) histogram of test1; (b) histogram of encoded test1; (c) histogram of test2; (d) histogram of encoded test2; (e) histogram of test3; (f) histogram of encoded test3; (g) histogram of test4; (h) histogram of encoded test4.
    Entropy 26 00254 g011aEntropy 26 00254 g011b
    Entropy 26 00254 g012aEntropy 26 00254 g012b
    Figure 12. Correlation analysis: (a) test1-HVPS; (b) encoded test1-HVPS; (c) test2-HVPS; (d) encoded test2-HVPS; (e) test3-HVPS; (f) encoded test3-HVPS; (g) test4-HVPS; (h) encoded test4-HVPS.
    Figure 12. Correlation analysis: (a) test1-HVPS; (b) encoded test1-HVPS; (c) test2-HVPS; (d) encoded test2-HVPS; (e) test3-HVPS; (f) encoded test3-HVPS; (g) test4-HVPS; (h) encoded test4-HVPS.
    Entropy 26 00254 g012aEntropy 26 00254 g012b
    Entropy 26 00254 g013
    Figure 13. Encoded pixel ratio.
    Figure 13. Encoded pixel ratio.
    Entropy 26 00254 g013
    Table 1. NIST SP800-22 test results for random number sequences.
    Table 1. NIST SP800-22 test results for random number sequences.
    NIST Test Items2D-LSM2D-SIM2D-SFM
    Monobit frequency test0.38590.10630.11810.37080.42310.5399
    Frequency within block test0.08650.79640.83980.82730.83120.9453
    Runs test0.54630.57320.93180.01290.12970.3399
    Longest-run-ones in a block test0.19880.18680.98800.13270.18080.9067
    Binary matrix rank test0.03710.26930.16160.02710.03520.0408
    Discrete Fourier transform test0.04220.13130.74960.72770.12400.5617
    Non-overlapping template matching test0.73230.60000.05620.24620.96970.3925
    Overlapping template matching0.96280.76640.01400.51820.07480.6554
    Maurer’s universal statistical test0.05360.43850.66540.88980.11860.3053
    Linear complexity test0.71080.11990.74340.39130.18760.5400
    Serial test0.12110.05440.45580.10860.09560.5779
    Approximate entropy test0.41360.02680.77910.65690.60320.3886
    Cumulative sums test0.09770.97160.98380.43710.90740.2756
    Random excursion test0.63820.69450.58540.66470.64140.6415
    Random excursion variant test0.48710.40650.56060.65000.39380.5142
    Table 2. Quantitative analysis of image quality.
    Table 2. Quantitative analysis of image quality.
    ImageMSEPSNRPCE
    test10.0000Inf0.026538
    test20.0000Inf0.026686
    test30.0000Inf0.010429
    test40.0000Inf0.030029
    Table 3. Entropy analysis.
    Table 3. Entropy analysis.
    ImageOriginalEncodedDecoded
    test17.02607.99987.0260
    test27.05517.99987.0551
    test37.09127.99997.0912
    test47.01347.99997.0134
    Ref. [33]-7.9993-
    Table 4. Histogram chi-square test.
    Table 4. Histogram chi-square test.
    ImageOriginalEncodedDecoded
    test13.5545 × 106264.67503.5545 × 106
    test23.4451 × 106238.89663.4451 × 106
    test33.3803 × 106235.70043.3803 × 106
    test43.6059 × 106242.60683.6059 × 106
    Ref. [34]1.3506 × 107262.5808-
    Table 5. Correlation analysis.
    Table 5. Correlation analysis.
    ImageHVPS
    test1-plain0.96220.97240.94980.9365
    test1-encoded0.0483−0.00200.00220.0112
    test2-plain0.96000.97920.95390.9573
    test2- encoded0.0060−0.0013−0.0088−0.0076
    test3-plain0.96940.97610.94180.9507
    test3- encoded−0.0048−0.0038−0.0128−0.0063
    test4-plain0.96460.98320.95450.9531
    test4- encoded0.01070.00610.00930.0048
    Ref. [33]0.0066−0.00490.0158-
    Table 6. Embedded capacity analysis.
    Table 6. Embedded capacity analysis.
    ImageTotal EC (bits)AL (bits)Net Payload (bits)ER1 (bpp)ER2 (bpp)
    test1398533932091517737433.99330.77774
    test2411922733879217313063.90550.69336
    test3439510936655547295553.83890.63722
    test4392591331512567746574.00560.79039
    Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

    © 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).

    Share and Cite

    MDPI and ACS Style

    Yang, Y.; Chang, R.; Feng, X.; Li, P.; Chen, Y.; Zhang, H. Ann-Dimensional Chaotic Map with Application in Reversible Data Hiding for Medical Images.Entropy2024,26, 254. https://doi.org/10.3390/e26030254

    AMA Style

    Yang Y, Chang R, Feng X, Li P, Chen Y, Zhang H. Ann-Dimensional Chaotic Map with Application in Reversible Data Hiding for Medical Images.Entropy. 2024; 26(3):254. https://doi.org/10.3390/e26030254

    Chicago/Turabian Style

    Yang, Yuli, Ruiyun Chang, Xiufang Feng, Peizhen Li, Yongle Chen, and Hao Zhang. 2024. "Ann-Dimensional Chaotic Map with Application in Reversible Data Hiding for Medical Images"Entropy 26, no. 3: 254. https://doi.org/10.3390/e26030254

    APA Style

    Yang, Y., Chang, R., Feng, X., Li, P., Chen, Y., & Zhang, H. (2024). Ann-Dimensional Chaotic Map with Application in Reversible Data Hiding for Medical Images.Entropy,26(3), 254. https://doi.org/10.3390/e26030254

    Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further detailshere.

    Article Metrics

    No
    No

    Article Access Statistics

    For more information on the journal statistics, clickhere.
    Multiple requests from the same IP address are counted as one view.
    Entropy, EISSN 1099-4300, Published by MDPI
    RSSContent Alert

    Further Information

    Article Processing Charges Pay an Invoice Open Access Policy Contact MDPI Jobs at MDPI

    Guidelines

    For Authors For Reviewers For Editors For Librarians For Publishers For Societies For Conference Organizers

    MDPI Initiatives

    Sciforum MDPI Books Preprints.org Scilit SciProfiles Encyclopedia JAMS Proceedings Series

    Follow MDPI

    LinkedIn Facebook X
    MDPI

    Subscribe to receive issue release notifications and newsletters from MDPI journals

    © 1996-2025 MDPI (Basel, Switzerland) unless otherwise stated
    Terms and Conditions Privacy Policy
    We use cookies on our website to ensure you get the best experience.
    Read more about our cookieshere.
    Accept
    Back to TopTop
    [8]ページ先頭

    ©2009-2025 Movatter.jp