1 Introduction

Present-day healthcare has been remodeled with the advancement in AI, smart communication networks, and IoT-based systems [3]. The IoT framework makes use of different sensors to collect a lot of information about the patient which is transmitted to cloud-based servers and processed by AI-based models as shown in Fig. 1. AI and Big Data analysis is being used increasingly for remote consultation, monitoring, and diagnosis in the e-healthcare system [20]. The application of AI in healthcare often known as Deep medicine entails the use of Deep Learning (DL) and Machine Learning (ML)-based models for automatic image classification, analysis, and segmentation [12, 21]. The AI models are also utilized for personalized medicine, drug development, and the organization of treatment strategies. The AI-based biomedical systems have been able to improve the quality of healthcare service while also decreasing its transmittal time.

Fig. 1
figure 1

Architecture of an IoT-based Healthcare with the wireless transference of data for remote diagnosis and consultation

N. S. Nariman et al. [22] present an analysis of the clinical and public health applications of ML and illustrate the critical role of data sharing and privacy. They discuss the different ML strategies like supervised, unsupervised, and reinforcement learning and identify the potential application areas like disease prediction, diagnosis, precision health, epidemic outbreak prediction, and treatment effectiveness, etc. S. K. Mohan et al. [19] propose a cardiovascular disease prediction system using IoT sensors and ML processing techniques. The system obtains health data from smart devices and can classify cardiovascular disease with 88.7% accuracy using the optimized ML techniques. M. P. Belfiore et al. [6] propose an AI-based tool called Thoracic VCAR software for COVID-19 diagnosis. The model can recognize and differentiate the ground glass opacities from consolidation and measures the volume of the affected areas using AI. Several recent works aim at integrating the IoT framework for data collection with the AI-based processing models [10, 25]. The e-healthcare systems transfer the collected medical data over to cloud-based servers through insecure communication channels that lead to security breaches [26, 28]. In the e-health systems, Computer-aided Diagnosis (CAD) is carried out for the treatment of the patient by using medical image analysis and segmentation. The medical details are transferred for remote consultation and the CAD systems are used to assist the healthcare professionals for diagnosis and monitoring of the conditions and formation of a treatment strategy. Z. F. Mohammed et al. [17] present a CAD system for the identification of acute lymphoblastic leukemia (ALL) cells. The cells are classified as normal and abnormal using various feature extraction techniques. Their system can automatically identify ALL cells with 97.45% accuracy. A. A. Abdulla [1] further present a CAD system with improved accuracy of 98.7% employing the Naïve Bayes and k-nearest neighbor classifier techniques.

Often medical images contain personal information and maintenance of their security has become a top area for research. Around 200 million healthcare records have been breached up to the year 2020 as reported by the Health Insurance Portability and Accountability (HIPPA) journal. Unysis report that there has been a 30% increase in cyberattacks with more than 192,000 COVID-19 related breaches taking place per week only in May 2020. Furthermore, IBM calculates the average economic burden incurred per data breach to be around $3.86 million. These statistical details are a motivating factor for researchers to formulate improved cryptosystems that can guarantee the security of sensitive medical data during transmission and storage through an IoT-based healthcare system.

Encryption is the most suitable method to safeguard against security breaches preventing data loss and data leak. Images are a form of unstructured voluminous data containing high redundancy and correlation and cannot be encrypted by the traditional schemes [29]. Many improved encryption techniques have been proposed in the past years based on chaos, compressed sensing, transform theory, and Deoxyribonucleic acid (DNA) encryption. Chaos is a deterministic phenomenon that is extremely contingent on initial conditions. Chaotic systems can be combined with different encryption schemes for the development of strong cryptosystems for image encryption. The chaos-based encryption architecture includes a key generation phase wherein the different chaotic systems are employed to generate a pseudorandom number sequence (PRN) [24]. The scheme includes pixel position permutation and value substitution using the PRN sequence generated by the chaotic maps. There are 1D maps like Chebyshev map and Quadratic map, and higher dimensional maps like Chen’s Hyperchaotic system that can be employed for image security. The higher dimensional maps are complex but have a larger keyspace and are more robust as compared to 1D maps [2]. F. Masood et. al., [15] present a lightweight security framework employing the Henon map, Chen’s Chaotic system, and the Brownian motion. The scheme has been evaluated using histogram analysis, entropy, time, and correlation analysis among others. The 1D chaotic map-based system is simple to implement but can be broken using phase-space estimation schemes. On the other hand, the hyperchaotic systems offer strength but have high computational complexity. Many hybrid schemes that integrate the DNA and chaos-construct schemes have been recently proposed [16]. DNA computing offers minimum power consumption, parallelism, and high storage capacity and is incorporated in many encryption schemes to increase robustness [27].

The purpose of this contribution is to present a security solution for IoT-based healthcare utilizing 3D chaos and PWLCM. The 3D chaotic map is used for PRN generation utilized in the permutation step [11]. We compute an image parameter using the sum of the pixels making the scheme adaptive. The image parameter forms an initial condition for the PWLCM which is used for key image generation [32]. The key image is then XORed with the image sequence to diffuse the pixels. Furthermore, 2-bit (DNA) and 8-bit (pixel) permutation along with crisscross diffusion is performed to increase security [35].

The contributions of the proposed technique are as follows:

  • The presented technique employs DNA encryption and hybrid chaotic maps like 3D chaotic maps and PWLCM for higher robustness. The scheme performs crisscross diffusion and XOR diffusion using a key image increasing security.

  • The scheme computes an image parameter which makes the proposed technique adaptive and more resistant to known and chosen-plaintext attacks. The scheme can resist statistical attacks as it generates uniform histograms for medical images that have a non-uniform intensity distribution.

  • The presented scheme leads to lossless medical data recovery which can facilitate data analysis and diagnosis in an IoT-based healthcare setup.

The rest of our work is formulated as follows. Section 2 summarizes the review of DNA and Chaos encryption schemes as per the recent literature. Section 3 illustrates the preliminaries used in the scheme. Section 4 presents the security model. Results are represented in Sect. 5. Section 6 shows the conclusion of the work.

2 Literature review

In this section, we discuss some recent literary works of chaos and DNA encryption that have been proposed for image data security. K. Zhan et al. [34] propose an encryption scheme built on a 4D hyperchaotic system and DNA cryptography. The 4D map is iterated to calculate a PRN sequence which is employed to globally disarrange the binary representation of the pixels. They perform DNA addition and complementation to increase the robustness of the scheme. The method has justifiable performance for natural images but generates a non-uniform histogram for medical images. Furthermore, the average NPCR and UACI for a natural image like Lena are 59.7406 and 25.0487 respectively which is much less than the theoretically ideal values revealing weakness towards differential attacks. X. Chai et al. [8] present a medical image encryption scheme that utilizes the PRN sequence generated from the 4D memristive chaotic map to carry out the diffusion and permutation operations. The scheme calculates the SHA-256 value as an initial condition of the 4D map rendering the scheme resistant to known and chosen-plaintext attacks. They use Latin square for pixel permutation and bi-directional adaptive diffusion for increased encryption effect. Their scheme has comparable performance with state-of-the-art schemes.

F. P. An et al. [4] present an encryption scheme using the cyclic encryption technique, chaos scheme, and adaptive wavelet algorithm. The scheme uses the particle swarm optimization (PSO) technique to enhance the adaptivity of the scheme and calculates SHA-1 as an index value for cyclic operation. The scheme has higher keyspace and improved adaptability and can resist chosen plaintext attacks. However, the computational complexity of the scheme is slightly higher than many recent schemes. S. S. Askar et al. [5] propose an image security framework based on the 2D economic map and the logistic map. They illustrate a key generation scheme and make use of logical XOR operation for the diffusion of image pixels. The performance of the scheme is evaluated and it is concluded that the method has a high level of security to prevent any form of attacks. T. Li et al. [14] present a scheme of image encryption employing the logistic and 2D Lorenz maps. The scheme has a large keyspace of 10112 and theoretically ideal NPCR and UACI values. Y. Wan et al. [31] design a 1D chaotic map called LLSS by combining the logistic and sine map equations and the mod operation. The generated map has no period window and completely maps to the range [0, 4] in the bifurcation diagram. They further propose an encryption scheme using the LLSS map, Qi hyperchaotic map, and DNA encryption. The scheme uses the Fibonacci transform and DNA block coding to increase the security strength of the scheme. However, the performance of the abovementioned schemes has not been evaluated on clinical images where there is a high contrast between intensity values. N. Tsafack et al. [30] propose a security module for IoT-based healthcare systems called IoHT. They design an infinite solution map called the trigonometric map and evaluate its performance. This map is designed using the existing chaotic systems like sine, cosine, and logistic map and evaluated using analysis techniques like bifurcation diagram analysis, Lyapunov exponent, and phase portrait analysis. They further propose an encryption scheme utilizing the novel trigonometric map and Mandelbrot set. They evaluate a Hamming distance between the R, G, B components of the image and the PRN sequence computed using the novel trigonometric map. This distance vector is XORed with the PRN sequence to increase the robustness of the scheme. Furthermore, Mandelbrot set is used for confusion operation by providing input to the conditional shift algorithm. The scheme is highly secure for IoHT based systems and can resist many attacks. D. Zareai et al. [33] present an encryption scheme that combines the Arnold cat map, logistic map, and image blocking technique. The blocking technique and Arnold map are used to permute the image pixels and multiple keys are formed to generate a highly secure cryptosystem. However, the schemes based on 1-D maps are vulnerable to attacks like key-space analysis and trajectory estimation algorithms.

The limitations of the reviewed works are as follows:

  • Most of the reviewed schemes are not adaptive and cannot resist the known and chosen-plaintext attacks.

  • The NPCR and UACI values for many schemes are below the theoretical maximum values indicating a lower diffusion mechanism. Furthermore, many schemes have a low keyspace and are less key sensitive.

  • Many techniques do not generate completely uniform histograms for medical images that have a non-uniform intensity distribution and hence cannot resist statistical attacks.

  • Many schemes lead to lossy recovery of the data making the scheme unacceptable for medical data security required in IoT-based healthcare.

3 Preliminaries

3.1 The 3D chaotic system

The 1D logistic equation is the simplest and most common chaotic system utilized for image encryption as shown in Eq. (1).

$${y}_{n+1}=r\times {y}_{n}\times \left( 1- {y}_{n}\right)$$
(1)

where ‘r’ is the parameter of the logistic equation. The system exhibits chaotic behavior where \(r \in \left[ 0, 4 \right], {y}_{n} \in [ 0 , 1 ]\), and 3.57 ≤ r ≤ 4. Hongjuan Liu. et al. [11] proposed the 2D version of the logistic map. In this work, we employ the 3D version of the logistic chaotic map described by P. N. Khade et al. in [13]. The system of equations for a 3D logistic chaotic map is shown in equation set (2). The 3D chaotic system involves cubic and quadratic coupling and can generate highly chaotic sequences.

$$\begin{array}{l}{f}_{i+1}=a{f}_{i}\left(1-{f}_{i}\right)+b{g}_{i}^{2}{f}_{i}+c{h}_{i}^{3}\\ { g}_{i+1}= a{g}_{i}(1-{g}_{i})+b{h}_{i}^{2}{g}_{i}+c{f}_{i}^{3}\\ {h}_{i+1}= a{h}_{i}(1-{h}_{i})+b{f}_{i}^{2}{h}_{i}+c{g}_{i}^{2}\end{array}$$
(2)

The final key sequence ‘k1’ is formed by concatenating the individual components as shown in Eq. (3).

$$k1 = [f,g,h]$$
(3)
$$k = b2dec(k1)$$
(4)

where k1 \(\in\) [0, 1] and the decimal representation are shown in Eq. (4), where, k \(\in\) [0, 255]. The 3D chaotic system generates the sequences \(f,g,and h\) that together form the sequence k1. This sequence is converted into a decimal form which generates the sequence k used for encryption.

3.2 DNA encryption

DNA computing offers tremendous advantages for image encryption which include parallelism, increased capacity for storage, and low power demand [18]. The basic DNA molecule comprises 4 nucleotide bases called Thymine (T), Guanine (G), Cytosine (C), and Adenine (A). As in the digital systems, 0 is taken complementary to 1 the base A is always complementary to T and G to C. There are 24 DNA coding techniques but only 8 follow the complementation rule called the Watson–Crick rule. In this work, we perform DNA also called 2-bit permutation using the index of the PRN sequence generated by the 3D chaotic system. The DNA sequence for an image of size M × N is 4 × M × N. The DNA encoding rules are shown in Table 1.

Table 1 DNA Encoding Rules

3.3 Piecewise Linear Chaotic Map (PWLCM)

The scheme is made adaptive by calculating a parameter ‘P’ from the sum of the pixels of the image as shown in Eq. (5).

$$P= mod\left(\left(sum\left(I\left(1:M\times floor\left(\frac{N}{2}\right)\right)\right)\right),255\right)/1000$$
(5)

where M and N represent the row and column of the image I. The parameter ‘P’ has been calculated for natural and medical test images and is in the range of 0 to 1. This parameter is taken as the initial condition for the PWLCM represented in equation set (6) [32]. This chaotic map is then used to generate the key image as shown in Eq. (7). If the input image is slightly altered the initial condition for PWLCM is changed and the resultant key image is also altered.

$${l}_{n+1}= {F}_{q}({l}_{n}) = \left\{\begin{array}{c}\frac{{l}_{n}}{q}, 0<{l}_{n}<q\\ \frac{\left({l}_{n}-q\right)}{\left(0.5-q\right)}, q\le {l}_{n}<0.5\\ {F}_{q}(1-{l}_{n}), 0.5\le {l}_{n}<1 \end{array}\right.$$
(6)

where, q ∈ (0, 0.5), \({P = l}_{k}\) ∈ (0, 1), and q = 0.25678900 [32]. The key image is used to perform pixel diffusion using the XOR operation and making it dependent on the parameter ‘P’ increases the strength of the cryptosystem towards chosen plaintext and known-plaintext attacks

$$KI=[ l \times 256]$$
(7)

where ‘KI’ is the pixel of the key image and l ∈ (0, 1). Pixels computed by the PWLCM are highly random and have a negligible correlation coefficient which is desirable for image encryption as described in [32].

3.4 Crisscross diffusion

In this work, we employ the Crisscross diffusion described in the CDCP technique as shown in [35]. The technique makes use of the XOR and mod operation to generate a cipher image block in two phases. The input image is divided into two halves called the upper half (UH) and lower half (LH) and is processed parallelly. The input decimal key sequence generated by the 3D chaotic system is taken as the key for the crisscross diffusion technique. The scheme makes use of an input key-value called \({E}_{0}= 52.\) The initial value of UH and LH are ′EandE(MN/2+1)′ respectively and are generated as shown in equation set (8), where MN is the size of the image.

$$\begin{array}{c}E(1) = bitxor(I(1), mod({E}_{0}+k(1),256))\\ E(MN/2+1) = bitxor(I(MN/2+1),mod(E(1)+K(MN/2+1, 256)))\end{array}$$
(8)

The remaining pixels of the UH and LH of the encrypted image E is simultaneously generated using the equation set (9).

$$\begin{array}{c}E(i) = bitxor(I(i), mod(E(MN/2+i-1)+k(i),256))\\ E(MN/2+i) = bitxor(I(MN/2+i),mod(E(i)+K(MN/2+i, 256)))\end{array}$$
(9)

where ′i′ is from index value 2 to MN/2 and ′E(i)′ represents one pixel of the encrypted image E and ′k(i)′ is the corresponding key-value generated by the 3D chaotic system. The final diffused image ‘Z’ is generated by the following set of equations. The initial values of the UH and LH are Z (1) and Z(MN/2 + 1) respectively and are calculated as shown in equation set (10).

$$\begin{array}{c}Z(1) = bitxor(E(1), mod(E(MN)+k(1),256))\\ Z(MN/2+1) = bitxor(E(MN/2+1),(mod(Z(1)+K(MN/2+1), 256)))\end{array}$$
(10)

The rest of the image pixels are computed by the equations set (11) wherein the pixel values are calculated in a crisscross manner using the bitxor and mod operations.

$$\begin{array}{c}Z(j) = bitxor(E(j), mod(Z(MN/2+j-1)+k(j),256))\\ Z(MN/2+j) = bitxor(E(MN/2+j),(mod(Z(j)+K(MN/2+j), 256)))\end{array}$$
(11)

where j is the index ranging from 2 to MN/2 and ‘Z(j)’ represents one pixel of the final diffused image Z and k(j) is the corresponding key-value generated by the 3D chaotic system.

4 Proposed method

In this section, we present the proposed security module for medical images transferred and stored in IoT-based healthcare. The input image is converted to its 2-bit DNA sequence form using one of the DNA encoding techniques. The 3D chaotic map is iterated using Eq. (2) and the PRN key sequence is generated by Eq. (4). The DNA sequence is permuted using the index of the key sequence. The decimal equivalent of the permuted DNA sequence is retrieved and its XOR diffusion is done using the key image. The key-image is generated by the PWLCM and the parameter P is calculated from the input image achieved by iterating the Eqs. (57). The index of the decimal representation of the PRN generated by the 3D chaos is calculated and employed for the crisscross diffusion of the image. Finally, the pixel permutation is carried out again using the sorted PRN sequence. The image encryption process is shown in Algorithm 1.

figure a

Algorithm 2 describes the image decryption process in detail.

figure b

5 Results and discussion

To evaluate the proposed method, we performed many experiments on the grayscale and color natural and medical images. The Windows 10 Operating system has been utilized with MATLAB R2017a (version 9.2.0 538,062). For all the experiments test images are resized to 256 × 256. The medical images have been retrieved from the OPENi image database represented in Fig. 2. For performance comparison purposes, we have taken natural test images as well. It has been demonstrated that the proposed method produces state-of-the-art results for natural and medical images and can be effectively used for an IoT-based healthcare system.

Fig. 2
figure 2

Source for medical Images: OPENi Database retrieved from https://openi.nlm.nih.gov/index.php/)

Test images (

5.1 Encryption evaluation metrics

The encryption algorithm has been evaluated using histogram analysis, key sensitivity analysis, statistical analysis, and differential analysis. The encryption technique must combat all the attacks like differential attacks, brute-force, and statistical among others. Furthermore, we compare the performance of the scheme with some recent schemes and can conclude that the proposed model is highly secure and implementable.

  1. i.

    Uniform Histogram and Visual Disguise

Histograms of the images generated by the proposed cryptosystem are completely uniform as shown in Fig. 3. The histogram H \(\left({\mathrm{r}}_{i}\right)\) of an image is given by the following Eq. (12):

$$H\left({r}_{i}\right)= {n}_{i}$$
(12)

where \({\mathrm{r}}_{i}\) is the ith intensity value and \({\mathrm{n}}_{\mathrm{i}}\) represents the number of pixels in the image with an intensity value equal to \({\mathrm{r}}_{i}\). As shown from Fig. 3 the generated histogram of the encrypted image is uniform and the encrypted image has a high visual disguise. The variance of histograms is also evaluated for the test Lena image to quantitatively evaluate the uniformity of the histogram. The security of the cryptosystem is more when the variance of the histogram is lower. The variance of the histogram of different images is shown in Table 2 and a comparison for the Lena image has been shown in Table 3. The results for the color Lena and Peppers images are shown in Fig. 4.

Fig. 3
figure 3

a Plain Images, (b) Encrypted Images (c) Histogram of Encrypted Images

Table 2 Variance of Histogram of cipher images
Table 3 Comparison of variance of the histogram of Lena Image
Fig. 4
figure 4

a, f 256 × 256 size Color Lena and Pepper Images, (b, g) Encrypted Images, (c-e, h-j) Histograms of R, G, and B channels of Color Lena and Peppers image respectively

  1. ii.

    Correlation Coefficient and PSNR

The correlation coefficient (CC) gives a measure of the redundancy of the pixels in the image. The plain image has high redundancy but the encrypted image should have a very low CC value. This will indicate minimum redundancy in the encrypted image. We evaluate the horizontal (C_H), vertical (C_V), and diagonal (C_D) correlation coefficient of plain and encrypted images as shown in Table 4 and comparison in Table 5. The PSNR value for encrypted images should be less than 10 as shown in Table 6. The correlation C has been described as shown in Eq. (13) and PSNR is shown in Eq. (14). The correlation analysis for the Lena image is shown in Fig. 5.

Table 4 Correlation Coefficient of the plain and encrypted images
Table 5 Comparison of Correlation Coefficients for Lena Image
Table 6 Comparison of PSNR values
Fig. 5
figure 5

Correlation analysis for plain and encrypted Lena image. (a, c) Row, and Column plot of Correlations of the plain Lena image and (b, d) Row, and Column plot of correlations of the encrypted image

$$C= \frac{n\left(\sum xy\right)- \left(\sum x\right)\left(\sum y\right)}{\sqrt{[}n\sum {x}^{2 }-{\left(\sum x\right)}^{2} ][n\sum {y}^{2 }-{\left(\sum y\right)}^{2} ]}$$
(13)
$$PSNR=20\times {\mathit{log}}_{10}\left(\frac{{(255)}^{2}}{\surd MSE}\right) dB$$
(14)
$$Where MSE =\frac{1}{MN}\sum_{i=1}^{M}\sum_{j=1}^{N}{(I\left(i,j\right)-{I}^{^{\prime}}(i,j))}^{2}$$
  1. iii.

    Diffusion Analysis and Information entropy Analysis

For diffusion analysis, we employ the parameters called NPCR and UACI. In the proposed scheme all the images have NPCR and UACI values of more than 99.55% and 33.35% respectively. The mathematical expression for NPCR and UACI have been shown in Eqs. (15) and (16) respectively. The comparison of NPCR and UACI values with state-of-the-art schemes has been shown in Table 7 and Table 8 respectively.

Table 7 Comparison of NPCR with state-of-the-art schemes
Table 8 Comparison of UACI values
$$\begin{array}{c}D\left(i,j\right)= \{0, if S1\left(i,j\right)=S2(i,j) 1, if S1\left(i,j\right)\ne S2(i,j)\\ NPCR1\left(S1,S2\right)=\sum i,j \frac{D\left(i,j\right)}{M\times N}\times 100\%\end{array}$$
(15)
$$UACI=\frac{1}{M\times N}\left(\sum_{i,j}\frac{\left|{C}_{1}\left(i,j\right)-{C}_{2}\left(i,j\right)\right|}{255}\right)\times 100\mathrm{\%}$$
(16)

The information entropy H(R) of the input source R can be seen in Eq. (17).

$$H\left(R\right)= \sum_{i=0}^{M-1}Prob({R}_{i})\mathit{log}\frac{1}{{(R}_{i})}$$
(17)

Here M gives the total symbols \({\mathrm{R}}_{\mathrm{i}}\in \mathrm{R}\). Information entropy is a measure of the randomness of encrypted images. We see that the value of entropy is more than 7.99 as shown in Table 9 and the comparison is shown in Table 10. The scheme is also tested for salt and pepper noise attack and Gaussian noise attack for Lena and Peppers image, the Mean Square Error (MSE) and PSNR values of the decrypted images are shown in Table 11. The results of the colored Lena and Peppers image are shown in Table 12. Furthermore, we have evaluated the scheme on 50 medical images retrieved from the Kaggle platform (kaggle.com/pranavraikokte/covid19-image-dataset/). The dataset contains chest X-ray scans of three classes i.e., normal, covid-19, and viral pneumonia. From the original dataset, we have formed a new dataset containing 50 images with the first 20 images taken each from the Covid-19 and normal classes and the first 10 images taken from the viral pneumonia class. The average values of the evaluation parameters are shown in Table 13.

Table 9 NPCR, UACI and Entropy values for different Test Image
Table 10 Comparison of Entropy values
Table 11 Noise Attack for Lena Image
Table 12 Evaluation parameters for colored images
Table 13 Average values of the evaluation parameters of 50 medical images

6 Conclusion

In this work, we present a robust image encryption scheme for the prevention of cyberattacks for IoT-driven e-healthcare systems. The scheme can resist the known and chosen-plaintext attacks as it generates a parameter from the input image pixels. The parameter forms the initial conditions for the chaotic maps and is used for the generation of key images and key sequences used for image confusion and diffusion. The scheme employs DNA encryption and crisscross-diffusion to enhance the level of security provided. The 3D chaotic logistic map is used to generate PRN sequences for 2-bit and 8-bit permutations and as key to the crisscross diffusion mechanism. Furthermore, the parameter from the input image is calculated and taken as the initial condition of the PWLCM. The key image generated with the map is used to diffuse the image pixels and increase security. The scheme is resistant to statistical, entropy, and differential analysis. The average NPCR and UACI values are equal to 99.5996 and 33.499 respectively. The average entropy is 7.9971 and the average Peak Signal to Noise Ratio is 7.4756 which is found to be comparable to most of the state-of-the-art schemes. Furthermore, for the Lena image, the variance of histogram equals 237.2784, and the horizontal, vertical, and diagonal correlations are equal to 0.9494, 0.9667, and 0.9366 respectively. However, the scheme takes around 3.9 s to encrypt an image of size 256 × 256. In the future, we would like to improve the execution time of the scheme by developing an improved chaotic map for the fast generation of highly chaotic key sequences that can produce robust encrypted images.