A New Image Encryption Scheme Based on Hybrid Chaotic Maps

. Chaos-based encryption algorithms oﬀer many advantages over conventional cryptographic algorithms, such as speed, high security, aﬀordable overheads for computation, and procedure power. In this paper, we propose a novel perturbation algorithm for data encryption based on double chaotic systems. A new image encryption algorithm based on the proposed chaotic maps is introduced. The proposed chaotiﬁcation method is a hybrid technique that parallels and combines the chaotic maps. It is based on combination between Discrete Wavelet Transform (DWT) to decompose the original image into sub-bands and both permutation and diﬀusion properties are attained using the chaotic states and parameters of the proposed maps, which are then concerned in shuﬄing of pixel and operations of substitution, respectively. Security, statistical test analyses, and comparison with other techniques indicate that the proposed algorithm has promising eﬀect and it can resist several common attacks. Namely, the average values for UACI and NPCR metrics were 33.6248% and 99.6472%, respectively. Additionally, unscrambling quality can fulﬁll security and execution prerequisites as evidenced by PSNR (9.005955) and entropy (7.999275) values. In sum, the proposed method has enough ability to achieve low residual intelligibility with high quality recovered data, high sensitivity, and high security performance compared to some other recent literature approaches.


Introduction
With the fast development of innovations in data communication, it can end up crucial for private information security from prohibitive actions or attackers. Data exchange is closely related to existence, such as instruction, commerce, financial matters, military, e-learning, phone keeping money, and news telecasting. With the modern telecommunication and multimedia technologies progression, a huge amount of critical information voyages in a daily monotony through the shared and open networks. In order to keep security, sensitive and critical information ought to be secured before conveyance [1]. For data transmitting through any uncertain channel, certain cryptograph techniques are required to change over the coherent information to incomprehensible form before transmitting (encryption). e modern strategies of cryptography are effective for text information. However, due to the high redundancy and bulk information capacity, they fail to provide computational security.
Chaos-based encryption is one of the foremost important security technologies within the advanced encryption zone. Chaos hypothesis is created by mathematicians and physicists. Chaos hypothesis has qualified features as nonlinearity, deterministically, abnormality, and affectability to beginning conditions. Security investigative community receives chaos hypothesis in modern cryptography. A function that has some kind of chaotic behavior is defined as a work or a chaotic map. Within the following we discuss numerous sorts of proposed chaotic maps that are utilized in this paper. To apply a chaos map, there are two ways in a cipher system: (i) produce pseudorandom stream utilizing chaotic maps, and (ii) utilize the plain or secret key(s) as control parameters and the introductory conditions [2]. Finally, apply a few emphases on chaotic systems to get cipher data. e first way compares to stream cipher and the second to block ciphers. e implementation of chaotic maps within the improvement of cryptography systems lies within the truth that a chaotic outline is characterized by (i) the beginning conditions and control parameters with high sensitivity, (ii) unpredictability of the orbital advancement, and (iii) the straight forwardness of the hardware and software execution that leads to a high encryption rate [3]. e techniques focused on chaos are considered effective in managing with voluminous, excess information. ey give quick, profoundly secure strategies of encryption. In literature, various research works have exploited chaotic maps for data encryption. For example, Zahmoul et al. [4] presented a beta chaotic map for producing distinctive groupings in replacement, diffusion, and exchange. eir system viably moves forward the encryption security. Yavuz et al. [5] approached autonomous chaotic function framework to adequately apply diffusion principles and confusion. Differential assaults extended the cryptosystem resistance; it moreover requires extra circular turn operations and exclusive-or on the scrambled image pixel values. Zhang [6] utilized S-box and the piecewise liner chaotic outline to produce key stream with great factual for image encryption. e presented cryptosystem had undefined encryption get ready and decryption. It contains a key with large space and quick speed for encryption, but still contains a lot of correlation for the ultimate encrypted image. Aqeel-ur-Rehman et al. [7] suggested encryption image algorithm and hyperchaotic framework related to the initial image used for creating the key stream. Due to small key space, it easily is joined to that complex scheme. Song et al. [8] presented a modern framework using the defining of the neighborhood nonlinear map within the Coupled Map Lattices (CML). e outline was connected to the instrument of permutation-diffusion. e encryption scheme chaos considered that the merits of spatiotemporal chaos and the Nonlinear Chaotic Algorithm (NCA) is a great execution and has profoundly eccentric chaotic sequences. Wang et al. [9] proposed an image encryption algorithm with combined permutation and diffusion stages. Due to its little key space, the algorithm is still not secure. Parvaz and Zarebnia [10] characterized a chaotic framework based on calculated sine, and tent framework. ough the encryption conspire is not palatable, they demonstrated that the encryption is secure. Wu et al. [11] presented a Two-Dimensional Hénon-Sine Map (2D-HSM) that has higher characteristics. Slimane et al. [12,13] presented an effective scheme for image encryption dependent on the settled nested chaotic map and Deoxyribonucleic Acid (DNA) utilizing e Secure Hash Algorithm (SHA-256) to produce the initial states of the chaotic attractor, and introduced a new chaotic system dependent on Julia's fractal procedure, tumultuous attractors, and logistic map in a complex set. e assessment of literature work finds that some chaosbased image encryption algorithms have security vulnerabilities, including (i) standing up to chosen-plaintext attack; (ii) sensitivity to all the chaotic secret keys; (iii) decoding of primary pixel within the decryption process; and (iv) reversing rectangular transform system. To outdo the abovementioned shortcomings and security defect, we propose an improved encryption algorithm utilizing two-dimensional alteration models. e main objective of our work is to propose a data encryption system with key sensitivity, low residual clarity, and keeping up great quality of information reproduced by chaotic maps. Security analysis and experimental results suggest that proposed map could encrypt digital images with powerful capability and high security to resist different attacks. e remainder of this paper is organized as follows. Within the next section, the proposed chaotic systems details are fully explained. e proposed encryption and decryption frameworks are presented in Section 3. In Section 4, the quantitative measurements for system evaluation are presented. Section 5 presents the test results for the proposed cryptosystem. Finally, the concluding comments and recommended future avenues are given in Section 6.

The Proposed Chaotic Systems
We propose a novel chaotic system for improving encryption quality and execution, which is described below. Our system is a Two-Dimensional (2D), nonlinear, discrete-time technique that provides dynamical chaotic behavior. Due to the nonrepeatability and ergodicity of chaos in these algorithms, they can accomplish general searches at higher speeds than stochastic searches that depend on probabilities [14]. e proposed chaotic maps are used to create the chaotic sequence; it derives from the model of Chirikov standard map. Classical chaotic maps suffer from low control parameters which in turn lead to a limited chaotic range, but the better dimensional as the proposed chaotic maps can be used to increase the key space and excessive complexity and complement the randomness of pseudo sequence. To create such maps a chaotic pseudo code is employed and is described in Algorithm 1. Among the diverse proposed maps, four are examined and their characteristics are analyzed below. In short, the new chaotic maps have desirable characteristics such as a large phase space, high ergodicity, and high sensitivity to slight changes in initial conditions and/or control parameters. ese characteristics are analogous to the requirements of encryption algorithms. In addition, these maps preserve the original structure of the classical maps in terms of their parameter range. e first proposed chaotic map can be considered as 2D growth of the traditional logistic map. It has a mathematical expression similar to Hénon map. e modified map gives a thought of chaotic nature which is given by condition (1). In this, original position (x n , y n ) can be mapped to a new position (x 1+n , y 1+n ) using the following: where the state variables x and y are the simulated time series, a, b, and r represent the external parameters of control, and n is an iteration number using this map. e graph of this map is obtained in Figure 1(a). e second proposed chaotic map that is utilized in our technique is a new finance model. It is a discrete-time dynamical system that exhibits chaotic behavior. It takes a 2 Complexity point (x n , y n ) in the plane and maps it to a new point given by x n+1 � sin x n + sin y n+1 .
e above set of equations is a dynamical nonlinear system with 2D nonlinearities. Within the finance dynamical illustration, the state factors x and y are the simulated time series, r acts the external control parameter, and n is an iteration number. e bifurcation diagrams with different parameters could be utilized to examine the distribution //Chaotic proposed algorithm Begin (1) It could be a system of a discrete time that maps point $(x n, y n)$.
(2) Define the initial value of maximum number of iterations t Max, upper boundary, and lower bound, population size n, number of dimensions dim and define the fitness function.   property of the chaotic series. It could be certain that the proposed map possesses excellent chaotic property in terms of uniform distribution and has relatively large parametric space, which can be suitable for the field of image encryption. e graph of this map is demonstrated in Figure 1 e third proposed chaotic map utilized in our pipeline is a 2D chaos map that includes generation of a permuted image which includes the change within the position of the pixel in unique image to some new position utilizing the taking after the following condition: y 1+n � y n − r tanh x n , where n is an iteration number using this map, the chaotic time, the state variables x and y are the simulated time series, and r represents the chaotic parameter. e graph of this map is observed in Figure 1(c). Finally, the fourth proposed chaotic map that is introduced is obtained using the iterative function introduced by y 1+n � y n + a . r cos x n , where the deterministic chaotic time series are produced in the interval x n , y n ϵ[0, 1], a and r speak to the external parameters control, and n is the number of the recreated focuses. e graph of this map is obtained in Figure 1(d). e proposed characteristic types of the modern finance models are obtained using MATLAB for the financial parameters, e.g., initial state values as x (0) � 0.02 and y (0) � 0.02. e dynamics of chaotic map are indicated by orbits.
e chaotic map orbit is characterized by a discontinuous motion, nonsmooth. e structures of the proposed chaotic maps are demonstrated. As can be readily seen from the figure, each chaotic system has its extraordinary signature, which could be a special attractor characteristic. e balance focuses of the other proposed chaotic system are gotten by fathoming the following pseudo code in Algorithm 1.

Chaotic Behavior Evaluation of the Proposed Maps.
Chaotic performance can be evaluated using different techniques such as Lyapunov exponent, bifurcation, and trajectory. A quick overview of those methods are given below; then evaluation of the chaotic behavior for the proposed maps based on their bifurcation diagram, iteration function diagram, and Lyapunov exponent are detailed in the next section.
Lyapunov exponent represents the highlights of a disordered framework and can generally communicate the general execution of chaotic maps. It is utilized as a quantitative measure for the sensitive reliance on initial conditions. For a discrete system x n+1 � f(x n ) and for an orbit beginning with x 0 , the Lyapunov exponent can be described as follows [15]: where f ′ is the subordinate of the capacity f. In the event that λ is negative, the framework is not clamorous. On the off chance that λ is zero, this implies the framework is impartially steady and is in consistent state mode. In the event that λ is certain, the advancement is touchy to introductory conditions and thusly disorganized. Additionally, it is not unexpected to allude to the Maximal Lyapunov Exponent (MLE), in light of the fact that it decides a thought of consistency for a riotous framework. e bigger MLE is, the more tumultuous the guide is and the less the quantity of cycles important to accomplish the necessary level of dissemination or disarray of data is, and this implies a superior clamorous guide. On the other hand, bifurcation diagram is normally alluded to as the subjective progress from ordinary to riotous conduct by changing the control parameter. e bifurcation outline is utilized to consider the clamorous framework as a component of the estimations of the control parameters. is chart permits knowing the districts of the framework showing intermingling, bifurcation, and bedlam relying upon the estimations of the control parameters [16]. At long last, iteration property plots the connection between the quantity of cycles n and the quadratic disorganized guide at various estimations of the disordered parameter r and at a particular introductory worth x 0 [17]. e parameter r can be partitioned into three areas, which can be analyzed by recreation utilizing MATLAB.

Analysis of the Proposed Chaotic Maps.
Quadratic map is a fundamental case of a disorderly framework. It might give the well-known and broadly utilized One-Dimensional (1D) disordered logistic map which is portrayed by scientific iterative [18]: where r is the clamorous parameter and n is the quantity of iterations. e arrangement of the quadratic guide is riotous, in light of the fact that it is nonlinear. It is deterministic since it has a condition that decides the conduct of the framework. Likewise, a slight difference in the underlying worth x o can prompt an altogether unique conduct of the guide. We can gather from Figure 2 that logistic map in general has a positive LE and scattered appropriation just for 3.57 ≤ r ≤ 4. As featured in [19] the logistic guide has negative marks, for example, (i) low riotous range for control parameter r, (ii) has nonconfused areas in any event, when 3.57 ≤ r ≤ 4, and (iii) has low biggest LE = 0.6923. Next, numerous plots for the examination of the proposed tumultuous maps will be concentrated, for example, the bifurcation diagram, the Lyapunov exponent, and the iteration property.

Analysis of the First Proposed Chaotic
Map. e bifurcation graph of the first proposed turbulent map is introduced in Figure 3

Analysis of the Second Proposed Chaotic Map.
e conduct of the second proposed map is introduced through Figure 5. As exhibited by the bifurcation outline shown in Figure 5

The Proposed Encryption System
An iterative handle to scramble arrangement of bytes that is 1D changed form of the 2D original image can be used in the suggested scheme. As given in equations (1) through (4), the proposed chaotic capacities are utilized.
ese capacities together guarantee perplexity and dissemination procedure required for encryption. For increasing security and to decrease encryption time, the algorithm is additionally backed with some logical operations help. e structures of encryption and decryption procedures are demonstrated in Figure 11. e DWT, based on operations of high-pass and low-pass filtering, consists in decomposing the image into sub-bands. For a single level decomposition, it presents an image as four sub-bands; the first sub-band represents an approximation image Low-Low (LL) and the others show image details in horizontal high-low (HL), vertical low-high (LH), and diagonal high-high (HH) directions. e four proposed maps are used to permute the positions of the four sub-bands pixels. e constructed proposed chaotic sequence is adopted to diffuse the overall permutation image; an auxiliary key is brought in the algorithm to make the algorithm sensitive to the secret keys. e Inverse Discrete Wavelet Transform (IDWT) allows perfect reconstruction of the image. e following subsection has details of encryption and decryption algorithms.
Within the presented cryptosystem for encryption and decryption forms, four of the proposed maps are utilized. e initial conditions and control parameters (key states) are extracted from the secret key and used to produce chaotic sequences from the proposed maps.

Encryption Process.
e proposed image encryption plot dependent on chaos structure is delineated in Figure 11(a). DWT, permutation (confusion), and diffusion stages are  Complexity blends of a low-pass filter and a high-pass filter and afterward dependent on the convolution with these channels to produce the LL, LH, HL, and HH subgroups. To acquire the following coarser scaled wavelet coefficients, the sub-band LL is additionally disintegrated and fundamentally subexamined. is procedure can rehash several times, which is controlled by the application. With the pyramid-organized wavelet transform, the size of the original image is identical to adding all the decayed subimages up. Utilizing this decay structure, there will be no data lost when the disintegrated pieces are reproduced. is remaking procedure is called IDWT [20].

e Permutation Process.
We utilize the proposed chaotic maps to produce tumultuous groupings and afterward sort that confused numbers in rising or plunging order for the age of the change key. We sort the chaotic sequences in the record network utilized in rearranging the original image to acquire the permuted image. In the wake of acquiring the rearranged image, the relationship among the neighboring pixels is totally upset and the image is totally unrecognizable. In this way, the permuted orderly conduct of the fourth g image is frail against factual assault, and realized plain-content assault [21]. erefore, we utilize a dispersion procedure after change to improve the security.

e Diffusion Process.
e dissemination step in the proposed encryption plot is performed by the key identified with the plain image calculation which utilized just one round dispersion activity and its key relies upon the initial key and the original image [22]. e diffusion procedure in  our scheme depends on the proposed chaotic maps. We will talk about the encryption procedure just in detail, because the decryption is the opposite procedure. e subtleties of the encryption procedure can be summed up by Algorithm 2.

Decryption Process.
e decryption procedure is the opposite activity of the encryption procedure. e schematic representation of the structure of the decoding forms is shown in Figure 11(b). Utilizing similar mystery keys, it tends to produce a tumultuous record grouping and the disordered vectors created in encryption process. e decoding calculation additionally comprises three fundamental stages: inverse diffusion, inverse confusion, and IDWT. Initially, we convert the encoded picture C in size M × N. At that point, we produce a reverse diffused vector. Besides, we acquire the consolidated permutated vector and recompose it into the four-stage subgroups (LL P , LH P , HI P , and HH P ). At long last, converse stage for each sub-band (LL, LH, HI, and HH) utilizing the confused record arrangement, and get the original image P utilizing IDWT. e decryption procedure is given in detail in Algorithm 3.

Performance Metrics
e quantitative performance of proposed techniques compared with traditional techniques could be measured using different metrics. e latter include (i) statistical parameters, (ii) differential parameters, and (iii) efficiency parameters [23]. Details of those metrics are given as follows.

Statistical Parameters.
Good cipher must have strong resistance against any measurable examination. To confirm the security of any encryption technique, the following statistical examinations should be performed [24].

Histogram
Analysis. An image histogram depicts the conveyance of image pixels by plotting the number of pixels at each gray scale level. e redundancy of plaintext should be hidden in the distribution of cipher text and this distribution logically needs to be uniform [23]. e histogram equation of an image is gotten as follows: P n � number of pixels with intensity n total number of pixels , n � 0, 1, . . . , L − 1, where I is represented as an r by c matrix of numbers extending of pixels from 0 to L − 1. L is the number of conceivable concentrated values, more often than not 256, and P n indicates the normalized histogram of [25].

Correlation Analysis.
e relationship between two variables is called correlation coefficient (R) [26]. e crosscorrelation coefficient between decrypted images and original is where n is the column number, m is the row number, OI is the pixels mean value of original image, and DI is the pixels mean value of decrypted image. Ideally, the value of R should be 1.

Information Entropy Analysis.
e entropy is a perfect feature to evaluate the degree of randomness. e entropy of a message source could be computed as [ where N represents the number of bits for each symbol and p(m) is the probability of symbol m i .

Differential Parameters.
Encrypted image needs to be sensitive to tiny changes in plain image. Attacker can change some features in the plain image to get changes within the encrypted one. If a small unsettling influence within the original image comes about in a significant change in the encrypted one, then differential attacks lose their efficiency and become useless [28].

Mean Square Error.
e Mean Square Error (MSE) is used in this paper to measure difference between the plain and encrypted images. e high value of MSE corresponds to a high difference between plain and encrypted images. It can present as in equation (10) [29]: where N is the number of columns, M is the number of rows, and f is the number of image frames. e parameters P(i, j) and C(i, j) refer to the pixels of the plain and the encrypted images, respectively. For a MSE ≥30 dB, there is a difference between the plain and encrypted images.
Input: plain image P Output: cipher image C

Begin //Permutation Process
Step 1: examine the plain image P in size M × N. P can be a gray-scale or RGB image.
Step 2: decompose the image into four level sub-bands (LL, LH, HL, and HH) by the selected DWT.
Step 3: choose a two-dimensional chaotic system and generalize it by introducing the initial values (x 0 , y 0 , a, b, r) , these initial values as secret keys.
Step 4: generate the chaotic sequences using the proposed chaotic maps and set the appropriate values of the secret keys. Can use the 1 st proposed chaotic map.
Step 5: change the chaotic sequence, with the same method, into a consistently dispersed grouping by altering the initial values and parameters.
Step 6: iterate the chaotic sequence for LL sub-band for scrambling LL P row by row and column by column (starting from the first row and the first column) Step 7: like step 3, compute the next quantized chaotic pair using the 2 nd , 3 rd , and 4 th proposed chaotic maps to scramble the next sub-bands of LH, HL, and HH, respectively, and reiterate this step total times. (When the last row or the last column has been scrambled, switch to the first row or the first column over again.) Step 8: combine the chaotic vectors (LL P , LH P , HI P , and HH P ) into one vector with S k in size M × N.
Step 9: make the new vector of mistook pixels for S P in size M × N as S P � S K (index).

//Diffusion Process
Step 10: adjust and change the vector S P realizing that every component of level gray ranges in [0, 255] utilizing the accompanying condition: S P (i) � mod(round(10 12 S P (i)), 256), where 1 ≤ i ≤ M × N Step 11: create the diffused vector with S D in size M × N as follows: S D � S P ⊕ S K , where ⊕ denotes the exclusive OR operation bit by bit Step 12: create the final matrix with cipher image C as follows: C � reshape(S D , M, N)Algorithm 2: Proposed encryption process.

End
Input: cipher image C Output: plain image P Begin Step 1: produce the deshuffled vector as follows: S P � S D ⊕ S K , where ⊕ denotes the exclusive OR operation bit by bit Step 2: produce the permutated each vector as follows: S P � S K (index) Step 3: obtain the permutation sub-bands (LL P , LH P , HI P , and HH P ) Step 4: opposite stage and reshape vector components utilizing the chaotic index sequence to get sub-bands (LL, LH, HI, and HH) Step 5: use IDWT recovers to obtain the original image End   (11) [30].

Peak Signal-to-Noise
Ratio. e peak signal-to-noise ratio (PSNR) measures the conformity between the original and decrypted images [31]. For an image of size M × N, it can be evaluated as follows: where Max 01 represents the maximum possible pixel value of the original image. For a good encryption algorithm, the PSNR should be as low as possible between the plain and encrypted image.

Number of Pixels Change
Rate. e Number of Pixels Change Rate (NPCR) is utilized to measure the percentage of different pixel numbers between the original and decrypted images and is assessed as within the following condition [31,32].
NPCR evaluates the rate of pixels change in the coded image after modification in one pixel of an original one; as with higher value for NPCR, more effective performance is got [32]. e practical value for 1-NPCR ought to be approximately 0.99 [33].

Unified Average Changing Intensity.
e Unified Average Changing Intensity (UCI) measures the average intensity of difference between plain and decrypted images. It could be computed through the following equation [33].
where the number of columns is represented by N , M is the number of rows, f is the number of image frames, DI is decrypted image, OI is the original image, and l is the number of bits per pixel of original image.

Efficiency Parameters.
Efficiency and high speed are additionally imperative issues for a successful cryptosystem, particularly for real-time Internet application. Generally, encryption speed is highly dependent on the CPU/MPU structure, size of RAM, operation system, the programming language, and compiler option. So, there is no need to compare the encryption speeds of two ciphers image using two different devices [24]. e foremost common parameter related to efficiency analysis is the slipped-by-time (sec) which has spoken to the overall computation time for encryption as well as decryption prepared in seconds for each trial of experiments.

Experimental Results
Most encryption algorithms are tested by utilizing measurable examination. ose analyses are utilized to find a relation between the encrypted and the original image. All of our experiments have been conducted utilizing a core i5-2400 Windows 7 machine with a 4 GB RAM, 160 GB HDD, and the same version of MATLAB programming environment. Our device was connected to the web most of time. All tests have been connected more than one time and thus the elapsed time represents the average simulation time for all trials for each test. e execution of proposed algorithm is tested using MATLAB R2017a where it is inspected through an arrangement of tests. e proposed approach is implemented using the proposed maps for encryption and decryption of an image. We used the benchmark images Lena, Cameraman, Baboon, etc. (each of which is 512 × 512 pixels) as plain (original) images. With multi-map orbit key, the proposed maps are performed. e foremost direct technique to choose the disorderly degree of the encrypted image is by the sense of sight. On the other hand, the stochasticity of encrypted images can be quantitatively calculated by the connection coefficient. Appling the proposed maps, the parameters r and n should be set agreeing with Step 1 in Algorithm 2. Based on the experimental encounter, general combos of r and n can continuously result in exceptionally disruptive outcomes at intervals of recreation. e beginning conditions of all proposed chaotic maps utilized are set as x (0) � 0.02 and y (0) � 0.02 as initial conditions for the first random key. e simulation results of the encryption process for Lena image are shown in Figure 12.

Encrypted and Decrypted Experiment Tests.
Four pictures are utilized to test the encryption algorithm, "Lena," "Cameraman," "Baboon," and "Peppers." From the simulation results shown in Figure 13, these cipher images show up to be so boisterous such that any data from them cannot be gotten. Within the decryption process, by utilizing the proper secret keys, the decoded images are the same as initial plain images.
Conveyances of information values in a system comprised the histogram. Histogram investigation can be made by looking at information distributions in numerous diverse fields. In encryption practices, in case the conveyances of numbers that represent encrypted data are near, this implies encryption is performing well. e closer the encrypted data distributions, the higher their encryption level. e Complexity 15 histogram investigation for the chosen sample images is shown in Figure 14. As shown in Figures 14(i)-14(l), the histograms of the encrypted images are uniform and do not give any clues to utilization of any factual examination assault. Subsequently, it is troublesome for attackers to perform the factual examination since there are no valuable data exposed within the cipher images.

Key Space Analysis.
e key space is the all out number of various keys that can be utilized in the encryption procedure. e proposed calculation comprises two procedures: permutation and diffusion. In permutation process, we utilize the four proposed maps with autonomous factors x 0 , y 0 , a, b and r for the four sub-bands. In the diffusion process, the clench hand proposed map has independent variables x 0 and r. In the key identified with the plain content algorithm, we have a consistent whole number c and c [1,255]. us, the key space is {x 0 , y 0 , a, b, r}. Sincex 0 , y 0 , a, b and r are twofold accuracy numbers, the absolute number of various qualities for x 0 , y 0 , a, b and r is more than 1014. In this way, the key space is bigger than 1014 × 1014 × 1014 × 1014 × 1014 × 255. is huge key space is sufficient to resist brute-force attack.

Key Sensitivity Analysis.
In addition to histogram analysis, we employed another critical feature of chaos encryption, which is key sensitivity. During the decryption, any little alteration within the key leads to diverse results. Even if only one parameter has been changed, encrypted data cannot be unscrambled. Additionally, the information cannot be decrypted with knowing all the keys since the decryption does not occur within the correct order. Figure 15 shows the encrypted image of the proposed approach when utilizing the specific keys. Figure 15(a) shows the original cameraman image. Figures 15(b) and 15(c) show the encrypted images utilizing diverse encrypted keys and there are no patterns or shadows obvious within the corresponding decrypted image with utilizing off-base keys.
e decrypted image is shown in Figure 16, where Figure 16(a) shows the decrypted image using the same keys of encryption. Figures 16(b) and 16(c) show illegal decrypted images while using the error keys. e results show that the decrypted images are all unrecognized.
is means that, without using the right key, the original image cannot be recovered. A little key change will produce the error decryption results. erefore, the proposed encryption algorithm has high key sensitivity.  Moreover, to assess the robustness of the proposed system the statistical analysis is conducted. Table 2 shows measurable analysis of our results; different measures are utilized: MSE, PSNP, ET, and Entropy. e proposed encryption employs distinctive midpoints when scrambling distinctive input images. is progressively can impressively increment the resistance of the cryptography system against unknown/chosen attacks   and differential assaults. Security performance of the proposed algorithm is better than those results mentioned in [34]. In order to test the algorithm's capacity to resist assaults, noise attack may be a common image assault strategy, which frequently happens within preparing of cipher image transmission. For assault analysis, two parameters were used, namely, the NPCR and UACI. e algorithm ought to have great sensitivity to plain image, which means great difference in cipher image caused by a small change in plain image. e effects of salt & pepper, speckle, and composite Gaussian and rotation attack are illustrated in Figure 17. It is concluded that the proposed scheme can resist different assaults (noise attack and rotation attack).
It may be a common form of cryptanalysis and a secure encryption scheme ought to have strong capacity of standing up to these attacks. For an image encryption scheme, by the number of pixels changing rate and bound together normal changed intensity can measure its capacity of standing up to differential attack. e results can be observed in Tables 3   0   1   2   3   4   5   6 Pixel gray value on location (x + 1, y) Pixel gray value on location (x + 1, y) Pixel gray value on location (x, y) Pixel gray value on location (x + 1, y) Pixel gray value on location (x, y)    As can be observed, NPCR is over 99% whereas UACI is over 33%. ese results infer the high sensitivity of the proposed calculation towards the miniature modification made to the plain image; the decrypted images will be completely different even if there is only one bit of change between the two plain images. In our test, the results of four encrypted images and the average value UACI and NPCR are 33.6248% and 99.6472%, individually. By differentiation, the values of UACI and NPCR in our plot are closer to the perfect esteem, which proves that it is exceedingly sensitive for the proposed encryption for resisting differential attacks.

Correlation of Two Adjacent
Pixels. Using the sample images above, we compute the correlation coefficients of adjacent pixels for the original and the encrypted image, and this is done through estimating the correlation among two vertically adjacent pixels, two horizontally adjacent pixels, and two diagonally adjacent pixels in the original and the corresponding encrypted images [22]. We randomly select 5000 pairs of two adjacent pixels from the image.
where cov(x, y) represents the covariance of x and y, D(x) represents the variance of the vector x, E vector or(x) represents the main value of vector x, and N means the length of the vector x.
As can be seen from Table 5 and Figure 18, the correlation coefficients of the plain images are close to 1, while the correlation coefficients of the cipher images are close to 0. So, the plain images have strong correlations for the adjacent pixels, while the cipher images have hardly any correlations for the adjacent pixels. ese demonstrate that our proposed scheme can fight against attacks based on statistical properties of the images.

Randomness Tests for the Ciphered Image.
To guarantee the security of the cryptosystem, the figured picture must have properties to segregate designs for additional measurable investigation, for example, great dispersion (i.e., arrangement's connection gets feeble), extensive stretch (i.e., long key period), and high multifaceted nature and productivity (i.e., disarray and dissemination) [39]. A few tests are ordinarily used to test the haphazardness of the figured picture. ese tests incorporate DIEHARD and NIST (SP800) measurable test suites. DIEHARD test is significant on the grounds that it is by all accounts the most remarkable and troublesome test suite to pass [40]. e P estimation of each test must be inside the achievement scope of 0.01 < P esteem < 0.99. NIST is a measurable bundle comprising a lot of tests. ese tests were created to test the haphazardness of the ciphered image dependent on the pseudorandom number generators. Tables 6 and 7 show the consequences of the NIST and DIEHARD; the outcomes show that ciphered images have passed all the assessments, which implies that they exhibit highly random behavior.

Conclusion
A set of novel chaotic maps based on DWT and double chaotic function have been proposed in an effort to improve encryption quality and execution. In such a way, the proposed pipeline was able to avoid many existing cryptanalysis methodologies and cryptography attacks.
is has been documented using the NPCR and UACI metrics with values of 99.6472% and 33.6248%, individually.
e dynamical analysis and sample entropy algorithms showed that the proposed map is overall hyperchaotic with the high sensitivity and high complexity. us, the proposed chaos-based image cipher can be seen as reasonable tool for applications like wireless communications.
ere are a few research focuses that can follow after this investigation.
e key choice handle can be randomized. e number of offers superimposed can be expanded to increase the layers of security. Different sorts of chaotic maps can be connected to the same image to improve the encryption handle. e proposed chaotic maps for multimedia security algorithms can be applied based on chaotic system for fog computing.

Data Availability
e data used to support the findings of this study are available from the corresponding author upon request.

Conflicts of Interest
e authors declare that they have no conflicts of interest.