
Citation: Nick K. Olrichs, J. Bernd Helms. Novel insights into the function of the conserved domain of the CAP superfamily of proteins[J]. AIMS Biophysics, 2016, 3(2): 232-246. doi: 10.3934/biophy.2016.2.232
[1] | Carolyn E. Jones, Miranda M. Lim . Phasic Sleep Events Shape Cognitive Function after Traumatic Brain Injury: Implications for the Study of Sleep in Neurodevelopmental Disorders. AIMS Neuroscience, 2016, 3(2): 232-236. doi: 10.3934/Neuroscience.2016.2.232 |
[2] | Wanda M. Snow, Brenda M. Stoesz, Judy E. Anderson . The Cerebellum in Emotional Processing: Evidence from Human and Non-Human Animals. AIMS Neuroscience, 2014, 1(1): 96-119. doi: 10.3934/Neuroscience.2014.1.96 |
[3] | Masao Ito, Naoko Nisimaru . Cerebellar Control of Defense Reactions under Orexin-mediated Neuromodulation as a Model of Cerebellohypothalamic Interaction. AIMS Neuroscience, 2014, 1(1): 89-95. doi: 10.3934/Neuroscience.2014.1.89 |
[4] | Jarrod Moss . Introduction to AIMS Neuroscience Special Issue “What Function Does the Anterior Insula Play in Human Cognition?”. AIMS Neuroscience, 2015, 2(3): 153-154. doi: 10.3934/Neuroscience.2015.3.153 |
[5] | Sarah Ly, Nirinjini Naidoo . Neuroenhancement and the Developing Brain: Commentary on the AIMS Neuroscience Special Issue on “Neuroenhancers”. AIMS Neuroscience, 2015, 2(4): 229-235. doi: 10.3934/Neuroscience.2015.4.229 |
[6] | UCHEWA O. Obinna, EMECHETA S. Shallom, EGWU A. Ogugua, EDE C. Joy, IBEGBU O. Augustine . Neuromodulatory roles of PIPER GUINEENSE and honey against Lead-Induced neurotoxicity in social interactive behaviors and motor activities in rat models. AIMS Neuroscience, 2022, 9(4): 460-478. doi: 10.3934/Neuroscience.2022026 |
[7] | Andrea J. Rapkin, Steven M. Berman, Edythe D. London . The Cerebellum and Premenstrual Dysphoric Disorder. AIMS Neuroscience, 2014, 1(2): 120-141. doi: 10.3934/Neuroscience.2014.2.120 |
[8] | Galina V. Portnova, Michael S. Atanov . Nonlinear EEG parameters of emotional perception in patients with moderate traumatic brain injury, coma, stroke and schizophrenia. AIMS Neuroscience, 2018, 5(4): 221-235. doi: 10.3934/Neuroscience.2018.4.221 |
[9] | Christopher D. Chambers, Eva Feredoes, Suresh D. Muthukumaraswamy, Peter J. Etchells . Instead of “playing the game” it is time to change the rules: Registered Reports at AIMS Neuroscience and beyond. AIMS Neuroscience, 2014, 1(1): 4-17. doi: 10.3934/Neuroscience.2014.1.4 |
[10] | O. J. Onaolapo, A. Y. Onaolapo . The 21st Century Cerebellum: An Evolution of Cognitive Functions, Connections, Disorders, and Pharmacotherapeutic Modulation. AIMS Neuroscience, 2017, 4(4): 189-222. doi: 10.3934/Neuroscience.2017.4.189 |
With rapid development of the Internet, information technology, and digital communications, the status of multimedia data transmission is increasing in modern society. Image is an important information carrier in human life to display or describe directly the objective phenomena. In recent years, owing to leakages of digital image information, serious consequences have occurred. Thus, image encryption protection has become particularly important. Traditional encryption algorithms store and encrypt data as a one-dimensional string. As to images, due to the large amount of data, the calculation of encryption schemes is complicated, and the high correlation between the adjacent pixels requires a sufficient long keystream for a high security level. Therefore, a new encryption algorithm needs to be proposed for the secure communication of images.
A chaotic system refers to a deterministic system with seemingly random irregular movements, and its behavior is uncertain, unrepeatable, and unpredictable. Chaotic system is sensitive to initial conditions, and exhibits pseudorandom, ergodicity, and aperiodicity [1]. The combination of an image encryption algorithm and a chaotic system can effectively improve security and anti-cracking ability. Therefore, chaotic systems have been widely used in image encryption algorithms since they were proposed. For example, in [2], an algorithm with one-time-keys was proposed to resist brute-force attack. Albahrani et al. [3] designed a block method based image encryption with a cross map as a kind of chaotic map. To improve the robustness against common attacks, Yu et al. [4] proposed a new image encryption algorithm based on a short-time fractional Fourier transform (FrFT) and a hyperchaotic system. The diffusion operation and feedback system were designed to improve the anti-interference ability. Moreover, the use of the hyperchaotic system increases the key space and enhances sensitivity to all keys. In [5], a color image encryption algorithm was proposed by using a hyperchaotic system, of which can compress and encrypt an image according to the requirements of the reconstructed image quality. To hide efficiently the pixel distribution for the plain image, DNA based method was employed in [6] with the help of DNA random encoding rules. A generalized chaotic map and operation of fractional-order edge dection were applied into image encryption algorithm [7]. Besides of time domain encryption, Borujeni and Eshghi [8] suggested a hybrid domain based image encryption scheme including both frequency and time domains. Hybrid chaotic systems [9,10] were also be designed and applied for color image encryption Liu et al. [11] designed a new pathological image encryption scheme to ensure the secure transmission of pathological images in a telemedicine system. To effectively resist the plaintext attacks, Feng et al. [12] combined the discrete logarithm with a memristor-based chaotic system and proposed an image reconstruction encryption algorithm. The finite multiplication group used in this study has up to 128 generators, which can expand the key space and enhance the ability of the image encryption algorithm in resisting plaintext attacks. To compress multiple images into a small amount of data for the convenience of image transmission, Huang et al. [13] presented a nonlinear optical image encryption scheme that can encrypt images in both spatial and frequency domains, in which phase truncation and bitwise exclusive-OR (XOR) operation improve the robustness of the multi-image encryption scheme. In [14], a simple and efficient image encryption scheme was designed based on multiple piece-wise linear chaotic map systems. Rotational permutation operations and block diffusion operations were implemented to reach good encryption effect. Wang and Gao [15] studied the application of matrix semi-tensor product theory in a new chaotic image encryption with a Boolean network, scrambling, and diffusion. A new method of global pixel diffusion [16] by chaotic sequences was proposed for image encryption with a high security. In [17], a three-dimensional bit-level based image encryption algorithm was presented. Both the Rubik's cube method and the bit-level encryption principle were taken to realize scrambling operation. Some other image encryption algorithms [18,19,20] also show good performance by different hyeer-chaotic system, coupled map, and 2D chaotic map.
Arnold transformation is a common image pixel scrambling algorithm used to reduce the high correlation between pixels. Based on Arnold transformation and singular value decomposition (SVD) in the fractional Hartley domain, a new phase image encryption scheme was proposed in [21]. Liu et al. [22] suggested a color image encryption algorithm using Arnold transformation and color mixing operation in the discrete cosine transform (DCT) domain. Arnold transformation was used to scramble the pixels of the three channels in color image, and the DCT was used to change the pixel values in the entire spatial distribution. Sui and Gao [23] proposed a color image encryption scheme using Gyrator transform and Arnold transformation, which has two security levels to protect image content. In the encryption and decryption processes, the rotation angle of the gyrator, number of iterations in Arnold transformation, parameters of the chaotic mapping, and generated accompanying phase function were all treated as the secret keys, thereby improving the security of the system. In [24], an optical color image encryption technique based on Arnold transformation and interferometry was proposed. Color image was decomposed into three channels R, G, B, and then each channel was encrypted into two random phase masks using Arnold transformation and interference method. Chen [25] used Arnold transformation to perturb the matrix pixels by encoding a single parameter, to form an image similar to color noise and to reduce the key space for storage and transmission applications. Wang et al. [26] suggested a fast algorithm for image encryption by parallel computing, in which parallelism of diffusion is designed to implement fast operation.
According to the classification of cryptosystems, cryptography can be divided into symmetric cryptography [27,28,29,30] and asymmetric (public key) cryptography [31,32,33,34,35,36]. In an asymmetric encryption algorithm, different keys are used for encrypting and decrypting, thereby realizing the nonlinearity of the algorithm, higher security, and convenient implementation of digital signature and verification. In [33], a scalable method of asymmetric image compression and encryption was proposed based on a discrete wavelet transform (DWT) and nonlinear operations in the cylindrical diffraction domain. DWT reduces the amount of data and is more conducive to data transmission. To enhance an encryption scheme with a larger key space than traditional cryptographic systems in the FT and FrFT fields, Ren et al. [37] designed an asymmetric image encryption scheme using a phase-truncated discrete multi-parameter FrFT. After a pixel scrambling and a random-phase mask, the asymmetric ciphertext with stable white noise was obtained through phase truncation.
In order to reduce the redundancy of image transmission, compression was also considered in image encryption. For example, Chai et al. [38] proposed a visually meaningful cipher image encryption by using technology of compressive sensing. Chaotic system, kronecker product, and singular value decomposition were all combined to produce the measurement matrix. In [39], a new chaotic color image encryption scheme was presented by multi-embedding strategy and compressive sensing. Each channel of R, G, and B were compressed to obtain measurements. Although there are many new image encryption algorithms have been published, some of them still have defects, for example, (i) The keystream is generated only dependent on the secret keys; (ⅱ) It is hard to ensure the secure management of keys. In view of this, this paper combines quantum logistic map, Arnold transformation, and diffusion technology together with RSA to design an asymmetric encryption scheme, aiming to carry out high security, strong anti-attack and more suitable for network transmission. The innovations of this paper are: 1) Extract the text information of the plain image to be plain message. 2) Generate the cipher message by RSA and produce the initial conditions for quantum system by a new mathematical model. 3) Update the initial conditions by the text information of the plain image to enhance the plaintext dependence. 4) Build an end-to-start cyclic modulo diffusion operation.
The rest of this article is organized as follows. Section 2 briefly introduces the public key RSA algorithm, Arnold transformation, and quantum logistic map. Section 3 gives the image encryption and decryption processes. Section 4 displays some experimental results. Section 5 discusses the various analytical tests of the encryption results. Section 6 presents the conclusions of this study.
The public key RSA cryptosystem was proposed in 1978 by Rivest, Shamir, and Adleman. RSA encryption algorithm is an asymmetric encryption structure, which can complete the decryption operation without directly passing the keys. This method ensures security and avoids the risk of keys being cracked, which typically happens when keys are transmitted directly. In the whole encryption process, the key and algorithm are independently separated. Therefore, the key can be distributed more effectively. The specific description of the RSA algorithm is as follows:
Step 1: Randomly and secretly choose two large prime numbers $p$ and $q$.
Step 2: Compute $n = p \times q$, $\varphi (n) = (p - 1)(q - 1)$, where $\varphi (n)$ is the Euler function of $n$.
Step 3: Randomly select $e$ in range $1 < e < \varphi (n)$, satisfying $\gcd (e, \varphi (n)) = 1$, where $e$ and $\varphi (n)$ are prime numbers.
Step 4: Calculate the decryption key $d$, where $e \times d = 1\bmod (\varphi (n))$.
Step 5: Open integers $n$ and $e$, and keep $d$ in secret.
Step 6: Encrypt plaintext $m$ to be ciphertext $c$ by $c = {m^e}\bmod n$.
Step 7: Decrypt ciphertext $c$ to be plaintext $m$ by $m = {c^d}\bmod n$.
Logistic map is a classical mathematical model used to study the behaviors of complex systems, such as dynamic systems, fractals, and chaos. In physics, if a physical quantity has the smallest indivisible basic unit, then this physical quantity is quantized, and the smallest unit is called a quantum. The quantum state is introduced into the chaotic system to form a quantum logistic map. The coupling of the system and harmonic oscillator path will produce a quantum logistic map with quantum correction. Akhshani et al. [40] applied quantum logistic map for image encryption, and its quantum logistic map is defined as,
$\left\{ xn+1=r(xn−|xn|2)−rynyn+1=−yne−2β+e−βr[(2−xn−x∗n)yn−xnz∗n−x∗nzn]zn+1=−zne−2β+e−βr[2(1−x∗n)zn−2xnyn−xn} \right.$
|
(1) |
where $\beta $ and $r$ represent the dissipation parameter and adjustable parameter, respectively, and $x_n^*$, $z_n^*$ are the conjugate complex numbers of ${x_n}$ and ${z_n}$, respectively. When one sets $r = 3.99$ and $\beta \geqslant 6$, the quantum logistic map shows higher chaotic characteristics [40]. So, in this study, $r = 3.99$ and $\beta = 7$ are set with all initial parameters be real numbers. As pointed by [40]: classical nonlinear chaotic systems are famous because of their exponential sensitivity to each initial condition. However, the linearity of quantum mechanics not only shows such sensitivity to each initial condition, and also the Heisenberg uncertainty principle (HUP) prevents us from talking about initial conditions in quantum mechanics. Therefore, for this interesting property, quantum logistic map can also be used in cryptography, for example image encryption. In view of these good characteristics of quantum logistic map, many image encryption algorithms [41,42,43] based on it have been proposed.
Arnold transformation is a scrambling operation that can randomly change the pixel position for an image, which is also called a cat map. By rearranging the pixels in a digital image matrix, the originally meaningful image will become a meaningless image. Arnold transformation is defined as follows:
$\left[ xn+1yn+1 \right] = \left[ {1112 } \right]\left[ xnyn \right]\bmod N$
|
(2) |
By replacing the matrix of above Arnold transformation, a generalized Arnold transformation can be obtained, which is defined as
$\left[ xn+1yn+1 \right] = \left[ {1baab+1 } \right]\left[ xnyn \right]\bmod N$
|
(3) |
where $a, b$ and $N$ are positive integers, $({x_n}, {y_n})$ are the coordinates of the pixel in the original image, and $({x_{n + 1}}, {y_{n + 1}})$ are the coordinate positions after transformation. Arnold transformation is a reversible mapping, and its corresponding inverse transformation is defined as
$\left[ xn+1yn+1 \right] = \left[ {ab+1−b−a1 } \right]\left[ xnyn \right]\bmod N$
|
(4) |
Arnold transformation is reversible, and it is easy to be implemented. Therefore, this study combines Arnold transformation with the quantum logistic system and other technologies to design a new image encryption scheme.
This study integrates the quantum logistic map, the RSA algorithm, the Arnold transformation, and the diffusion operation to realize a new asymmetric image encryption scheme. The framework of the proposed image encryption scheme is shown in Figure 1. The detail encryption steps are as follows:
Step 1: Select large prime numbers $p$ and $q$, and calculate public key $e$ and private key $d$.
Step 2: Read plain image $P$ with size $M \times N$.
Step 3: Extract the text information of the image, i.e., $R = \sum\nolimits_{i = 1}^M {\sum\nolimits_{j = 1}^N {P(i, j)} } $, for public information.
Step 4: Select three plain parameters ${a_i}(i = 1, 2, 3)$ and encrypt them with the public key to obtain the public parameters ${c_i} = a_i^e\bmod n$.
Step 5: Calculate the initial values: ${x_0} = ({c_1} + {a_1})/({k_1}{c_1} + {k_2}{a_1})$, ${y_0} = ({c_2} + {a_2})/({k_1}{c_2} + {k_2}{a_2})$, ${z_0} = ({c_3} + {a_3})/({k_1}{c_3} + {k_2}{a_3})$, where ${k_1} = 3, {k_2} = 5$.
Step 6: Update the initial values: ${x'_0} = \bmod ({x_0} + {R_1}, 1)$, ${y'_0} = \bmod ({y_0} + {R_1}, 1)$, ${z'_0} = \bmod ({z_0} + {R_1}, 1)$, where ${R_1} = (R + 1)/(255 \times M \times N + 1)$.
Step 7: The updated initial values are substituted into quantum logistic map. After discarding the first 500 values of the sequence, the chaotic sequences $x, y, z$ are obtained.
Step 8: Process the sequences as,
$\left\{ X=mod(fix(x(1:M)×1014),256)Y=mod(fix(y(1:N)×1014),256)Z=mod(fix(z×1014),256) \right.$
|
(5) |
Step 9: Perform Arnold scrambling operation on the plain image to obtain the scrambled image . The values of , , and in the Arnold map are calculated as
$ma = \bmod (sum(X), mc) + 1$ | (6) |
$mb = \bmod (sum(Y), mc) + 1$ | (7) |
where $mc = \bmod (sum(Z), R) + 1$.
Step 10: For the image $A$, perform XOR diffusion operation by row for it to obtain image $B$ as,
${B_i} = {A_i} \oplus {X_i}$ | (8) |
where $i = 1, 2, \cdots, M$.
Step 11: Perform diffusion under modulo operation by row again to obtain image $C$ as,
${C_i} = \bmod ({B_i} + {Z_i} + {C_{i - 1}}, 256)$ | (9) |
where $i = 1, 2, \cdots , M$. ${C_0}$ is a constant.
Step 12: Connect the last row of image $C$ with the first row of $C$ and perform diffusion under modulo operation for rows again to obtain image $D$ as,
${D_1} = \bmod ({C_1} + {Z_1} + {C_M}, 256)$ | (10) |
${D_i} = \bmod ({C_i} + {Z_i} + {D_{i - 1}}, 256)$ | (11) |
where $i = 2, 3, \cdots, M$.
Step 13: The column direction is similar to the row direction. For image $D$, take the column as a unit and perform the XOR diffusion operation on the corresponding component of each column and $Y$ to obtain image $E$ as,
${E_j} = {D_j} \oplus {Y_j}$ | (12) |
where $j = 1, 2, \cdots, N$.
Step 14: Perform modulo diffusion to each column to obtain image $F$ as,
${F_j} = \bmod ({E_j} + {Z_j} + {F_{j - 1}}, 256)$ | (13) |
where $j = 1, 2, \cdots , N$. ${F_0}$ is a constant.
Step 15: Connect the last column of the image $F$ with the first column of $F$ and perform modulo diffusion in the column direction again to obtain the cipher image $G$ as,
${G_1} = \bmod ({F_1} + {Z_1} + {F_N}, 256)$ | (14) |
${G_j} = \bmod ({F_j} + {Z_j} + {G_{j - 1}}, 256)$ | (15) |
where $j = 2, 3, \cdots, N$.
The receiver has a cipher image $G$, public parameters ${c_1}, {c_2}, {c_3}, r, \beta $, and $R$, and private key $(d, n)$. Figure 2 is the decryption flowchart of the proposed algorithm. The specific steps of decryption are as follows:
Step 1: Use the private key $(d, n)$ to decrypt the public parameters ${a_i} = c_i^d\bmod n$.
Step 2: Read the cipher image $G$ with size $M \times N$.
Step 3: Calculate the initial value ${x_0} = ({c_1} + {a_1})/(3{c_1} + 5{a_1})$, ${y_0} = ({c_2} + {a_2})/(3{c_2} + 5{a_2})$, ${z_0} = ({c_3} + {a_3})/(3{c_3} + 5{a_3})$.
Step 4: Update the initial values ${x_0}^\prime = \bmod ({x_0} + {R_1}, 1)$, ${y_0}^\prime = \bmod ({y_0} + {R_1}, 1)$, ${z_0}^\prime = \bmod ({z_0} + {R_1}, 1)$, where ${R_1} = (R + 1)/(255 \times M \times N + 1)$.
Step 5: By iterating quantum logistic map, and discarding the first 500 values of the sequence, obtain the chaotic sequence $x', y', z'$.
Step 6: Use Eq (5) to process the sequence and get $X', Y', Z'$.
Step 7: Calculate the two control parameters $ma'$ and $mb'$ of the Arnold map using Eqs (6) and (7).
Step 8: Use images $G$ and $Z'$ to perform the inverse modulo operation of the corresponding columns to derive image $F'$ as,
${F_j}^\prime = \bmod ({G_j} - {G_{j - 1}} - {Z_j}^\prime , 256)$ | (16) |
${F_1}^\prime = \bmod ({G_1} - {Z_1}^\prime - {F_N}^\prime , 256)$ | (17) |
where $j = 2, 3, \cdots, N$.
Step 9: Use image $F'$ to perform the inverse modulo operation of the corresponding columns to derive image $E'$ as,
${E_j}^\prime = \bmod ({F_j}^\prime - {F_{j - 1}}^\prime - {Z_j}^\prime , 256)$ | (18) |
where $j = 1, 2, \cdots , N$. ${F'_0}$ is a constant.
Step 10: Use images $E'$ and $Y'$ to perform the XOR diffusion operation of the corresponding column to derive image $D'$ as,
${D_j}^\prime = {E_j}^\prime \oplus {Y_j}^\prime $ | (19) |
where $j = 1, 2, \cdots, N$
Step 11: The row direction is similar to the column direction. Use $Z'$ to perform the inverse modulo diffusion operation in the row direction, and then use $X'$ to perform the XOR diffusion of the corresponding rows to derive image $A'$.
Step 12: According to the parameter values $ma'$ and $mb'$, use Eq (4) to perform the inverse operation of the Arnold map and obtain the plain image $P'$.
Grayscale and color images (some from the USC-SIPI database) are taken for testing. Windows 10 operating system is used with an AMD Ryzen 7 1700 8-core processor and 8 GB memory, and the simulations are performed on MATLAB R2017b. Table 1 shows the values of each parameter in our test. Among them, ${a_1}, {a_2}, {a_3}, q, p$ and $d$ are the private keys, as well as $e, r, \beta , {c_1}, {c_2}$ and ${c_3}$ are the public keys. Figures 3 and 4 present the test images and their corresponding cipher images, respectively. So, no useful information about the plain image can be seen from these cipher images. Figure 5 shows the corresponding correct decrypted images. So, the proposed cryptographic scheme can be applied to both grayscale and color images. Table 2 shows the time required to encrypt images of different sizes. As we see that our scheme can be implemented by a fast way.
Parameter | Value | Parameter | Value |
$q$ | 1733 | ${a_2}$ | 15 |
$p$ | 1697 | ${a_3}$ | 20 |
$e$ | 163 | $r$ | 3.99 |
${a_1}$ | 7 | $\beta $ | 7 |
$d$ | 2,757,259 | ${c_1}$ | 2,855,219 |
${c_2}$ | 164,340 | ${c_3}$ | 128,682 |
Image size | Initial value generation | Confusion-diffusion encryption | Total time |
256 × 256 | 0.014931 | 0.337695 | 0.394836 |
512 × 512 | 0.059334 | 0.699589 | 0.735226 |
Histogram analysis [44,45] shows how pixels are distributed in an image by plotting the number of observations for each brightness level. The frequency distribution of pixel values implies the statistical correlation between the plain images and the cipher images. A good image encryption system should have the ability to hide correlations; that is, the frequency distribution of the cipher on the pixel value is uniform, and the attacker cannot infer the plain information from it. To verify the uniformity of the pixel distribution of the proposed encryption algorithm, Figure 6 (a)–(c) and (d)–(f) show the histograms of the grayscale and encrypted images, respectively. Figure 7 is the histogram of the Baboon color image with three channels. To further evaluate the uniformity of the histogram, the statistical chi-square test was also performed, which is defined as,
${\chi ^2} = \sum\limits_{L = 0}^{255} {\frac{{{{({o_L} - {e_L})}^2}}}{{{e_L}}}} $ | (20) |
where $L$ is the intensity level, ${o_L}$ and ${e_L}$ are the observation reference and expected reference of the $L$ gray level in the cipher image, respectively. The results of evaluating the uniformity of cipher images based on the chi-square values are shown in Table 3. Table 4 shows the chi-square comparison results. The smaller the chi-square value, the more uniform the pixel distribution and the higher the security. The histogram of the cipher image is evenly distributed, and the chi-square value is much smaller than the value of the plain image, which effectively improves resistivity against statistical attacks.
Image | Plain-image | Cipher-image | Results |
Goldhill | 161621.1816 | 279.9395 | Pass |
Sailboat | 179772.6055 | 240.8535 | Pass |
Peppers (Grayscale) | 138836.1738 | 287.2168 | Pass |
Sun | 319180.5827 | 273.1582 | Pass |
Baboon | 101863.4615 | 266.8301 | Pass |
Peppers (Color) | 340999.4414 | 246.8555 | Pass |
Reference | Baboon | ||
R | G | B | |
This Paper | 227.05 | 214.01 | 254.08 |
Ref. [46] | 287.56 | 227.89 | 259.78 |
Another measurement of statistical analyses is correlation [47,48,49,50]. For a natural digital image, there is a strong correlation between adjacent pixels in the horizontal, vertical, and diagonal directions. The lower correlation of adjacent pixels in a cipher image, the better performance of an encryption algorithm. A good cryptographic scheme should eliminate this correlation in a quantitative way to ensure security. The correlation coefficient is defined as
${R_{x'y'}} = \frac{{\operatorname{cov} (x', y')}}{{\sqrt {D(x')} \sqrt {D(y')} }}$ | (21) |
$\operatorname{cov} (x', y') = \frac{1}{N}\sum\limits_{i = 1}^N {({{x'}_i} - E(x'))({{y'}_i} - E(y'))} $ | (22) |
$E(x') = \frac{1}{N}\sum\limits_{i = 1}^N {{{x'}_i}} $ | (23) |
$D(x') = \frac{1}{N}\sum\limits_{i = 1}^N {({{x'}_i} - E(x')} {)^2}$ | (24) |
where ${R_{x'y'}}$ represents the correlation coefficient, $x'$ and $y'$ are the gray values of two adjacent pixels, and $N$ is the total logarithm. Figure 8 shows the correlation of three directions of the grayscale image sailboat. Tables 5 and 6 show the correlation coefficient values of the test images. Table 7 shows the correlation coefficient comparisons of Baboon. The data in the tables show that the correlation coefficient of the plain images is close to 1, which means that the correlation coefficient between adjacent pixels is very strong. By using the proposed scheme, the values become close to 0, which means that our scheme can eliminate the strong correlation.
Image | Plain-image | Cipher-image | ||||
Horizontal | Vertical | Diagonal | Horizontal | Vertical | Diagonal | |
Goldhill | 0.9752 | 0.9708 | 0.9524 | -0.0151 | 0.0209 | 0.0078 |
Sailboat | 0.9721 | 0.9743 | 0.9602 | 0.0154 | 0.0106 | 0.0075 |
Peppers | 0.9833 | 0.9796 | 0.9684 | 0.0139 | 0.0054 | 0.0153 |
Image | Direction | Plain-image | Cipher-image | ||||
R | G | B | R | G | B | ||
Sun | Horizontal | 0.9561 | 0.9504 | 0.9584 | 0.0049 | -0.0041 | 0.0025 |
Vertical | 0.9553 | 0.9473 | 0.9569 | 0.0018 | 0.0102 | 0.0110 | |
Diagonal | 0.9338 | 0.9258 | 0.9359 | -0.0181 | 0.0029 | -0.0087 | |
Peppers | Horizontal | 0.9660 | 0.9811 | 0.9661 | 0.0092 | -0.0054 | 0.0103 |
Vertical | 0.9656 | 0.9822 | 0.9669 | 0.0059 | 0.0140 | 0.0118 | |
Diagonal | 0.9584 | 0.9630 | 0.9489 | -0.0093 | 0.0030 | 0.0092 | |
Baboon | Horizontal | 0.8620 | 0.7559 | 0.8838 | -0.0033 | 0.0228 | -0.0047 |
Vertical | 0.9230 | 0.8658 | 0.9104 | 0.0046 | 0.0063 | -0.0045 | |
Diagonal | 0.8536 | 0.7359 | 0.8428 | 0.0140 | 0.0050 | 0.0104 |
Method | Direction | Cipher-image | ||
R | G | B | ||
Ref. [49] | Horizontal | -0.0174 | -0.0048 | 0.0086 |
Vertical | -0.0021 | -0.0020 | 0.0727 | |
Diagonal | 0.0182 | -0.0096 | -0.0073 | |
Ours | Horizontal | 0.0092 | -0.0054 | 0.0103 |
Vertical | 0.0059 | 0.0140 | 0.0118 | |
Diagonal | -0.0093 | 0.0030 | 0.0092 |
In information theory, entropy is an important index to measure the degree of randomness of a message. Ideally, each pixel of an 8-bit cipher image has a theory entropy value of 8. The higher the information entropy value, the more uniform of gray value distribution and the more random of an image. The calculation formula of information entropy is,
$H(x) = - \sum\nolimits_{i = 0}^N {p({x_i})} {\log _2}p({x_i})$ | (25) |
where $p({x_i})$ is the probability of the occurrence of ${x_i}$, and $N$ is the total number of ${x_i}$. Tables 8 and 9 show the information entropy tests for different images. These results tell us that the information entropy values of the cipher image are very close to 8, indicating that the encryption scheme has strong randomness.
Image | Goldhill | Sailboat | Peppers |
Plain-image | 7.47778 | 7.48452 | 7.57148 |
Cipher-image | 7.99923 | 7.99934 | 7.99921 |
Image | Baboon | Peppers | ||||
R | G | B | R | G | B | |
Plain-image | 7.70667 | 7.47443 | 7.75222 | 7.338832 | 7.496255 | 7.05831 |
Cipher-image | 7.999377 | 7.99941 | 7.99927 | 7.99934 | 7.99924 | 7.99932 |
Usually, an image has high data redundancy; therefore, its pixels have a high correlation with neighboring pixels. For a secure cipher image, the pixel values should be evenly distributed to achieve high randomness and high security. Local information entropy is another qualitative criterion for evaluating the randomness of an image, which is defined as,
$\overline {{H_{(k, TB)}}} ({S_i}) = \sum\limits_{i = 1}^k {\frac{{H({S_i})}}{k}} $ | (26) |
where ${S_i}$ represents the optional $k$ groups of pixels in the image, and $TB$ represents the number of pixels in ${S_i}$. The local information entropy values of the grayscale and color images are tested and shown in Tables 10 and 11, respectively. Based on these results, it can be seen that the local information entropy of the cipher image has surpassed 7.95, indicating that the distribution of pixel values inside the image is very uniform and random.
Image | Goldhill | Sailboat | Peppers |
Plain-local | 6.48739 | 6.47318 | 6.55437 |
Cipher-local | 7.95391 | 7.95486 | 7.95317 |
Image | Baboon | Peppers | ||||
R | G | B | R | G | B | |
Plain-local | 6.75219 | 7.04211 | 7.00261 | 6.35622 | 6.45065 | 6.30729 |
Cipher-local | 7.95617 | 7.95727 | 7.95342 | 7.95686 | 7.95521 | 7.95294 |
The ideal property of a good encryption method should be sensitive to any small change in the plain image. That is, when the plain image has a small change in any pixel, the difference of the cipher image is analyzed to evaluate the diffusion performance of the encryption algorithm and should have the ability to resist differential attacks. The number of pixel change rate (NPCR) and unified average changing intensity (UACI) are two standards used for testing. The formulas are,
$ D(i, j) = \left\{ 0,if C1(i,j)=C2(i,j)1,if C1(i,j)≠C2(i,j) \right.$
|
(27) |
$NPCR({C_1}, {C_2}) = \sum\limits_{i = 1}^M {\sum\limits_{j = 1}^N {\frac{{D(i, j)}}{{M \times N}}} } \times 100\% $ | (28) |
$UACI({C_1}, {C_2}) = \sum\limits_{i = 1}^M {\sum\limits_{j = 1}^N {\frac{{|{C_1}(i, j) - {C_2}(i, j)|}}{{M \times N \times 255}}} } \times 100\% $ | (29) |
where ${C_1}$ is one cipher image, ${C_2}$ is another cipher image with one pixel in the same plain image changes. The theory values for NPCR and UACI are 99.6093 and 33.4635% respectively. Tables 12 and 13 present the average values of NPCR and UACI for grayscale and color images, respectively. Table 14 lists the comparisons by testing image Lena. All these test results show that the proposed asymmetric image encryption scheme has the ability to resist differential attacks.
Image | NPCR | UACI |
Goldhill | 99.6124 | 33.4522 |
Sailboat | 99.6129 | 33.4302 |
Peppers | 99.6086 | 33.4398 |
Image | Sun | Baboon | Peppers | ||||||
R | G | B | R | G | B | R | G | B | |
NPCR | 99.6134 | 99.6107 | 99.5951 | 99.6089 | 99.5975 | 99.6017 | 99.6010 | 99.6126 | 99.6092 |
UACI | 33.4784 | 33.4314 | 33.4631 | 33.4457 | 33.4622 | 33.4176 | 33.4744 | 33.4806 | 33.4139 |
Method | NPCR | UACI | Image size |
Ours | 99.6136 | 33.4643 | 512 × 512 |
Ours | 99.6078 | 33.3123 | 256 × 256 |
Ref. [44] | 99.7904 | 33.4970 | 512 × 512 |
Ref. [45] | 99.6033 | 28.6797 | 512 × 512 |
Ref. [46] | 99.5911 | 33.4208 | 256 × 256 |
An extremely high key sensitivity can guarantee the security of an encryption system against the brute force attacks. To evaluate the sensitivity of keys, the $512 \times 512$ image Sailboat is used as an example for testing. Figure 9 shows the key sensitivity analysis results. Moreover, Figure 9(d) shows that even if a small key change occurs, the cipher image experiences a big difference. These test results show that only the correct key can decrypt the image, and the image encryption algorithm is highly sensitive to the keys and has the ability to resist brute force attacks.
The asymmetric image encryption algorithm proposed in this paper is suitable for grayscale and color images. Taking color image as an example, Table 15 shows the information entropy comparisons with other image encryption algorithms. The values in the table express that the information entropy result of the proposed scheme in this paper is closer to 8, indicating that the gray value distribution in the proposed asymmetric encryption scheme is more uniform and random than that of other algorithms.
Image | size | Method | Information entropy | ||
R | G | B | |||
Peppers | 512 × 512 | Ours | 7.9993 | 7.9992 | 7.9993 |
256 × 256 | Ours | 7.9987 | 7.9984 | 7.9987 | |
256 × 256 | Ref. [6] | 7.9979 | 7.9979 | 7.9979 | |
512 × 512 | Ref. [14] | 7.9991 | 7.9992 | 7.9993 | |
256 × 256 | Ref. [47] | 7.9986 | 7.9987 | 7.9985 | |
256 × 256 | Ref. [48] | 7.9911 | 7.9912 | 7.9915 | |
256 × 256 | Ref. [49] | 7.9962 | 7.9929 | 7.9725 | |
Baboon | 512 × 512 | Ours | 7.9994 | 7.9994 | 7.9993 |
256 × 256 | Ours | 7.9981 | 7.9982 | 7.9979 | |
256 × 256 | Ref. [48] | 7.9914 | 7.9915 | 7.9915 | |
256 × 256 | Ref. [49] | 7.9923 | 7.9803 | 7.9986 |
This study employed a chaotic quantum logistic map, combining with both scrambling and diffusion operations, to propose a new asymmetric image encryption algorithm. First, the Arnold map was used to scramble the pixel positions of the plain images to achieve information hiding in the first layer. In the diffusion stage, different from the conventional point-to-point diffusion method, our solution took each row and each column as different units to perform diffusion operation. As to the row direction, the data in each row are first XOR-diffused. Then, each row in the image and the corresponding row in the keystream matrix are modulated and diffused; that is, two cyclic diffusions are realized by connecting the start and end. Operations to the column direction use a similar process to obtain the cipher image. Among them, the initial values of the quantum logistic map are related to the plain image, which can resist the known plaintext attack and chosen plaintext attack. Experimental tests and analyses show that the new asymmetric image encryption scheme proposed in this paper is suitable for both grayscale and color images, can better distribute pixel values be uniform, reduce high correlation, is highly sensitive to keys, and has the ability to resist various attacks.
However, there is still some disadvantages, for example, the compression operation was not considered in our scheme. So, in the future work, image can be compressed to reduce data redundancy, and how to achieve a good balance between the security and the complexity of image reconstruction should be taken into consideration. In addition, fast implement of encryption scheme is also an important issue in the future research.
The authors would like to thank the reviewers for their valuable comments and the editor's helpful suggestions. This work was supported in part by the National Natural Science Foundation of China (No.61972103), the Natural Science Foundation of Guangdong Province of China (No.2019A1515011361), and the Key Scientific Research Project of Education Department of Guangdong Province of China (No.2020ZDZX3064).
The authors declare that they have no conflict of interest.
[1] | Gibbs GM, Roelants K, O'Bryan MK (2008) The CAP superfamily: cysteine-rich secretory proteins, antigen 5, and pathogenesis-related 1 proteins--roles in reproduction, cancer, and immune defense. Endocr Rev 29: 865–897. |
[2] | Gibbs GM, O'Bryan MK (2007) Cysteine rich secretory proteins in reproduction and venom. Soc Reprod Fertil Suppl 65: 261–267. |
[3] | Yamazaki Y, Morita T (2004) Structure and function of snake venom cysteine-rich secretory proteins. Toxicon 44: 227–231. |
[4] | Choudhary V, Schneiter R (2012) Pathogen-Related Yeast (PRY) proteins and members of the CAP superfamily are secreted sterol-binding proteins. Proc Natl Acad Sci USA 109: 16882–16887. |
[5] | Xu X, Francischetti IM, Lai R, et al. (2012) Structure of protein having inhibitory disintegrin and leukotriene scavenging functions contained in single domain. J Biol Chem 287: 10967–10976. |
[6] | Kelleher A, Darwiche R, Rezende WC, et al. (2014) Schistosoma mansoni venom allergen-like protein 4 (SmVAL4) is a novel lipid-binding SCP/TAPS protein that lacks the prototypical CAP motifs. Acta Crystallogr D Biol Crystallogr 70: 2186–2196. |
[7] | Milne TJ, Abbenante G, Tyndall JD, et al. (2003) Isolation and characterization of a cone snail protease with homology to CRISP proteins of the pathogenesis-related protein superfamily. J Biol Chem 278: 31105–31110. |
[8] | Eberle HB, Serrano RL, Fullekrug J, et al. (2002) Identification and characterization of a novel human plant pathogenesis-related protein that localizes to lipid-enriched microdomains in the Golgi complex. J Cell Sci 115: 827–838. |
[9] | Serrano RL, Kuhn A, Hendricks A, et al. (2004) Structural analysis of the human Golgi-associated plant pathogenesis related protein GAPR-1 implicates dimerization as a regulatory mechanism. J Mol Biol 339: 173–183. |
[10] | Shoji-Kawata S, Sumpter R, Leveno M, et al. (2013) Identification of a candidate therapeutic autophagy-inducing peptide. Nature 494: 201–206. |
[11] | Kuballa P, Nolte WM, Castoreno AB, et al. (2012) Autophagy and the immune system. Annu Rev Immunol 30: 611–646. |
[12] | Eberle HB, Serrano RL, Fullekrug J, et al. (2002) Identification and characterization of a novel human plant pathogenesis-related protein that localizes to lipid-enriched microdomains in the Golgi complex. J Cell Sci 115: 827–838. |
[13] | Zhou Q, Hao L, Huang W, et al. (2016) The Golgi-Associated Plant Pathogenesis-Related Protein GAPR-1 Enhances Type I Interferon Signaling Pathway in Response to Toll-Like Receptor 4. Inflammation 39: 706–717. |
[14] | Baxter RM, Crowell TP, George JA, et al. (2007) The plant pathogenesis related protein GLIPR-2 is highly expressed in fibrotic kidney and promotes epithelial to mesenchymal transition in vitro. Matrix Biol 26: 20–29. |
[15] | Aalberts M, van Dissel-Emiliani FM, van Adrichem NP, et al. (2012) Identification of distinct populations of prostasomes that differentially express prostate stem cell antigen, annexin A1, and GLIPR2 in humans. Biol Reprod 86: 82:1–8. |
[16] | Van Galen J, Van Balkom BW, Serrano RL, et al. (2010) Binding of GAPR-1 to negatively charged phospholipid membranes: unusual binding characteristics to phosphatidylinositol. Mol Membr Biol 27: 81–91. |
[17] | van Galen J, Olrichs NK, Schouten A, et al. (2012) Interaction of GAPR-1 with lipid bilayers is regulated by alternative homodimerization. Biochim Biophys Acta 1818: 2175–2183. |
[18] | Olrichs NK, Mahalka AK, Kaloyanova D, et al. (2014) Golgi-Associated plant Pathogenesis Related protein 1 (GAPR-1) forms amyloid-like fibrils by interaction with acidic phospholipids and inhibits Abeta aggregation. Amyloid 21: 88–96. |
[19] | Yoshiike Y, Minai R, Matsuo Y, et al. (2008) Amyloid oligomer conformation in a group of natively folded proteins. PLoS One 3: e3235. |
[20] | Schwarzman AL, Gregori L, Vitek MP, et al. (1994) Transthyretin sequesters amyloid beta protein and prevents amyloid formation. Proc Natl Acad Sci USA 91: 8368–8372. |
[21] | Chen J, Yagi H, Sormanni P, et al. (2012) Fibrillogenic propensity of the GroEL apical domain: a Janus-faced minichaperone. FEBS Lett 586: 1120–1127. |
[22] | Rekas A, Ahn KJ, Kim J, et al. (2012) The chaperone activity of alpha-synuclein: Utilizing deletion mutants to map its interaction with target proteins. Proteins 80: 1316–1325. |
[23] | Ofengeim D, Ito Y, Najafov A, et al. (2015) Activation of necroptosis in multiple sclerosis. Cell Rep 10: 1836–1849. |
[24] | Zhang L, Qu S, Liang A, et al. (2015) Gene expression microarray analysis of the sciatic nerve of mice with diabetic neuropathy. Int J Mol Med 35: 333–339. |
[25] | Karlsson O, Berg AL, Hanrieder J, et al. (2015) Intracellular fibril formation, calcification, and enrichment of chaperones, cytoskeletal, and intermediate filament proteins in the adult hippocampus CA1 following neonatal exposure to the nonprotein amino acid BMAA. Arch Toxicol 89: 423–436. |
[26] | Nishi H, Hashimoto K, Madej T, et al. (2013) Evolutionary, physicochemical, and functional mechanisms of protein homooligomerization. Prog Mol Biol Transl Sci 117: 3–24. |
[27] | Marianayagam NJ, Sunde M, Matthews JM (2004) The power of two: protein dimerization in biology. Trends Biochem Sci 29: 618–625. |
[28] | Ali MH, Imperiali B (2005) Protein oligomerization: how and why. Bioorg Med Chem 13: 5013–5020. |
[29] | Wang X, Sharp JS, Handel TM, et al. (2013) Chemokine oligomerization in cell signaling and migration. Prog Mol Biol Transl Sci 117: 531–578. |
[30] | Zimmerberg J, Kozlov MM (2006) How proteins produce cellular membrane curvature. Nat Rev Mol Cell Biol 7: 9–19. |
[31] | Park PS, Filipek S, Wells JW, et al. (2004) Oligomerization of G protein-coupled receptors: past, present, and future. Biochemistry 43: 15643–15656. |
[32] | Adi-Harel S, Erlich S, Schmukler E, et al. (2010) Beclin 1 self-association is independent of autophagy induction by amino acid deprivation and rapamycin treatment. J Cell Biochem 110: 1262–1271. |
[33] | Ku B, Woo JS, Liang C, et al. (2008) An insight into the mechanistic role of Beclin 1 and its inhibition by prosurvival Bcl-2 family proteins. Autophagy 4: 519–520. |
[34] | Chiti F, Dobson CM (2006) Protein misfolding, functional amyloid, and human disease. Annu Rev Biochem 75: 333–366. |
[35] | Dobson CM (2003) Protein folding and misfolding. Nature 426: 884–890. |
[36] | Iannuzzi C, Irace G, Sirangelo I (2015) The effect of glycosaminoglycans (GAGs) on amyloid aggregation and toxicity. Molecules 20: 2510–2528. |
[37] | Oskarsson ME, Singh K, Wang J, et al. (2015) Heparan Sulfate Proteoglycans Are Important for Islet Amyloid Formation and Islet Amyloid Polypeptide-induced Apoptosis. J Biol Chem 290: 15121–15132. |
[38] | Kinnunen PK (2009) Amyloid Formation on Lipid Membrane Surfaces. The Open Biology Journal 2: 163–175. |
[39] | Burke KA, Yates EA, Legleiter J (2013) Biophysical insights into how surfaces, including lipid membranes, modulate protein aggregation related to neurodegeneration. Front Neurol 4: 17. |
[40] | Sunde M, Serpell LC, Bartlam M, et al. (1997) Common core structure of amyloid fibrils by synchrotron X-ray diffraction. J Mol Biol 273: 729–739. |
[41] | Glabe CG (2008) Structural classification of toxic amyloid oligomers. J Biol Chem 283: 29639–29643. |
[42] | Kayed R, Lasagna-Reeves CA (2013) Molecular mechanisms of amyloid oligomers toxicity. J Alzheimers Dis 33 Suppl 1: S67–78. |
[43] | Breydo L, Uversky VN (2015) Structural, morphological, and functional diversity of amyloid oligomers. FEBS Lett 589: 2640–2648. |
[44] | Haass C, Selkoe DJ (2007) Soluble protein oligomers in neurodegeneration: lessons from the Alzheimer's amyloid beta-peptide. Nat Rev Mol Cell Biol 8: 101–112. |
[45] | Kagan BL, Jang H, Capone R, et al. (2012) Antimicrobial properties of amyloid peptides. Mol Pharm 9: 708–717. |
[46] | Greenwald J, Riek R (2012) On the possible amyloid origin of protein folds. J Mol Biol 421: 417–426. |
[47] | Gsponer J, Babu MM (2012) Cellular strategies for regulating functional and nonfunctional protein aggregation. Cell Rep 2: 1425–1437. |
[48] | Fowler DM, Koulov AV, Balch WE, et al. (2007) Functional amyloid--from bacteria to humans. Trends Biochem Sci 32: 217–224. |
[49] | Maji SK, Perrin MH, Sawaya MR, et al. (2009) Functional amyloids as natural storage of peptide hormones in pituitary secretory granules. Science 325: 328–332. |
[50] | Puzzo D, Arancio O (2013) Amyloid-beta peptide: Dr. Jekyll or Mr. Hyde? J Alzheimers Dis 33 Suppl 1: S111–20. |
[51] | Hervas R, Li L, Majumdar A, et al. (2016) Molecular Basis of Orb2 Amyloidogenesis and Blockade of Memory Consolidation. PLoS Biol 14: e1002361. |
[52] | Jacob RS, George E, Singh PK, et al. (2016) Cell Adhesion on Amyloid Fibrils Lacking Integrin Recognition Motif. J Biol Chem . |
[53] | Halfmann R, Jarosz DF, Jones SK, et al. (2012) Prions are a common mechanism for phenotypic inheritance in wild yeasts. Nature 482: 363–368. |
[54] | Li J, McQuade T, Siemer AB, et al. (2012) The RIP1/RIP3 necrosome forms a functional amyloid signaling complex required for programmed necrosis. Cell 150: 339–350. |
[55] | Parry TL, Melehani JH, Ranek MJ, et al. (2015) Functional Amyloid Signaling via the Inflammasome, Necrosome, and Signalosome: New Therapeutic Targets in Heart Failure. Front Cardiovasc Med 2: 25. |
[56] | Rapsinski GJ, Wynosky-Dolfi MA, Oppong GO, et al. (2015) Toll-like receptor 2 and NLRP3 cooperate to recognize a functional bacterial amyloid, curli. Infect Immun 83: 693–701. |
[57] | Heneka MT, Kummer MP, Latz E (2014) Innate immune activation in neurodegenerative disease. Nat Rev Immunol 14: 463–477. |
[58] | Maldera JA, Vasen G, Ernesto JI, et al. (2011) Evidence for the involvement of zinc in the association of CRISP1 with rat sperm during epididymal maturation. Biol Reprod 85: 503–510. |
[59] | Lu S, Faris JD, Sherwood R, et al. (2014) A dimeric PR-1-type pathogenesis-related protein interacts with ToxA and potentially mediates ToxA-induced necrosis in sensitive wheat. Mol Plant Pathol 15: 650–663. |
[60] | Borloo J, Geldhof P, Peelaers I, et al. (2013) Structure of Ostertagia ostertagi ASP-1: insights into disulfide-mediated cyclization and dimerization. Acta Crystallogr D Biol Crystallogr 69: 493–503. |
[61] | Prados-Rosales RC, Roldan-Rodriguez R, Serena C, et al. (2012) A PR-1-like protein of Fusarium oxysporum functions in virulence on mammalian hosts. J Biol Chem 287: 21970–21979. |
[62] | Sugiyama H, Burnett L, Xiang X, et al. (2009) Purification and multimer formation of allurin, a sperm chemoattractant from Xenopus laevis egg jelly. Mol Reprod Dev 76: 527–536. |
[63] | Asojo OA, Goud G, Dhar K, et al. (2005) X-ray structure of Na-ASP-2, a pathogenesis-related-1 protein from the nematode parasite, Necator americanus, and a vaccine antigen for human hookworm infection. J Mol Biol 346: 801–814. |
[64] | Ma D, Francischetti IM, Ribeiro JM, et al. (2015) The structure of hookworm platelet inhibitor (HPI), a CAP superfamily member from Ancylostoma caninum. Acta Crystallogr F Struct Biol Commun 71: 643–649. |
[65] | Tsolis AC, Papandreou NC, Iconomidou VA, et al. (2013) A consensus method for the prediction of 'aggregation-prone' peptides in globular proteins. PLoS One 8: e54175. |
[66] | Egge N, Muthusubramanian A, Cornwall GA (2015) Amyloid properties of the mouse egg zona pellucida. PLoS One 10: e0129907. |
[67] | Guyonnet B, Egge N, Cornwall GA (2014) Functional amyloids in the mouse sperm acrosome. Mol Cell Biol 34: 2624–2634. |
[68] | Swanson WJ, Aagaard JE, Vacquier VD, et al. (2011) The molecular basis of sex: linking yeast to human. Mol Biol Evol 28: 1963–1966. |
[69] | Garcia MC, Lee JT, Ramsook CB, et al. (2011) A role for amyloid in cell aggregation and biofilm formation. PLoS One 6: e17632. |
[70] | Da Ros VG, Munoz MW, Battistone MA, et al. (2015) From the epididymis to the egg: participation of CRISP proteins in mammalian fertilization. Asian J Androl 17: 711–715. |
[71] | Caballero J, Frenette G, D'Amours O, et al. (2012) Bovine sperm raft membrane associated Glioma Pathogenesis-Related 1-like protein 1 (GliPr1L1) is modified during the epididymal transit and is potentially involved in sperm binding to the zona pellucida. J Cell Physiol 227: 3876–3886. |
[72] | Busso D, Goldweic NM, Hayashi M, et al. (2007) Evidence for the involvement of testicular protein CRISP2 in mouse sperm-egg fusion. Biol Reprod 76: 701–708. |
[73] | Doty A, Buhi WC, Benson S, et al. (2011) Equine CRISP3 modulates interaction between spermatozoa and polymorphonuclear neutrophils. Biol Reprod 85: 157–164. |
[74] | Ernesto JI, Weigel Munoz M, Battistone MA, et al. (2015) CRISP1 as a novel CatSper regulator that modulates sperm motility and orientation during fertilization. J Cell Biol 210: 1213–1224. |
[75] | Burnett LA, Xiang X, Bieber AL, et al. (2008) Crisp proteins and sperm chemotaxis: discovery in amphibians and explorations in mammals. Int J Dev Biol 52: 489–501. |
[76] | Burnett LA, Anderson DM, Rawls A, et al. (2011) Mouse sperm exhibit chemotaxis to allurin, a truncated member of the cysteine-rich secretory protein family. Dev Biol 360: 318–328. |
[77] | Usmani SM, Zirafi O, Muller JA, et al. (2014) Direct visualization of HIV-enhancing endogenous amyloid fibrils in human semen. Nat Commun 5: 3508. |
[78] | Castellano LM, Shorter J (2012) The Surprising Role of Amyloid Fibrils in HIV Infection. Biology (Basel) 1: 58–80. |
[79] | Doncel GF (2006) Exploiting common targets in human fertilization and HIV infection: development of novel contraceptive microbicides. Hum Reprod Update 12: 103–117. |
[80] | Gebbink MF, Claessen D, Bouma B, et al. (2005) Amyloids--a functional coat for microorganisms. Nat Rev Microbiol 3: 333–341. |
[81] | Garcia-Sherman MC, Lundberg T, Sobonya RE, et al. (2015) A unique biofilm in human deep mycoses: fungal amyloid is bound by host serum amyloid P component. NPJ Biofilms Microbiomes 1: 15009. |
[82] | Syed AK, Boles BR (2014) Fold modulating function: bacterial toxins to functional amyloids. Front Microbiol 5: 401. |
[83] | Pisa D, Alonso R, Rabano A, et al. (2015) Different Brain Regions are Infected with Fungi in Alzheimer's Disease. Sci Rep 5: 15015. |
[84] | Oh J, Kim JG, Jeon E, et al. (2007) Amyloidogenesis of type III-dependent harpins from plant pathogenic bacteria. J Biol Chem 282: 13601–13609. |
[85] | van Loon LC, Rep M, Pieterse CM (2006) Significance of inducible defense-related proteins in infected plants. Annu Rev Phytopathol 44: 135–162. |
[86] | Van Loon LC, Van Strien EA (1999) The families of pathogenesis-related proteins, their activities, and comparative analysis of PR-1 type proteins. Physiol Mol Plant Pathol 55: 85–97. |
[87] | Niderman T, Genetet I, Bruyere T, et al. (1995) Pathogenesis-related PR-1 proteins are antifungal. Isolation and characterization of three 14-kilodalton proteins of tomato and of a basic PR-1 of tobacco with inhibitory activity against Phytophthora infestans. Plant Physiol 108: 17–27. |
[88] | Rauscher M, Adam AL, Wirtz S, et al. (1999) PR-1 protein inhibits the differentiation of rust infection hyphae in leaves of acquired resistant broad bean. Plant J 19: 625–633. |
[89] | Benhamou N (1995) Immunocytochemistry of plant defense mechanisms induced upon microbial attack. Microsc Res Tech 31: 63–78. |
[90] | Lee YK, Hippe-Sanwald S, Lee SC, et al. (2000) In situ localization of PR-1 mRNA and PR-1 protein in compatible and incompatible interactions of pepper stems with Phytophthora capsici. Protoplasma 211: 64–75. |
[91] | Santén K, Marttila S, Liljeroth E, et al. (2005) Immunocytochemical localization of the pathogenesis-related PR-1 protein in barley leaves after infection by Bipolaris sorokiniana. Physiol Mol Plant Pathol 66: 45–54. |
[92] | Teixeira PJ, Costa GG, Fiorin GL, et al. (2013) Novel receptor-like kinases in cacao contain PR-1 extracellular domains. Mol Plant Pathol 14: 602–609. |
[93] | Jiang G, Hunter T (1999) Receptor signaling: when dimerization is not enough. Curr Biol 9: R568–71. |
[94] | Chen YL, Lee CY, Cheng KT, et al. (2014) Quantitative peptidomics study reveals that a wound-induced peptide from PR-1 regulates immune signaling in tomato. Plant Cell 26: 4135–4148. |
[95] | Chien PS, Nam HG, Chen YR (2015) A salt-regulated peptide derived from the CAP superfamily protein negatively regulates salt-stress tolerance in Arabidopsis. J Exp Bot 66: 5301–5313. |
[96] | Buch F, Pauchet Y, Rott M, et al. (2014) Characterization and heterologous expression of a PR-1 protein from traps of the carnivorous plant Nepenthes mirabilis. Phytochemistry 100: 43–50. |
[97] | Osman A, Wang CK, Winter A, et al. (2012) Hookworm SCP/TAPS protein structure--A key to understanding host-parasite interactions and developing new interventions. Biotechnol Adv 30: 652–657. |
[98] | Moyle M, Foster DL, McGrath DE, et al. (1994) A hookworm glycoprotein that inhibits neutrophil function is a ligand of the integrin CD11b/CD18. J Biol Chem 269: 10008–10015. |
[99] | Asojo OA (2011) Structure of a two-CAP-domain protein from the human hookworm parasite Necator americanus. Acta Crystallogr D Biol Crystallogr 67: 455–462. |
[100] | Del Valle A, Jones BF, Harrison LM, et al. (2003) Isolation and molecular cloning of a secreted hookworm platelet inhibitor from adult Ancylostoma caninum. Mol Biochem Parasitol 129: 167–177. |
[101] | Horn M, Bertling A, Brodde MF, et al. (2012) Human neutrophil alpha-defensins induce formation of fibrinogen and thrombospondin-1 amyloid-like structures and activate platelets via glycoprotein IIb/IIIa. J Thromb Haemost 10: 647–661. |
[102] | Canobbio I, Abubaker AA, Visconte C, et al. (2015) Role of amyloid peptides in vascular dysfunction and platelet dysregulation in Alzheimer's disease. Front Cell Neurosci 9: 65. |
[103] | Wang YL, Kuo JH, Lee SC, et al. (2010) Cobra CRISP functions as an inflammatory modulator via a novel Zn2+- and heparan sulfate-dependent transcriptional regulation of endothelial cell adhesion molecules. J Biol Chem 285: 37872–37883. |
[104] | Alexandrescu AT (2005) Amyloid accomplices and enforcers. Protein Sci 14: 1–12. |
[105] | Hughes AJ, Hussain R, Cosentino C, et al. (2012) A zinc complex of heparan sulfate destabilises lysozyme and alters its conformation. Biochem Biophys Res Commun 425: 794–799. |
[106] | Berthelot K, Lecomte S, Coulary-Salin B, et al. (2016) Hevea brasiliensis prohevein possesses a conserved C-terminal domain with amyloid-like properties in vitro. Biochim Biophys Acta 1864: 388–399. |
[107] | Lay FT, Mills GD, Poon IK, et al. (2012) Dimerization of plant defensin NaD1 enhances its antifungal activity. J Biol Chem 287: 19961–19972. |
[108] | Poon IK, Baxter AA, Lay FT, et al. (2014) Phosphoinositide-mediated oligomerization of a defensin induces cell lysis. Elife 3: e01808. |
[109] | Garvey M, Meehan S, Gras SL, et al. (2013) A radish seed antifungal peptide with a high amyloid fibril-forming propensity. Biochim Biophys Acta 1834: 1615–1623. |
[110] | Marangon M, Van Sluyter SC, Waters EJ, et al. (2014) Structure of haze forming proteins in white wines: Vitis vinifera thaumatin-like proteins. PLoS One 9: e113757. |
[111] | Yu XM, Griffith M (1999) Antifreeze proteins in winter rye leaves form oligomeric complexes. Plant Physiol 119: 1361–1370. |
Parameter | Value | Parameter | Value |
$q$ | 1733 | ${a_2}$ | 15 |
$p$ | 1697 | ${a_3}$ | 20 |
$e$ | 163 | $r$ | 3.99 |
${a_1}$ | 7 | $\beta $ | 7 |
$d$ | 2,757,259 | ${c_1}$ | 2,855,219 |
${c_2}$ | 164,340 | ${c_3}$ | 128,682 |
Image size | Initial value generation | Confusion-diffusion encryption | Total time |
256 × 256 | 0.014931 | 0.337695 | 0.394836 |
512 × 512 | 0.059334 | 0.699589 | 0.735226 |
Image | Plain-image | Cipher-image | Results |
Goldhill | 161621.1816 | 279.9395 | Pass |
Sailboat | 179772.6055 | 240.8535 | Pass |
Peppers (Grayscale) | 138836.1738 | 287.2168 | Pass |
Sun | 319180.5827 | 273.1582 | Pass |
Baboon | 101863.4615 | 266.8301 | Pass |
Peppers (Color) | 340999.4414 | 246.8555 | Pass |
Reference | Baboon | ||
R | G | B | |
This Paper | 227.05 | 214.01 | 254.08 |
Ref. [46] | 287.56 | 227.89 | 259.78 |
Image | Plain-image | Cipher-image | ||||
Horizontal | Vertical | Diagonal | Horizontal | Vertical | Diagonal | |
Goldhill | 0.9752 | 0.9708 | 0.9524 | -0.0151 | 0.0209 | 0.0078 |
Sailboat | 0.9721 | 0.9743 | 0.9602 | 0.0154 | 0.0106 | 0.0075 |
Peppers | 0.9833 | 0.9796 | 0.9684 | 0.0139 | 0.0054 | 0.0153 |
Image | Direction | Plain-image | Cipher-image | ||||
R | G | B | R | G | B | ||
Sun | Horizontal | 0.9561 | 0.9504 | 0.9584 | 0.0049 | -0.0041 | 0.0025 |
Vertical | 0.9553 | 0.9473 | 0.9569 | 0.0018 | 0.0102 | 0.0110 | |
Diagonal | 0.9338 | 0.9258 | 0.9359 | -0.0181 | 0.0029 | -0.0087 | |
Peppers | Horizontal | 0.9660 | 0.9811 | 0.9661 | 0.0092 | -0.0054 | 0.0103 |
Vertical | 0.9656 | 0.9822 | 0.9669 | 0.0059 | 0.0140 | 0.0118 | |
Diagonal | 0.9584 | 0.9630 | 0.9489 | -0.0093 | 0.0030 | 0.0092 | |
Baboon | Horizontal | 0.8620 | 0.7559 | 0.8838 | -0.0033 | 0.0228 | -0.0047 |
Vertical | 0.9230 | 0.8658 | 0.9104 | 0.0046 | 0.0063 | -0.0045 | |
Diagonal | 0.8536 | 0.7359 | 0.8428 | 0.0140 | 0.0050 | 0.0104 |
Method | Direction | Cipher-image | ||
R | G | B | ||
Ref. [49] | Horizontal | -0.0174 | -0.0048 | 0.0086 |
Vertical | -0.0021 | -0.0020 | 0.0727 | |
Diagonal | 0.0182 | -0.0096 | -0.0073 | |
Ours | Horizontal | 0.0092 | -0.0054 | 0.0103 |
Vertical | 0.0059 | 0.0140 | 0.0118 | |
Diagonal | -0.0093 | 0.0030 | 0.0092 |
Image | Goldhill | Sailboat | Peppers |
Plain-image | 7.47778 | 7.48452 | 7.57148 |
Cipher-image | 7.99923 | 7.99934 | 7.99921 |
Image | Baboon | Peppers | ||||
R | G | B | R | G | B | |
Plain-image | 7.70667 | 7.47443 | 7.75222 | 7.338832 | 7.496255 | 7.05831 |
Cipher-image | 7.999377 | 7.99941 | 7.99927 | 7.99934 | 7.99924 | 7.99932 |
Image | Goldhill | Sailboat | Peppers |
Plain-local | 6.48739 | 6.47318 | 6.55437 |
Cipher-local | 7.95391 | 7.95486 | 7.95317 |
Image | Baboon | Peppers | ||||
R | G | B | R | G | B | |
Plain-local | 6.75219 | 7.04211 | 7.00261 | 6.35622 | 6.45065 | 6.30729 |
Cipher-local | 7.95617 | 7.95727 | 7.95342 | 7.95686 | 7.95521 | 7.95294 |
Image | NPCR | UACI |
Goldhill | 99.6124 | 33.4522 |
Sailboat | 99.6129 | 33.4302 |
Peppers | 99.6086 | 33.4398 |
Image | Sun | Baboon | Peppers | ||||||
R | G | B | R | G | B | R | G | B | |
NPCR | 99.6134 | 99.6107 | 99.5951 | 99.6089 | 99.5975 | 99.6017 | 99.6010 | 99.6126 | 99.6092 |
UACI | 33.4784 | 33.4314 | 33.4631 | 33.4457 | 33.4622 | 33.4176 | 33.4744 | 33.4806 | 33.4139 |
Image | size | Method | Information entropy | ||
R | G | B | |||
Peppers | 512 × 512 | Ours | 7.9993 | 7.9992 | 7.9993 |
256 × 256 | Ours | 7.9987 | 7.9984 | 7.9987 | |
256 × 256 | Ref. [6] | 7.9979 | 7.9979 | 7.9979 | |
512 × 512 | Ref. [14] | 7.9991 | 7.9992 | 7.9993 | |
256 × 256 | Ref. [47] | 7.9986 | 7.9987 | 7.9985 | |
256 × 256 | Ref. [48] | 7.9911 | 7.9912 | 7.9915 | |
256 × 256 | Ref. [49] | 7.9962 | 7.9929 | 7.9725 | |
Baboon | 512 × 512 | Ours | 7.9994 | 7.9994 | 7.9993 |
256 × 256 | Ours | 7.9981 | 7.9982 | 7.9979 | |
256 × 256 | Ref. [48] | 7.9914 | 7.9915 | 7.9915 | |
256 × 256 | Ref. [49] | 7.9923 | 7.9803 | 7.9986 |
Parameter | Value | Parameter | Value |
$q$ | 1733 | ${a_2}$ | 15 |
$p$ | 1697 | ${a_3}$ | 20 |
$e$ | 163 | $r$ | 3.99 |
${a_1}$ | 7 | $\beta $ | 7 |
$d$ | 2,757,259 | ${c_1}$ | 2,855,219 |
${c_2}$ | 164,340 | ${c_3}$ | 128,682 |
Image size | Initial value generation | Confusion-diffusion encryption | Total time |
256 × 256 | 0.014931 | 0.337695 | 0.394836 |
512 × 512 | 0.059334 | 0.699589 | 0.735226 |
Image | Plain-image | Cipher-image | Results |
Goldhill | 161621.1816 | 279.9395 | Pass |
Sailboat | 179772.6055 | 240.8535 | Pass |
Peppers (Grayscale) | 138836.1738 | 287.2168 | Pass |
Sun | 319180.5827 | 273.1582 | Pass |
Baboon | 101863.4615 | 266.8301 | Pass |
Peppers (Color) | 340999.4414 | 246.8555 | Pass |
Reference | Baboon | ||
R | G | B | |
This Paper | 227.05 | 214.01 | 254.08 |
Ref. [46] | 287.56 | 227.89 | 259.78 |
Image | Plain-image | Cipher-image | ||||
Horizontal | Vertical | Diagonal | Horizontal | Vertical | Diagonal | |
Goldhill | 0.9752 | 0.9708 | 0.9524 | -0.0151 | 0.0209 | 0.0078 |
Sailboat | 0.9721 | 0.9743 | 0.9602 | 0.0154 | 0.0106 | 0.0075 |
Peppers | 0.9833 | 0.9796 | 0.9684 | 0.0139 | 0.0054 | 0.0153 |
Image | Direction | Plain-image | Cipher-image | ||||
R | G | B | R | G | B | ||
Sun | Horizontal | 0.9561 | 0.9504 | 0.9584 | 0.0049 | -0.0041 | 0.0025 |
Vertical | 0.9553 | 0.9473 | 0.9569 | 0.0018 | 0.0102 | 0.0110 | |
Diagonal | 0.9338 | 0.9258 | 0.9359 | -0.0181 | 0.0029 | -0.0087 | |
Peppers | Horizontal | 0.9660 | 0.9811 | 0.9661 | 0.0092 | -0.0054 | 0.0103 |
Vertical | 0.9656 | 0.9822 | 0.9669 | 0.0059 | 0.0140 | 0.0118 | |
Diagonal | 0.9584 | 0.9630 | 0.9489 | -0.0093 | 0.0030 | 0.0092 | |
Baboon | Horizontal | 0.8620 | 0.7559 | 0.8838 | -0.0033 | 0.0228 | -0.0047 |
Vertical | 0.9230 | 0.8658 | 0.9104 | 0.0046 | 0.0063 | -0.0045 | |
Diagonal | 0.8536 | 0.7359 | 0.8428 | 0.0140 | 0.0050 | 0.0104 |
Method | Direction | Cipher-image | ||
R | G | B | ||
Ref. [49] | Horizontal | -0.0174 | -0.0048 | 0.0086 |
Vertical | -0.0021 | -0.0020 | 0.0727 | |
Diagonal | 0.0182 | -0.0096 | -0.0073 | |
Ours | Horizontal | 0.0092 | -0.0054 | 0.0103 |
Vertical | 0.0059 | 0.0140 | 0.0118 | |
Diagonal | -0.0093 | 0.0030 | 0.0092 |
Image | Goldhill | Sailboat | Peppers |
Plain-image | 7.47778 | 7.48452 | 7.57148 |
Cipher-image | 7.99923 | 7.99934 | 7.99921 |
Image | Baboon | Peppers | ||||
R | G | B | R | G | B | |
Plain-image | 7.70667 | 7.47443 | 7.75222 | 7.338832 | 7.496255 | 7.05831 |
Cipher-image | 7.999377 | 7.99941 | 7.99927 | 7.99934 | 7.99924 | 7.99932 |
Image | Goldhill | Sailboat | Peppers |
Plain-local | 6.48739 | 6.47318 | 6.55437 |
Cipher-local | 7.95391 | 7.95486 | 7.95317 |
Image | Baboon | Peppers | ||||
R | G | B | R | G | B | |
Plain-local | 6.75219 | 7.04211 | 7.00261 | 6.35622 | 6.45065 | 6.30729 |
Cipher-local | 7.95617 | 7.95727 | 7.95342 | 7.95686 | 7.95521 | 7.95294 |
Image | NPCR | UACI |
Goldhill | 99.6124 | 33.4522 |
Sailboat | 99.6129 | 33.4302 |
Peppers | 99.6086 | 33.4398 |
Image | Sun | Baboon | Peppers | ||||||
R | G | B | R | G | B | R | G | B | |
NPCR | 99.6134 | 99.6107 | 99.5951 | 99.6089 | 99.5975 | 99.6017 | 99.6010 | 99.6126 | 99.6092 |
UACI | 33.4784 | 33.4314 | 33.4631 | 33.4457 | 33.4622 | 33.4176 | 33.4744 | 33.4806 | 33.4139 |
Method | NPCR | UACI | Image size |
Ours | 99.6136 | 33.4643 | 512 × 512 |
Ours | 99.6078 | 33.3123 | 256 × 256 |
Ref. [44] | 99.7904 | 33.4970 | 512 × 512 |
Ref. [45] | 99.6033 | 28.6797 | 512 × 512 |
Ref. [46] | 99.5911 | 33.4208 | 256 × 256 |
Image | size | Method | Information entropy | ||
R | G | B | |||
Peppers | 512 × 512 | Ours | 7.9993 | 7.9992 | 7.9993 |
256 × 256 | Ours | 7.9987 | 7.9984 | 7.9987 | |
256 × 256 | Ref. [6] | 7.9979 | 7.9979 | 7.9979 | |
512 × 512 | Ref. [14] | 7.9991 | 7.9992 | 7.9993 | |
256 × 256 | Ref. [47] | 7.9986 | 7.9987 | 7.9985 | |
256 × 256 | Ref. [48] | 7.9911 | 7.9912 | 7.9915 | |
256 × 256 | Ref. [49] | 7.9962 | 7.9929 | 7.9725 | |
Baboon | 512 × 512 | Ours | 7.9994 | 7.9994 | 7.9993 |
256 × 256 | Ours | 7.9981 | 7.9982 | 7.9979 | |
256 × 256 | Ref. [48] | 7.9914 | 7.9915 | 7.9915 | |
256 × 256 | Ref. [49] | 7.9923 | 7.9803 | 7.9986 |