Next Article in Journal
A Fast Algorithm for Estimating Two-Dimensional Sample Entropy Based on an Upper Confidence Bound and Monte Carlo Sampling
Next Article in Special Issue
An n-Dimensional Chaotic Map with Application in Reversible Data Hiding for Medical Images
Previous Article in Journal
Quantum Switch as a Thermodynamic Resource in the Context of Passive States
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Hybrid Cryptosystem Incorporating a New Algorithm for Improved Entropy

by
Víctor Manuel Silva-García
1,
Rolando Flores-Carapia
1 and
Manuel Alejandro Cardona-López
2,*
1
Centro de Innovación y Desarrollo Tecnológico en Cómputo, Instituto Politécnico Nacional, Ciudad de México 07738, Mexico
2
Centro de Investigación en Computación, Instituto Politécnico Nacional, Ciudad de México 07738, Mexico
*
Author to whom correspondence should be addressed.
Entropy 2024, 26(2), 154; https://doi.org/10.3390/e26020154
Submission received: 17 January 2024 / Revised: 3 February 2024 / Accepted: 6 February 2024 / Published: 10 February 2024

Abstract

:
Today, safeguarding sensitive content through encryption is crucial. This work presents a hybrid cryptosystem for images that employs both asymmetric and symmetric encryption. The asymmetric component involves applying the Diffie–Hellman protocol and the ElGamal cryptosystem to securely transmit two constants. These constants are necessary for the symmetrical aspect to generate dynamic permutations, substitution boxes, and round keys. Following an encryption process with fourteen rounds, the encrypted images are processed by an algorithm proposed to enhance entropy, a critical metric for assessing encryption quality. It increases the frequencies of the basic colors to achieve a histogram closely resembling a uniform distribution, but it increases the image size by approximately 8%. This improves the entropy values achieved by the hybrid cryptosystem, bringing them remarkably close to the ideal value of 8.0. In specific instances, the entropy values were elevated from 7.99926 to 8.0. The proposed method exhibits resilience against various attacks, including differential, linear, brute force, and algebraic attacks, as evaluated through the entropy, correlation, goodness of fit, Discrete Fourier Transform (DFT), Number of Pixels Change Rate (NPCR), Unified Average Changing Intensity (UACI), Avalanche Criteria (AC), contrast, energy, and homogeneity. Further, encrypted images are subjected to noise attacks ranging from 20% to 50% noise, including additive, multiplicative, occlusion noise, as well as the newly introduced χ 2 noise. The noise damage is quantified using the proposed Similarity Parameter (SP), and a 3 × 3 median filter is employed to enhance the visual quality.

1. Introduction

In this research paper, a hybrid cryptosystem is proposed to encrypt color images and facilitate key distribution. It includes an additional algorithm to enhance entropy, achieving values remarkably close to the ideal 8.0 and, in some instances, values of precisely 8.0. The described proposal involves augmenting the resulting encrypted image’s frequencies to achieve a histogram closely resembling a uniform distribution. This modification increases the image size by 8%. A detailed explanation of the algorithm is provided in Section 3.1. The cryptosystem features a symmetrical design of fourteen rounds, with the application of a distinct 8 × 8 S-box in each one. The process starts with a permutation and setting the key size to match the image dimensions. Additionally, the cryptosystem is dynamic; two constants multiplied by π generate permutations, S-boxes, and round keys that change in each encryption cycle. We named the proposal HAICDHBC, which stands for Hybrid Information Encryption Algorithm using the Diffie–Hellman Protocol and Blockchain. It enables information encryption, as any message can be represented by an image and subsequently encrypted. The distribution of constants is facilitated by the Diffie–Hellman protocol and the ElGamal asymmetric cryptosystem [1], establishing a robust key space.
Various hybrid cryptosystems have been developed to encrypt information [2,3,4,5,6]. However, none of them demonstrate an encryption quality that achieves entropy values remarkably close to eight. In contrast, our proposed system attains a value of eight for some images. Additionally, this study addresses the resistance of encrypted images against noise attacks. To assess the security of HAICDHBC, three types of attacks are studied in this paper: attacks applicable to the ElGamal cryptosystem, symmetric cryptosystems, and those designed to damage encrypted images. Attacks on the ElGamal asymmetric cryptosystem involve solving the discrete logarithm problem, which requires finding the value a in the equation α a mod p β given the values of β , α , and p [7,8]. Meanwhile, attacks on the symmetric cryptosystem include linear, differential, algebraic, and brute force methods [9,10,11].
Finally, the attacks on encrypted images involve the application of noise, including additive, multiplicative, and occlusion noise and noise with a χ 2 distribution. Subsequently, HAICDHBC’s resistance to attacks is demonstrated. Additionally, images entirely in black and white are encrypted for evaluation, which is necessary as we use a symmetric cryptosystem. The randomness measurements of the encrypted images are reported in the results section.
The review of related works and their main differences to HAICDHBC commences with the entropy parameter. Although some cryptosystems report high entropies [12,13,14], the results achieved with HAICDHBC are superior. Similarly, the goodness-of-fit test values in other works on image encryption typically hover around 200 [15,16,17], whereas the ideal value is 0. This proposed method attains values ranging between zero and one. Another significant difference is that two types of noise are typically applied to encrypted images, including occlusion [18,19,20]. In contrast, the HAICDHBC proposal incorporates four types of noise. Additionally, in conventional papers, the loss of sharpness in decrypted images is not measured after noise application [21,22,23]. However, in this work, the Similarity Parameter (SP) is introduced to evaluate the loss of sharpness due to damage to encrypted information. Evaluating the quality of encrypted images involves critical assessments through randomness measurements. Two widely used parameters for this purpose are entropy and correlation.
Additionally, the consideration of real-world applications plays a crucial role in cryptosystem design. For example, Song et al. proposed an arbitrary-size encryption scheme to efficiently protect a batch of images with varying sizes [24]. Additionally, to enhance the encryption efficiency, Song et al. incorporated a parallel image encryption algorithm using intra-bitplane scrambling [25]. On the other hand, in certain countries such as Mexico, regulations prohibit data loss in images [26]. While our proposal increases the encrypted image size by 8% and increases the entropy, during the decryption stage, it is restored to its original dimensions without any loss of data. On the contrary, when employed in formats such as JPEG in lossy compression mode, suboptimal results are frequently observed, characterized by entropy values around 7.90 [27].
This paper is organized as follows: It commences with an introduction, which presents some related works and provides a brief overview of the state of the art. Section 2 introduces the theoretical elements used in this research. Section 3 outlines the construction of the new theoretical tools incorporated into the cipher algorithm. In Section 4, the encryption procedure and the test images are detailed. Section 5 presents the various noise types and how they are applied to the ciphered images, along with a high-level description of the median filter 3 × 3 and the SP parameter. The results are presented in Section 6, and an analysis and discussion are provided in Section 7. Finally, Section 8 contains the conclusions and outlines future work.

2. Mathematical Background of HAICDHBC

2.1. Pi Number

As mentioned earlier, an S-box of size 8 × 8 and dynamic permutations are employed in this work, both of which are random. The bits to the right of the decimal point of π exhibit important properties, such as the random appearance of zeros or ones. Table 1 provides evidence that P ( x i = 0 ) = P ( x i = 1 ) = 0.5 for every bit position i 0 .
The results in Table 1 demonstrate a trend toward 50% as larger values of n are considered. The percentage of zeros may be greater than or less than 50%. Therefore, there is no preference for zeros or ones. In other words, the percentages of zeros and ones consistently fluctuate around the 50% mark. Additionally, another crucial property of the number π is that it is a transcendental number [28].

2.2. Blockchain and Hash Functions

In this research, the SHA-512 algorithm is used in the blockchain technique. This procedure is used to send two constants of approximately 2 512 bits. Additionally, the proposed cryptosystem HAICDHBC uses a seed generated by the Diffie–Hellman protocol and the ElGamal cryptosystem [29]. Applying the SHA-512 algorithm to plaintext results in a 512-bit string defines a function that is not one-to-one. The latter property makes it nearly impossible to retrieve plaintext given the 512-bit string [30].
The solution to this problem is referred to as a preimage [31]. In this context, the probability that another distinct plaintext produces the same 512-bit output string is at most 50%. This scenario is termed a collision. The percentage of attacks on the SHA-512 algorithm is calculated over a set of 2 256 plaintexts [31]. This property is utilized in the process of sending two constants, given that the 512-bit strings are public.

2.3. ElGamal Cryptosystem and the Diffie–Hellman Protocol

As previously mentioned, the HAICDHBC system incorporates the Diffie–Hellman protocol based on the ElGamal cryptosystem [29]. The following provides a detailed explanation of these methods.
The process commences with the ElGamal asymmetric cryptosystem, which is grounded in the set of residues denoted as Z p = { 1 , , p 1 } . In this study, the construction of p is proposed as p = 2 k × q 1 q 2 + 1 , where q 1 , q 2 are two primes of approximately 2 512 each, and c = 1 , 2 , [32]. This approach is chosen because it facilitates the retrieval of the generating element α by identifying the prime factors of p 1 and ensures the simplicity of the process [32]. Moreover, the even integer 2 k does not exceed four decimal digits when the prime p is on the order of 2 1024 . Additionally, the verification of high primality for a positive integer ending in 1, 3, 7, or 9 is achieved through the Miller–Rabin algorithm [33].
The expression 0 < α < p 1 is utilized to compute the generator element with the objective of satisfying Equation (1), where the qs are the prime factors of ( p 1 ) .
α ( p 1 ) / q 1 mod p
Once the prime p and the generator element α are determined, the Diffie–Hellman protocol can be implemented. Both the sender A and the receiver B randomly generate positive integers a A , a B such that 1 < a A , a B < p 1 . Subsequently, the sender performs the following calculation: β A = α a A mod. p. Similarly, the receiver carries out the operation β B = α a B mod. p. The sender then sends β A to the receiver, and the receiver sends β B to the sender. Subsequently, the sender computes β = β B a A mod. p. It is important to note that the receiver can also obtain β = β A a B mod. p. In this way, the value β serves as the seed for sending two constants.
The authors think it pertinent to provide an illustrative example with values that are not suitable for real-world implementation but serve to elucidate the procedure. For example, assume the two primes are q 1 = 113 and q 2 = 127 . Thus, p = 2 ( 1 ) × ( q 1 q 2 ) + 1 = 28,703. Hence, the prime factors, q, of p 1 are 2, 113, and 127. With these considerations in mind and utilizing the generator α = 14,807, the computations for α p 1 / q all result in values different from 1. Additionally, it is worth noting that the private keys of the sender and receiver are a A = 623 and a B = 421 . Consequently, β A = 14,009, β B = 23,442, and the seed is β = 14 , 438 .

2.4. Entropy

As this paper’s title suggests, the encrypted images exhibit a high entropy, a parameter used to measure the their quality. Therefore, a brief overview of this parameter is presented. This method of measuring randomness, attributed to Shannon [34], is calculated according to Equation (2). Indeed, many works in the field of information encryption employ this measure [35].
E ( x ) = x ε X P r ( x ) l o g 2 P r ( x )
An encrypted image is deemed to have a good encryption quality if its entropy is close to 8, considering that each basic color has 256 intensity levels. To verify this assertion, in this work, ten additional measurements are used to confirm this characteristic.

2.5. Correlation Coefficient

The second parameter to discuss is the correlation coefficient. The correlation analysis of an encrypted image is conducted as follows: m pixels are randomly selected from the encrypted image. It is important to note that each pixel has three basic colors: red, green, and blue. Subsequently, the correlation is computed over the previously selected adjacent pixels. These pixels are considered in the horizontal, vertical, and diagonal directions [36]. With this information, Equation (3) is employed to calculate the correlation. It is worth mentioning that the subscript c indicates the color, and the subscript d signifies the direction. In this context, for a given direction, the variable x i , c in Equation (3) represents an intensity value such that 0 x i , c 255 .
The expressions of the variables x ¯ and z ¯ are defined in Equations (4) and (5). Also, it is important to note that an image is considered well encrypted if the correlation is a number close to zero [36].
r d = 1 n ( i = 1 n ( x i , c x ¯ c ) ( z i , c z ¯ c ) ) 1 n 2 ( i = 1 n ( x i , c x ¯ c ) 2 ) ( i = 1 n ( z i , c z ¯ c ) 2 )
x ¯ c = 1 n i = 1 n x i , c
z ¯ c = 1 n i = 1 n z i , c

2.6. Discrete Fourier Transform

The Discrete Fourier Transform (DFT) is a statistical hypothesis test. It is commonly employed to quantify the degree of randomness in encrypted information [37]. This tool specifically scrutinizes the presence of repetitive bit strings. Additionally, it is worth highlighting that this parameter is incorporated into the NIST 800-22 standard [38]. In the computation of this parameter, the variables defined in Equations (6)–(8) are utilized, where m represents the length of the analyzed string, M 0 in Equation (6) is a constant value, and l in Equation (7) is a boundary.
M 0 = ( 0.95 ) × m 0.05
l = Ln 1 0.05 ( m )
In this context, to compute the values of the functions f j appearing in Equation (8), it is important to consider that y k takes values of −1 and 1, while the complex unit is denoted as i = 1 . Additionally, j = 1 , 2 , , m 2 1 , taking into account that m is even, as it is the number of pixels expressed in bytes. Regarding the variable N 1 in Equation (9), its initial value is zero, i.e., N 1 = 0 . Subsequently, f j is computed for each j, and the result is compared with l. If it is less than l, 1 is added to N 1 ; otherwise, the value of N 1 remains unchanged.
f j = k = 1 m y k e 2 π ( i ) ( k 1 ) j n
After computing f j for all j and obtaining the final value of N 1 , the variable d can be calculated using Equation (9). Like in all statistical hypothesis tests, there is a rejection region and an acceptance region. In this context, the variable p-value, as expressed in Equation (10), is taken as the decision parameter. If the p-value is less than 0.01, the hypothesis of randomness is rejected; otherwise, it is accepted. For this research, a significance level of 0.01 is considered [39].
d = N 1 N 0 m ( 0.95 ) ( 0.05 ) 4
p - v a l u e = erfc d 2
Additionally, the erfc function is evaluated as Equation (11).
erfc d 2 = 2 ( 1 Φ ( d ) )

2.7. Goodness-of-Fit Test

Similar to the previous parameter, the procedure to measure the goodness of fit is a statistical hypothesis test. It assesses if the information conforms to a uniform distribution for each of the basic colors.
In this context, the null hypothesis posits that the string of bits is random, while the alternative hypothesis asserts the opposite. It is essential to note that in every hypothesis test, a statistic is formulated, and a rejection region is defined based on the chosen level of significance [40].
The goodness of fit is defined in Equation (12). Furthermore, it follows a χ 2 distribution with n 1 degrees of freedom.
χ 2 = i = 1 n ( o i exp ) 2 exp
Additionally, based on the central limit theorem, the variable χ 2 converges to a normal distribution with a mean of μ = 255 and a variance of σ = 22.5 [41]. For a significance level of α = 0.01 , the decision rule is as follows: if χ 2 308 , the null hypothesis is accepted; otherwise, it is rejected. On the other hand, note that this type of instrument is not included in the NIST 800-22 standard when testing the randomness of a bit string.

2.8. NPCR, UACI, and AC Parameters

The resistance of HAICDHBC against a differential attack is measured using the Number of Pixels Change Rate (NPCR), Unified Average Changing Intensity (UACI), and Avalanche Criteria (AC) parameters. Each of them is briefly described below.
The NPCR parameter is defined according to Equation (13), where the subscript c indicates the analyzed color, and W and H are the width and height of the encrypted image, respectively. Additionally, the function D ( i , j ) evaluates the differences between two encrypted images denoted as 1 and 2, both with the same width and height. Given a position ( i , j ) , the pixels of images 1 and 2 are compared at this position. If both pixels are equal, D ( i , j ) = 0 ; otherwise, D ( i , j ) = 1 . When this parameter approaches a value of 99.6%, the encryption is considered to be resistant to a differential attack [42].
NPCR c = Σ i , j D ( i , j ) c W × H × 100 %
The UACI parameter also assesses the difference between two images. In this case, it considers the variations in intensities of each pixel, which are integers ranging from 0 to 255. The UACI is determined using Equation (14). It is important to note that the subscripts 1 , c and 2 , c indicate the image number and the specific basic color being utilized. Additionally, the variables W and H represent the width and height of the analyzed images. Furthermore, the value considered desirable for this parameter to mitigate the impact of a differential attack is 33.4% [43].
UACI c = 1 W × H i , j I 1 , c ( i , j ) I 2 , c ( i , j ) 255 × 100 %
The third parameter, AC, is determined according to Equation (15). In this expression, T represents the size of all image pixels in bits. Additionally, the subscript c designates the color. Thus, this parameter assesses the differences, bit by bit, between images 1 and 2. The function d ( i , j ) in Equation (16) takes the value 0 when the bits at position ( i , j ) in both images are the same and 1 otherwise. A desirable value for AC is considered to be 50%.
AC c = Σ i , j d ( i , j ) c T × 100 %
d ( i , j ) c = 0 1

2.9. Homogeneity, Contrast, and Energy

In this part, a high-level description of the homogeneity, contrast, and energy parameters is given. Homogeneity is calculated using Equation (17), where the function g ( i , j ) indicates the value it takes at the point ( i , j ) . On the other hand, an encrypted image is considered to be of high quality if the homogeneity is low [44].
H o m o g e n e i t y = i , j g ( i , j ) 1 + i j
The contrast parameter is assessed using Equation (18). In this context, contrast quantifies the variations between adjacent points ( i , j ) . Similarly to before, f ( i , j ) represents the value of f at the point ( i , j ) . It is worth noting that an image is considered to be well encrypted when the contrast values are large [45].
C o n t r a s t = i , j i j 2 g ( i , j )
To conclude this section, we will discuss the energy parameter, measured using Equation (19). This parameter assesses the level of information disorder in an encrypted image. An image is considered well encrypted when the energy is close to zero [46].
E n e r g y = i , j g ( i , j ) 2

2.10. The Median Filter

Following noise damage to encrypted images, a 3 × 3 filter tool is employed after decryption. Subsequently, the sharpness enhancement in the impaired images is quantified using the SP parameter.
This filter application is a non-linear procedure [47]. It involves constructing a nine-point mask around a pixel ( x 1 , y 1 ) in the decrypted image affected by noise, as illustrated in Figure 1. The pixels in the mask are arranged based on intensity, and the median value is selected. This median value, denoted as M c , ( x 1 , y 1 ) , with c indicating the basic color, must be greater than or equal to the first 9 2 1 pixels and less than the remaining ones.
After obtaining the median value, it is substituted for each pixel in the nine-point mask.

3. Development of New Elements

In this section, we will use the proposed algorithm on an encrypted image to enhance the entropy. Additionally, the algorithm for generating permutations and the Similarity Parameter (SP) will be introduced. To commence, we will outline the algorithm designed to augment entropy.

3.1. Algorithm to Enhance Entropy

The entropy-enhancement algorithm begins by denoting an encrypted image as A. Its dimensions are 512 × 512 pixels and it has a discrete area A equal to 262,144 pixels. We will detail the algorithm used to encrypt images in Section 4. With this in mind, it is important to highlight that it is possible to obtain three color histograms from the encrypted image. Each one comprises 256 intensities i in the range of 0 i 255 . The frequency of each intensity is denoted as follows: f r , i , f g , i , and f b , i , where r, g, and b represent the basic colors c, and i is the intensity. Additionally, it holds true for each color that i = 0 255 f r , i = i = 0 255 f g , i = i = 0 255 f b , i = 262,144. As part of the proposed method, the size of the encrypted image is increased by approximately 8% to improve the encryption quality. The advantages of this enhancement will be presented in Section 6. To achieve this, rows of 512 pixels are added to the encrypted image A after row 511. Image enlargement A finishes when the number of pixels is greater than or equal to A × 1.08. Let us denote the increased discrete area with n new rows as A . The value of each frequency in the enlarged image is around the value h defined in Equation (20).
h = A 256
Subsequently, the difference d c , i between the values h and the frequency f c , i of the encrypted image A is defined. Specifically, d r , i = h f r , i , d g , i = h f g , i , and d b , i = h f b , i , where 0 i 255 . The variable d can be greater than, equal to, or less than zero. Given these variables, the steps of the algorithm developed in this paper to obtain the increased part of A are as follows, and this process is replicated for each basic color.
1.
First iteration. The frequency f c , 0 has an associated difference d c 0 . When this difference is greater than zero, one is added to the frequency f c , 0 ; otherwise, the frequency remains unchanged. This strategy continues for f c , 2 until f c , 255 .
2.
Consecutive iterations. The process restarts with the first frequency, which might have been modified in the previous iteration. Therefore, the difference d is recalculated, and f c , 0 is modified according to the result. The process is executed in the same manner as before for all frequencies, while updating d c , i . This iterative process continues until the sum of the added pixels equals n × 512, which is equivalent to the number of pixels in the added rows.
To conclude the algorithm, three permutations are applied, one for each basic color of the pixels that were increased. This is executed to ensure that the enlarged part is an image color. Once this is completed, another permutation P is applied to the entire enlarged image A .

3.2. Algorithm for Constructing Permutations

As indicated in the previous section, the method proposed in this work involves permutations. Furthermore, it is asserted that any non-negative integer can be expressed on a factorial basis. In this context, the set of non-negative integers is defined as Z m = n N 0 n m ! 1 for a given m 2 .
Hence, any element n 0 of the set Z m can be expressed in the factorial base ( m 1 ) ! , ( m 2 ) ! 1 ! , 0 ! This is illustrated in Equation (21):
n 0 = D 0 ( m 1 ) ! + D 1 ( m 2 ) ! + D m 2 ( 1 ) ! + D m 1 ( 0 ) !
Also, according to Euclid’s division algorithm, the D i coefficients in Equation (21) are unique [48]. It will be shown later that D m 1 = 0 . Furthermore, the coefficients of Equation (21) satisfy the inequality in Equation (22).
0 D i < ( m i ) with 0 i ( m 2 )
Taking into account Equations (21) and (22), an algorithm is constructed to obtain permutations on arrays of m positions [49]. Also, note that the ( m i ) ! values appear as factors in Equation (21) because, in a 512 × 512 image, there are 262,144 placements, making it impractical to write at 250,000!, at least for now.
To conclude this section, it is noted that the algorithm to construct the permutations defines a one-to-one function [49].

3.3. Similarity Parameter

Encrypted images are susceptible to noise, and thus they may appear distorted when decrypted. Therefore, it is advantageous to devise a parameter that quantifies the loss in sharpness [50]. For this, in this paper, the parameter SP c is introduced to assess the degradation of decrypted images. Specifically, Equation (23) defines SP c , with the subscript indicating the basic color under analysis.
SP c = | [ 100 % UACI c ( 2.994011 ) ] |
It is based on the UACI parameter, previously defined in Equation (14), which assesses the distinction between two images. In this context, two extreme cases are presented below to describe the SP performance.
In the first case, a plain image is compared with an encrypted one to simulate the total noise damage. If a figure is well encrypted, UACI 33.4 % [43], and consequently, SP c = | [ 100 % 33.4 % ( 2.994011 ) ] | = 0.036 % 0 % . This would indicate a total loss of sharpness, signifying complete information loss.
In the second case, if both images being compared are the same, it is implied that UACI = 0%. Consequently, SP c = | [ 100 % 0 % ( 2.994011 ) ] | = 100 % . However, this scenario signifies that both images are equal, and there is no information loss. In conclusion, SP c measures the sharpness from 0% to 100%.
To summarize this section, this tool will be employed in the present work to assess the improvement in sharpness after applying the 3 × 3 filter to the damaged images.

4. Encryption Procedure

The hybrid encryption cryptosystem comprises two cryptosystems: one asymmetric cryptosystem and another symmetric cryptosystem. We will now present a description of the asymmetric cryptosystem.

4.1. Asymmetric Cryptosystem

Two integer constants, denoted as C 1 and C 2 , are initially proposed with the condition 0 < C 1 , C 2 2 512 . Subsequently, the asymmetric ElGamal cryptosystem and the SHA-512 algorithm are employed to transmit these constants [51]. The process begins with the ElGamal cryptosystem, where the sender possesses knowledge of the receiver’s public key β B and the receiver is aware of the sender’s public key, β A .
It is essential to consider that β B = α a B mod . p and β A = α a A mod . p , where a A and a B are private while α and p are public parameters. Both the sender and the receiver possess the knowledge of β = ( β B ) a A mod . p and β = ( β A ) a B mod . p .
With this information, the following steps are executed:
1.
The sender generates two constants, denoted as C 1 and C 2 , each being a 512-bit string 0 < C 1 , C 2 2 512 . If the representation of the constants is shorter than 512 bits, the sender pads zeros to the left to ensure that the length remains at 512 bits.
2.
β i is computed using the formula β i = α i × β , mod . , p for i = 1 , 2 , , 128 . It is important to note that the initial 64 β i values are designated for transmitting C 1 , while the subsequent 64 β i values are intended for sending C 2 .
3.
The constants are transmitted via the following process: The 512-bit string corresponding to C 1 is segmented into one-byte blocks, resulting in 64 blocks. Each block is associated with an integer b i ranging from 0 to 255. If the i-th byte has a value of zero, the SHA-512 algorithm is applied once to β i , SHA-512( β i ). Conversely, if the value of b i falls within the range of 1 b i 255 , the SHA-512 algorithm is iteratively applied b i + 1 times to the string β i , yielding a 512-bit string, which is public.
4.
The receiver computes β i and sequentially applies the SHA-512 algorithm to each β i , given that they possess knowledge of β . Consequently, the receiver can determine the values of b i and retrieve the constants C 1 and C 2 .

4.2. Symmetric Cryptosystem

The symmetric encryption procedure comprises two stages. Initially, the plain image undergoes encryption through fourteen rounds. Subsequently, the encrypted image is expanded following the algorithm detailed in Section III. Here, a high-level description outlines the processes in the symmetric cryptosystem during the initial stage. Additionally, the construction of the involved elements is illustrated as follows:
1.
First Round. The process commences with an XOR operation between the original image pixels and the first round key. The resulting chain is then segmented into one-byte blocks. Subsequently, substitution is implemented following the procedure established by the Advanced Encryption Standard (AES). This process utilizes the first of the fourteen dynamic substitution boxes.
2.
Rounds two to fourteen. The same process is replicated, involving the byte chain from the previous round and the corresponding round key. The resulting string is then processed through the appropriate box, following the protocol established in the previous step. During round fourteen, three operations are performed: the XOR operation using the fourteen round-key, passing the result through the fourteenth box. In the third step, an XOR operation is executed between the chain emerging from the boxes and the fifteen round-key. This final result is considered the initial stage of image encryption.
The generation of boxes, permutations, and rounds keys is detailed below.
  • Substitution box. Each substitution box is a permutation of 256 values ranging from 00 to ff in a hexadecimal system. The sender constructs the fifteen boxes used in the encryption process through the following steps. First, compute C 1 × π by considering the bits to the right of the decimal point. This bit string is then divided into one-byte blocks. Taking the first byte, representing an integer c 0 , calculate D 0 = c 0   mod . 256. For D i , where the i t h byte to the right of the decimal point is c i , compute D i = c i   mod .   256 i . Once D i values are available for 0 i 255 , apply the procedure in Section 3.2, which results in the first substitution box. For the j t h box, where 2 j 14 , shifts of ( j 1 ) × 256 bytes are made to the right of the decimal point, and then the same process is applied as before.
  • Permutation. The permutation P, applied at the end of the process, is constructed in the following way. The sender computes the product C 2 × π , and the bits to the right of the decimal point are then divided into bytes. Here, the calculation of the constant D 0 involves pixels 0, 1, and 2. This string of three pixels has an associated integer of 24 bits denoted as d 0 , and let l be the number of pixels in the enlarged image. Therefore, D 0 = d 0   mod . l. To obtain the other constants, shifts of one pixel to the right are made. For instance, in the case of D 1 , pixels 1, 2, and 3 are considered. Then, for the i-th coefficient, pixels i ,   i + 1 , and i + 2 are considered, resulting in the integer d i . Hence, D i = d i   mod .   l i , where 1 i l 2 .
  • Round keys. Round keys are 512 × 512 byte-size pixels. The first round key is calculated as follows: from the product C 2 × π , the first (512 × 512) × 24 bits to the right of the decimal point are taken. The reason for multiplying by 24 is the color images, where pixel representation is 24 bits (three bytes). Note that in the case of a 256-grayscale image, it is only multiplied by eight. This string is then divided into bytes and subsequently passed through the first substitution box, similarly to the AES procedure [52]. The chain that results from this process is denoted as k 1 . In general, to generate the i-th round key k i , we proceed as follows: a shift of i 1 bits is made to the right of the decimal point from C 2 × π , with 1 i 15 . Afterward, the corresponding substitution box is applied, following the same rule as before. Note that for the round key k 15 , box fourteen is used.
In addition, the receiver can reproduce this procedure once it knows C 1 , C 2 , and therefore they can decrypt the image. Constants are generated randomly for every image encryption; this implies that boxes, permutations, and round keys are dynamic. This is possible as the function f ( C ) = C × π is a one-to-one function. In other words, if C 1 C 2 , it is implied that f ( C 1 ) f ( C 2 ) . This ensures that the bit strings on the right side of the decimal point are different when the constants change.

4.3. Second Stage

Three permutations are applied only to the incremented image part, one for each basic color. However, these permutations are not executed in the decryption process because this is just noise without information. On the other hand, it is noted that the three permutations are constructed in the same way as P, but the number of pixels, in this case, is l = n × 512, where n represents the number of incremented rows. After applying the three permutations, the permutation P is executed across the entire image, encompassing | A | × 1.08 pixels. This step concludes the encryption process.
We present the values utilized in this study— q 1 , q 2 , k, p , α —and the private keys β A and β B of both the sender and receiver in Table 2.

4.4. Images for Testing

The performance of HAICDHBC was assessed with a range of images, presented in Figure 2. They consist of color and grayscale images and a message. The widely utilized Lena image is included, given its common use in image encryption studies [53]. Furthermore, two additional images, one entirely black and the other in white, will be considered in subsequent analyses.
Throughout this research, most plain images have dimensions of 512 × 512 pixels. It is worth mentioning that while this particular size was used in the proposed encryption algorithm, it can be used with images of varying dimensions. For instance, the Sor Juana image, which contains one of her poems, has a size of 423 × 544 pixels. Another noteworthy observation is that all images encrypted using HAICDHBC, whether in color or grayscale, yield a color figure as a result.
The performance of HAICDHBC is compared with AES-CBC for images affected by noise [54]. This comparison will be detailed in the following section.

5. Damaged Encrypted Images with Noise

In this study, the encrypted images are subjected to four types of noise attacks to test the HAICDHBC cryptosystem: additive, multiplicative, occlusion, and χ 2 noise attacks. To elaborate on this, we will start by discussing additive and multiplicative noises.

5.1. Additive and Multiplicative Noises

A high-level description of both types of noises is provided. Initially, n random pixels are selected from the encrypted image, and each of these points is associated with a color level denoted as g c ( x , y ) , where 0 g c ( x , y ) 255 . Here, the subscript c indicates the basic color.
To generate additive noise, a non-zero integer ϕ c ( x , y ) is randomly chosen, depending on the point and basic color. Subsequently, the operations outlined in Equation (24) are executed, resulting in an integer g c ( x , y ) within the range of 0 to 255. To introduce damage to an image encrypted with additive noise, the value of g c ( x , y ) is replaced with g c ( x , y ) .
g c ( x , y ) = [ g c ( x , y ) + ϕ c ( x , y ) ] mod 256
In the case of multiplicative noise, much like additive noise, a non-zero integer ϕ c ( x , y ) is randomly determined. Following this, Equation (25) is solved. To introduce damage using multiplicative noise, the color level g c ( x , y ) is then substituted with g c ( x , y ) .
g c ( x , y ) = [ g c ( x , y ) × ϕ c ( x , y ) ] mod 256

5.2. Occlusion Noise

Occlusion noise involves damaging a confined area of an encrypted image. In this study, this noise is applied over a concentric parallelogram, as illustrated in Figure 3. Specifically, the color cherry is utilized, although another color could be used. The process involves substituting the pixel color at a point inside the parallelogram with cherry. Similar approaches have been employed in other research, although the shape may not necessarily be a parallelogram [55].

5.3. Chi-Square Noise

As previously mentioned, the proposed noise is referred to as χ 2 noise based on the χ 2 distribution. χ 2 noise can be described by Equation (26). Additionally, the variable defined in Equation (12) follows a χ 2 distribution with n 1 degrees of freedom [56]. However, this distribution approximates to a normal distribution N ( μ , σ ) because there are 256 color levels. Considering that n = 256 , it follows that mean μ = 255 and standard deviation σ = 22.58 .
Subsequently, to apply χ 2 noise, m pixels ( x , y ) from the encrypted image are randomly selected. Each of these pixels possesses a color level within the range of 0 g c ( x , y ) 255 , where the subscript c designates the basic color.
For each pixel and basic color, a randomly chosen value denoted as z c ( x , y ) is determined, following a standard normal distribution, expressed as z c ( x , y ) N(0, 1). The range of these values extends from to . However, in this study, we limit the values to the interval 3 < z c ( x , y ) < 3 and use the following criterion: if z c < 3 , the value is assigned as 3 ; if z c > 3 , it is set to 3.
With this information, the value of g c is calculated using Equation (26). The result is not necessarily an integer, and the symbols ⌊⌋ and ⌈⌉ are used to discretize it as g d c . If the decimal part of g c ( x , y ) is less than or equal to 0.5, ⌊⌋ is applied, meaning that g d c takes only the integer part of g c ( x , y ) . On the other hand, if the decimal part of g c ( x , y ) is greater than 0.5, then ⌈⌉ is used, indicating that the integer part of g c ( x , y ) plus one is taken by g d c .
g c ( x , y ) = 255 + z c ( x , y ) 22.58
Now, to apply χ 2 noise, the color level g c ( x , y ) is replaced by g d c ( x , y ) for all randomly chosen points.
To conclude this section, it is worth noting that when using this type of noise in the encrypted image, the majority of the randomly chosen pixels undergo a substitution with extreme values within the interval of 0–255, that is, values ranging from 0 to 64 or from 191 to 255.

6. Results

This section commences with the presentation of the Lena image in a flat state, as depicted in Figure 4a. In Figure 4b, the corresponding encrypted outcome is showcased. It is discernible that the encrypted figure is expanded in comparison to the original. Additionally, the histograms of the basic colors red and green appear almost horizontal, while that of the color blue is completely horizontal. The histograms are presented in Figure 4c–e.
In terms of evaluations, we will initially show the results of the encrypted images without noise. The evaluations to be presented include entropy, correlation, NPCR, UACI, AC, contrast, homogeneity, and energy. Following that, we will present evaluations utilizing statistical hypothesis tests such as the Discrete Fourier Transform and the goodness-of-fit test.
With this in mind, the subsequent subsection presents the results of entropy and correlation.

6.1. Entropy and Correlation

It should be noted that the assessed images correspond to those shown in Figure 2. The purpose of presenting these results is to gauge the randomness of the encrypted images. Table 3 and Table 4 display the evaluations of entropy and correlation, respectively.

6.2. Differential Attack

The NPCR, UACI, and AC values are presented in Table 5, Table 6 and Table 7, respectively.

6.3. Energy, Contrast, and Homogeneity

Continuing with the presentation of results, we now focus on the following parameters: energy, contrast, and homogeneity. These are displayed in Table 8, Table 9 and Table 10, respectively.

6.4. The Goodness-of-Fit Test and Discrete Fourier Transform

This section presents the results of the hypothesis tests, specifically the goodness of fit based on the χ 2 value and the Discrete Fourier Transform (DFT). The evaluations of both are displayed in Table 11 and Table 12.

6.5. Black and White Images

As the hybrid cryptosystem, HAICDHBC, includes a symmetric algorithm, it is beneficial to assess the encryption of two images: one entirely black image and another entirely white image. It should be noted that the size of both images is 512 × 512 pixels. The encrypted figures were evaluated using entropy and correlation; the results of these measurements are presented in Table 13.

6.6. Attack on Encrypted Images with Noise

We will now present images subjected to noise after encryption. The procedure is illustrated with the Baboon image and implemented as follows. The original image is displayed in Figure 5a. Subsequently, the image undergoes encryption using HAICDHBC and is then subjected to χ 2 noise with a magnitude of 50%. To finalize the process, the damaged image is decrypted, and the outcome is exhibited in Figure 5b.
Another experiment involving noise was conducted as follows: the Baboon image was encrypted, but this time using the standard AES-CBC. Subsequently, additive noise with a magnitude of 50% was applied to the encrypted figure. The damaged image was then decrypted using AES-CBC. The outcome of this procedure is illustrated in Figure 6. A discussion related to Figure 5 and Figure 6 is provided in the results analysis section.
Another crucial aspect studied in this section is the application of the median filter, which is employed to enhance the visual quality of images affected by noise. As described in Section 2.10, a 3 × 3 median filter was utilized. Figure 7a displays the Baboon image damaged by 50% χ 2 noise, while Figure 7b exhibits the resulting image after applying the 3 × 3 median filter.
Following the presentation of the image results, evaluations using the SP parameter are now showcased. Table 14 displays the SP results for various sizes of χ 2 noise applied to the images depicted in Figure 2.
To conclude this section, sharpness evaluations using the SP parameter are presented in Table 15. In this analysis, four types of noise were explored, with a fixed damage size of 50%. The images in Figure 2 were utilized in this process, with the application a 3 × 3 median filter after decryption.

7. Results Analysis and Discussion

In the security analysis of the proposed hybrid cryptosystem, the key-space in the asymmetric cryptosystem is first analyzed, followed by the symmetric key-space. In the asymmetric cryptosystem, the sender’s and receiver’s public keys, denoted as β A and β B , respectively, satisfy the condition 1 β A , β B p 1 . Given that p is approximately 2 1024 , the key space for the asymmetric cryptosystem is on the order of 2 1024 possible elements. For key construction in the symmetric cryptosystem, two random constants, C 1 and C 2 , are chosen, such that 0 C 1 , C 2 2 512 . Consequently, the number of keys in the symmetric cryptosystem is on the order of 2 512 × 2 512 , which is equal to 2 1024 . Therefore, the key space of the hybrid cryptosystem is estimated to be around 2 1024 .
The cryptosystem’s security is also analyzed for potential attacks on HAICDHBC due to its asymmetric and symmetric composition. First, attacks on the ElGamal asymmetric cryptosystem are considered. The objective of such attacks is to unveil the sender’s private key a A when the public key β A is known. Various generic algorithms, such as the Pohlig–Hellman attack, have been developed for this purpose, with a complexity of O ( p ) [57]. Given that the prime used in this work is approximately 2 1024 , the complexity of such attacks would be on the order of O ( 2 512 ) . Consequently, they are unfeasible, at least with existing technology.
For the symmetric system, the dynamic generation of the fourteen 8 × 8 substitution boxes in every encryption process ensures that they remain undisclosed. The latter avoids potential attacks, such as linear and algebraic attacks, at least as they are currently understood [9,58]. Regarding a differential attack, the results of NPCR, UACI, and AC in Table 5, Table 6 and Table 7 indicate that this type of attack ca be avoided.
Concerning noise attacks on encrypted images, a visual comparison is performed between the HAICDHBC algorithm and AES-CBC. As can be seen in Figure 5 and Figure 6, both exhibit damage caused by the same noise of the same size. However, in the case of AES-CBC, the decrypted image fails to provide meaningful information about the original image. Furthermore, the assessment of image sharpness using the SP under the influence of the four mentioned noises is detailed in Table 14. The image containing Sor Juana’s message is the most affected by noise. When the noise size is 50%, the sharpness value drops to 29%, while in other cases, it hovers around 55%. On the other hand, a 3 × 3 median filter was applied to the damaged images, and the results were reevaluated using the SP parameter. These results can be observed in Table 15. The most significant improvement was observed in Sor Juana’s message, with SP increasing from 29% to 57%, almost doubling in sharpness. Additionally, the Lena image exhibited an marked improvement, with the sharpness reaching up to 87%.
Another noteworthy aspect is the encryption quality. Table 16 presents a comparison of the entropy in this and other works for grayscale images. Notably, use of the HAICDHBC algorithm leads to an entropy very close to 8, surpassing other methods. However, it is essential to acknowledge that this improvement comes at a cost. The image size increases by approximately 8%, making the transmission of encrypted images difficult due to the larger size. Nevertheless, this trade-off results in an enhanced level of security.
Finally, it is highlighted that the values of the goodness-of-fit test in Table 11 are close to zero, and in some cases, they are precisely zero. These results indicate the random distribution of the encrypted information. This observation is consistent with the evaluations of correlation, energy, contrast, homogeneity, and the DFT shown in Table 4, Table 8, Table 9, Table 10 and Table 12, respectively. Therefore, the encryption is of a high quality.

8. Conclusions

In this paper, the hybrid cryptosystem HAICDHBC is introduced for image encryption, using ElGamal, the Diffie–Hellman protocol, the blockchain procedure with the Hash Sha-512 algorithm, and the number pi. The symmetrical system comprises fourteen rounds, incorporating dynamic substitution boxes, round keys, and permutations. An algorithm is also included to improve the entropy. The results demonstrate high-quality image encryption, evidenced by notably excellent results in entropy and goodness-of-fit tests. Comparative analyses with other works reveal a significant improvement in the entropy results. The algorithm’s resilience to noise attacks was assessed by damaging encrypted images with four types of noise at various intensities, and it demonstrated a superior resistance compared to AES–CBC. A novel parameter, SP, was introduced to evaluate damage and assess sharpness improvements with the application of a median 3 × 3 filter to damaged images. A security analysis affirms the algorithm’s resistance to known attacks, establishing its security. Future work will focus on developing a digital signature algorithm for images utilizing the number pi and the Diffie–Hellman protocol [64].

Author Contributions

Conceptualization, methodology, formal analysis, investigation, visualization, writing—review and editing, data curation, software, validation, writing—original draft preparation: V.M.S.-G., R.F.-C. and M.A.C.-L.; resources, supervision, project administration, funding acquisition: V.M.S.-G. All authors have read and agreed to the published version of the manuscript.

Funding

This work was funded in part by the economic support program of the Comisión de Operación y Fomento de Actividades Académicas (COFAA) and the Secretaría de Investigación y Posgrado (SIP) of the Instituto Politécnico Nacional under grant 20230797.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data that support the findings of this study are available from the corresponding author upon request.

Acknowledgments

The authors would like to thank the Instituto Politécnico Nacional of México (Secretaría Académica, Comisión de Operación y Fomento de Actividades Académicas COFAA, SIP, and CIDETEC), and the CONAHCyT (SNI) for their support in the development of this work.

Conflicts of Interest

The authors declare no conflicts of interest.

Abbreviations

The following abbreviations are used in this manuscript:
ACAvalanche Criteria
AESAdvanced Encryption Standard
DFTDiscrete Fourier Transform
HAICDHBCHybrid Information Encryption Algorithm using the Diffie–Hellman Protocol and Blockchain
NPCRNumber of Pixels Change Rate
SPSimilarity Parameter
UACIUnified Average Changing Intensity

References

  1. Shang, W.; Yu, Z. A new media content trusted dissemination architecture based on AV-blockchain and ChinaDRM. Intell. Converg. Netw. 2023, 4, 142–157. [Google Scholar] [CrossRef]
  2. Ahmed, A.; Nanne, M.F.; Gueye, B. The effectiveness of a hybrid Diffie-Hellman-RSA-AES model. In Proceedings of the 2022 International Conference on Computer Communication and Informatics (ICCCI), Coimbatore, India, 25–27 January 2022; pp. 1–5. [Google Scholar] [CrossRef]
  3. Alohali, M.A.; Aljebreen, M.; Al-Mutiri, F.; Othman, M.; Motwakel, A.; Alsaid, M.I.; Alneil, A.A.; Osman, A.E. Blockchain-Driven Image Encryption Process with Arithmetic Optimization Algorithm for Security in Emerging Virtual Environments. Sustainability 2023, 15, 5133. [Google Scholar] [CrossRef]
  4. Flores-Carapia, R.; Silva-García, V.M.; Cardona-López, M.A. A Dynamic Hybrid Cryptosystem Using Chaos and Diffie-Hellman Protocol: An Image Encryption Application. Appl. Sci. 2023, 13, 7168. [Google Scholar] [CrossRef]
  5. Zhang, Q. An Overview and Analysis of Hybrid Encryption: The Combination of Symmetric Encryption and Asymmetric Encryption. In Proceedings of the 2nd International Conference on Computing and Data Science (CDS), Stanford, CA, USA, 28–29 January 2021; pp. 616–622. [Google Scholar] [CrossRef]
  6. Ahmad, A.; AbuHour, Y.; Younisse, R.; Alslman, Y.; Alnagi, E.; Abu Al-Haija, Q. MID-Crypt: A Cryptographic Algorithm for Advanced Medical Images Protection. J. Sens. Actuat. Netw. 2022, 11, 24. [Google Scholar] [CrossRef]
  7. Josodipuro, M.J.; Saputra, K.V.I.; Lukas, S. Statistical Analysis of Pollard’s Rho Attack on Elliptic Curve Cryptography. In Proceedings of the 1st International Conference on Technology Innovation and Its Applications (ICTIIA), Tangerang, Indonesia, 23 September 2022; pp. 1–6. [Google Scholar] [CrossRef]
  8. Das, M.; Chakraborty, R. Statistical Cryptanalysis of ElGamal Cryptosystem for measuring security in disruptive technology. In Proceedings of the Second International Conference on Computer Science, Engineering and Applications (ICCSEA), Gunupur, India, 8 September 2022; pp. 1–5. [Google Scholar] [CrossRef]
  9. Malviya, A.K.; Tiwari, N.; Chawla, M. Quantum cryptanalytic attacks of symmetric ciphers: A review. Comput. Electr. Eng. 2022, 101, 108122. [Google Scholar] [CrossRef]
  10. Burek, E.; Wroński, M. Quantum Annealing and Algebraic Attack on Speck Cipher. In Proceedings of the Computational Science, ICCS 2022, London, UK, 21–23 June 2022; pp. 143–149. [Google Scholar] [CrossRef]
  11. Zodpe, H.; Shaikh, A. A Survey on Various Cryptanalytic Attacks on the AES Algorithm. Int. J. Next-Gener. Comput. 2021, 12, 115–123. [Google Scholar]
  12. Parida, P.; Pradhan, C.; Alzubi, J.A.; Javadpour, A.; Gheisari, M.; Liu, Y.; Lee, C.C. Elliptic curve cryptographic image encryption using Henon map and Hopfield chaotic neural network. Multimed. Tools Appl. 2023, 82, 33637–33662. [Google Scholar] [CrossRef]
  13. Wu, J.; Zhang, J.; Liu, D.; Wang, X. A Multiple-Medical-Image Encryption Method Based on SHA-256 and DNA Encoding. Entropy 2023, 25, 898. [Google Scholar] [CrossRef] [PubMed]
  14. Liu, H.; Teng, L.; Zhang, Y.; Si, R.; Liu, P. Mutil-medical image encryption by a new spatiotemporal chaos model and DNA new computing for information security. Expert Syst. Appl. 2024, 235, 121090. [Google Scholar] [CrossRef]
  15. Gao, X.; Sun, B.; Cao, Y.; Banerjee, S.; Mou, J. A color image encryption algorithm based on hyperchaotic map and DNA mutation. Chin. Phys. B 2023, 32, 030501. [Google Scholar] [CrossRef]
  16. Zhang, Z.; Tang, J.; Ni, H.; Huang, T. Image adaptive encryption algorithm using a novel 2D chaotic system. Nonlinear Dyn. 2023, 111, 10629–10652. [Google Scholar] [CrossRef]
  17. Qobbi, Y.; Abid, A.; Jarjar, M.; El Kaddouhi, S.; Jarjar, A.; Benazzi, A. Adaptation of a genetic operator and a dynamic S-box for chaotic encryption of medical and color images. Sci. Afr. 2023, 19, e01551. [Google Scholar] [CrossRef]
  18. Mansoor, S.; Parah, S.A. HAIE: A hybrid adaptive image encryption algorithm using Chaos and DNA computing. Multimed. Tools Appl. 2023, 82, 28769–28796. [Google Scholar] [CrossRef]
  19. Iqbal, N.; Hussain, I.; Khan, M.A.; Abbas, S.; Yousaf, S. An efficient image cipher based on the 1D scrambled image and 2D logistic chaotic map. Multimed. Tools Appl. 2023, 82, 40345–40373. [Google Scholar] [CrossRef]
  20. Du, S.; Ye, G. IWT and RSA based asymmetric image encryption algorithm. Alex. Eng. J. 2023, 66, 979–991. [Google Scholar] [CrossRef]
  21. Hu, Y.; Nan, L. Image encryption algorithm based on 1D-SFACF with cross-cyclic shift and adaptive diffusion. Phys. Scr. 2023, 98, 55209. [Google Scholar] [CrossRef]
  22. Trujillo-Toledo, D.; López-Bonilla, O.; García-Guerrero, E.; Esqueda-Elizondo, J.; Cárdenas-Valdez, J.; Tamayo-Pérez, U.; Aguirre-Castro, O.; Inzunza-González, E. Real-time medical image encryption for H-IoT applications using improved sequences from chaotic maps. Integration 2023, 90, 131–145. [Google Scholar] [CrossRef]
  23. Kumar, A.; Dua, M. A GRU and chaos-based novel image encryption approach for transport images. Multimed. Tools Appl. 2023, 82, 18381–18408. [Google Scholar] [CrossRef]
  24. Song, W.; Fu, C.; Zheng, Y.; Zhang, Y.; Chen, J.; Wang, P. Batch image encryption using cross image permutation and diffusion. J. Inf. Secur. Appl. 2024, 80, 103686. [Google Scholar] [CrossRef]
  25. Song, W.; Fu, C.; Zheng, Y.; Tie, M.; Liu, J.; Chen, J. A parallel image encryption algorithm using intra bitplane scrambling. Math. Comput. Simul. 2023, 204, 71–88. [Google Scholar] [CrossRef]
  26. General de la Nación, A. Manual de digitalización de documentos. BoletíN Del Arch. Gen. NacióN 2022, 9, 41–117. [Google Scholar]
  27. Ahmad, I.; Choi, W.; Shin, S. Comprehensive Analysis of Compressible Perceptual Encryption Methods–Compression and Encryption Perspectives. Sensors 2023, 23, 4057. [Google Scholar] [CrossRef] [PubMed]
  28. Natarajan, S.; Thangadurai, R. Pillars of Transcendental Number Theory, 1st ed.; Springer: Singapore, 2020; p. 25. [Google Scholar]
  29. Wang, H.; Wen, J.; Liu, J.; Zhang, H. ACKE: Asymmetric Computing Key Exchange Protocol for IoT Environments. IEEE Internet Things J. 2023, 10, 18273–18281. [Google Scholar] [CrossRef]
  30. Levina, A.; Plotnikov, A.; Ashmarov, E. New Method of Hash Functions Analysis. In Proceedings of the 2023 12th Mediterranean Conference on Embedded Computing (MECO), Budva, Montenegro, 6–10 June 2023; pp. 1–5. [Google Scholar] [CrossRef]
  31. Stinson, D.R.; Patterson, M. Cryptography: Theory and Practice, 4th ed.; CRC Press: Boca Raton, FL, USA, 2018; pp. 278–295. [Google Scholar]
  32. Silva-García, V.; Flores-Carapia, R.; González-Ramírez, M. Temas Selectos de Criptografía, 1st ed.; Alfaomega: Mexico City, Mexico, 2023; pp. 103–112. [Google Scholar]
  33. Ishmukhametov, S.T.; Mubarakov, B.G.; Rubtsova, R.G. On the Number of Witnesses in the Miller–Rabin Primality Test. Symmetry 2020, 12, 890. [Google Scholar] [CrossRef]
  34. Feutrill, A.; Roughan, M. A Review of Shannon and Differential Entropy Rate Estimation. Entropy 2021, 23, 1046. [Google Scholar] [CrossRef]
  35. Fang, P.; Liu, H.; Wu, C.; Liu, M. A survey of image encryption algorithms based on chaotic system. Visual Comput. 2023, 39, 1975–2003. [Google Scholar] [CrossRef]
  36. Wen, H.; Kang, S.; Wu, Z.; Lin, Y.; Huang, Y. Dynamic rna coding color image cipher based on chain feedback structure. Mathematics 2023, 11, 3133. [Google Scholar] [CrossRef]
  37. Alhumyani, H. Dual Image Cryptosystem Using Henon Map and Discrete Fourier Transform. Intell. Autom. Soft Comput. 2023, 36, 2933. [Google Scholar] [CrossRef]
  38. Almaraz-Luengo, E.; Alaña-Olivares, B.; García-Villalba, L.J.; Hernández-Castro, J. Further analysis of the statistical independence of the NIST SP 800-22 randomness tests. Appl. Math. Comput. 2023, 459, 128222. [Google Scholar] [CrossRef]
  39. Chen, L.; Zhou, J.; Lin, L. Hypothesis testing for populations of networks. Commun. Stat.-Theory Methods 2023, 52, 3661–3684. [Google Scholar] [CrossRef]
  40. Heumann, C.; Shalabh, M.S. Introduction to Statistics and Data Analysis, 1st ed.; Springer: Cham, Switzerland, 2016; pp. 219–265. [Google Scholar]
  41. del Barrio, E.; Sanz, A.G.; Loubes, J.M.; Niles-Weed, J. An Improved Central Limit Theorem and Fast Convergence Rates for Entropic Transportation Costs. SIAM J. Math. Data Sci. 2023, 5, 639–669. [Google Scholar] [CrossRef]
  42. Abd-El-Atty, B.; El-Affendi, M.A.; Chelloug, S.A.; Abd El-Latif, A.A. Double Medical Image Cryptosystem Based on Quantum Walk. IEEE Access 2023, 11, 69164–69176. [Google Scholar] [CrossRef]
  43. Mir, U.H.; Lone, P.N.; Singh, D.; Mishra, D.C. A public and private key image encryption by modified approach of Vigener cipher and the chaotic maps. Imaging Sci. J. 2023, 71, 82–96. [Google Scholar] [CrossRef]
  44. Geng, S.; Li, J.; Zhang, X.; Wang, Y. An Image Encryption Algorithm Based on Improved Hilbert Curve Scrambling and Dynamic DNA Coding. Entropy 2023, 25, 1178. [Google Scholar] [CrossRef] [PubMed]
  45. Khafaga, D.S.; Alhammad, S.M.; Magdi, A.; ElKomy, O.; Lashin, N.A.; Hosny, K.M. Securing Transmitted Color Images Using Zero Watermarking and Advanced Encryption Standard on Raspberry Pi. Comput. Syst. Sci. Eng. 2023, 47, 1967–1986. [Google Scholar] [CrossRef]
  46. Sun, S. A New Image Encryption Scheme Based on 6D Hyperchaotic System and Random Signal Insertion. IEEE Access 2023, 11, 66009–66016. [Google Scholar] [CrossRef]
  47. Balasamy, K.; Shamia, D. Feature Extraction-based Medical Image Watermarking Using Fuzzy-based Median Filter. IETE J. Res. 2023, 69, 83–91. [Google Scholar] [CrossRef]
  48. Eder, C.; Pfister, G.; Popescu, A. Standard bases over Euclidean domains. J. Symb. Comput. 2021, 102, 21–36. [Google Scholar] [CrossRef]
  49. Silva-García, V.M.; Flores-Carapia, R.; Rentería-Márquez, C.; Luna-Benoso, B.; Chimal-Eguía, J.C. Image cipher applications using the elliptical curve and chaos. Int. J. Appl. Math. Comput. Sci. 2020, 30, 377–391. [Google Scholar] [CrossRef]
  50. Yuan, S.; Han, Y.; Liu, X.; Li, Z.; Bing, P.; Zhou, X. Optical encryption for multi-user based on computational ghost imaging with Hadamard modulation. Optik 2023, 273, 170500. [Google Scholar] [CrossRef]
  51. Ma, X.; Wang, C. Hyper-chaotic image encryption system based on N+ 2 ring Joseph algorithm and reversible cellular automata. Multimed. Tools Appl. 2023, 82, 38967–38992. [Google Scholar] [CrossRef]
  52. Menezes, A.; Stebila, D. The Advanced Encryption Standard: 20 Years Later. IEEE Secur. Priv. 2021, 19, 98–102. [Google Scholar] [CrossRef]
  53. Rekha, K.S.; Amali, M.J.; Swathy, M.; Raghini, M.; Darshini, B.P. A steganography embedding method based on CDF-DWT technique for data hiding application using Elgamal algorithm. Biomed. Signal Process. Control 2023, 80, 104212. [Google Scholar] [CrossRef]
  54. Adeniji, O.D.; Akinola, O.E.; Adesina, A.O.; Afolabi, O. Text encryption with advanced encryption standard (AES) for near field communication (NFC) using Huffman compression. In Proceedings of the 5th International Conference on Applied Informatics, ICAI 2022, Arequipa, Peru, 27–29 October 2022; pp. 158–170. [Google Scholar] [CrossRef]
  55. Singh, K.N.; Singh, A.K. Towards Integrating Image Encryption with Compression: A Survey. ACM Trans. Multimedia Comput. Commun. Appl. 2022, 18, 89. [Google Scholar] [CrossRef]
  56. Egorov, V.; Kryzhanovsky, B. Density Function of Weighted Sum of Chi-Square Variables with Trigonometric Weights. Opt. Mem. Neural Netw. 2023, 32, 14–19. [Google Scholar] [CrossRef]
  57. Beaver, C. Adventures in Cryptology: Exploration-Worthy Project Topics. PRIMUS 2024, 34, 13–31. [Google Scholar] [CrossRef]
  58. Grassi, L.; Manterola Ayala, I.; Hovd, M.N.; Øygarden, M.; Raddum, H.; Wang, Q. Cryptanalysis of symmetric primitives over rings and a key recovery attack on Rubato. In Proceedings of the 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, 20–24 August 2023; pp. 305–339. [Google Scholar] [CrossRef]
  59. Wen, J.; Xu, X.; Sun, K.; Jiang, Z.; Wang, X. Triple-image bit-level encryption algorithm based on double cross 2D hyperchaotic map. Nonlinear Dyn. 2023, 111, 6813–6838. [Google Scholar] [CrossRef]
  60. Rahul, B.; Kuppusamy, K.; Senthilrajan, A. Bio-Metric Based Colour-Image-Encryption using Multi-Chaotic Dynamical Systems and SHA-256 Hash Algorithm. Inf. Secur. J. 2023, 1–25. [Google Scholar] [CrossRef]
  61. Li, D.; Li, J.; Di, X.; Li, B. Design of cross-plane colour image encryption based on a new 2D chaotic map and combination of ECIES framework. Nonlinear Dyn. 2023, 111, 2917–2942. [Google Scholar] [CrossRef]
  62. Aldin, S.S.A.B.; Aykaç, M.; Aldin, N.B. Quad-color image encryption based on Chaos and Fibonacci Q-matrix. Multimed. Tools Appl. 2023, 83, 7827–7846. [Google Scholar] [CrossRef]
  63. Daoui, A.; Yamni, M.; Chelloug, S.A.; Wani, M.A.; El-Latif, A.A.A. Efficient Image Encryption Scheme Using Novel 1D Multiparametric Dynamical Tent Map and Parallel Computing. Mathematics 2023, 11, 1589. [Google Scholar] [CrossRef]
  64. Syed, D.; Al-Ghushami, A.H.; Zainab, A.; Alkul, O.; Abdulhamid, S.M.; Yusuf, S.; Abozaid, F.; Alobaidly, A.; Almarri, A. On the Pivotal Role of Digital Signatures: A Review of Conception, Mensuration, and Applications. In Proceedings of the 2023 3rd International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME), Tenerife, Canary Islands, Spain, 19–21 July 2023; pp. 1–6. [Google Scholar] [CrossRef]
Figure 1. A 3 × 3 median filter.
Figure 1. A 3 × 3 median filter.
Entropy 26 00154 g001
Figure 2. Images utilized for evaluating HAICDHBC. (a) Sor Juana. (b) Barbara. (c) Lena. (d) Baboon. (e) Peppers. (f) Donkey.
Figure 2. Images utilized for evaluating HAICDHBC. (a) Sor Juana. (b) Barbara. (c) Lena. (d) Baboon. (e) Peppers. (f) Donkey.
Entropy 26 00154 g002
Figure 3. Encrypted Lena image affected by occlusion noise at 50%.
Figure 3. Encrypted Lena image affected by occlusion noise at 50%.
Entropy 26 00154 g003
Figure 4. Lena encryption results. (a) Lena plain image. (b) Lena encrypted image. (c) Red histogram of (b). (d) Green histogram of (b). (e) Blue histogram of (b).
Figure 4. Lena encryption results. (a) Lena plain image. (b) Lena encrypted image. (c) Red histogram of (b). (d) Green histogram of (b). (e) Blue histogram of (b).
Entropy 26 00154 g004
Figure 5. HAICDHBC resistance to χ 2 noise. (a) Plain Baboon image. (b) Baboon decryption after the application of χ 2 noise of 50 % in the encryption stage.
Figure 5. HAICDHBC resistance to χ 2 noise. (a) Plain Baboon image. (b) Baboon decryption after the application of χ 2 noise of 50 % in the encryption stage.
Entropy 26 00154 g005
Figure 6. Advanced Encryption Standard (AES)-CBC resistance to additive noise. (a) Plain Baboon image. (b) Baboon image decryption after the application of additive noise of 50 % in the encryption stage.
Figure 6. Advanced Encryption Standard (AES)-CBC resistance to additive noise. (a) Plain Baboon image. (b) Baboon image decryption after the application of additive noise of 50 % in the encryption stage.
Entropy 26 00154 g006
Figure 7. Baboon image enhancement visual quality. (a) Baboon image decryption with chi-square noise of 50%. (b) Decrypted Baboon image after a 3×3 filter application to (a).
Figure 7. Baboon image enhancement visual quality. (a) Baboon image decryption with chi-square noise of 50%. (b) Decrypted Baboon image after a 3×3 filter application to (a).
Entropy 26 00154 g007
Table 1. Probability estimation P ( x i ) of a bit x i with different samples.
Table 1. Probability estimation P ( x i ) of a bit x i with different samples.
Chain LengthPercent of Zeros (%)Percent of Ones (%)
2 3 75.00000025.000000
2 10 51.07421948.925781
2 15 49.93591350.064087
2 20 50.02327049.976730
2 25 49.99032950.009671
2 30 49.99933150.000669
2 35 50.00019049.999810
2 40 50.00003449.999966
Table 2. Values employed in this work.
Table 2. Values employed in this work.
VariableHexadecimal Value
q 1 C74A52C90C7095EC92B727D85CE31218
C3863BF9000DFDA1C3E0A284F3E7A700
4E793365586ACFAA79DC99FB627BF8CD
1E49A56863EBDAAD5701E025363D607
q 2 B0C1B9F894F6AC59082D91B8697E0689
6CD0C921161B445703B67B0F1AD3C5B1
858DDB6903723FB20FFA6608D8B3E656
AA003767762E010D1C769C876FB603A9
kFF0
p 89104ED0230E59E3F4BB9575AFD05227B51EA7
EA635698ED6CFFE8A67E1BF72D96E128354BD
A521E302B128C29B4E41B7381CDA8EC89E0BD
AC049FFD8EA7865A7E5697E496EBC4DDCBE1
28ECD23A817BDCDE53684B479ACF1FCFABC
C0416496FF978E82610BA253B11483D612D032E
E24F44D6C3E1D70944E2F3CECD77C3AFEA411
α 2B62FB6FDE4EF4204BA91E06AA5B4E076BCC9
4A382C5B926F5DBC89F5E432DBC34A5565E15
D88E8956CF414B3DBBECC9DA928E3F92BD99
9DA7864B87ED884A5B309635DA0D6F00503B2
69192BE1FB84C504A067228E65B67E1C2C491
43C68F179BDC50DDCB4E7C378C43C0482501
FE6AFE00C8A91320D2963639A09D335796DD
β A 9FECC2EC3057B87D5902733EDDC02F9A0687
525015F0EDFA99BABB65DFC8BBECB8E2B150
0767A267048E5CA01EB0EC87C14825BCBB3C2
01A67CFB616580308B09D5EF8FDBFF25397CA
0013BCBB3959DEEC18710531B26DAB9DE7468
DBD04DB76A213D8C39E8B18346B130D2A28C
44A2BB31A8C4CE7CE7A75E51A06F2A2F45239
β B 37550E7CBF9338DAE5484461E73B56DC95F21
F4D43E9B3120B04C6F6450B345E73A63F597B3
922CD2D1F271B6B4773F6EB684FE938D8EF8E
6F3F39A7CE95D2DBAFCB104F1A1F2779B1F6
F34B5331AC7BD6B61902AED70C6C475AB79A
0412A36D13ADB900A6A7299B7B31D176E070F
670E7804754D5114459AAED3BF6765C5E5F426
Table 3. Entropy results per color of encrypted images.
Table 3. Entropy results per color of encrypted images.
ImageRedGreenBlue
Sor Juana7.99999997.99999817.9999982
Barbara7.99999977.99999468.0
Lena7.99999977.99999907.9999970
Baboon7.99999987.99999917.9999996
Peppers7.99999998.08.0
Donkey8.07.99999977.9999997
Table 4. Correlation coefficient per color and direction of encrypted images.
Table 4. Correlation coefficient per color and direction of encrypted images.
DirectionImageRedGreenBlue
HorizontalSor Juana0.002050.007000.00169
Barbara0.00219−0.003110.00600
Lena−0.007680.004600.00370
Baboon−0.00216−0.00419−0.00804
Peppers0.002860.000250.00214
Donkey0.001020.00481−0.00031
VerticalSor Juana−0.000720.001260.00548
Barbara−0.00177−0.001490.00275
Lena−0.00640−0.00325−0.00220
Baboon0.00046−0.00011−0.00131
Peppers0.00131−0.00308−0.00054
Donkey0.002670.00418−0.00568
DiagonalSor Juana−0.00549−0.00340−0.00191
Barbara0.00058−0.00321−0.00909
Lena0.005900.005200.00388
Baboon−0.003660.005430.00136
Peppers0.00655−0.00379−0.00315
Donkey0.001580.00658−0.00678
Table 5. Number of Pixels Change Rate (NPCR) results per color of encrypted images.
Table 5. Number of Pixels Change Rate (NPCR) results per color of encrypted images.
ImageRedGreenBlue
Sor Juana99.6399.5999.61
Barbara99.6299.6299.60
Lena99.5999.6299.60
Baboon99.6099.6199.61
Peppers99.6099.6299.58
Donkey99.6199.6399.62
Table 6. Unified Average Changing Intensity (UACI) results per color of encrypted images.
Table 6. Unified Average Changing Intensity (UACI) results per color of encrypted images.
ImageRedGreenBlue
Sor Juana33.4733.3833.46
Barbara33.4433.5433.47
Lena33.4933.4833.49
Baboon33.3833.5233.46
Peppers33.4433.5233.48
Donkey33.3433.5033.51
Table 7. Avalanche Criteria (AC) results per color of encrypted images.
Table 7. Avalanche Criteria (AC) results per color of encrypted images.
ImageRedGreenBlue
Sor Juana50.0349.9749.98
Barbara50.0049.9849.96
Lena49.9649.9950.01
Baboon49.9550.0050.02
Peppers49.9750.0049.97
Donkey49.9650.0050.01
Table 8. Energy results per color of encrypted images.
Table 8. Energy results per color of encrypted images.
ImageRedGreenBlue
Sor Juana0.015630.015630.01563
Barbara0.015630.015630.01563
Lena0.015630.015630.01563
Baboon0.015630.015630.01563
Peppers0.015630.015630.01563
Donkey0.015630.015630.01563
Table 9. Contrast results per color of encrypted images.
Table 9. Contrast results per color of encrypted images.
ImageRedGreenBlue
Sor Juana10.4310.4710.48
Barbara10.4910.5210.53
Lena10.4710.5010.53
Baboon10.5310.4610.49
Peppers10.5010.5110.49
Donkey10.5010.5110.49
Table 10. Homogeneity results per color of encrypted images.
Table 10. Homogeneity results per color of encrypted images.
ImageRedGreenBlue
Sor Juana0.3900.3910.390
Barbara0.3890.3890.389
Lena0.3890.3890.388
Baboon0.3880.3890.389
Peppers0.3890.3890.389
Donkey0.3890.3890.388
Table 11. Goodness-of-fit test (✓ Accept) with a rejection threshold of 308.
Table 11. Goodness-of-fit test (✓ Accept) with a rejection threshold of 308.
ImageRedGreenBlue
Sor Juana0.3/✓1.2/✓0.1/✓
Barbara0.3/✓0.2/✓0.9/✓
Lena1.6/✓0.0/✓0.0/✓
Baboon0.0/✓0.5/✓0.1/✓
Peppers0.0/✓0.0/✓0.2/✓
Donkey0.0/✓0.0/✓0.0/✓
Table 12. Discrete Fourier Transform (DFT) evaluation (✓ Accept) with α = 0.01 .
Table 12. Discrete Fourier Transform (DFT) evaluation (✓ Accept) with α = 0.01 .
ImageRedGreenBlue
Sor Juana0.470/✓0.287/✓0.392/✓
Barbara0.148/✓0.933/✓0.571/✓
Lena0.306/✓0.423/✓0.465/✓
Baboon0.284/✓0.815/✓0.704/✓
Peppers0.945/✓0.988/✓0.418/✓
Donkey0.153/✓0.883/✓0.331/✓
Table 13. Entropy and correlation values for encrypted, completely black and white images.
Table 13. Entropy and correlation values for encrypted, completely black and white images.
ParameterImageRedGreenBlue
EntropyBlack7.99999937.99999977.9999994
White7.99999958.07.9999992
Horizontal CorrelationBlack0.00279−0.001600.00703
White0.00663−0.002430.00041
Vertical CorrelationBlack−0.003570.00699−0.00295
White0.000690.003610.00032
Diagonal CorrelationBlack−0.002420.00087−0.00511
White0.005830.000660.00644
Table 14. Similarity Parameter (SP) results for different size of χ 2 noise applied.
Table 14. Similarity Parameter (SP) results for different size of χ 2 noise applied.
ColorImage20%30%40%50%
RedSor Juana72.6958.1643.5329.27
Barbara82.7073.8664.1455.96
Lena79.7070.8060.2450.69
Baboon82.8174.0964.4255.70
Peppers83.1974.7965.8957.41
Donkey72.4758.6346.1631.72
GreenSor Juana72.7058.0843.5729.30
Barbara82.8173.8264.1455.80
Lena81.1672.8663.2454.37
Baboon83.5675.2666.1057.84
Peppers80.2670.2959.6949.71
Donkey72.1358.1645.8331.00
BlueSor Juana72.5458.1643.5328.97
Barbara82.7273.8364.1755.83
Lena83.0775.5866.7858.57
Baboon82.1473.1363.0754.09
Peppers79.7769.5158.7448.86
Donkey72.5858.6446.0431.84
Table 15. SP results after application of a 3 × 3 median filter after noise attacks of 50%.
Table 15. SP results after application of a 3 × 3 median filter after noise attacks of 50%.
ColorImageOcclusionAdditiveMultiplicativeChi-Square
RedSor Juana58.6557.6258.2657.10
Barbara81.1281.4381.6681.24
Lena82.6382.3583.5282.91
Baboon76.4576.6176.8076.33
Peppers88.3988.2888.6988.26
Donkey61.7661.5363.1660.85
GreenSor Juana58.3257.5258.0857.29
Barbara81.1781.4881.7181.28
Lena84.2484.2084.9984.39
Baboon76.9076.9977.2376.81
Peppers81.7281.6182.2881.53
Donkey61.0961.0062.6659.85
BlueSor Juana58.4557.4458.1957.10
Barbara81.1881.4881.6381.39
Lena87.7687.8288.3087.90
Baboon73.9974.2174.4373.96
Peppers80.9880.5781.4780.76
Donkey61.7261.5163.2360.64
Table 16. Entropy comparison with other works.
Table 16. Entropy comparison with other works.
ImageAlgorithmEntropy
LenaHAICDHBC7.9999
Ref. [59]7.9992
Ref. [60]7.9993
Ref. [61]7.9994
BaboonHAICDHBC7.999999
Ref. [62]7.999800
Ref. [17]7.999800
Ref. [63]7.999900
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Silva-García, V.M.; Flores-Carapia, R.; Cardona-López, M.A. A Hybrid Cryptosystem Incorporating a New Algorithm for Improved Entropy. Entropy 2024, 26, 154. https://doi.org/10.3390/e26020154

AMA Style

Silva-García VM, Flores-Carapia R, Cardona-López MA. A Hybrid Cryptosystem Incorporating a New Algorithm for Improved Entropy. Entropy. 2024; 26(2):154. https://doi.org/10.3390/e26020154

Chicago/Turabian Style

Silva-García, Víctor Manuel, Rolando Flores-Carapia, and Manuel Alejandro Cardona-López. 2024. "A Hybrid Cryptosystem Incorporating a New Algorithm for Improved Entropy" Entropy 26, no. 2: 154. https://doi.org/10.3390/e26020154

APA Style

Silva-García, V. M., Flores-Carapia, R., & Cardona-López, M. A. (2024). A Hybrid Cryptosystem Incorporating a New Algorithm for Improved Entropy. Entropy, 26(2), 154. https://doi.org/10.3390/e26020154

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop