
The Indonesian Presidential Regulation No. 35 of 2018 heralds a transformative agenda for producing electrical energy from biomass in an environmentally conscious manner. Jakarta emerges as a pivotal area in this transformation, with its strategic adoption of Waste to Energy (WtE) systems. In this study, we probe into the multiple layers of community preferences and the acceptance of WtE developments in Jakarta, factoring in an array of local concerns and policy-driven directives. Through a methodologically structured choice experiment, participants weighed in on various scenarios delineating shifts from the status quo to innovative WtE technological adoptions. we scrutinize a spectrum of attributes, each with defined status quo levels and proposed advancements: From enhancing awareness of landfill impacts (P1), escalating local policy commitments (K1) and integrating waste treatment facilities (F1) to diversifying waste processing outputs into liquid (PP1), solid (PP2), gas (PP3) and electricity (PP4). We also consider the transition from unmanaged landfills to controlled applications of landfill gas (PA1) and thermal treatment (PA2), as well as the initiation of emission and pollutant monitoring (M1).Our findings illuminate a significant public inclination to move beyond the current paradigms towards embracing WtE conversions, with particular willingness to support socialization of new waste processing technologies (P1), generation of energy in various forms especially liquid (PP1) and electricity (PP4) and implementation of environmental monitoring measures (M1). These attributes were marked by a notable willingness to accept (WTA) the proposed changes, signaling a readiness for policy and infrastructural advancements in waste management.
Citation: Aarce Tehupeiory, Iva Yenis Septiariva, I Wayan Koko Suryawan. Evaluating Community Preferences for Waste-to-Energy Development in Jakarta: An Analysis Using the Choice Experiment Method[J]. AIMS Environmental Science, 2023, 10(6): 809-831. doi: 10.3934/environsci.2023044
[1] | Qing Ye, Qiaojia Zhang, Sijie Liu, Kaiqiang Chen . A novel chaotic system based on coupled map lattice and its application in HEVC encryption. Mathematical Biosciences and Engineering, 2021, 18(6): 9410-9429. doi: 10.3934/mbe.2021463 |
[2] | Min Liu, Guodong Ye . A new DNA coding and hyperchaotic system based asymmetric image encryption algorithm. Mathematical Biosciences and Engineering, 2021, 18(4): 3887-3906. doi: 10.3934/mbe.2021194 |
[3] | Yuzhen Zhou, Erxi Zhu, Shan Li . An image encryption algorithm based on the double time-delay Lorenz system. Mathematical Biosciences and Engineering, 2023, 20(10): 18491-18522. doi: 10.3934/mbe.2023821 |
[4] | Zilong Liu, Jingbing Li, Jing Liu . Encrypted face recognition algorithm based on Ridgelet-DCT transform and THM chaos. Mathematical Biosciences and Engineering, 2022, 19(2): 1373-1387. doi: 10.3934/mbe.2022063 |
[5] | Zhenjun Tang, Yongzheng Yu, Hanyun Zhang, Mengzhu Yu, Chunqiang Yu, Xianquan Zhang . Robust image hashing via visual attention model and ring partition. Mathematical Biosciences and Engineering, 2019, 16(5): 6103-6120. doi: 10.3934/mbe.2019305 |
[6] | Li-na Zhang, Chen-yu Cui, Xiao-yu Zhang, Wei Wu . Adaptive visual cryptography scheme design based on QR codes. Mathematical Biosciences and Engineering, 2022, 19(12): 12160-12179. doi: 10.3934/mbe.2022566 |
[7] | Kaimeng Chen, Chin-Chen Chang . High-capacity reversible data hiding in encrypted images based on two-phase histogram shifting. Mathematical Biosciences and Engineering, 2019, 16(5): 3947-3964. doi: 10.3934/mbe.2019195 |
[8] | Xianyi Chen, Mengling Zou, Bin Yang, Zhenli Wang, Nannan Wu, Lili Qi . A visually secure image encryption method based on integer wavelet transform and rhombus prediction. Mathematical Biosciences and Engineering, 2021, 18(2): 1722-1739. doi: 10.3934/mbe.2021089 |
[9] | Qi Wang, John Blesswin A, T Manoranjitham, P Akilandeswari, Selva Mary G, Shubhangi Suryawanshi, Catherine Esther Karunya A . Securing image-based document transmission in logistics and supply chain management through cheating-resistant visual cryptographic protocols. Mathematical Biosciences and Engineering, 2023, 20(11): 19983-20001. doi: 10.3934/mbe.2023885 |
[10] | Amit Kumar, Jehad Alzabut, Sudesh Kumari, Mamta Rani, Renu Chugh . Dynamical properties of a novel one dimensional chaotic map. Mathematical Biosciences and Engineering, 2022, 19(3): 2489-2505. doi: 10.3934/mbe.2022115 |
The Indonesian Presidential Regulation No. 35 of 2018 heralds a transformative agenda for producing electrical energy from biomass in an environmentally conscious manner. Jakarta emerges as a pivotal area in this transformation, with its strategic adoption of Waste to Energy (WtE) systems. In this study, we probe into the multiple layers of community preferences and the acceptance of WtE developments in Jakarta, factoring in an array of local concerns and policy-driven directives. Through a methodologically structured choice experiment, participants weighed in on various scenarios delineating shifts from the status quo to innovative WtE technological adoptions. we scrutinize a spectrum of attributes, each with defined status quo levels and proposed advancements: From enhancing awareness of landfill impacts (P1), escalating local policy commitments (K1) and integrating waste treatment facilities (F1) to diversifying waste processing outputs into liquid (PP1), solid (PP2), gas (PP3) and electricity (PP4). We also consider the transition from unmanaged landfills to controlled applications of landfill gas (PA1) and thermal treatment (PA2), as well as the initiation of emission and pollutant monitoring (M1).Our findings illuminate a significant public inclination to move beyond the current paradigms towards embracing WtE conversions, with particular willingness to support socialization of new waste processing technologies (P1), generation of energy in various forms especially liquid (PP1) and electricity (PP4) and implementation of environmental monitoring measures (M1). These attributes were marked by a notable willingness to accept (WTA) the proposed changes, signaling a readiness for policy and infrastructural advancements in waste management.
With rapid development of the Internet, information technology, and digital communications, the status of multimedia data transmission is increasing in modern society. Image is an important information carrier in human life to display or describe directly the objective phenomena. In recent years, owing to leakages of digital image information, serious consequences have occurred. Thus, image encryption protection has become particularly important. Traditional encryption algorithms store and encrypt data as a one-dimensional string. As to images, due to the large amount of data, the calculation of encryption schemes is complicated, and the high correlation between the adjacent pixels requires a sufficient long keystream for a high security level. Therefore, a new encryption algorithm needs to be proposed for the secure communication of images.
A chaotic system refers to a deterministic system with seemingly random irregular movements, and its behavior is uncertain, unrepeatable, and unpredictable. Chaotic system is sensitive to initial conditions, and exhibits pseudorandom, ergodicity, and aperiodicity [1]. The combination of an image encryption algorithm and a chaotic system can effectively improve security and anti-cracking ability. Therefore, chaotic systems have been widely used in image encryption algorithms since they were proposed. For example, in [2], an algorithm with one-time-keys was proposed to resist brute-force attack. Albahrani et al. [3] designed a block method based image encryption with a cross map as a kind of chaotic map. To improve the robustness against common attacks, Yu et al. [4] proposed a new image encryption algorithm based on a short-time fractional Fourier transform (FrFT) and a hyperchaotic system. The diffusion operation and feedback system were designed to improve the anti-interference ability. Moreover, the use of the hyperchaotic system increases the key space and enhances sensitivity to all keys. In [5], a color image encryption algorithm was proposed by using a hyperchaotic system, of which can compress and encrypt an image according to the requirements of the reconstructed image quality. To hide efficiently the pixel distribution for the plain image, DNA based method was employed in [6] with the help of DNA random encoding rules. A generalized chaotic map and operation of fractional-order edge dection were applied into image encryption algorithm [7]. Besides of time domain encryption, Borujeni and Eshghi [8] suggested a hybrid domain based image encryption scheme including both frequency and time domains. Hybrid chaotic systems [9,10] were also be designed and applied for color image encryption Liu et al. [11] designed a new pathological image encryption scheme to ensure the secure transmission of pathological images in a telemedicine system. To effectively resist the plaintext attacks, Feng et al. [12] combined the discrete logarithm with a memristor-based chaotic system and proposed an image reconstruction encryption algorithm. The finite multiplication group used in this study has up to 128 generators, which can expand the key space and enhance the ability of the image encryption algorithm in resisting plaintext attacks. To compress multiple images into a small amount of data for the convenience of image transmission, Huang et al. [13] presented a nonlinear optical image encryption scheme that can encrypt images in both spatial and frequency domains, in which phase truncation and bitwise exclusive-OR (XOR) operation improve the robustness of the multi-image encryption scheme. In [14], a simple and efficient image encryption scheme was designed based on multiple piece-wise linear chaotic map systems. Rotational permutation operations and block diffusion operations were implemented to reach good encryption effect. Wang and Gao [15] studied the application of matrix semi-tensor product theory in a new chaotic image encryption with a Boolean network, scrambling, and diffusion. A new method of global pixel diffusion [16] by chaotic sequences was proposed for image encryption with a high security. In [17], a three-dimensional bit-level based image encryption algorithm was presented. Both the Rubik's cube method and the bit-level encryption principle were taken to realize scrambling operation. Some other image encryption algorithms [18,19,20] also show good performance by different hyeer-chaotic system, coupled map, and 2D chaotic map.
Arnold transformation is a common image pixel scrambling algorithm used to reduce the high correlation between pixels. Based on Arnold transformation and singular value decomposition (SVD) in the fractional Hartley domain, a new phase image encryption scheme was proposed in [21]. Liu et al. [22] suggested a color image encryption algorithm using Arnold transformation and color mixing operation in the discrete cosine transform (DCT) domain. Arnold transformation was used to scramble the pixels of the three channels in color image, and the DCT was used to change the pixel values in the entire spatial distribution. Sui and Gao [23] proposed a color image encryption scheme using Gyrator transform and Arnold transformation, which has two security levels to protect image content. In the encryption and decryption processes, the rotation angle of the gyrator, number of iterations in Arnold transformation, parameters of the chaotic mapping, and generated accompanying phase function were all treated as the secret keys, thereby improving the security of the system. In [24], an optical color image encryption technique based on Arnold transformation and interferometry was proposed. Color image was decomposed into three channels R, G, B, and then each channel was encrypted into two random phase masks using Arnold transformation and interference method. Chen [25] used Arnold transformation to perturb the matrix pixels by encoding a single parameter, to form an image similar to color noise and to reduce the key space for storage and transmission applications. Wang et al. [26] suggested a fast algorithm for image encryption by parallel computing, in which parallelism of diffusion is designed to implement fast operation.
According to the classification of cryptosystems, cryptography can be divided into symmetric cryptography [27,28,29,30] and asymmetric (public key) cryptography [31,32,33,34,35,36]. In an asymmetric encryption algorithm, different keys are used for encrypting and decrypting, thereby realizing the nonlinearity of the algorithm, higher security, and convenient implementation of digital signature and verification. In [33], a scalable method of asymmetric image compression and encryption was proposed based on a discrete wavelet transform (DWT) and nonlinear operations in the cylindrical diffraction domain. DWT reduces the amount of data and is more conducive to data transmission. To enhance an encryption scheme with a larger key space than traditional cryptographic systems in the FT and FrFT fields, Ren et al. [37] designed an asymmetric image encryption scheme using a phase-truncated discrete multi-parameter FrFT. After a pixel scrambling and a random-phase mask, the asymmetric ciphertext with stable white noise was obtained through phase truncation.
In order to reduce the redundancy of image transmission, compression was also considered in image encryption. For example, Chai et al. [38] proposed a visually meaningful cipher image encryption by using technology of compressive sensing. Chaotic system, kronecker product, and singular value decomposition were all combined to produce the measurement matrix. In [39], a new chaotic color image encryption scheme was presented by multi-embedding strategy and compressive sensing. Each channel of R, G, and B were compressed to obtain measurements. Although there are many new image encryption algorithms have been published, some of them still have defects, for example, (i) The keystream is generated only dependent on the secret keys; (ⅱ) It is hard to ensure the secure management of keys. In view of this, this paper combines quantum logistic map, Arnold transformation, and diffusion technology together with RSA to design an asymmetric encryption scheme, aiming to carry out high security, strong anti-attack and more suitable for network transmission. The innovations of this paper are: 1) Extract the text information of the plain image to be plain message. 2) Generate the cipher message by RSA and produce the initial conditions for quantum system by a new mathematical model. 3) Update the initial conditions by the text information of the plain image to enhance the plaintext dependence. 4) Build an end-to-start cyclic modulo diffusion operation.
The rest of this article is organized as follows. Section 2 briefly introduces the public key RSA algorithm, Arnold transformation, and quantum logistic map. Section 3 gives the image encryption and decryption processes. Section 4 displays some experimental results. Section 5 discusses the various analytical tests of the encryption results. Section 6 presents the conclusions of this study.
The public key RSA cryptosystem was proposed in 1978 by Rivest, Shamir, and Adleman. RSA encryption algorithm is an asymmetric encryption structure, which can complete the decryption operation without directly passing the keys. This method ensures security and avoids the risk of keys being cracked, which typically happens when keys are transmitted directly. In the whole encryption process, the key and algorithm are independently separated. Therefore, the key can be distributed more effectively. The specific description of the RSA algorithm is as follows:
Step 1: Randomly and secretly choose two large prime numbers p and q.
Step 2: Compute n=p×q, φ(n)=(p−1)(q−1), where φ(n) is the Euler function of n.
Step 3: Randomly select e in range 1<e<φ(n), satisfying gcd(e,φ(n))=1, where e and φ(n) are prime numbers.
Step 4: Calculate the decryption key d, where e×d=1mod(φ(n)).
Step 5: Open integers n and e, and keep d in secret.
Step 6: Encrypt plaintext m to be ciphertext c by c=memodn.
Step 7: Decrypt ciphertext c to be plaintext m by m=cdmodn.
Logistic map is a classical mathematical model used to study the behaviors of complex systems, such as dynamic systems, fractals, and chaos. In physics, if a physical quantity has the smallest indivisible basic unit, then this physical quantity is quantized, and the smallest unit is called a quantum. The quantum state is introduced into the chaotic system to form a quantum logistic map. The coupling of the system and harmonic oscillator path will produce a quantum logistic map with quantum correction. Akhshani et al. [40] applied quantum logistic map for image encryption, and its quantum logistic map is defined as,
{xn+1=r(xn−|xn|2)−rynyn+1=−yne−2β+e−βr[(2−xn−x∗n)yn−xnz∗n−x∗nzn]zn+1=−zne−2β+e−βr[2(1−x∗n)zn−2xnyn−xn} | (1) |
where β and r represent the dissipation parameter and adjustable parameter, respectively, and x∗n, z∗n are the conjugate complex numbers of xn and zn, respectively. When one sets r=3.99 and β⩾6, the quantum logistic map shows higher chaotic characteristics [40]. So, in this study, r=3.99 and β=7 are set with all initial parameters be real numbers. As pointed by [40]: classical nonlinear chaotic systems are famous because of their exponential sensitivity to each initial condition. However, the linearity of quantum mechanics not only shows such sensitivity to each initial condition, and also the Heisenberg uncertainty principle (HUP) prevents us from talking about initial conditions in quantum mechanics. Therefore, for this interesting property, quantum logistic map can also be used in cryptography, for example image encryption. In view of these good characteristics of quantum logistic map, many image encryption algorithms [41,42,43] based on it have been proposed.
Arnold transformation is a scrambling operation that can randomly change the pixel position for an image, which is also called a cat map. By rearranging the pixels in a digital image matrix, the originally meaningful image will become a meaningless image. Arnold transformation is defined as follows:
[xn+1yn+1]=[1112][xnyn]modN | (2) |
By replacing the matrix of above Arnold transformation, a generalized Arnold transformation can be obtained, which is defined as
[xn+1yn+1]=[1baab+1][xnyn]modN | (3) |
where a,b and N are positive integers, (xn,yn) are the coordinates of the pixel in the original image, and (xn+1,yn+1) are the coordinate positions after transformation. Arnold transformation is a reversible mapping, and its corresponding inverse transformation is defined as
[xn+1yn+1]=[ab+1−b−a1][xnyn]modN | (4) |
Arnold transformation is reversible, and it is easy to be implemented. Therefore, this study combines Arnold transformation with the quantum logistic system and other technologies to design a new image encryption scheme.
This study integrates the quantum logistic map, the RSA algorithm, the Arnold transformation, and the diffusion operation to realize a new asymmetric image encryption scheme. The framework of the proposed image encryption scheme is shown in Figure 1. The detail encryption steps are as follows:
Step 1: Select large prime numbers p and q, and calculate public key e and private key d.
Step 2: Read plain image P with size M×N.
Step 3: Extract the text information of the image, i.e., R=∑Mi=1∑Nj=1P(i,j), for public information.
Step 4: Select three plain parameters ai(i=1,2,3) and encrypt them with the public key to obtain the public parameters ci=aeimodn.
Step 5: Calculate the initial values: x0=(c1+a1)/(k1c1+k2a1), y0=(c2+a2)/(k1c2+k2a2), z0=(c3+a3)/(k1c3+k2a3), where k1=3,k2=5.
Step 6: Update the initial values: x′0=mod(x0+R1,1), y′0=mod(y0+R1,1), z′0=mod(z0+R1,1), where R1=(R+1)/(255×M×N+1).
Step 7: The updated initial values are substituted into quantum logistic map. After discarding the first 500 values of the sequence, the chaotic sequences x,y,z are obtained.
Step 8: Process the sequences as,
{X=mod(fix(x(1:M)×1014),256)Y=mod(fix(y(1:N)×1014),256)Z=mod(fix(z×1014),256) | (5) |
Step 9: Perform Arnold scrambling operation on the plain image to obtain the scrambled image . The values of , , and in the Arnold map are calculated as
ma=mod(sum(X),mc)+1 | (6) |
mb=mod(sum(Y),mc)+1 | (7) |
where mc=mod(sum(Z),R)+1.
Step 10: For the image A, perform XOR diffusion operation by row for it to obtain image B as,
Bi=Ai⊕Xi | (8) |
where i=1,2,⋯,M.
Step 11: Perform diffusion under modulo operation by row again to obtain image C as,
Ci=mod(Bi+Zi+Ci−1,256) | (9) |
where i=1,2,⋯,M. C0 is a constant.
Step 12: Connect the last row of image C with the first row of C and perform diffusion under modulo operation for rows again to obtain image D as,
D1=mod(C1+Z1+CM,256) | (10) |
Di=mod(Ci+Zi+Di−1,256) | (11) |
where i=2,3,⋯,M.
Step 13: The column direction is similar to the row direction. For image D, take the column as a unit and perform the XOR diffusion operation on the corresponding component of each column and Y to obtain image E as,
Ej=Dj⊕Yj | (12) |
where j=1,2,⋯,N.
Step 14: Perform modulo diffusion to each column to obtain image F as,
Fj=mod(Ej+Zj+Fj−1,256) | (13) |
where j=1,2,⋯,N. F0 is a constant.
Step 15: Connect the last column of the image F with the first column of F and perform modulo diffusion in the column direction again to obtain the cipher image G as,
G1=mod(F1+Z1+FN,256) | (14) |
Gj=mod(Fj+Zj+Gj−1,256) | (15) |
where j=2,3,⋯,N.
The receiver has a cipher image G, public parameters c1,c2,c3,r,β, and R, and private key (d,n). Figure 2 is the decryption flowchart of the proposed algorithm. The specific steps of decryption are as follows:
Step 1: Use the private key (d,n) to decrypt the public parameters ai=cdimodn.
Step 2: Read the cipher image G with size M×N.
Step 3: Calculate the initial value x0=(c1+a1)/(3c1+5a1), y0=(c2+a2)/(3c2+5a2), z0=(c3+a3)/(3c3+5a3).
Step 4: Update the initial values x0′=mod(x0+R1,1), y0′=mod(y0+R1,1), z0′=mod(z0+R1,1), where R1=(R+1)/(255×M×N+1).
Step 5: By iterating quantum logistic map, and discarding the first 500 values of the sequence, obtain the chaotic sequence x′,y′,z′.
Step 6: Use Eq (5) to process the sequence and get X′,Y′,Z′.
Step 7: Calculate the two control parameters ma′ and mb′ of the Arnold map using Eqs (6) and (7).
Step 8: Use images G and Z′ to perform the inverse modulo operation of the corresponding columns to derive image F′ as,
Fj′=mod(Gj−Gj−1−Zj′,256) | (16) |
F1′=mod(G1−Z1′−FN′,256) | (17) |
where j=2,3,⋯,N.
Step 9: Use image F′ to perform the inverse modulo operation of the corresponding columns to derive image E′ as,
Ej′=mod(Fj′−Fj−1′−Zj′,256) | (18) |
where j=1,2,⋯,N. F′0 is a constant.
Step 10: Use images E′ and Y′ to perform the XOR diffusion operation of the corresponding column to derive image D′ as,
Dj′=Ej′⊕Yj′ | (19) |
where j=1,2,⋯,N
Step 11: The row direction is similar to the column direction. Use Z′ to perform the inverse modulo diffusion operation in the row direction, and then use X′ to perform the XOR diffusion of the corresponding rows to derive image A′.
Step 12: According to the parameter values ma′ and mb′, use Eq (4) to perform the inverse operation of the Arnold map and obtain the plain image P′.
Grayscale and color images (some from the USC-SIPI database) are taken for testing. Windows 10 operating system is used with an AMD Ryzen 7 1700 8-core processor and 8 GB memory, and the simulations are performed on MATLAB R2017b. Table 1 shows the values of each parameter in our test. Among them, a1,a2,a3,q,p and d are the private keys, as well as e,r,β,c1,c2 and c3 are the public keys. Figures 3 and 4 present the test images and their corresponding cipher images, respectively. So, no useful information about the plain image can be seen from these cipher images. Figure 5 shows the corresponding correct decrypted images. So, the proposed cryptographic scheme can be applied to both grayscale and color images. Table 2 shows the time required to encrypt images of different sizes. As we see that our scheme can be implemented by a fast way.
Parameter | Value | Parameter | Value |
q | 1733 | a2 | 15 |
p | 1697 | a3 | 20 |
e | 163 | r | 3.99 |
a1 | 7 | β | 7 |
d | 2,757,259 | c1 | 2,855,219 |
c2 | 164,340 | c3 | 128,682 |
Image size | Initial value generation | Confusion-diffusion encryption | Total time |
256 × 256 | 0.014931 | 0.337695 | 0.394836 |
512 × 512 | 0.059334 | 0.699589 | 0.735226 |
Histogram analysis [44,45] shows how pixels are distributed in an image by plotting the number of observations for each brightness level. The frequency distribution of pixel values implies the statistical correlation between the plain images and the cipher images. A good image encryption system should have the ability to hide correlations; that is, the frequency distribution of the cipher on the pixel value is uniform, and the attacker cannot infer the plain information from it. To verify the uniformity of the pixel distribution of the proposed encryption algorithm, Figure 6 (a)–(c) and (d)–(f) show the histograms of the grayscale and encrypted images, respectively. Figure 7 is the histogram of the Baboon color image with three channels. To further evaluate the uniformity of the histogram, the statistical chi-square test was also performed, which is defined as,
χ2=255∑L=0(oL−eL)2eL | (20) |
where L is the intensity level, oL and eL are the observation reference and expected reference of the L gray level in the cipher image, respectively. The results of evaluating the uniformity of cipher images based on the chi-square values are shown in Table 3. Table 4 shows the chi-square comparison results. The smaller the chi-square value, the more uniform the pixel distribution and the higher the security. The histogram of the cipher image is evenly distributed, and the chi-square value is much smaller than the value of the plain image, which effectively improves resistivity against statistical attacks.
Image | Plain-image | Cipher-image | Results |
Goldhill | 161621.1816 | 279.9395 | Pass |
Sailboat | 179772.6055 | 240.8535 | Pass |
Peppers (Grayscale) | 138836.1738 | 287.2168 | Pass |
Sun | 319180.5827 | 273.1582 | Pass |
Baboon | 101863.4615 | 266.8301 | Pass |
Peppers (Color) | 340999.4414 | 246.8555 | Pass |
Reference | Baboon | ||
R | G | B | |
This Paper | 227.05 | 214.01 | 254.08 |
Ref. [46] | 287.56 | 227.89 | 259.78 |
Another measurement of statistical analyses is correlation [47,48,49,50]. For a natural digital image, there is a strong correlation between adjacent pixels in the horizontal, vertical, and diagonal directions. The lower correlation of adjacent pixels in a cipher image, the better performance of an encryption algorithm. A good cryptographic scheme should eliminate this correlation in a quantitative way to ensure security. The correlation coefficient is defined as
Rx′y′=cov(x′,y′)√D(x′)√D(y′) | (21) |
cov(x′,y′)=1NN∑i=1(x′i−E(x′))(y′i−E(y′)) | (22) |
E(x′)=1NN∑i=1x′i | (23) |
D(x′)=1NN∑i=1(x′i−E(x′))2 | (24) |
where Rx′y′ represents the correlation coefficient, x′ and y′ are the gray values of two adjacent pixels, and N is the total logarithm. Figure 8 shows the correlation of three directions of the grayscale image sailboat. Tables 5 and 6 show the correlation coefficient values of the test images. Table 7 shows the correlation coefficient comparisons of Baboon. The data in the tables show that the correlation coefficient of the plain images is close to 1, which means that the correlation coefficient between adjacent pixels is very strong. By using the proposed scheme, the values become close to 0, which means that our scheme can eliminate the strong correlation.
Image | Plain-image | Cipher-image | ||||
Horizontal | Vertical | Diagonal | Horizontal | Vertical | Diagonal | |
Goldhill | 0.9752 | 0.9708 | 0.9524 | -0.0151 | 0.0209 | 0.0078 |
Sailboat | 0.9721 | 0.9743 | 0.9602 | 0.0154 | 0.0106 | 0.0075 |
Peppers | 0.9833 | 0.9796 | 0.9684 | 0.0139 | 0.0054 | 0.0153 |
Image | Direction | Plain-image | Cipher-image | ||||
R | G | B | R | G | B | ||
Sun | Horizontal | 0.9561 | 0.9504 | 0.9584 | 0.0049 | -0.0041 | 0.0025 |
Vertical | 0.9553 | 0.9473 | 0.9569 | 0.0018 | 0.0102 | 0.0110 | |
Diagonal | 0.9338 | 0.9258 | 0.9359 | -0.0181 | 0.0029 | -0.0087 | |
Peppers | Horizontal | 0.9660 | 0.9811 | 0.9661 | 0.0092 | -0.0054 | 0.0103 |
Vertical | 0.9656 | 0.9822 | 0.9669 | 0.0059 | 0.0140 | 0.0118 | |
Diagonal | 0.9584 | 0.9630 | 0.9489 | -0.0093 | 0.0030 | 0.0092 | |
Baboon | Horizontal | 0.8620 | 0.7559 | 0.8838 | -0.0033 | 0.0228 | -0.0047 |
Vertical | 0.9230 | 0.8658 | 0.9104 | 0.0046 | 0.0063 | -0.0045 | |
Diagonal | 0.8536 | 0.7359 | 0.8428 | 0.0140 | 0.0050 | 0.0104 |
Method | Direction | Cipher-image | ||
R | G | B | ||
Ref. [49] | Horizontal | -0.0174 | -0.0048 | 0.0086 |
Vertical | -0.0021 | -0.0020 | 0.0727 | |
Diagonal | 0.0182 | -0.0096 | -0.0073 | |
Ours | Horizontal | 0.0092 | -0.0054 | 0.0103 |
Vertical | 0.0059 | 0.0140 | 0.0118 | |
Diagonal | -0.0093 | 0.0030 | 0.0092 |
In information theory, entropy is an important index to measure the degree of randomness of a message. Ideally, each pixel of an 8-bit cipher image has a theory entropy value of 8. The higher the information entropy value, the more uniform of gray value distribution and the more random of an image. The calculation formula of information entropy is,
H(x)=−∑Ni=0p(xi)log2p(xi) | (25) |
where p(xi) is the probability of the occurrence of xi, and N is the total number of xi. Tables 8 and 9 show the information entropy tests for different images. These results tell us that the information entropy values of the cipher image are very close to 8, indicating that the encryption scheme has strong randomness.
Image | Goldhill | Sailboat | Peppers |
Plain-image | 7.47778 | 7.48452 | 7.57148 |
Cipher-image | 7.99923 | 7.99934 | 7.99921 |
Image | Baboon | Peppers | ||||
R | G | B | R | G | B | |
Plain-image | 7.70667 | 7.47443 | 7.75222 | 7.338832 | 7.496255 | 7.05831 |
Cipher-image | 7.999377 | 7.99941 | 7.99927 | 7.99934 | 7.99924 | 7.99932 |
Usually, an image has high data redundancy; therefore, its pixels have a high correlation with neighboring pixels. For a secure cipher image, the pixel values should be evenly distributed to achieve high randomness and high security. Local information entropy is another qualitative criterion for evaluating the randomness of an image, which is defined as,
¯H(k,TB)(Si)=k∑i=1H(Si)k | (26) |
where Si represents the optional k groups of pixels in the image, and TB represents the number of pixels in Si. The local information entropy values of the grayscale and color images are tested and shown in Tables 10 and 11, respectively. Based on these results, it can be seen that the local information entropy of the cipher image has surpassed 7.95, indicating that the distribution of pixel values inside the image is very uniform and random.
Image | Goldhill | Sailboat | Peppers |
Plain-local | 6.48739 | 6.47318 | 6.55437 |
Cipher-local | 7.95391 | 7.95486 | 7.95317 |
Image | Baboon | Peppers | ||||
R | G | B | R | G | B | |
Plain-local | 6.75219 | 7.04211 | 7.00261 | 6.35622 | 6.45065 | 6.30729 |
Cipher-local | 7.95617 | 7.95727 | 7.95342 | 7.95686 | 7.95521 | 7.95294 |
The ideal property of a good encryption method should be sensitive to any small change in the plain image. That is, when the plain image has a small change in any pixel, the difference of the cipher image is analyzed to evaluate the diffusion performance of the encryption algorithm and should have the ability to resist differential attacks. The number of pixel change rate (NPCR) and unified average changing intensity (UACI) are two standards used for testing. The formulas are,
D(i,j)={0,if C1(i,j)=C2(i,j)1,if C1(i,j)≠C2(i,j) | (27) |
NPCR(C1,C2)=M∑i=1N∑j=1D(i,j)M×N×100% | (28) |
UACI(C1,C2)=M∑i=1N∑j=1|C1(i,j)−C2(i,j)|M×N×255×100% | (29) |
where C1 is one cipher image, C2 is another cipher image with one pixel in the same plain image changes. The theory values for NPCR and UACI are 99.6093 and 33.4635% respectively. Tables 12 and 13 present the average values of NPCR and UACI for grayscale and color images, respectively. Table 14 lists the comparisons by testing image Lena. All these test results show that the proposed asymmetric image encryption scheme has the ability to resist differential attacks.
Image | NPCR | UACI |
Goldhill | 99.6124 | 33.4522 |
Sailboat | 99.6129 | 33.4302 |
Peppers | 99.6086 | 33.4398 |
Image | Sun | Baboon | Peppers | ||||||
R | G | B | R | G | B | R | G | B | |
NPCR | 99.6134 | 99.6107 | 99.5951 | 99.6089 | 99.5975 | 99.6017 | 99.6010 | 99.6126 | 99.6092 |
UACI | 33.4784 | 33.4314 | 33.4631 | 33.4457 | 33.4622 | 33.4176 | 33.4744 | 33.4806 | 33.4139 |
Method | NPCR | UACI | Image size |
Ours | 99.6136 | 33.4643 | 512 × 512 |
Ours | 99.6078 | 33.3123 | 256 × 256 |
Ref. [44] | 99.7904 | 33.4970 | 512 × 512 |
Ref. [45] | 99.6033 | 28.6797 | 512 × 512 |
Ref. [46] | 99.5911 | 33.4208 | 256 × 256 |
An extremely high key sensitivity can guarantee the security of an encryption system against the brute force attacks. To evaluate the sensitivity of keys, the 512×512 image Sailboat is used as an example for testing. Figure 9 shows the key sensitivity analysis results. Moreover, Figure 9(d) shows that even if a small key change occurs, the cipher image experiences a big difference. These test results show that only the correct key can decrypt the image, and the image encryption algorithm is highly sensitive to the keys and has the ability to resist brute force attacks.
The asymmetric image encryption algorithm proposed in this paper is suitable for grayscale and color images. Taking color image as an example, Table 15 shows the information entropy comparisons with other image encryption algorithms. The values in the table express that the information entropy result of the proposed scheme in this paper is closer to 8, indicating that the gray value distribution in the proposed asymmetric encryption scheme is more uniform and random than that of other algorithms.
Image | size | Method | Information entropy | ||
R | G | B | |||
Peppers | 512 × 512 | Ours | 7.9993 | 7.9992 | 7.9993 |
256 × 256 | Ours | 7.9987 | 7.9984 | 7.9987 | |
256 × 256 | Ref. [6] | 7.9979 | 7.9979 | 7.9979 | |
512 × 512 | Ref. [14] | 7.9991 | 7.9992 | 7.9993 | |
256 × 256 | Ref. [47] | 7.9986 | 7.9987 | 7.9985 | |
256 × 256 | Ref. [48] | 7.9911 | 7.9912 | 7.9915 | |
256 × 256 | Ref. [49] | 7.9962 | 7.9929 | 7.9725 | |
Baboon | 512 × 512 | Ours | 7.9994 | 7.9994 | 7.9993 |
256 × 256 | Ours | 7.9981 | 7.9982 | 7.9979 | |
256 × 256 | Ref. [48] | 7.9914 | 7.9915 | 7.9915 | |
256 × 256 | Ref. [49] | 7.9923 | 7.9803 | 7.9986 |
This study employed a chaotic quantum logistic map, combining with both scrambling and diffusion operations, to propose a new asymmetric image encryption algorithm. First, the Arnold map was used to scramble the pixel positions of the plain images to achieve information hiding in the first layer. In the diffusion stage, different from the conventional point-to-point diffusion method, our solution took each row and each column as different units to perform diffusion operation. As to the row direction, the data in each row are first XOR-diffused. Then, each row in the image and the corresponding row in the keystream matrix are modulated and diffused; that is, two cyclic diffusions are realized by connecting the start and end. Operations to the column direction use a similar process to obtain the cipher image. Among them, the initial values of the quantum logistic map are related to the plain image, which can resist the known plaintext attack and chosen plaintext attack. Experimental tests and analyses show that the new asymmetric image encryption scheme proposed in this paper is suitable for both grayscale and color images, can better distribute pixel values be uniform, reduce high correlation, is highly sensitive to keys, and has the ability to resist various attacks.
However, there is still some disadvantages, for example, the compression operation was not considered in our scheme. So, in the future work, image can be compressed to reduce data redundancy, and how to achieve a good balance between the security and the complexity of image reconstruction should be taken into consideration. In addition, fast implement of encryption scheme is also an important issue in the future research.
The authors would like to thank the reviewers for their valuable comments and the editor's helpful suggestions. This work was supported in part by the National Natural Science Foundation of China (No.61972103), the Natural Science Foundation of Guangdong Province of China (No.2019A1515011361), and the Key Scientific Research Project of Education Department of Guangdong Province of China (No.2020ZDZX3064).
The authors declare that they have no conflict of interest.
[1] | M. Binkley et al., "Defining Twenty-First Century Skills BT - Assessment and Teaching of 21st Century Skills, " P. Griffin, B. McGaw, and E. Care, Eds. Dordrecht: Springer Netherlands, 2012, pp. 17–66. |
[2] | Harman K, Bich NTN (2010) Reforming Teaching and Learning in Vietnam's Higher Education System BT - Reforming Higher Education in Vietnam: Challenges and Priorities. In: Harman G, Hayden M, Nghi PT (eds). Springer Netherlands, Dordrecht, pp 65–86 |
[3] |
Pakpour AH, Zeidi IM, Emamjomeh MM, et al (2014) Household waste behaviours among a community sample in Iran: An application of the theory of planned behaviour. Waste Manag 34: 980–986. https://doi.org/https://doi.org/10.1016/j.wasman.2013.10.028 doi: 10.1016/j.wasman.2013.10.028
![]() |
[4] | Peraturan Presiden Indonesia, Perpres No 83/2018. 2018. |
[5] |
Sugiyono A, Adiarso (2021) Development of Natural Gas Infrastructure to Enhance National Energy Security in Indonesia. IOP Conf Ser Mater Sci Eng 1053: 12099. https://doi.org/10.1088/1757-899x/1053/1/012099 doi: 10.1088/1757-899x/1053/1/012099
![]() |
[6] | Erahman QF, Purwanto WW (2021) Energy Security: A Case Study of Indonesia BT - Energy and Environmental Security in Developing Countries. In: Asif M (ed). Springer International Publishing, Cham, pp 49–74 |
[7] | Kumara INS, Ariastina WG, Sukerayasa IW, Giriantari IAD (2014) On the potential and progress of renewable electricity generation in Bali. In: 2014 6th International Conference on Information Technology and Electrical Engineering (ICITEE). pp 1–6 |
[8] |
Yana S, Nizar M, Irhamni, Mulyati D (2022) Biomass waste as a renewable energy in developing bio-based economies in Indonesia: A review. Renew Sustain Energy Rev 160: 112268. https://doi.org/https://doi.org/10.1016/j.rser.2022.112268 doi: 10.1016/j.rser.2022.112268
![]() |
[9] |
Sharvini SR, Noor ZZ, Chong CS, et al (2018) Energy consumption trends and their linkages with renewable energy policies in East and Southeast Asian countries: Challenges and opportunities. Sustain Environ Res 28: 257–266. https://doi.org/https://doi.org/10.1016/j.serj.2018.08.006 doi: 10.1016/j.serj.2018.08.006
![]() |
[10] | Pambudi NA, Firdaus RA, Rizkiana R, et al (2023) Renewable Energy in Indonesia: Current Status, Potential, and Future Development. Sustainability 15 |
[11] | Soonmin H, Lomi A, Okoroigwe EC, Urrego LR (2019) Investigation of Solar Energy: The Case Study in. 9: |
[12] |
Anitha K, Verchot L V, Joseph S, et al (2015) A review of forest and tree plantation biomass equations in Indonesia. Ann For Sci 72: 981–997. https://doi.org/10.1007/s13595-015-0507-4 doi: 10.1007/s13595-015-0507-4
![]() |
[13] |
Afifah AS, Suryawan IWK, Sarwono A (2020) Microalgae production using photo-bioreactor with intermittent aeration for municipal wastewater substrate and nutrient removal. Commun Sci Technol 5: 107–111. https://doi.org/10.21924/cst.5.2.2020.200 doi: 10.21924/cst.5.2.2020.200
![]() |
[14] | Sari MM, Inoue T, Harryes RK, et al (2022) Potential of Recycle Marine Debris in Pluit Emplacement, Jakarta to Achieve Sustainable Reduction of Marine Waste Generation. Int J Sustain Dev Plan 17: 119–125 |
[15] |
Malico I, Nepomuceno Pereira R, Gonçalves AC, Sousa AMO (2019) Current status and future perspectives for energy production from solid biomass in the European industry. Renew Sustain Energy Rev 112: 960–977. https://doi.org/https://doi.org/10.1016/j.rser.2019.06.022 doi: 10.1016/j.rser.2019.06.022
![]() |
[16] |
Sirohi R, Kumar Gaur V, Kumar Pandey A, et al (2021) Harnessing fruit waste for poly-3-hydroxybutyrate production: A review. Bioresour Technol 326: 124734. https://doi.org/https://doi.org/10.1016/j.biortech.2021.124734 doi: 10.1016/j.biortech.2021.124734
![]() |
[17] |
Amen R, Hameed J, Albashar G, et al (2021) Modelling the higher heating value of municipal solid waste for assessment of waste-to-energy potential: A sustainable case study. J Clean Prod 287: 125575. https://doi.org/https://doi.org/10.1016/j.jclepro.2020.125575 doi: 10.1016/j.jclepro.2020.125575
![]() |
[18] |
Ali Shah SA, Longsheng C, Solangi YA, et al (2021) Energy trilemma based prioritization of waste-to-energy technologies: Implications for post-COVID-19 green economic recovery in Pakistan. J Clean Prod 284: 124729. https://doi.org/https://doi.org/10.1016/j.jclepro.2020.124729 doi: 10.1016/j.jclepro.2020.124729
![]() |
[19] |
Jakobsson C, Fujii S, Gä rling T (2000) Determinants of private car users' acceptance of road pricing. Transp Policy 7: 153–158. https://doi.org/https://doi.org/10.1016/S0967-070X(00)00005-6 doi: 10.1016/S0967-070X(00)00005-6
![]() |
[20] |
Mills B, Schleich J (2010) What's driving energy efficient appliance label awareness and purchase propensity? Energy Policy 38: 814–825. https://doi.org/https://doi.org/10.1016/j.enpol.2009.10.028 doi: 10.1016/j.enpol.2009.10.028
![]() |
[21] |
Achillas C, Vlachokostas C, Moussiopoulos N, et al (2011) Social acceptance for the development of a waste-to-energy plant in an urban area. Resour Conserv Recycl 55: 857–863. https://doi.org/https://doi.org/10.1016/j.resconrec.2011.04.012 doi: 10.1016/j.resconrec.2011.04.012
![]() |
[22] |
Upreti BR, van der Horst D (2004) National renewable energy policy and local opposition in the UK: the failed development of a biomass electricity plant. Biomass Bioenergy 26: 61–69. https://doi.org/https://doi.org/10.1016/S0961-9534(03)00099-0 doi: 10.1016/S0961-9534(03)00099-0
![]() |
[23] |
Baxter J, Ho Y, Rollins Y, Maclaren V (2016) Attitudes toward waste to energy facilities and impacts on diversion in Ontario, Canada. Waste Manag 50: 75–85. https://doi.org/https://doi.org/10.1016/j.wasman.2016.02.017 doi: 10.1016/j.wasman.2016.02.017
![]() |
[24] |
He J, Lin B (2019) Assessment of waste incineration power with considerations of subsidies and emissions in China. Energy Policy 126: 190–199. https://doi.org/https://doi.org/10.1016/j.enpol.2018.11.025 doi: 10.1016/j.enpol.2018.11.025
![]() |
[25] |
Bondes M, Johnson T (2017) Beyond Localized Environmental Contention: Horizontal and Vertical Diffusion in a Chinese Anti-Incinerator Campaign. J Contemp China 26: 504–520. https://doi.org/10.1080/10670564.2017.1275079 doi: 10.1080/10670564.2017.1275079
![]() |
[26] |
Damayanti P, Moersidik SS, Haryanto JT (2021) Waste to Energy in Sunter, Jakarta, Indonesia: Plans and Challenges. IOP Conf Ser Earth Environ Sci 940: 012033. https://doi.org/10.1088/1755-1315/940/1/012033 doi: 10.1088/1755-1315/940/1/012033
![]() |
[27] |
Mulyadin R M, Ariawan K, Iqbal M (2018)Conflict of waste management in DKI Jakarta and its recomended solutions. J Analisis Kebijakan Kehutanan 15: 179–191. https://doi.org/10.20886/jakk.2018.15.2.179-191 doi: 10.20886/jakk.2018.15.2.179-191
![]() |
[28] |
Sagala G, Kristanto GA, Kusuma MA, Rizki S (2018) Assessment of municipal solid waste as refuse derived fuel in the cement industry. Int J Adv Sci Eng Inf Technol 8: 1062–1070. https://doi.org/10.18517/ijaseit.8.4.3469 doi: 10.18517/ijaseit.8.4.3469
![]() |
[29] | Guo M, Nowakowska-Grunt J, Gorbanyov V, Egorova M (2020) Green Technology and Sustainable Development: Assessment and Green Growth Frameworks. Sustain. 12 |
[30] |
Haghani M, Bliemer MCJ, Rose JM, et al (2021) Hypothetical bias in stated choice experiments: Part I. Macro-scale analysis of literature and integrative synthesis of empirical evidence from applied economics, experimental psychology and neuroimaging. J Choice Model 41: 100309. https://doi.org/https://doi.org/10.1016/j.jocm.2021.100309 doi: 10.1016/j.jocm.2021.100309
![]() |
[31] |
Rahaman MM, Iqbal MH (2021) Willingness-to-pay for improved cyclone early warning services across coastal Bangladesh: Application of choice experiment. Int J Disaster Risk Reduct 61: 102344. https://doi.org/https://doi.org/10.1016/j.ijdrr.2021.102344 doi: 10.1016/j.ijdrr.2021.102344
![]() |
[32] | Mazzocchi C, Orsi L, Sali G (2021) Consumers' Attitudes for Sustainable Mountain Cheese. Sustain. 13 |
[33] | Medeiros G, Florindo T, Talamini E, et al (2020) Optimising Tree Plantation Land Use in Brazil by Analysing Trade-Offs between Economic and Environmental Factors Using Multi-Objective Programming. For. 11 |
[34] |
Grilli G, Tyllianakis E, Luisetti T, et al (2021) Prospective tourist preferences for sustainable tourism development in Small Island Developing States. Tour Manag 82: 104178. https://doi.org/https://doi.org/10.1016/j.tourman.2020.104178 doi: 10.1016/j.tourman.2020.104178
![]() |
[35] |
Tomić T, Schneider DR (2020) Circular economy in waste management – Socio-economic effect of changes in waste management system structure. J Environ Manage 267: 110564. https://doi.org/https://doi.org/10.1016/j.jenvman.2020.110564 doi: 10.1016/j.jenvman.2020.110564
![]() |
[36] |
Khan AH, López-Maldonado EA, Alam SS, et al (2022) Municipal solid waste generation and the current state of waste-to-energy potential: State of art review. Energy Convers Manag 267: 115905. https://doi.org/https://doi.org/10.1016/j.enconman.2022.115905 doi: 10.1016/j.enconman.2022.115905
![]() |
[37] |
Iqbal A, Liu X, Chen G-H (2020) Municipal solid waste: Review of best practices in application of life cycle assessment and sustainable management techniques. Sci Total Environ 729: 138622. https://doi.org/https://doi.org/10.1016/j.scitotenv.2020.138622 doi: 10.1016/j.scitotenv.2020.138622
![]() |
[38] |
Istrate I-R, Iribarren D, Gálvez-Martos J-L, Dufour J (2020) Review of life-cycle environmental consequences of waste-to-energy solutions on the municipal solid waste management system. Resour Conserv Recycl 157: 104778. https://doi.org/https://doi.org/10.1016/j.resconrec.2020.104778 doi: 10.1016/j.resconrec.2020.104778
![]() |
[39] |
Al-Shetwi AQ (2022) Sustainable development of renewable energy integrated power sector: Trends, environmental impacts, and recent challenges. Sci Total Environ 822: 153645. https://doi.org/https://doi.org/10.1016/j.scitotenv.2022.153645 doi: 10.1016/j.scitotenv.2022.153645
![]() |
[40] |
Gutberlet J, Sorroche S, Martins Baeder A, et al (2021) Waste Pickers and Their Practices of Insurgency and Environmental Stewardship. J Environ Dev 30: 369–394. https://doi.org/10.1177/10704965211055328 doi: 10.1177/10704965211055328
![]() |
[41] |
Mö slinger M, Ulpiani G, Vetters N (2023) Circular economy and waste management to empower a climate-neutral urban future. J Clean Prod 421: 138454. https://doi.org/https://doi.org/10.1016/j.jclepro.2023.138454 doi: 10.1016/j.jclepro.2023.138454
![]() |
[42] | Nie P, Dahanayake KC, Sumanarathna N (2023) Exploring UAE's transition towards circular economy through construction and demolition waste management in the pre-construction stage–A case study approach. Smart Sustain Built Environ ahead-of-p: https://doi.org/10.1108/SASBE-06-2022-0115 |
[43] |
Suryawan IWK, Lee C-H (2023a) Citizens' willingness to pay for adaptive municipal solid waste management services in Jakarta, Indonesia. Sustain Cities Soc 97. https://doi.org/https://doi.org/10.1016/j.scs.2023.104765 doi: 10.1016/j.scs.2023.104765
![]() |
[44] | Montorsi L, Milani M, Venturelli M (2018) Economic assessment of an integrated waste to energy system for an urban sewage treatment plant: A numerical approach Energy, 158: 105-110. |
[45] |
Malinauskaite J, Jouhara H, Czajczyńska D, et al (2017) Municipal solid waste management and waste-to-energy in the context of a circular economy and energy recycling in Europe. Energy 141: 2013–2044. https://doi.org/https://doi.org/10.1016/j.energy.2017.11.128 doi: 10.1016/j.energy.2017.11.128
![]() |
[46] | Suryawan IWK, Septiariva IY, Fauziah EN, et al (2022) Municipal Solid Waste to Energy : Palletization of Paper and Garden Waste into Refuse Derived Fuel. J Ecol Eng 23: 64–74 |
[47] |
Tozlu A, Ö zahi E, Abuşoğlu A (2016) Waste to energy technologies for municipal solid waste management in Gaziantep. Renew Sustain Energy Rev 54: 809–815. https://doi.org/https://doi.org/10.1016/j.rser.2015.10.097 doi: 10.1016/j.rser.2015.10.097
![]() |
[48] |
Duan Z, Kjeldsen P, Scheutz C (2021) Trace gas composition in landfill gas at Danish landfills receiving low-organic waste. Waste Manag 122: 113–123. https://doi.org/https://doi.org/10.1016/j.wasman.2021.01.001 doi: 10.1016/j.wasman.2021.01.001
![]() |
[49] |
Fetanat A, Mofid H, Mehrannia M, Shafipour G (2019) Informing energy justice based decision-making framework for waste-to-energy technologies selection in sustainable waste management: A case of Iran. J Clean Prod 228: 1377–1390. https://doi.org/https://doi.org/10.1016/j.jclepro.2019.04.215 doi: 10.1016/j.jclepro.2019.04.215
![]() |
[50] |
Huang GC-L, Chen R-Y (2021) Injustices in phasing out nuclear power?: Exploring limited public participation and transparency in Taiwan's transition away from nuclear energy. Energy Res Soc Sci 71: 101808. https://doi.org/https://doi.org/10.1016/j.erss.2020.101808 doi: 10.1016/j.erss.2020.101808
![]() |
[51] | Badan Pusat Statistik provinsi DKI Jakarta, "Provinsi DKI Jakarta Dalam Angka 2021, " Provinsi DKI Jakarta Dalam Angka 2021, 2021. |
[52] |
Suryawan IWK, Lee C-H (2023) Community preferences in carbon reduction: Unveiling the importance of adaptive capacity for solid waste management. Ecol Indic 157: 111226. https://doi.org/https://doi.org/10.1016/j.ecolind.2023.111226 doi: 10.1016/j.ecolind.2023.111226
![]() |
[53] | Suryawan IWK, Septiariva IY, Sari MM, et al (2023) Acceptance of Waste to Energy (WtE) Technology by Local Residents of Jakarta City, Indonesia to Achieve Sustainable Clean and Environmentally Friendly Energy. J Sustain Dev Energy, Water Environ Syst 11: 1004 |
[54] | Shipe ME, Deppen SA, Farjah F, Grogan EL (2019) Developing prediction models for clinical use using logistic regression: an overview. J Thorac Dis 11: S574–S584. https://doi.org/10.21037/jtd.2019.01.25 |
[55] |
Li W, Long R, Chen H, et al (2020) Willingness to pay for hydrogen fuel cell electric vehicles in China: A choice experiment analysis. Int J Hydrogen Energy 45: 34346–34353. https://doi.org/https://doi.org/10.1016/j.ijhydene.2020.01.046 doi: 10.1016/j.ijhydene.2020.01.046
![]() |
[56] |
Crouch GI, Del Chiappa G, Perdue RR (2019) International convention tourism: A choice modelling experiment of host city competition. Tour Manag 71: 530–542. https://doi.org/https://doi.org/10.1016/j.tourman.2018.10.002 doi: 10.1016/j.tourman.2018.10.002
![]() |
[57] |
Deliormanlı AH (2012) Cerchar abrasivity index (CAI) and its relation to strength and abrasion test methods for marble stones. Constr Build Mater 30: 16–21. https://doi.org/https://doi.org/10.1016/j.conbuildmat.2011.11.023 doi: 10.1016/j.conbuildmat.2011.11.023
![]() |
[58] |
McDermott R, O'Dell C (2001) Overcoming cultural barriers to sharing knowledge. J Knowl Manag 5: 76–85. https://doi.org/10.1108/13673270110384428 doi: 10.1108/13673270110384428
![]() |
[59] |
Iorfa SK, Ottu IFA, Oguntayo R, et al (2020) COVID-19 Knowledge, Risk Perception, and Precautionary Behavior Among Nigerians: A Moderated Mediation Approach. Front Psychol 11: 1–10. https://doi.org/10.3389/fpsyg.2020.566773 doi: 10.3389/fpsyg.2020.566773
![]() |
[60] |
Gubbels J, van der Put CE, Assink M (2019) Risk Factors for School Absenteeism and Dropout: A Meta-Analytic Review. J Youth Adolesc 48: 1637–1667. https://doi.org/10.1007/s10964-019-01072-5 doi: 10.1007/s10964-019-01072-5
![]() |
[61] |
Ulhasanah N, Goto N (2018) Assessment of citizens' environmental behavior toward municipal solid waste management for a better and appropriate system in Indonesia: a case study of Padang City. J Mater Cycles Waste Manag 20: 1257–1272. https://doi.org/10.1007/s10163-017-0691-4 doi: 10.1007/s10163-017-0691-4
![]() |
[62] |
Singh A, Sushil (2021) Integrated approach for finding the causal effect of waste management over sustainability in the organization. Benchmarking An Int J 28: 3040–3073. https://doi.org/10.1108/BIJ-08-2020-0419 doi: 10.1108/BIJ-08-2020-0419
![]() |
[63] | Nurany F, Ismail I, Ferdaus Noor Aulady M, et al (2020) Article Review: The Policy Implementation of Waste to Energy Power Plant – Pilot Project in Surabaya, Indonesia. E3S Web Conf 190: |
[64] |
Mustia DI, Edy S, Nurul A (2021) Analysis of waste composition as a source of refuse-derived fuel in Cilacap. IOP Conf Ser Earth Environ Sci 896: 12063. https://doi.org/10.1088/1755-1315/896/1/012063 doi: 10.1088/1755-1315/896/1/012063
![]() |
[65] | Rachman SA, Hamdi M, Djaenuri A, Sartika I (2020) Model of Public Policy Implementation for Refused Derived Fuel (RDF) Waste Management in Cilacap Regency. Int J Sci Soc 2. https://doi.org/10.200609/ijsoc.v2i4.239 |
[66] |
Siregar SRH, Saragih BR, Surjosatyo A (2018) Evaluation of Waste Energy Conversion Technology using Analitycal Hierarchy Process in Bantargebang Landfill, Indonesia. E3S Web Conf 67: 1–5. https://doi.org/10.1051/e3sconf/20186702012 doi: 10.1051/e3sconf/20186702012
![]() |
[67] |
Kristanto GA, Koven W (2019) Estimating greenhouse gas emissions from municipal solid waste management in Depok, Indonesia. City Environ Interact 4: 100027. https://doi.org/https://doi.org/10.1016/j.cacint.2020.100027 doi: 10.1016/j.cacint.2020.100027
![]() |
[68] | Legino S, Arianto R, Pasra N (2019) The attainment of 100 percent electrification ratio in the archipelago of Indonesia by people way electricity initiative. J Phys Conf Ser 1282. https://doi.org/10.1088/1742-6596/1282/1/012057 |
[69] |
Legino S, Hidayawanti R, Putra IS, Pribadi A (2019) Reducing coal consumption by people empowerment using local waste processing unit. J Phys Conf Ser 1217: 12028. https://doi.org/10.1088/1742-6596/1217/1/012028 doi: 10.1088/1742-6596/1217/1/012028
![]() |
[70] | Brunner IMIM, Norhidayat A, Brunner SM (2021) Processing of Organic Waste and Biomass Waste with Waste Processing Technology at the Source. VI: 2085–2095. https://doi.org/10.32672/jse.v6i3.3120 |
[71] |
Nasruddin, Idrus Alhamid M, Daud Y, et al (2016) Potential of geothermal energy for electricity generation in Indonesia: A review. Renew Sustain Energy Rev 53: 733–740. https://doi.org/https://doi.org/10.1016/j.rser.2015.09.032 doi: 10.1016/j.rser.2015.09.032
![]() |
[72] |
Saxinger G, Krasnoshtanova NE, Illmeier G (2018) In limbo between state and corporate responsibility: Transport infrastructure in the oil village Verkhnemarkovo, Irkutskaya Oblast in Russia. IOP Conf Ser Earth Environ Sci 190: 12062. https://doi.org/10.1088/1755-1315/190/1/012062 doi: 10.1088/1755-1315/190/1/012062
![]() |
[73] |
Gupta D, Garg A (2020) Sustainable development and carbon neutrality: Integrated assessment of transport transitions in India. Transp Res Part D Transp Environ 85: 102474. https://doi.org/https://doi.org/10.1016/j.trd.2020.102474 doi: 10.1016/j.trd.2020.102474
![]() |
[74] |
Persyn D, Díaz-Lanchas J, Barbero J (2022) Estimating road transport costs between and within European Union regions. Transp Policy 124: 33–42. https://doi.org/https://doi.org/10.1016/j.tranpol.2020.04.006 doi: 10.1016/j.tranpol.2020.04.006
![]() |
[75] |
Chu Van T, Ramirez J, Rainey T, et al (2019) Global impacts of recent IMO regulations on marine fuel oil refining processes and ship emissions. Transp Res Part D Transp Environ 70: 123–134. https://doi.org/https://doi.org/10.1016/j.trd.2019.04.001 doi: 10.1016/j.trd.2019.04.001
![]() |
[76] |
Marafi A, Albazzaz H, Rana MS (2019) Hydroprocessing of heavy residual oil: Opportunities and challenges. Catal Today 329: 125–134. https://doi.org/https://doi.org/10.1016/j.cattod.2018.10.067 doi: 10.1016/j.cattod.2018.10.067
![]() |
[77] |
Gabdulkhakov RR, Rudko VA, Pyagay IN (2022) Methods for modifying needle coke raw materials by introducing additives of various origin (review). Fuel 310: 122265. https://doi.org/https://doi.org/10.1016/j.fuel.2021.122265 doi: 10.1016/j.fuel.2021.122265
![]() |
[78] |
Mbazima SJ, Masekameni MD, Mmereki D (2022) Waste-to-energy in a developing country: The state of landfill gas to energy in the Republic of South Africa. Energy Explor Exploit 40: 1287–1312. https://doi.org/10.1177/01445987221084376 doi: 10.1177/01445987221084376
![]() |
[79] | Palaniandy P, Aziz HA, Wang LK, et al (2022) Sanitary Landfill Types and Design BT - Solid Waste Engineering and Management: Volume 2. In: Wang LK, Wang M-HS, Hung Y-T (eds). Springer International Publishing, Cham, pp 543–597 |
[80] | Roswulandari A, Daerobi A, Gravitiani E (2019) Waste to Energy (WTE) Putri Cempo As Urban Innovation: A Financial Analysis. 8th International Conference on Sustainable Environment and Architecture. https://doi.org/10.2991/senvar-18.2019.25 |
[81] |
Sunarto, Sulistyaningsih T (2018) Integrated sustainable waste management in Malang City, East Java, Indonesia. AIP Conf Proc 1977: 30043. https://doi.org/10.1063/1.5042963 doi: 10.1063/1.5042963
![]() |
[82] | Prasetya DA, Sanusi A, Chandrarin G, et al (2019) Small and Medium Enterprises Problem and Potential Solutions for Waste Management. J Southwest Jiaotong Univ 54. https://doi.org/10.35741/issn.0258-2724.54.6.21 |
[83] | Prayitno G, Hakim AN, Meidiana C (2020) Community Participation on the Self Help Group of Methane Gas (Biogas) Management as Renewable Energy in Indonesia. Int J Energy Econ Policy 11: 200–211 |
[84] |
Purmessur B, Surroop D (2019) Power generation using landfill gas generated from new cell at the existing landfill site. J Environ Chem Eng 7: 103060. https://doi.org/https://doi.org/10.1016/j.jece.2019.103060 doi: 10.1016/j.jece.2019.103060
![]() |
[85] | USEPA, "Bioreactors, " 2018. https://archive.epa.gov/epawaste/nonhaz/municipal/web/html/bioreactors.html. (accessed Apr. 25, 2022). |
[86] | Grossule V, Morello L, Cossu R, Lavagnolo M (2018) BIOREACTOR LANDFILLS: COMPARISON AND KINETICS OF THE DIFFERENT SYSTEMS. Detritus In Press: 1. https://doi.org/10.31025/2611-4135/2018.13703 |
[87] | Lin C-Y, Chai WS, Lay C-H, et al (2021) Optimization of Hydrolysis-Acidogenesis Phase of Swine Manure for Biogas Production Using Two-Stage Anaerobic Fermentation. Process. 9 |
[88] |
Kumarasiri B, Dissanayake P (2021) Barriers to implementing waste-to-energy projects in Sri Lanka: a PESTEL analysis. Built Environ Proj Asset Manag 11: 544–558. https://doi.org/10.1108/BEPAM-03-2020-0051 doi: 10.1108/BEPAM-03-2020-0051
![]() |
[89] | Panepinto D, Zanetti M (2021) Technical and Environmental Comparison among Different Municipal Solid Waste Management Scenarios. Sustain. 13 |
[90] |
Sütterlin B, Siegrist M (2017) Public acceptance of renewable energy technologies from an abstract versus concrete perspective and the positive imagery of solar power. Energy Policy 106: 356–366. https://doi.org/https://doi.org/10.1016/j.enpol.2017.03.061 doi: 10.1016/j.enpol.2017.03.061
![]() |
[91] | Gayatri SU (2019) ANALISIS JEJARING KEBIJAKAN DALAM PENGELOLAAN SAMPAH MENJADI ENERGI LISTRIK DI DKI JAKARTA. Universitas Gadjah Mada, Yogyakarta |
[92] |
Come Zebra EI, van der Windt HJ, Nhumaio G, Faaij APC (2021) A review of hybrid renewable energy systems in mini-grids for off-grid electrification in developing countries. Renew Sustain Energy Rev 144: 111036. https://doi.org/https://doi.org/10.1016/j.rser.2021.111036 doi: 10.1016/j.rser.2021.111036
![]() |
[93] |
Carley S, Konisky DM (2020) The justice and equity implications of the clean energy transition. Nat Energy 5: 569–577. https://doi.org/10.1038/s41560-020-0641-6 doi: 10.1038/s41560-020-0641-6
![]() |
[94] |
Hoang AT, Sandro Nižetić, Olcer AI, et al (2021) Impacts of COVID-19 pandemic on the global energy system and the shift progress to renewable energy: Opportunities, challenges, and policy implications. Energy Policy 154: 112322. https://doi.org/https://doi.org/10.1016/j.enpol.2021.112322 doi: 10.1016/j.enpol.2021.112322
![]() |
[95] |
Koengkan M, Poveda YE, Fuinhas JA (2020) Globalisation as a motor of renewable energy development in Latin America countries. GeoJournal 85: 1591–1602. https://doi.org/10.1007/s10708-019-10042-0 doi: 10.1007/s10708-019-10042-0
![]() |
[96] |
Sari MM, Suryawan IWK, Septiariva IY (2023) Processing of Biodegradable Waste from Ceremonial Activities in Bali with Black Soldier Fly (BSF) Larvae. J Multidiscip Appl Nat Sci 3: 138–148. https://doi.org/10.47352/jmans.2774-3047.175 doi: 10.47352/jmans.2774-3047.175
![]() |
1. | Xianhua Song, Guanglong Chen, Ahmed A. Abd El-Latif, Quantum Color Image Encryption Scheme Based on Geometric Transformation and Intensity Channel Diffusion, 2022, 10, 2227-7390, 3038, 10.3390/math10173038 | |
2. | Ya-jun Gao, Hong-wei Xie, Jun Zhang, Hao Zhang, A novel quantum image encryption technique based on improved controlled alternated quantum walks and hyperchaotic system, 2022, 598, 03784371, 127334, 10.1016/j.physa.2022.127334 | |
3. | Man-Wen Tian, Yassine Bouteraa, Khalid A. Alattas, Shu-Rong Yan, Abdullah K. Alanazi, Ardashir Mohammadzadeh, Saleh Mobayen, Hiroki Sayama, A Type-3 Fuzzy Approach for Stabilization and Synchronization of Chaotic Systems: Applicable for Financial and Physical Chaotic Systems, 2022, 2022, 1099-0526, 1, 10.1155/2022/8437910 | |
4. | Quanyv Wang, Xiaoqiang Zhang, Xiaohu Zhao, Image encryption algorithm based on improved Zigzag transformation and quaternary DNA coding, 2022, 70, 22142126, 103340, 10.1016/j.jisa.2022.103340 | |
5. | Abdurrahim Toktas, Ugur Erkan, Feyza Toktas, Zeki Yetgin, Chaotic Map Optimization for Image Encryption Using Triple Objective Differential Evolution Algorithm, 2021, 9, 2169-3536, 127814, 10.1109/ACCESS.2021.3111691 | |
6. | Chunmeng Li, Xiaozhong Yang, An image encryption algorithm based on discrete fractional wavelet transform and quantum chaos, 2022, 260, 00304026, 169042, 10.1016/j.ijleo.2022.169042 | |
7. | Ioannis Kafetzis, Christos Volos, 2022, Chapter 5, 978-3-031-02471-9, 85, 10.1007/978-3-031-02472-6_5 | |
8. | Xiu-Fang Feng, Shi-Xian Nan, Rui-Qing Ma, Hao Zhang, A Lossless Compression and Encryption Method for Remote Sensing Image Using LWT, Rubik’s Cube and 2D-CCM, 2022, 32, 0218-1274, 10.1142/S0218127422501498 | |
9. | Mohamed Maazouz, Abdelmoughni Toubal, Billel Bengherbia, Oussama Houhou, Noureddine Batel, FPGA implementation of a chaos-based image encryption algorithm, 2022, 34, 13191578, 9926, 10.1016/j.jksuci.2021.12.022 | |
10. | Wenzheng Ma, Tingting Yu, Zhuang Wang, Xianli Li, A novel image encryption scheme based on Logistic cosine cascade maps, 2023, 98, 0031-8949, 035225, 10.1088/1402-4896/acbba6 | |
11. | Guo-Dong Ye, Hui-Shan Wu, Xiao-Ling Huang, Syh-Yuan Tan, Asymmetric image encryption algorithm based on a new three-dimensional improved logistic chaotic map, 2023, 32, 1674-1056, 030504, 10.1088/1674-1056/ac7dbb | |
12. | B. Nagarajan, C. Ananth, N. Mohananthini, Blockchain-based smart and secured scheme for question sharing using bee colony optimization based quantum logistic map encryption, 2023, 15, 2511-2104, 2889, 10.1007/s41870-023-01333-4 | |
13. | WALAA M. ABD-ELHAFIEZ, MAHMOUD ABDEL-ATY, XIAO-JUN YANG, AWATEF BALOBAID, AN IMAGE ENCRYPTION TECHNIQUE BASED ON DISCRETE WAVELET TRANSFORM AND FRACTIONAL CHAOTIC CRYPTOVIROLOGY, 2024, 32, 0218-348X, 10.1142/S0218348X23401242 | |
14. | Jinwen He, Hegui Zhu, Xv Zhou, Quantum image encryption algorithm via optimized quantum circuit and parity bit-plane permutation, 2024, 81, 22142126, 103698, 10.1016/j.jisa.2024.103698 | |
15. | Mohamed Yamni, Achraf Daoui, Paweł Pławiak, Osama Alfarraj, Ahmed A. Abd El-Latif, A Hardware-Accelerated Approach to Chaotic Image Encryption: LTB Map and FPGA Implementation, 2024, 12, 2169-3536, 103921, 10.1109/ACCESS.2024.3432008 | |
16. | Jianrong Li, Zhiqiang Xu, Pengyu Han, Huiying Sun, Ting Ke, Wei Chen, Chuanlei Zhang, 2024, Chapter 27, 978-981-97-5602-5, 331, 10.1007/978-981-97-5603-2_27 | |
17. | Zahraa A. Ali, Tayseer S. Atia, Ahmed Y. Yousuf, Ahmed J. Khahdim, A comprehensive review of quantum image encryption methods: design characteristics, cryptographic properties, and AI integration, 2024, 23, 1573-1332, 10.1007/s11128-024-04563-y | |
18. | Furkan Ciylan, Bünyamin Ciylan, Mehmet Atak, FPGA-Based Chaotic Image Encryption Using Systolic Arrays, 2023, 12, 2079-9292, 2729, 10.3390/electronics12122729 | |
19. | Rashad Ali, Muhammad Kamran Jamil, Amal S. Alali, Javed Ali, Gulraiz Afzal, A Robust S Box Design Using Cyclic Groups and Image Encryption, 2023, 11, 2169-3536, 135880, 10.1109/ACCESS.2023.3337443 | |
20. | R. Amutha, 2024, Image Encryption Using Chaotic Map, 979-8-3503-5082-1, 1223, 10.1109/TENCON61640.2024.10902948 | |
21. | Biswarup Yogi, Ajoy Kumar Khan, Advancements in image encryption: A comprehensive review of design principles and performance metrics, 2025, 57, 15740137, 100759, 10.1016/j.cosrev.2025.100759 | |
22. | Li Huang, Cong Ding, Zhenjie Bao, Haitao Chen, Changsheng Wan, A DNA Encoding Image Encryption Algorithm Based on Chaos, 2025, 13, 2227-7390, 1330, 10.3390/math13081330 | |
23. | Mohamed Yamni, Achraf Daoui, Chakir El-Kasri, May Almousa, Ali Abdullah S. AlQahtani, Ahmed A. Abd El-Latif, Lightweight image encryption using integer reversible discrete Dual-Hahn transform on embedded systems, 2025, 69, 22150986, 102108, 10.1016/j.jestch.2025.102108 | |
24. | K. SUBHASHINI, R. AMUTHA, B. A. MOHAMMED HASHIM, Chaotic Image Encryption using Two Level Scrambling, 2025, 25, 1582-7445, 27, 10.4316/AECE.2025.02004 | |
25. | 晓瑞 金, Image Encryption Algorithm Based on HLSE Chaotic Map and Improved Zigzag Transform, 2025, 15, 2161-8801, 164, 10.12677/csa.2025.157190 |
Parameter | Value | Parameter | Value |
q | 1733 | a2 | 15 |
p | 1697 | a3 | 20 |
e | 163 | r | 3.99 |
a1 | 7 | β | 7 |
d | 2,757,259 | c1 | 2,855,219 |
c2 | 164,340 | c3 | 128,682 |
Image size | Initial value generation | Confusion-diffusion encryption | Total time |
256 × 256 | 0.014931 | 0.337695 | 0.394836 |
512 × 512 | 0.059334 | 0.699589 | 0.735226 |
Image | Plain-image | Cipher-image | Results |
Goldhill | 161621.1816 | 279.9395 | Pass |
Sailboat | 179772.6055 | 240.8535 | Pass |
Peppers (Grayscale) | 138836.1738 | 287.2168 | Pass |
Sun | 319180.5827 | 273.1582 | Pass |
Baboon | 101863.4615 | 266.8301 | Pass |
Peppers (Color) | 340999.4414 | 246.8555 | Pass |
Reference | Baboon | ||
R | G | B | |
This Paper | 227.05 | 214.01 | 254.08 |
Ref. [46] | 287.56 | 227.89 | 259.78 |
Image | Plain-image | Cipher-image | ||||
Horizontal | Vertical | Diagonal | Horizontal | Vertical | Diagonal | |
Goldhill | 0.9752 | 0.9708 | 0.9524 | -0.0151 | 0.0209 | 0.0078 |
Sailboat | 0.9721 | 0.9743 | 0.9602 | 0.0154 | 0.0106 | 0.0075 |
Peppers | 0.9833 | 0.9796 | 0.9684 | 0.0139 | 0.0054 | 0.0153 |
Image | Direction | Plain-image | Cipher-image | ||||
R | G | B | R | G | B | ||
Sun | Horizontal | 0.9561 | 0.9504 | 0.9584 | 0.0049 | -0.0041 | 0.0025 |
Vertical | 0.9553 | 0.9473 | 0.9569 | 0.0018 | 0.0102 | 0.0110 | |
Diagonal | 0.9338 | 0.9258 | 0.9359 | -0.0181 | 0.0029 | -0.0087 | |
Peppers | Horizontal | 0.9660 | 0.9811 | 0.9661 | 0.0092 | -0.0054 | 0.0103 |
Vertical | 0.9656 | 0.9822 | 0.9669 | 0.0059 | 0.0140 | 0.0118 | |
Diagonal | 0.9584 | 0.9630 | 0.9489 | -0.0093 | 0.0030 | 0.0092 | |
Baboon | Horizontal | 0.8620 | 0.7559 | 0.8838 | -0.0033 | 0.0228 | -0.0047 |
Vertical | 0.9230 | 0.8658 | 0.9104 | 0.0046 | 0.0063 | -0.0045 | |
Diagonal | 0.8536 | 0.7359 | 0.8428 | 0.0140 | 0.0050 | 0.0104 |
Method | Direction | Cipher-image | ||
R | G | B | ||
Ref. [49] | Horizontal | -0.0174 | -0.0048 | 0.0086 |
Vertical | -0.0021 | -0.0020 | 0.0727 | |
Diagonal | 0.0182 | -0.0096 | -0.0073 | |
Ours | Horizontal | 0.0092 | -0.0054 | 0.0103 |
Vertical | 0.0059 | 0.0140 | 0.0118 | |
Diagonal | -0.0093 | 0.0030 | 0.0092 |
Image | Goldhill | Sailboat | Peppers |
Plain-image | 7.47778 | 7.48452 | 7.57148 |
Cipher-image | 7.99923 | 7.99934 | 7.99921 |
Image | Baboon | Peppers | ||||
R | G | B | R | G | B | |
Plain-image | 7.70667 | 7.47443 | 7.75222 | 7.338832 | 7.496255 | 7.05831 |
Cipher-image | 7.999377 | 7.99941 | 7.99927 | 7.99934 | 7.99924 | 7.99932 |
Image | Goldhill | Sailboat | Peppers |
Plain-local | 6.48739 | 6.47318 | 6.55437 |
Cipher-local | 7.95391 | 7.95486 | 7.95317 |
Image | Baboon | Peppers | ||||
R | G | B | R | G | B | |
Plain-local | 6.75219 | 7.04211 | 7.00261 | 6.35622 | 6.45065 | 6.30729 |
Cipher-local | 7.95617 | 7.95727 | 7.95342 | 7.95686 | 7.95521 | 7.95294 |
Image | NPCR | UACI |
Goldhill | 99.6124 | 33.4522 |
Sailboat | 99.6129 | 33.4302 |
Peppers | 99.6086 | 33.4398 |
Image | Sun | Baboon | Peppers | ||||||
R | G | B | R | G | B | R | G | B | |
NPCR | 99.6134 | 99.6107 | 99.5951 | 99.6089 | 99.5975 | 99.6017 | 99.6010 | 99.6126 | 99.6092 |
UACI | 33.4784 | 33.4314 | 33.4631 | 33.4457 | 33.4622 | 33.4176 | 33.4744 | 33.4806 | 33.4139 |
Image | size | Method | Information entropy | ||
R | G | B | |||
Peppers | 512 × 512 | Ours | 7.9993 | 7.9992 | 7.9993 |
256 × 256 | Ours | 7.9987 | 7.9984 | 7.9987 | |
256 × 256 | Ref. [6] | 7.9979 | 7.9979 | 7.9979 | |
512 × 512 | Ref. [14] | 7.9991 | 7.9992 | 7.9993 | |
256 × 256 | Ref. [47] | 7.9986 | 7.9987 | 7.9985 | |
256 × 256 | Ref. [48] | 7.9911 | 7.9912 | 7.9915 | |
256 × 256 | Ref. [49] | 7.9962 | 7.9929 | 7.9725 | |
Baboon | 512 × 512 | Ours | 7.9994 | 7.9994 | 7.9993 |
256 × 256 | Ours | 7.9981 | 7.9982 | 7.9979 | |
256 × 256 | Ref. [48] | 7.9914 | 7.9915 | 7.9915 | |
256 × 256 | Ref. [49] | 7.9923 | 7.9803 | 7.9986 |
Parameter | Value | Parameter | Value |
q | 1733 | a2 | 15 |
p | 1697 | a3 | 20 |
e | 163 | r | 3.99 |
a1 | 7 | β | 7 |
d | 2,757,259 | c1 | 2,855,219 |
c2 | 164,340 | c3 | 128,682 |
Image size | Initial value generation | Confusion-diffusion encryption | Total time |
256 × 256 | 0.014931 | 0.337695 | 0.394836 |
512 × 512 | 0.059334 | 0.699589 | 0.735226 |
Image | Plain-image | Cipher-image | Results |
Goldhill | 161621.1816 | 279.9395 | Pass |
Sailboat | 179772.6055 | 240.8535 | Pass |
Peppers (Grayscale) | 138836.1738 | 287.2168 | Pass |
Sun | 319180.5827 | 273.1582 | Pass |
Baboon | 101863.4615 | 266.8301 | Pass |
Peppers (Color) | 340999.4414 | 246.8555 | Pass |
Reference | Baboon | ||
R | G | B | |
This Paper | 227.05 | 214.01 | 254.08 |
Ref. [46] | 287.56 | 227.89 | 259.78 |
Image | Plain-image | Cipher-image | ||||
Horizontal | Vertical | Diagonal | Horizontal | Vertical | Diagonal | |
Goldhill | 0.9752 | 0.9708 | 0.9524 | -0.0151 | 0.0209 | 0.0078 |
Sailboat | 0.9721 | 0.9743 | 0.9602 | 0.0154 | 0.0106 | 0.0075 |
Peppers | 0.9833 | 0.9796 | 0.9684 | 0.0139 | 0.0054 | 0.0153 |
Image | Direction | Plain-image | Cipher-image | ||||
R | G | B | R | G | B | ||
Sun | Horizontal | 0.9561 | 0.9504 | 0.9584 | 0.0049 | -0.0041 | 0.0025 |
Vertical | 0.9553 | 0.9473 | 0.9569 | 0.0018 | 0.0102 | 0.0110 | |
Diagonal | 0.9338 | 0.9258 | 0.9359 | -0.0181 | 0.0029 | -0.0087 | |
Peppers | Horizontal | 0.9660 | 0.9811 | 0.9661 | 0.0092 | -0.0054 | 0.0103 |
Vertical | 0.9656 | 0.9822 | 0.9669 | 0.0059 | 0.0140 | 0.0118 | |
Diagonal | 0.9584 | 0.9630 | 0.9489 | -0.0093 | 0.0030 | 0.0092 | |
Baboon | Horizontal | 0.8620 | 0.7559 | 0.8838 | -0.0033 | 0.0228 | -0.0047 |
Vertical | 0.9230 | 0.8658 | 0.9104 | 0.0046 | 0.0063 | -0.0045 | |
Diagonal | 0.8536 | 0.7359 | 0.8428 | 0.0140 | 0.0050 | 0.0104 |
Method | Direction | Cipher-image | ||
R | G | B | ||
Ref. [49] | Horizontal | -0.0174 | -0.0048 | 0.0086 |
Vertical | -0.0021 | -0.0020 | 0.0727 | |
Diagonal | 0.0182 | -0.0096 | -0.0073 | |
Ours | Horizontal | 0.0092 | -0.0054 | 0.0103 |
Vertical | 0.0059 | 0.0140 | 0.0118 | |
Diagonal | -0.0093 | 0.0030 | 0.0092 |
Image | Goldhill | Sailboat | Peppers |
Plain-image | 7.47778 | 7.48452 | 7.57148 |
Cipher-image | 7.99923 | 7.99934 | 7.99921 |
Image | Baboon | Peppers | ||||
R | G | B | R | G | B | |
Plain-image | 7.70667 | 7.47443 | 7.75222 | 7.338832 | 7.496255 | 7.05831 |
Cipher-image | 7.999377 | 7.99941 | 7.99927 | 7.99934 | 7.99924 | 7.99932 |
Image | Goldhill | Sailboat | Peppers |
Plain-local | 6.48739 | 6.47318 | 6.55437 |
Cipher-local | 7.95391 | 7.95486 | 7.95317 |
Image | Baboon | Peppers | ||||
R | G | B | R | G | B | |
Plain-local | 6.75219 | 7.04211 | 7.00261 | 6.35622 | 6.45065 | 6.30729 |
Cipher-local | 7.95617 | 7.95727 | 7.95342 | 7.95686 | 7.95521 | 7.95294 |
Image | NPCR | UACI |
Goldhill | 99.6124 | 33.4522 |
Sailboat | 99.6129 | 33.4302 |
Peppers | 99.6086 | 33.4398 |
Image | Sun | Baboon | Peppers | ||||||
R | G | B | R | G | B | R | G | B | |
NPCR | 99.6134 | 99.6107 | 99.5951 | 99.6089 | 99.5975 | 99.6017 | 99.6010 | 99.6126 | 99.6092 |
UACI | 33.4784 | 33.4314 | 33.4631 | 33.4457 | 33.4622 | 33.4176 | 33.4744 | 33.4806 | 33.4139 |
Method | NPCR | UACI | Image size |
Ours | 99.6136 | 33.4643 | 512 × 512 |
Ours | 99.6078 | 33.3123 | 256 × 256 |
Ref. [44] | 99.7904 | 33.4970 | 512 × 512 |
Ref. [45] | 99.6033 | 28.6797 | 512 × 512 |
Ref. [46] | 99.5911 | 33.4208 | 256 × 256 |
Image | size | Method | Information entropy | ||
R | G | B | |||
Peppers | 512 × 512 | Ours | 7.9993 | 7.9992 | 7.9993 |
256 × 256 | Ours | 7.9987 | 7.9984 | 7.9987 | |
256 × 256 | Ref. [6] | 7.9979 | 7.9979 | 7.9979 | |
512 × 512 | Ref. [14] | 7.9991 | 7.9992 | 7.9993 | |
256 × 256 | Ref. [47] | 7.9986 | 7.9987 | 7.9985 | |
256 × 256 | Ref. [48] | 7.9911 | 7.9912 | 7.9915 | |
256 × 256 | Ref. [49] | 7.9962 | 7.9929 | 7.9725 | |
Baboon | 512 × 512 | Ours | 7.9994 | 7.9994 | 7.9993 |
256 × 256 | Ours | 7.9981 | 7.9982 | 7.9979 | |
256 × 256 | Ref. [48] | 7.9914 | 7.9915 | 7.9915 | |
256 × 256 | Ref. [49] | 7.9923 | 7.9803 | 7.9986 |