Image transmission is happening more frequently in this era of technologically sophisticated digital information. Additionally, more individuals are becoming aware of its importance. In order to secure images, many academics are participating in research, which is advantageous for guaranteeing data security. In order to strengthen the security of images during transmission, we have investigated new encryption algorithms to guarantee this. First, a current representing the Lorenz chaotic system is introduced into the neuron model. The neuron model generates sequences after receiving the current signal. The next move is made as the current shifts based on whether the sequence that results is chaotic or not. If so, the subsequent operation is carried out; otherwise, the current is altered until chaotic sequences are produced. Second, a global scrambling with de-duplication technique is used to scramble the image using the resulting chaotic sequence. To complete the dislocation effect, the Latin square is used to dislocate the image after the initial dislocation. Fourth, the image that has been scrambled is subjected to two rounds of additive mode diffusion. They are diffusion in the forward additive mode and diffusion in the inverse additive mode. Lastly, to improve the diffusion effect, the image is diffused in the finite domain. Eventually, the encrypted image is obtained. After evaluation tests and comparison with related literature, it can be found that the algorithm of this study has certain advantages. Also, the resistance to attack is good. It can protect the security of the image.INDEX TERMS image encryption,Lorenz system,Hodgkin-Huxley model,Latin square.
I. INTRODUCTIONT HE development of technology has facilitated the advancement of life quality [1]. High-tech electrical products are gradually becoming more prevalent in everyday life. The frequent use of intelligent devices is a notable performance [2]. As technology advances, electronic data are increasingly the preferred form of communication with partners. The study of data security is particularly crucial in this situation of constant information exchange [3]. The security of the images, in addition to the data, is crucial to the transmission process [4]. Therefore, it follows that the study of network security is also related to the security of images. Because of the limitations of data transmission technologies at the beginning of technological development, image encryption was not widely used [5]. Additionally, digital communication did not gain much popularity. These caused the importance of image encryption not to be adequately portrayed. As the information era has progressed, it appears that user-to-user communication can no longer be fully satisfied by straightforward data exchange [6]. Images appear to be better able to convey the feelings that users want to express and to convey more information. In this instance, visual communication between consumers is becoming more common. Users may not care whether image information is shared in some cir...