1 Introduction

With the development of science and technology, especially the advance of computer technology, our life is more and more convenient. Nowadays, most of information are transmitted on the network in a digital form. The transmitted information was once only text form, but now there are more and more information forms, including image and video, etc. All forms of information are widely used in all sorts of online communicating, including professional multimedia communication and online working. World have suffered a lot due to international pandemic caused by COVID-19 virus and people rely more on network interaction [37]. In this case, the problem of information security has highlighted, to ensure the information security, many encryption algorithms have been proposed by scholars [18, 22, 27, 34, 38, 50]. Among all kinds of information forms, image information is widely used due to its legibility and comprehensive. Image information would be accessed illegally by unauthorized hackers if they are not encrypted, resulting huge losses. However, if use the tradition encryption algorithms to process images, the effect would be not good as expected because images own strong correlations between adjacent pixels and highly redundancy. One of the reasons is that these algorithms are originally designed for text, they are not suitable for images. These algorithm acts like a helping hand to near us the required results which we intended [4, 6,7,8,9,10,11,12,13,14, 23, 25, 46]. Thus, we need algorithms that are more suitable for image encryption.

In recent years, there are more and more scholars pay attention to the study of chaos theory. Chaos theory, especially chaotic maps among it, has been widely used due to their good performance since its mentioned firstly by Lorenz [41]. Chaos maps own many excellent characteristics, such as high sensitivity to the initial parameters and values, unpredictability to trajectories, topological transitivity and so on [18, 27, 38]. The sequences generated by chaotic maps are pseudo-randomness, thus, it’s usually used as a random source to combine with image encryption methods. Then the security of image cryptographic algorithms could be further improved because of the good chaotic behavior of maps.

Among image encryption algorithms based on chaotic maps, chaotic maps are used to generated pseudo random sequences, and then according to the sequence scramble and diffuse the images. From the perspective of dimensionality, chaotic maps could be divided into one-dimensional (1D) chaotic maps and high-dimensional (HD) chaotic maps, respectively. Both them have their own advantages. 1D chaotic maps own simple structure, and then there are a number of studies proposed based on these maps [15, 17, 32, 33, 35, 44]. In Ref. [32], 1D Tent map is used to encrypt the fingerprint images. The images would be transformed into DNA sequence according to the DNA coding rules which is determined by the position of pixel points. And then the sequence generated by Tent map would also be coded to DNA sequence depending on the coding rules determined by the position of element. Finally, calculate these two DNA sequences using DNA XOR operation and then obtain a cipher image after converting the DNA sequence. Ref. [33] proposed a color image encryption image encryption algorithm. In this encryption scheme, a new Piece-wise Linear chaotic map (PWLCM) is used to generated the random number sequences. This encryption scheme includes row-column and block based rotational permutation operations and diffusion operations. The proposed algorithm is simple but efficient and owns low computing cost. The authors used four 1D chaotic maps to encrypt gray and color images in Ref. [15], adopting a novel cryptographic primitive operation. From the stimulation experiment results, it’s clear that this image encryption algorithm has large key space, high information entropy, strong robust attack resistance and can be competed with other schemes. Ref. [44] proposed an image encryption based on Cyclic Redundancy Check (CRC) and nine palace map, in which a 1D Logistic map is used to generate the random sequence. In the encryption algorithm, the plain image would be divided into nine sub-images and scramble these sub-images based on nine palace map. Then diffuse the scrambled image by using CRC method. In Ref. [35], a novel image encryption method based on logistic chaotic systems and deep autoencoder has been proposed. The method uses logistic chaotic system to scramble the original image, and then encodes the random scrambled image through a deep auto-encoder to generate the encrypted image. Ref. [17] introduced an improved 1D Logistic map and used a simple encryption algorithm to demonstrate the validity of this map. Two matrices in the paper are generated by improved map to confuse and diffuse the plain text images respectively. To sum up, low-dimensional chaotic maps are widely used due to their simple structure and low computing cost. But it should be noticed that simple structure and single trajectory also means low security level. Some low dimensional chaotic maps can be broken by using phase space reconstruction algorithm [36], etc.

Therefore, most researchers prefer to using high dimensional chaotic maps to encrypt the images [3, 20, 24, 26, 30, 40, 47]. In Ref. [26], a color image encryption based on a 1D chaotic map (piecewise linear chaotic map) and a Chen chaotic system has been proposed. The PWLCM are used to scramble the binary matric transformed by original image, and the Chen chaotic system is used to diffuse three components of scrambled image. Series experiments shows this encryption scheme has great results. Ref. [40] proposed a new chaotic map named LL compound chaotic map, which is constructed based on Logistic map and Lü system. Combine the new chaotic map and adjacent-side XOR operation to obtain an improved ZigZag transform algorithm, which would be used to encryption images. The position and value of pixels are destroyed completely, resulting that this kind of scheme is effective and has high security level. In Ref. [30], the authors improved the random sequence generated by 3D Lorenz system. Use the equalization method to make the distribution of chaotic sequences more even. The proposed image encryption in Ref. [30] is also designed based on confusion and diffusion stages. Ref. [24] proposed an effective chaotic color/grayscale image encryption algorithm. The algorithm uses a hybrid 2D composite chaotic map combined with a sine-cosine cross-chaotic map for the permutation. Then, a 1D combined Logistic-Tent chaotic map is used to generate a matrix, which is XORed with the scrambled image. And in Ref. [3], the image encryption algorithm is implemented based on a compressive sensing (CS) algorithm and a Lorenz system. In the Discrete Cosine Transform (DCT) domain, the plain image would be compressed and sparse, and the dimension of the plain image can be reduced by the combination of pixels. The sequences generated by Logistic map and Lorenz system are used to encrypt images. The security analysis results show that this scheme owns low time complexity and high encryption effect simultaneously. In Ref. [47], a color image encryption algorithm based on DNA coding, DNA computing, Lorenz chaotic system, Logistic map and hyper chaotic map. The R, G, B components are disordered by 2D hyperchaotic sequences and then these components are scrambled by Logistic sequences. Encode the RGB images by using DNA rules and then combine them with the DNA matrices generated by Lorenz chaotic map to obtain the final cipher image. Nadeem et al. [20] proposed a new RGB encryption scheme based on the Dynamic 3D scrambled image, 5D multi-wing-hyperchaotic-system and DNA computing. In this scheme, the three parts of the color image are reconstructed into a 1D matrix, and then the matrix is randomly assigned to different cells of the 3D scrambled image. As for the diffusion phase, chaotic system and DNA method are used. Generally speaking, using high dimensional chaotic maps to encrypt the images owns higher security than 1D chaotic maps due to HD chaotic maps has larger key space and more complexity dynamical characteristic.

Recently, DNA coding and DNA computing are widely used in many encryption algorithms due to its good feature like high parallelism, massive storage and low power consumption [16, 39, 48]. However, some of these schemes are just use one DNA coding rule in the whole process [2, 5, 19, 28, 42], which make it is easy for hackers to attack the cipher images. Based on above, this paper proposes an idea of constructing high-dimensional cyclic symmetric chaotic map by using 1D chaotic map. In this improvement model, multiple 1D chaotic maps are coupled into a HD chaotic map, in order to prove the generality of the model, we propose two examples 3D-CSLM and 3D-CSCM, respectively. Among them, 3D-CSLM is implemented based on three Logistic maps. In the new map, the output of the first dimension would be used as the input value of the third one, the output of the second dimension would be used as the input value of the first one, and then the output of the third dimension would be used as the input value of the second one. The 3D-CSCM is built on a similar principle and will not be explained in detail here. The three state variables are used to perturb the sequences generated by other dimensions, so as to enhance the correlation between the three dimensions and further improve the dynamic performance of the newly generated chaotic map. Moreover, a novel image encryption algorithm based on 3D-CSLM is used to demonstrate the practicability of the improvement model. The advantages of this paper can be summed as follows:

  1. 1)

    The idea of constructing high-dimensional cyclic symmetric chaotic map proposed in this paper is feasible after theoretical verification.

  2. 2)

    The proposed 3D-CSLM and 3D-CSCM own excellent chaotic performance. The space of initial parameters is extended, and the sequences generated by new chaotic system iteration are more random and difficult to predict than the sequences generated by original one.

  3. 3)

    In image encryption algorithm, the DNA rules which would be used are not fixed. The rules are adjusted by the sequence generated by 3D-CSLM, resulting that the image encryption algorithm owns a high security level.

  4. 4)

    The initial parameters and values of 3D-CSLM are determined by the plain image and secret keys. The correlation between plain images and encryption algorithm is high. It also means that the proposed encryption algorithm owns high ability to resist plaintext attacks.

The rest of this paper can be described as follows. The model of construction a high dimensional cyclic symmetric chaotic map is shown in Section 2. The new chaotic maps improved by the improvement model (3D-CSLM and 3D-CSCM) and their chaotic behavior are showed in Section 3. In Section 4, encryption/decryption process of novel image encryption scheme based on 3D-CSLM are proposed. In Section 5, the simulation experiment results analyses are provided. Finally, the conclusion of this paper is presented in Section 6.

2 The model of construction high-dimensional cyclic symmetric chaotic map

In this section, we will introduce the model of constructing a high-dimensional cyclic symmetric chaotic map and prove its chaotic characteristics. Classical 1D chaotic map has many good characteristics, such as low computing cost, simple structure and so on. But it’s also easy to be attacked due to its single trajectory and small range of parameters.

Thus, in this paper, we propose a model of using multiple 1D chaotic maps to construct a HD cyclic symmetric chaotic map. This keystone of the model is that coupling multiple 1D chaotic maps into a high-dimensional chaotic map, and using the output of one chaotic map as the input of another chaotic map. The specific formula is shown as Eq. (1).

$$ {X}_{i+1}=F\left({X}_i\right)=\left\{\begin{array}{c}f\left({x}_i^{(2)}\right)\\ {}f\left({x}_i^{(3)}\right)\\ {}\dots \\ {}f\left({x}_i^{(n)}\right)\\ {}f\left({x}_i^{(1)}\right)\end{array}\right\} $$
(1)

where \( {X}_i=\left({x}_i^{(1)},{x}_i^{(2)},\dots, {x}_i^{(n)}\right) \) be the n-dimensional variable, f is a chaotic map, and F represents the improved chaotic map. In the iterative process of chaotic map, the (i + 1)-th dimension variable is controlled by the i-th dimension variable, where i = 1, 2, …, n − 1. And the n-th dimension variable is controlled by the 1st dimension variable. Through continuous correlation in this way, the n variables form a cycle, improving the performance of chaotic maps.

Theorem 1

The map F is n-order cyclic symmetric.

Proof

f is a chaotic map, the map F is a composite of multiple f maps. We could have

$$ {F}^{(n)}\left({X}_i\right)={F}^{\left(n-1\right)}\circ \left(\begin{array}{c}f\left({x}_i^{(2)}\right)\\ {}f\left({x}_i^{(3)}\right)\\ {}\dots \\ {}f\left({x}_i^{(n)}\right)\\ {}f\left({x}_i^{(1)}\right)\end{array}\right)={F}^{\left(n-2\right)}\circ \left(\begin{array}{c}{f}^{(2)}\left({x}_i^{(3)}\right)\\ {}{f}^{(2)}\left({x}_i^{(4)}\right)\\ {}\dots \\ {}{f}^{(2)}\left({x}_i^{(1)}\right)\\ {}{f}^{(2)}\left({x}_i^{(2)}\right)\end{array}\right)=\dots =\left(\begin{array}{c}{f}^{(n)}\left({x}_i^{(1)}\right)\\ {}{f}^{(n)}\left({x}_i^{(2)}\right)\\ {}\dots \\ {}{f}^{(n)}\left({x}_i^{\left(n-1\right)}\right)\\ {}{f}^{(n)}\left({x}_i^{(n)}\right)\end{array}\right)={f}^{(n)}\left({X}_i\right) $$
(2)

From the above equation, the theorem 1 could be conducted.

Theorem 2

The improved map F owns high sensitivity to initial condition: For any x and y in its neighbor U, |x − y| < δ, there exist a positive integer N and a ε > 0, which satisfies |F(N)(x) − F(N)(y)| > ε.

Proof

|X − Y| < δ can be transformed into the following equation,

$$ \sqrt{{\left({x}^{(1)}-{y}^{(1)}\right)}^2+{\left({x}^{(2)}-{y}^{(2)}\right)}^2+\dots +{\left({x}^{(n)}-{y}^{(n)}\right)}^2}<\delta $$
(3)

Therefore, |x(i) − y(i)| < δ would always hold for all i(i = 1, 2, …, n). Due to f is a chaotic map, owns high sensitivity to initial conditions. Thus, there are positive integers Ni and εi, satisfying \( \left|{f}^{\left({N}_i\right)}\left({x}^{(i)}\right)-{f}^{\left({N}_i\right)}\left({y}^{(i)}\right)\right|>{\varepsilon}_i \), i = 1, 2, …, n.

Firstly, set N = N1, ε =  min {ε1, ε2, …, εn}. Assume that N = nk. Then we can conclude that

$$ {\displaystyle \begin{array}{c}\mid {F}^{(N)}(X)-{F}^{(N)}(Y)\mid =\mid \left(\begin{array}{c}{f}^{(nk)}\left({x}^{(1)}\right)\\ {}{f}^{(nk)}\left({x}^{(2)}\right)\\ {}\dots \\ {}{f}^{(nk)}\left({x}^{(n)}\right)\end{array}\right)-\left(\begin{array}{c}{f}^{(nk)}\left({y}^{(1)}\right)\\ {}{f}^{(nk)}\left({y}^{(2)}\right)\\ {}\dots \\ {}{f}^{(nk)}\left({y}^{(n)}\right)\end{array}\right)\mid \\ {}=\sqrt{{\left({f}^{(nk)}\left({x}^{(1)}\right)-{f}^{(nk)}\left({y}^{(1)}\right)\right)}^2+\dots +{\left({f}^{(nk)}\left({x}^{(n)}\right)-{f}^{(nk)}\left({y}^{(n)}\right)\right)}^2}\\ {}\ge \sqrt{{\left({f}^{(nk)}\left({x}^{(1)}\right)-{f}^{(nk)}\left({y}^{(1)}\right)\right)}^2}=\mid {f}^{\left({N}_1\right)}\left({x}^{(1)}\right)-{f}^{\left({N}_1\right)}\left({y}^{(1)}\right)\mid >{\varepsilon}_1\ge \varepsilon \end{array}} $$
(4)

That is also to say that the equation |F(N)(X) − F(N)(Y)| ≥ ε is proved.

Then when N = nk + 1, we also can obtain,

$$ {\displaystyle \begin{array}{c}\mid {F}^{(N)}(X)-{F}^{(N)}(Y)\mid =\mid \left(\begin{array}{c}{f}^{\left( nk+1\right)}\left({x}^{(2)}\right)\\ {}{f}^{\left( nk+1\right)}\left({x}^{(3)}\right)\\ {}\dots \\ {}{f}^{\left( nk+1\right)}\left({x}^{(1)}\right)\end{array}\right)-\left(\begin{array}{c}{f}^{\left( nk+1\right)}\left({y}^{(2)}\right)\\ {}{f}^{\left( nk+1\right)}\left({y}^{(3)}\right)\\ {}\dots \\ {}{f}^{\left( nk+1\right)}\left({y}^{(1)}\right)\end{array}\right)\mid \\ {}=\sqrt{{\left({f}^{\left( nk+1\right)}\left({x}^{(2)}\right)-{f}^{\left( nk+1\right)}\left({y}^{(2)}\right)\right)}^2+\dots +{\left({f}^{\left( nk+1\right)}\left({x}^{(1)}\right)-{f}^{\left( nk+1\right)}\left({y}^{(1)}\right)\right)}^2}\\ {}\ge \sqrt{{\left({f}^{\left( nk+1\right)}\left({x}^{(1)}\right)-{f}^{\left( nk+1\right)}\left({y}^{(1)}\right)\right)}^2}=\mid {f}^{\left({N}_1\right)}\left({x}^{(1)}\right)-{f}^{\left({N}_1\right)}\left({y}^{(1)}\right)\mid >{\varepsilon}_1\ge \varepsilon \end{array}} $$
(5)

The equation |F(N)(X) − F(N)(Y)| ≥ ε could also be proved.

Finally, assume thatN = nk + j, 1 < j < n.

$$ {\displaystyle \begin{array}{c}\mid {F}^{(N)}(X)-{F}^{(N)}(Y)\mid =\mid \left(\begin{array}{c}{f}^{\left( nk+j\right)}\left({x}^{\left(j+1\right)}\right)\\ {}{f}^{\left( nk+j\right)}\left({x}^{\left(j+2\right)}\right)\\ {}\dots \\ {}{f}^{\left( nk+j\right)}\left({x}^{(j)}\right)\end{array}\right)-\left(\begin{array}{c}{f}^{\left( nk+j\right)}\left({y}^{\left(j+1\right)}\right)\\ {}{f}^{\left( nk+j\right)}\left({y}^{\left(j+2\right)}\right)\\ {}\dots \\ {}{f}^{\left( nk+j\right)}\left({y}^{(j)}\right)\end{array}\right)\mid \\ {}=\sqrt{{\left({f}^{\left( nk+j\right)}\left({x}^{\left(j+1\right)}\right)-{f}^{\left( nk+j\right)}\left({y}^{\left(j+1\right)}\right)\right)}^2+\dots +{\left({f}^{\left( nk+j\right)}\left({x}^{(j)}\right)-{f}^{\left( nk+j\right)}\left({y}^{(j)}\right)\right)}^2}\\ {}\ge \sqrt{{\left({f}^{\left( nk+j\right)}\left({x}^{(1)}\right)-{f}^{\left( nk+j\right)}\left({y}^{(1)}\right)\right)}^2}=\mid {f}^{\left({N}_1\right)}\left({x}^{(1)}\right)-{f}^{\left({N}_1\right)}\left({y}^{(1)}\right)\mid >{\varepsilon}_1\ge \varepsilon \end{array}} $$
(6)

According to Eq. (6), the equation |F(N)(X) − F(N)(Y)| ≥ ε could still be proved. Therefore, there must exist a positive integerNand ε > 0, satisfying |F(N)(x) − F(N)(y)| > ε.

In conclusion, the theorem 2 holds.

Theorem 3

The new chaotic map F is bounded.

Proof

Since f is chaotic and bounded, we can assume that |f| < M, then

$$ \mid F\mid =\sqrt{\left(f{\left({x}_i^{(2)}\right)}^2\right)+\left(f{\left({x}_i^{(3)}\right)}^2\right)+\dots +\left(f{\left({x}_i^{(1)}\right)}^2\right)}\le \sqrt{M^2+{M}^2\dots +{M}^2}=M\sqrt{n} $$
(7)

That also means that \( \left|F\right|\le M\sqrt{n} \) always holds, indicating that the newly generated chaotic map F is bounded. The theorem is proved efficiently.

3 Two examples of high-dimensional cyclic symmetric chaotic maps

In this section, to prove the practicability and effectiveness of the model, we apply the model to two simple 1D chaotic map, Logistic map and Chebyshev map, obtaining 3D-CSLM and 3D-CSCM, respectively. Then, take a series of simulation experiments to compare the two newly generated chaotic maps with the original ones, showing the changes in performance of chaotic maps.

3.1 Three-dimensional cyclic symmetric logistic map and its performances

The classical Logistic chaotic map owns a simple structure and low implementation cost, but its trajectory is relatively simple and easy to predict, so that the security is insufficient. And HD chaotic maps own high security level. Therefore, based on the concept of using low-dimensional chaotic maps to construct high-dimensional chaotic maps, a new model of constructing 3D cyclic symmetric chaotic map is proposed in this paper. Apply the model to 1D Logistic map, obtaining the new three-dimensional chaotic system (3D-CSLM) whose mathematical definition could be described as follows,

$$ \Big\{{\displaystyle \begin{array}{c}{x}_{i+1}=f\left({y}_i,{a}_1\right)={a}_1{y}_i\left(1-{y}_i\right)\\ {}{y}_{i+1}=f\left({z}_i,{a}_2\right)={a}_2{z}_i\left(1-{z}_i\right)\\ {}{z}_{i+1}=f\left({x}_i,{a}_3\right)={a}_3{x}_i\left(1-{x}_i\right)\end{array}} $$
(8)

Where initial values x, y, z ∈ (0, 1), control parameters a1, a2, a3 ∈ (0, 4). Due to the 3D-CSLM is constructed based on Logistic map and cyclic symmetric model, the state variables x, y and z are correlated and cyclically symmetric. What’s more, the structure of 3D-CSLM is still relatively simple, but the complexity and randomness will be improved. To prove this point, we take a series of experimental analyses. In these experiments, the control parameter a1 would be used as an independent variable, changing within the defined interval, the other control parameters a2, a3 are fixed. The initial values x, y and z are generated randomly. Because the experimental results of 3D-CSLM in x, y and z directions are similar, only the results in x directions are taken for display here.

3.1.1 Phase diagram and bifurcation diagram analyses

Phase diagram can directly reflect the distribution of chaotic sequences in phase space. From the phase diagrams, the ergodicity of chaotic maps can be roughly judged from the distribution density and the space area occupied [31]. Figure 1 shows the phase diagram of the 3D-CSLM. From the figure, it’s easy to find that the chaotic sequence generated by 3D-CSLM distribute randomly in the whole three-dimensional space with range 0 to 1, occupying a large area of phase space, indicating that the chaotic sequence owns a strong randomness.

Fig. 1
figure 1

The phase diagram of 3D-CSLM

Bifurcation diagrams are often used to observe the changes in size of the range of chaotic parameters. Figure 2 shows the bifurcation diagrams of the original Logistic map and the 3D-CSLM, respectively. From it, it’s clear that 3D-CSLM has a larger parametrial range. It should be noted that there exist periodic windows, in practice, we should avoid taking parameter values in the periodic window.

Fig. 2
figure 2

The bifurcation diagrams of (a) original Logistic map, (b) 3D-CSLM

3.1.2 Lyapunov exponent analysis

An important feature of chaos map is its high sensitivity to initial conditions, the feature is also a reason why it could be widely used in cryptography field. High sensitivity to initial conditions means that even if the initial conditions change slightly, the trajectories of generated sequences would separate very quickly. The quickly the separation speed, the high the sensitivity of chaotic maps to initial conditions. Lyapunov exponent (LE) is used to measure the speed of separation, which shows the divergence or convergence rate of the system trajectory. A positive LE means that even if the initial state changes slightly, the difference in the final output is completely different [43]. Thus, the system is chaotic when LE > 0. Figure 3a shows that the LE spectrum diagrams of classical Logistic map and 3D-CSLM. From the figure, it is proved again that the chaotic parametrial domain is effectively expanded and 3D-CSLM owns stabler chaotic behavior than the classical one when a ∈ [2.89,3.85) ∪ (3.85,4]. Therefore, 3D-CSLM has good chaotic feature.

Fig. 3
figure 3

a Lyapunov exponent diagram of Logistic map and 3D-CSLM, b Approximate entropy diagram of Logistic map and 3D-CSLM

3.1.3 Approximate entropy analysis

Approximate entropy (ApEn) is a dynamic parameter used to quantify the regularity and unpredictability of time series fluctuations. It can be said that the value of ApEn reflects the degree of confusion of the sequence. For a sequence of data, the stronger the regularity, the smaller the approximate entropy. On the contrary, the more complex and less regular, the greater the approximate entropy. It can be seen from Fig. 3b that the ApEn values of the 3D-CSLM is basically maintained above 1.6 in the effective chaotic parametrial range, which is superior to the Logistic map, indicating that the chaotic map improved by proposed model owns good complexity and randomness.

3.2 Three-dimensional cyclic symmetric Chebyshev map and its performance analyses

Similarly, using the same principle, we construct a high-dimensional circularly symmetric chaotic map based on classical Chebyshev map, named 3D-CSCM. Its mathematical definition is shown as follows

$$ \Big\{{\displaystyle \begin{array}{c}{x}_{i+1}=g\left({y}_i,{b}_1\right)=\mathit{\cos}\left({b}_1\operatorname{arccos}\left({y}_i\right)\right)\\ {}{y}_{i+1}=g\left({z}_i,{b}_2\right)=\mathit{\cos}\left({b}_2\operatorname{arccos}\left({z}_i\right)\right)\\ {}{z}_{i+1}=g\left({x}_i,{b}_3\right)=\mathit{\cos}\left({b}_3\operatorname{arccos}\left({x}_i\right)\right)\end{array}} $$
(9)

Where the initial values x, y, z ∈ (−1, 1), and the control parameters b1, b2, b3 ∈ (0, 6). To relate the changes in performance of the original Chebyshev map and 3D-CSCM in detail, some experiments are taken. In these experiments, the initial values are randomly generated. In the three control parameters, two of the control parametersb2, b3 are fixed, the another one, b1, would be used as an independent variable. Because the results of 3D-CSCM in x, y and z directions are similar, only the experimental results in x direction is taken for display.

3.2.1 Phase diagram and bifurcation diagram analyses

The phase diagram of 3D-CSCM is shown as Fig. 4. It’s clear from the figure that the distributed of the chaotic sequence generated by 3D-CSCM is even in the phase space, basically covering the whole phase space region, indicating that its chaotic performance is excellent. Figure 5 shows the bifurcation diagrams of classical Chebyshev map and 3D-CSCM, respectively. From it, it is not difficult to find that 3D-CSCM owns a wider chaotic parametrial range.

Fig. 4
figure 4

The phase diagram of 3D-CSCM

Fig. 5
figure 5

a Chebyshev map Bifurcation Diagram, b 3D-CSCM Bifurcation Diagram

3.2.2 Lyapunov exponent analysis

Figure 6a displays the LE curves of classical Chebyshev map and 3D-CSCM. From the figure, we can find that when b > 0.03, 3D-CSCM will enter a chaotic state and continue to the end. The results of comparison prove again that 3D-CSCM has a wider chaotic range than classical Chebyshev map.

Fig. 6
figure 6

a Lyapunov exponent diagram of Chebyshev map and 3D-CSCM, b Approximate entropy diagram of Chebyshev map and 3D-CSCM

3.2.3 Approximate entropy analysis

The ApEn value curves of classical Chebyshev map and 3D-CSCM are showed in Fig. 6b. When 3D-CSCM is in chaotic state, it’s clear that the ApEn value of 3D-CSCM is higher than that of classical Chebyshev map, and most of the ApEn value of 3D-CSCM remains above 1.6. All the above experimental results show that that 3D-CSCM owns higher complexity and would be more difficult to predict.

4 A novel image encryption algorithm based on 3D-CSLM

To prove the practicability of the improved map, a novel image encryption algorithm based on 3D-CSLM is also designed in this paper.

4.1 DNA rule

Deoxyribonucleic acid is composed of four nucleotides, which are adenine (A), thymine (T), cytosine (C) and guanine (G). According to the Worson-Crick base pairing rule, A pairs with T and C pairs with G. According to DNA coding rules, digital sequences can be transformed into pseudo-DNA strands. For example, when encode number 124, it would firstly be converted to a binary sequence, 01111100. And then the binary sequence would be transformed to (ACCG) if choose Rule 8 as the encoding rule. The DNA coding rules have a total of eight rules, as shown in Table 1. What’s more, the DNA computation operation used here is the XOR operation, whose concrete calculation rules are showed as Table 2.

Table 1 DNA coding rules
Table 2 Operation rules of DNA XOR

When convert a binary sequence to a DNA sequence, take 8-bit as a group, and then convert each group to DNA sequence by using the DNA rules. Similarly, when convert a DNA sequence to a binary sequence, take four bases as a group, obtaining the corresponding binary sequence by using DNA rules. Both these two processes, the selection of the DNA rules depends on the chaotic sequence generated by 3D-CSLM. Comparing with the fixed DNA structure, it improves the security and complexity of image encryption.

4.2 Encryption process

The encryption scheme is mainly composed of image permutation, DNA operation, and diffusion process. Figure 7 shows the detailed encryption flow chart. Assume that the plain image is a grayscale image with size M × N, and the specific encryption steps could be described as follows,

  1. Step 1.

    Convert the plain image into a matrix P with the size of M × N, then set the initial keys {a1, a2, a3, x1, y1, z1, u, T1}.

  2. Step 2.

    Calculate the sum of pixel values Pi of the plain image by using the matrix P. And then bring the sum of pixel values and the initial key {a1, a2, a3, x1, y1, z1} into 3D-CSLM.

  3. Step 3.

    Generate the parameters used in the second iteration. The algorithm uses Eq. (10) to calculate the values of control parameters {a12, a22, a32} required by the second round 3D-CSLM. The calculation of the initial value {x2, y2, z2}of the second round 3D-CSLM is consistent with the control parameters. Then bring the newly generated control parameters and initial values into 3D-CSLM.

    Fig. 7
    figure 7

    Encryption flow chart

$$ {a}_{i2}={a}_i+ Pi\times 1{0}^{-14} $$
(10)
  1. Step 4.

    Iterating 3D-CSLM generates multiple chaotic sequences {kx1, ky1, kz1, kx2, ky2, kz2}, the length of each sequence is M × N. Then treat these chaotic sequences as following equations, where Pi =  mod (Pi, 256).

$$ {K}_1=\mathit{\operatorname{mod}}\left(\boldsymbol{floor}\left({k}_{x1}\left( Pi+1: Pi+N\right)\times {10}^6\right),M\right) $$
(11)
$$ {K}_2=\boldsymbol{floor}\left({k}_{y1}\times 255\right) $$
(12)
$$ {K}_3=\mathit{\operatorname{mod}}\left(\boldsymbol{floor}\left({k}_{z1}\left( Pi+1: Pi+M\right)\times {10}^6\right),N\right) $$
(13)
$$ {K}_4=\mathit{\operatorname{mod}}\left(\boldsymbol{floor}\left({k}_{x2}\times {10}^6\right),8\right)+1 $$
(14)
$$ {K}_5=\mathit{\operatorname{mod}}\left(\boldsymbol{floor}\left({k}_{y2}\times {10}^6\right),8\right)+1 $$
(15)
$$ {K}_6=\mathit{\operatorname{mod}}\left(\boldsymbol{floor}\left({k}_{z2}\times {10}^6\right),8\right)+1 $$
(16)
  1. Step 5.

    Permutation process. Input matrix P and sequence K1 and K3.

Firstly, perform column cyclic shift on matrix P. Perturb the pixel position of each column of the matrix according to Eq. (17), obtaining the preliminary scrambled matrix Pc. Then the row cyclic shift is carried out to change the pixel position of each row of the matrix, and the scrambled matrix Pl is obtained. Eq. (18) is the specific scrambling formula. circshift(⋅) is the displacement function.

$$ Pc\left(1:M,i\right)=\boldsymbol{circshift}\left(P\left(1:M,i\right),{K}_1(i)\right) $$
(17)
$$ Pl\left(i,1:\mathrm{N}\right)=\boldsymbol{circshift}\left( Pc\left(i,1:N\right),{K}_3(i)\right) $$
(18)
  1. Step 6.

    Converts the digital matrix into DNA sequence. Input matrix Pl and sequence K4.

Firstly, convert the matrix Pl into a binary matrix, where each decimal value is converted to 8-bit binary number. Every 8 bits of binary would be converted to four bases, and the conversion rules are shown in Table 1. The conversion operation takes 8 bits as a group, M × N times in total, and the rules of each conversion are determined by sequence K4. Finally, obtain the transformed DNA sequence, DNA _ A. The operating formula could be described as follow,

$$ DNA\_A(i)= DNA\_\boldsymbol{Encode}\left( dec2 bin\left( Pl(i),8\right),{K}_4(i)\right) $$
(19)
  1. Step 7.

    Generate mask sequence. Input the initial key {μ, T1} into the Skew tent map, which is described as Eq. (20). Depending on this equation, generate a chaotic random sequence T. Then obtain mask sequence M by normalizing the values in sequence T between 0 and 255,

$$ T(x)=\Big\{{\displaystyle \begin{array}{c}x/\mu, x\in \left[0,\mu \right]\\ {}\left(1-x\right)/\left(1-\mu \right),x\in \left(\mu, 1\right]\end{array}} $$
(20)
  1. Step 8.

    Perform DNA coding. Input mask sequence M and sequence K5.

Reshape the mask sequence M into a matrix Mr with size of M × N. Convert the mask matrix Mr into DNA sequence as the operations in Step 6, named DNA _ B, as Eq. (21) shows.

$$ DNA\_B(i)= DNA\_\boldsymbol{Encode}\left( dec2 bin\left( Mr(i),8\right),{K}_5(i)\right) $$
(21)
  1. Step 9.

    Perform DNA XOR Operation. Input the DNA sequencesDNA _ AandDNA _ B.

According to the computation rules showed in Table 2, two DNA sequences of the same size are subjected to the DNA XOR phase. DNA _ A is bitwise XORed with DNA _ B to produce a new DNA sequence DNA _ C. The operation could be described as follows in mathematically,

$$ DNA\_C(i)= DNA\_ XOR\left( DNA\_A(i), DNA\_B(i)\right) $$
(22)
  1. Step 10.

    Perform DNA decoding operation to transform the DNA sequence DNA _ C into a decimal sequence D. Take every four bases as a group, using the DNA rules as showed in Table 1. The selection of DNA rules is determined by the sequence K6. After all bases are converted, a binary matrix will be obtained. Then convert the binary matrix into a decimal matrix D with size of M × N by using following equation,

$$ D(i)= DNA\_\boldsymbol{Decode}\left( DNA\_C(i),K6(i)\right) $$
(23)
  1. Step 11.

    Diffusion operation. Input matrix D, the sum of plain pixel values Pi, and sequence K2.

The purpose of this step is to associate with plain image information and improve the complexity of encrypted image C by adding random sequence K2. Firstly, calculate the values of C(1), then use these values to obtain the final encrypted image C.

$$ C(1)=D(1)\oplus {K}_2(1)\oplus Pi $$
(24)
$$ C(i)=D(i)\oplus {K}_2(i)\oplus Pi\oplus C\left(i-1\right) $$
(25)

The decryption process can be thought of as the inverse of the encryption process. Firstly, bring the transmitted key sequences into 3D-CSLM, generating multiple chaotic sequences. And then use Eqs. (11)–(16) to generate the needed random sequences. The second step is the inverse process of diffusion operation. Then the DNA coding step is carried out, the decimal matrix is converted into DNA sequence. Next, the reverse operation of DNA XOR is performed. After it, start the decoding step, obtaining the decimal matrix. Finally, the image pixels are restored to their original position by reverse permutation operation. The cipher image C would be decrypted as the original image P.

5 Experimental results and security analysis

All of the following experiments are performed in a computer with an Intel(R) Core (TM) i5-10210U CPU @ 1.60GHz 2.11 GHz and 8 GB of RAM, and the operating system is Microsoft Window10. And the software is MATLAB 2019a. The plain images which are used as examples, their size is 256 × 256. The encrypted and decrypted results are showed in Figs. 8 and 9. From the figures, it’s clear that whether ordinary grayscale images, all-white image or all-black image, the image encryption algorithm shows good performance.

Fig. 8
figure 8

Experimental results: (a) Lena; (b) cipher Lena; (c) decipher Lena; (d) Peppers; (e) cipher Peppers; (f) decipher Peppers; (g) Camera; (h) cipher Camera; (i) decipher Camera

Fig. 9
figure 9

Experimental results: (a) All-Black; (b) cipher All-Black; (c) decipher All-Black; (d) All-White; (e) cipher All-White; (f) decipher All-White

5.1 Key space analysis

The key space refers to the size of the digital space that can be used as the key. A good encryption algorithm should own large enough key space to resist exhaustive attack. The key values of the algorithm proposed in this paper are composed of the initial conditions of 3D-CSLM (a1, a2, a3, x1, y1, z1) and skew tent map (μ, T1). Assume that the current computer accuracy is 10−14, the key space would be (108)14 = 10112, which is more than the required 2100 [43]. Therefore, the proposed encryption scheme is strong enough to resist exhaustive attack and has high security.

5.2 Key sensitivity analysis

Key sensitivity refers to the degree of change of encrypted and decrypted images when the key is slightly changed. An excellent encryption algorithm owns a great difference in its encryption and decryption effect with small changes in the key. Figure 10 shows the key sensitivity experiment results of the encryption algorithm in this paper. The results indicate that when the precision is 10−14, the correct decryption image could not be recovered from the cipher image with slightly modifying keys, such as a1 = a1 + 10−14, x1 = x1 + 10−14, T1 = T1 + 10−14.

Fig. 10
figure 10

a Decryption with correct key, b Decryption with a1 + 10−14, c Decryption with x1 + 10−14, d Decryption with μ + 10−14, e Decryption with T1 + 10−14

5.3 Histogram analysis

The histogram shows the distribution of image pixel values. Ideally, the histogram of the encrypted image should be evenly distributed [40]. If the pixel value distribution is not uniform, the scheme is vulnerable to statistical analysis attack. A good encryption algorithm should make the cipher histogram tend to be balanced. The histograms of Lena, Pepper and Camera are showed as Fig. 11. It can be easily seen that the image histogram tends to be uniform after encryption process, indicating that the proposed scheme can resist statistical analysis attacks.

Fig. 11
figure 11

Histograms of the plain and cipher images. a Plain Lena, b Encrypted Lena, c Plain Peppers, d Encrypted Peppers, e Plain Camera, f Encrypted Camera

5.4 Correlation analysis

There is a high correlation between the adjacent pixels of the original image, which would influence greatly the security of encryption algorithms. In order to resist the attack of statistical analysis, the proposed encryption scheme should make the correlation coefficient of adjacent pixels in the encrypted image low enough. We utilize Eqs. (26)–(29) to calculate the correlation coefficient between adjacent pixels [39].

$$ E(x)=\frac{1}{K}\sum \limits_{i=1}^K{x}_i $$
(26)
$$ D(x)=\frac{1}{K}\sum \limits_{i=1}^K{\left({x}_i-E(x)\right)}^2 $$
(27)
$$ Cov\left(x,y\right)=\frac{1}{K}\sum \limits_{i=1}^K\left({x}_i-E(x)\right)\left({y}_i-E(y)\right) $$
(28)
$$ {r}_{xy}=\frac{Cov\left(x,y\right)}{\sqrt{D(x)}\sqrt{D(y)}} $$
(29)

In the formula, x and y represent the pixel values of adjacent pixels, and K is the total number of pixels calculated. 3000 pairs of adjacent pixels in the horizontal, vertical and diagonal directions are randomly selected from the plain image and the cipher image, respectively, to compare the correlation between the adjacent pixels in the plain image and the cipher image. Figure 12 shows the pixel distribution of the plain image Lena and its encrypted image in all directions. Table 3 lists the experimental results of the correlation analysis. Table 4 compares the correlation coefficients of encrypted Lena images with other algorithms. Judging from the experimental results, the proposed algorithm is closer to zero compared with other algorithms. Thus, the proposed scheme can effectively reduce the correlation between pixels and has a better encryption effect than other schemes.

Fig. 12
figure 12

Correlation analysis diagrams: Horizontal direction of (a) plain Lena, (b) cipher Lena, Vertical direction of (c) plain Lena, (d) cipher Lena, Diagonal direction of (e) plain Lena, (f) cipher Lena

Table 3 Correlation analysis
Table 4 Comparison of correlation coefficients for encrypted Lena image

5.5 Differential attack analysis

The ideal encryption algorithm should have a significant difference in the encryption effect for the slight change of the plain image, resulting a good ability to resist the differential attack. NPCR (rate of change of pixel number) and UACI (uniform mean change intensity) are usually used to analyze the ability of the algorithm to resist differential attack [38]. The specific calculation equations are shown in Eqs. (30)–(32).

$$ NPCR=\frac{\sum \limits_{i,j}D\left(i,j\right)}{M\times N}\times 100 $$
(30)
$$ UACI=\frac{1}{M\times N}\left[\sum \limits_{i,j}\frac{\mid {C}_1\left(i,j\right)-{C}_2\left(i,j\right)\mid }{255}\right]\times 100 $$
(31)
$$ D\left(i,j\right)=\left\{\begin{array}{c}1,{C}_1\left(i,j\right)\ne {C}_2\left(i,j\right)\\ {}0,{C}_1\left(i,j\right)={C}_2\left(i,j\right)\end{array}\right. $$
(32)

where M and N are the length and width of the original image, C1 and C2 are the cipher images whose plain images only with a pixel value difference. We randomly select a pixel from the plain image and add or subtract 1 from the original pixel value to achieve a tiny change effect of the image, obtaining two plain images which are used above. For a grayscale image with the size of 256 × 256, the ideal values of NPCR and UACI are 0.996093 and 0.334635, respectively. Tables 5 and 6 list the experimental results and comparisons with other algorithms. From the tow tables, it’s easy to find that the experimental results of our encryption algorithm are closer to the ideal value than others, so this scheme owns a good anti-differential attack performance.

Table 5 Experimental results of NPCR and UACI
Table 6 Comparison results of NPCR and UACI for Lena

5.6 Information entropy analysis

Information entropy can be used to evaluate the randomness degree of the image. The greater the randomness of the image pixel distribution, the higher the security. The information entropy is calculated by,

$$ H(s)=-\sum \limits_{i=1}^{2^L-1}p\left({s}_i\right){\mathit{\log}}_2p\left({s}_i\right) $$
(33)

where L is the total number of pixels, S is the gray value, and p(si) is the probability of si occurrence. The theoretical value of information entropy of gray image is 8. Table 7 lists the information entropy results of this scheme, and Table 8 compares the information entropy of Lena image with other schemes. The experimental results in Tables 7 and 8 both show that the cipher image pixels are more random, and the proposed scheme has sufficient security.

Table 7 Information entropy of plain images and cipher images
Table 8 Comparison of information entropy of Lena

5.7 Robustness analysis

The encrypted image may receive various interference factors during transmission, which will lead to the distortion of the encrypted image. Ideal encryption algorithm should have good robustness to resist various interference attacks. To prove the robustness of the image encryption, we perform the occlusion attack and noise attack to the encrypted image, respectively. Firstly, selecting the Peppers image as an example, we used 12.5%, 25%, and 50% occlusion attacks to it. The experimental results are showed as Fig. 13. It is not difficult to find that even if a large amount of data is lost in the central part of the encrypted image, the decrypted image can still recover many details of the original image.

Fig. 13
figure 13

Occlusion attack analysis: (a) encrypted image with 12.5% data loss, (b) encrypted image with 25% data loss, (c) encrypted image with 50% data loss, (d) decrypted image of (a), (e) decrypted image of (b), (f) decrypted image of (c)

Then, perform the noise test. Noise interference was added to the encrypted images, where salt & pepper noise (SPN) with intensity of 0.01, 0.03 and 0.05 was added to the Peppers images, respectively. Figure 14 shows the experimental effect. Although adding different noise interference, the decrypted image can still clearly show the original image details. Experimental results show that the algorithm in this paper has excellent robustness and can effectively resist jamming attacks.

Fig. 14
figure 14

Noise attack analysis: (a) encrypted image with 0.01 SPN, (b) encrypted image with 0.03 SPN, (c) encrypted image with 0.05 SPN, (d) decrypted image of (a), (e) decrypted image of (b), (f) decrypted image of (c)

5.8 Algorithm complexity analysis

The time complexity analysis is carried out for the encryption operation of the image with the size of M × N. The first stage is the sequence generation stage of the chaotic system, which produces random sequences with the length of M × N. In the permutation stage, the number of calculated execution operations is M + N. The time complexity of the encoding and decoding of DNA sequence and the process of DNA XOR operation is still O(M × N). The final XOR operation is executed for M × N times in total. Overall, the time complexity of the algorithm in this paper is O(M × N).

6 Conclusions

In this work, a model of constructing high-dimensional chaotic cyclic symmetric chaotic map by using low dimensional chaotic map is proposed. The model is generated by the cyclic symmetry of one-dimensional chaotic map. According to this model, two new chaotic maps 3D-CSLM and 3D-CSCM are proposed. Phase diagram, bifurcation diagram, Lyapunov exponent and Approximate entropy are provided to evaluate that the new maps have better ergodicity, wider chaotic range and higher complexity. Then we apply the new chaotic map, 3D-CSLM, to image encryption, designing a new image encryption algorithm based on it. In this algorithm, 3D-CSLM is used to generate chaotic sequences,combined with DNA method to improve the computational efficiency, and uses DNA XOR process to complete the diffusion operation between DNA elements. Simulation experiments were performed to illustrate that the algorithm has strong anti-attack ability and can resist different types of attacks such as differential attacks and noise attacks. Performance analysis shows that the algorithm has an excellent performance in terms of key space, key sensitivity, histogram, correlation analysis and information entropy.

The above conclusions and analysis indicates the good effects and the prospects for the real world application of the model, but there are still spaces to be explored and improved. Firstly, the model is more suitable for simple 1D chaotic mapping, and there are limitations for some complex 1D chaotic mappings. In addition, the proposed algorithm is mainly for gray image. For color image, it needs to be converted into gray image first. In the future, we will further study and optimize the proposed model and algorithm.