Figures
Abstract
A wide range of mathematical constructs, theories, and algorithms have been leveraged by cryptographers to secure valuable and sensitive digital images. Among these, image encryption based on scrambling algorithms has been extensively utilized. These scrambling techniques operate on 1D, 2D, and 3D constructs, relying on pixel-level swapping to enhance security. This research introduces a novel scrambling algorithm that employs a row- and column-based scrambling approach. The encryption process begins with an input image, from which a 2D scrambled image is generated. The columns of pixels from the input image are randomly placed into the columns of the scrambled image. Once all columns are inserted, the process is repeated to intensify the scrambling effect. A similar procedure is then applied to the rows of the image. To further enhance security, a diffusion process is applied using an XOR operation between the scrambled image and a random number stream. These random numbers are generated using the 3D Rössler chaotic system, where two chaotic streams contribute to the scrambling effect, and a third stream is used for diffusion. Both machine simulations and exhaustive security analyses demonstrate that the proposed image cipher is highly resistant to various cryptanalytic attacks, including brute-force attacks, differential attacks, and noise and data cropping attacks. Given these promising results, we recommend the proposed method for real-world applications to fully utilize its security potential.
Citation: Zulfiqar N, Ahmad T, Ghazal TM, Ikram A, Gazzawe F, Albahar MA, et al. (2025) Securing digital images: A chaos-driven scrambling algorithm using the Rössler system. PLoS One 20(6): e0326202. https://doi.org/10.1371/journal.pone.0326202
Editor: Serdar Solak, Kocaeli University, TÜRKIYE
Received: March 2, 2025; Accepted: May 26, 2025; Published: June 25, 2025
Copyright: © 2025 Zulfiqar et al. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
Data Availability: All relevant data are within the manuscript.
Funding: The author(s) received no specific funding for this work.
Competing interests: The authors have declared that no competing interests exist.
1 Introduction
In an era characterized by the continuous storage and transmission of digital data, ensuring the integrity, privacy and confidentiality of this data has become very important and urgent. The niche of image encryption—a crucial subset of data security, carries out the protection of visual information from the illegitimate access and tempering. Since digital images are ubiquitous and they are perennially being used in the various fields like medicine, social media, traffic, research, data science to name a few, development of robust image encryption techniques has become paramount. Traditionally, the ciphers like Data Encryption Standard (DES), Advanced Encryption Standard (AES), International Data Encryption Algorithm (IDEA) and Rivest-Shamir-Adleman (RSA) have been employed by the industry experts, practitioners and academicians to safeguard their data during the storage and transmission. One of the limitations of these ciphers is that they can carry out the job of encryption on the textual data. They can’t be used for the digital images. Hence, the cryptographers have paid an increasing attentions towards exploring the different techniques for the image encryption.
Varied chaotic maps and other random number generators have rendered a great job in spawning the streams of random numbers.These random numbers are fundamentally raw and primitive in their character and orientation. So, normally, they are customized and normalized in a particular range of the values so that they can be employed over the pixels’ data of the given plaintext images. These random numbers carry out the two cardinal operations of confusion and diffusion lying at the very heart of the enterprise of cryptography. In confusion, the pixels are physically disordered and permuted. In the diffusion, their values are changed.
Many ciphers for the images have been produced during the last two decades or so for the security of digital images [8–10,51–53,56,57,65,66,76]. The instruments of chaotic maps [14–17] and DNA encoding [18–21] have been a part of the majority of these algorithms. Besides, other mathematical constructs have also been employed to realize the effects of scrambling like nine palace [22], king [23], cellular automata [24], 15-puzzle [25] latin square [26] and latin cube [27], Kenken puzzle [28], Castle [29], etc. In [22], the Cyclic Redundancy Check (CRC) and nine palace map were employed to come up with a secured image cipher. The theory of the nine palace was exploited to shuffle the color image pixels in given plain image. Besides, bits of three channels were cyclically shifted using the CRC code. A random key matrix was used to get the effects of diffusion. An entropy of 7.9993 was obtained. In another work [29], the chess piece Castle was employed to get the confusion effects. This Castle randomly walked on the large hypothetical chessboard. As it walked, the pixels taken from the given image were migrated to the random positions of the other image. To introduce more security effects, DNA encoding was also used.
An other work [33] has developed a novel scheme for image encryption in which an interdependence between encrypted planes has been carried out. In particular, it reduced encryption time and enhanced the security by embedding a complicated XoR operation. The reported work used a substitution technique that employed XoR operations among pixels. This action was inspired by fast Walsh-Hadamard transform algorithm. Moreover, encryption has many key phases which enhanced efficiency and security of the system. Firstly, line processing involved fusing lines from varied planes and application of chaotic substitution permutation operations. Secondly, the same kind of operation was done to the columns of the given image. Lastly, the planes were broken down into the intersecting squared sub-blocks along with an XoR chaotic confusion operation applied simultaneously to three-channel sub-blocks. Besides, the work [34] not only presents an image encryption algorithm but also a novel chaotic system named as fractional-order five-dimensional hyper-chaotic system (F5DHS). Apart from that, this work also used an extended DNA encoding scheme to spawn more DNA encoding rules. Additionally, four DNA computation methods were also used to heighten the security of the potential encryption algorithm. Moreover, a blocked image encryption method was engineered to distribute the RGB image into sub-blocks. Later on, DNA encoding, DNA decoding and DNA arithmetic rules were determined for sub-blocks basedon the chaotic data.
Image encryption based on the scrambled images is also one of the most used techniques employed by the image cryptographers. These techniques include 1D scrambled image [35] 2D scrambled image [36,37] and 3D [38] etc. The particular modus oprandi of these techniques works like this. Initially, scrambled image is generated. The pixels values of these images is normally initialized by some value say –1. Then pixels’ data from the given image is inserted one by one on the different cells of the scrambled image. During this process, sometimes the data can’t be inserted due to the pixels’ cells which are already occupied. Due to this reason, the remaining data is inserted on the vacant locations of the scrambled image. In this way, the entire data of the given plain image is inserted in the scrambled image. This is how the scrambling effects are realized in this type of technique. The study [35] created a 1D scrambled image. Then the pixels data from the given plain image were inserted on the different 1D positions of the scrambled image. Random numbers generated by the 2D logistic chaotic map were utilized in this process. Besides, the work [37] created a 2D scrambled image. Moreover, the reported work employed the Langton’s ant for transferring the pixels from the given plain image to the different locations of the scrambled image. In the same fashion, the work [38] extrapolated this concept to the three dimensions. First of all, a 3D space was created, now the pixels data from the given color image was inserted to the different positions of the 3D space. In all these works, chaotic maps were employed to generate the streams of random data.
Some image ciphers got broken by the cause of numerous security defects in their design methodologies [5, 6]. As an example, the work [30] was cracked by [31] due to the lack of plaintext feature in its design principle. Moreover, some ciphers happen to be very time-consuming in their decryption and encryption algorithms. For instance, the work [22] took a time of around 20 seconds for encryption and decryption of the given digital images which is not in line with the urgent requirements of the current times. Hence, remedial measures must be adopted to thwart future hackers and other adversaries and to design the speedier image ciphers.
Inspired by the above discussion, in particular of [35–38], this study has rendered a yet another image encryption algorithm. First of all, a 2D scrambled image is created. Then the randomly chosen rows from the give image are inserted to the different rows of the 2D scrambled image. This process has been iterated numerously to satisfactorily inject the scrambling effects. The same operation has been carried out based on the columns of the given plain image. 3D Rössler chaotic system [13] has been employed to generate the streams of random numbers. A simple but powerful XoR operation has been carried out to embed the diffusion effects in the proposed image cipher. The following bullets objectively describe the contributions of the current research endeavor.
- A novel image encryption algorithm has been proposed that employs iterative row and column insertion into a 2D scrambled image to achieve strong confusion effects.
- A 3D Rössler chaotic system has been used to generate high-quality random sequences that drive the scrambling process, enhancing unpredictability and security.
- A lightweight yet effective XOR-based diffusion mechanism has been integrated, ensuring a robust transformation of the plaintext image into a secure ciphertext.
The rest of the paper has been formatted like this. Section 3 describes the necessary concept of Rössler chaotic map/system. In Section 4, the proposed encryption scheme for the digital images has been presented in detail. Machine experimentation along with other performance evaluations have been given in Sections 5 and 6. Finally, the Section 7 closes the article with requisite concluding remarks and possible future research directions.
2 Related work
Due to the dramatic rise of the digital images in the current era of time, cryptographers paid an increasing attention to their security. Here, we will describe few of the published works.
With the focus on the encryption of medical image, a research [67] utilized chaotic systems in their encryption algorithm. In the start, there was a key generation layer. Next, there were 2 encryption rounds in which DNA computing and chaotic systems were amalgamated to harness their fuller potential. All of this was done by complying with the classical cryptographic structure of permutation, substitution and diffusion. The secret parameters of chaotic systems were generated through the initial parameters alongside the SHA-256 hash function. The algorithm passed through finite number of rounds. Each round consisted of six steps, namely permutation on block-based system, substitution on pixel-based system, DNA encoding, substitution on bit-level (which is DNA complementing), DNA decoding, and diffusion on bit-level system. Using the logistic-Chebyshev map during the substitution of bit-level system, key strings were generated whereas the diffusion of bit-level system helped achieve key strings utilizing sine-Chebyshev map. The repetition of the reported steps along with the secret keys resulted in the required cipher image.
A research study [68] suggested a novel 1D fractional chaotic mapping. Furthermore, the reported work also suggested DNA encoding, parallelly utilizing chaotic mapping. The combination of fraction operation and sine map rendered a yet another chaotic map. The suggested algorithm also exploited SHA-3 hash codes to resist potential plaintext attack. In an other work [69], a new 1D SCCM (sine - cosine chaotic map) was proposed to enhance the cryptographic strength of the existing 1D chaotic map. The SCCM when conjoined with DNA operations produced an image encryption algorithm. For the confusion phase, columns and rows of the input image were relocated and this was done through the chaotic sequence achieved through SCCM. Following the rule of “one pixel for one rule,” chaotic sequences helped select the coding, decoding and calculating rules as suggested by the random DNA coding. SHA-512 hash helped generate the initial parameters of the chaotic mapping.
The combined use of the chaotic systems and DNA sequence operations resulted in an other image encryption algorithm [70]. The cryptographic structure of traditional permutation and diffusion was followed in this work. The initial system parameters were calculated using 256-bit hash function. These parameters were used for 2D LASM (two-dimensional Logistic adjusted Sine map) along with a new one-dimensional chaotic mapping. The 2D LASM produced the chaotic sequence which was utilized in rule matrix of DNA encoding and DNA decoding; this encoded the input plain image in the DNA matrix accordingly. The permutation of columns and rows was done on DNA level at the DNA matrix of the original plain image. Apart from that, the scrambling of inter-and intra-DNA plane was achieved at the same time. In the next step, the process was done on DNA matrix which was permutated. The process consisted of XOR-operation of DNA utilizing the key matrix of DNA strands. The said key matrix was attained through the 2 one-dimensional chaotic system mapping. Lastly, confused DNA-matrix was decoded, which resulted in the encrypted image. A research [71] based on using the combination of chaotic maps with technique of differential encoding was proposed as a method to perform the encryption of the digital images. For the confusion phase, the randomization of coordinate points in the image were performed by scrambling algorithm using 2D Arnold map. The value of pixels were changed in perspective to the original image using the magic square. The techniques of differential encoding focused on bit-level security, whereas chaotic maps focused on leveling up the complexity while increasing randomness in the diffusion phase.
In the research [72], the conjoined use of RNA codons and MSC (Magical Square Chaotic Algorithm) presented us with a hybrid method for encryption of plain images. The starting value used for chaotic function LS2 was generated by algorithm SHA-256. MSC was used for moving pixels of the image. Again, to move pixel values, chaotic function and RNA codons were employed. Lastly, algorithm for genetic operators were used to optimize the process. The proposed algorithm rendered nice security effects to resist varying future attacks. An other relevant work [73] aimed at improving the chaotic system. Indeed, improving a chaotic map would be beneficial for the potential algorithms of encryption. The reported work employed a 1D logistic map integrated with feedback control and a coupling mechanism to enhance the degree of randomness by dynamically altering the chaotic sequence for selective position shifting. The simulation of this method entailed that the result of 2D chaotic maps were improved in terms of complexity and bigger chaos range. Furthermore, the use of improved chaotic sequences used in correspondence to octree principle performed better with greater security.
In another study [74], the use of 3D Arnold transform, RSA and MPFrDCT (multiple parameter fractional discrete cosine transform) provided a unique technique to encrypt and decrypt the digital images. The color maps were removed in the starting phase in order to convert them in their indexed form. This from was taken as RGB channel. 3D Arnold Transform was employed to feed these RGB values, which was used to change the pixel values, performing substitution and permutation. For the last step, multiple parameter fractional discrete cosine transforms were used to change the given domain into the frequency domain of image that had been encrypted. This technique was dependent not only on the secret keys but also on how they are arranged. In this way, simply knowing the secret keys will do no harm to the cipher image. Moreover, the combination of magic squares with chaotic map and particle swarm optimization provided an other algorithm to perform encryption [75]. The values of magic square were filled with the breaking up of image into single 8-bit (1-byte )blocks. This initiated the particle swarm optimization (PSO) process, as the cipher image was used as particles in the system. Moreover, many works have produced novel image encryption algorithms [76–78]
3 Rössler chaotic system
The theory of chaos refers to the phenomenon that the tiniest change in the initial set of states, as well as system parameters, results in a huge change in future states of the system [23]. Using this philosophy of chaos, mathematicians and scientists have come up with a huge number of chaotic systems. These systems are highly dependent on system parameters and initial states. Besides, image cryptographers have used them abundantly in developing their image ciphers. Low dimensional chaotic systems do not render the much chaotic and random data. So, their employment in writing the image ciphers do not provide the nice results of different security parameters. However, the higher dimensional maps render much chaotic data, hence, they cause to produce relatively better results of security parameter. However, they cause computational time overhead for the ciphers. By considering these two extremes, the current study has employed the 3D Rössler chaotic system [13]. In 1976, Otto E. Rössler proposed a system of three differential equations with one of them has non-linear term that has a dynamic behavior able to produce chaos. Following are the mathematical equations for the selected system.
Here x, y and z are the system states and a, b, c correspond to the system parameters. The Rössler attractor achieves the chaotic system upon the values of , and c = 5.7 (Figs 1 to 4). Apart from that, the Bifurcation diagram of the chaotic system can be seen in the Fig 5.
The Lyapunov exponent analysis was conducted by varying the control parameter c revealing regions of chaotic behavior characterized by positive exponent values. This validates the system’s sensitivity to initial conditions and confirms the presence of chaos, further supporting its suitability for secure image encryption (Fig 6).
4 Materials and methods
The underlying idea of the current research endeavor is to safeguard the images from cyber security attacks as they travel through the open network like the Internet. Before transmitting these images, they are encrypted by using some encryption algorithm. Once, they are encrypted, they get transmitted. As these cipher images reach to their destination, they are converted to their original forms through the application of the decryption algorithm over them. Moreover, Rössler chaotic map has been employed to generate the streams of random numbers. These numbers facilitate in doing the diffusion and scrambling operations over the pixel data of these images.
4.1 Generation of key stream
Let the input plain image is img whose size is . Plaintext sensitivity is an important feature to thwart hidden threats of differential attack. This feature has been embedded by taking the pixels’ sum of given input image. This sum has been, in turn, employed to temper the initial values of the chaotic system being employed in this work. Suppose that sum is sum of pixels’ intensity values of given input image. Assign 1.90 to x0 and update its value according to the following equation:
Assign the other values to the primary states and system parameters of chaotic system as . Now the Rössler chaotic map has been ignited by giving the updated secret key. This map rendered three streams of random numbers, i.e.,
,
and
. These random numbers are very raw. They must to tailored to fit to the algorithmic logic of pixels scrambling, this study has conceived. So pass them through Equation 2 with these parameters
,
,
, m and n. It is to be noted that
corresponds to the size of the given image. This equation provides the three new streams of random numbers, i.e.,
,
and
with the corresponding ranges of
,
and
.
4.2 Proposed image encryption scheme
The image scrambler consists of two algorithms, i.e., Row based scrambling and Column based scrambling. Since, Row-Based and Column-Based scramblings are symmetric, so we have drawn only the schematic diagram of how the row based scrambling has been carried out (see Fig 7). Call the Algorithm 1 for the scrambling of the given image img with the parameters of img and hori.
Algorithm 1. Row based scrambling
Here we explain the steps of the Algorithm 1.
Line 1 finds the size of the given image img and assign it to the . Line 2 initializes a variable called pointer with the value of 1. A goto control structure has been employed in this algorithm. Line 3 corresponds to the label start of this structure. The goto statement is fired at the line 5 and the control shifts to the label end (line 37) if the condition at the line 4 gets true. Lines (7-11) create a scrambled image S1 (with the size of
) each of whose cells are occupied with the value of -1. Lines (12-15) initialize the two arrays named as flagSI and flagPI with the value -1. These values will act as a filter to make the relevant decisions. In the line 16, a slice of random numbers
has been taken in the array horiTemp from the array hori. These random numbers will facilitate in carrying out the confusion operation for encryption. Lines (17-23) assign the rows from the plain image img to the scrambled image S1. Line 18 checks whether the horiTemp(k)th index is empty? If it is, the line 19 assigns the kth row from the plain image img to the horiTemp(k)th row of the scrambled image. Lines 20 and 21 assign 0 to the kth index of the arrays flagPI and flagSI. Lastly, the lines (24–33) assign the remaining rows from the plain image to the scrambled image SI. In order to repeat this process, line 34 updates the image img with the array of S1. Line 35 increases the value of variable pointer by the value of 1. Line 36 shifts the control to the label start to repeat the process. As soon as the condition at line 4 evaluates to be true, control is shifted to the label end. Lastly, the line 38 assigns the scrambled image img to the variable img1.
Algorithm 2. Column based scrambling
In the same fashion, to introduce an added layer of security, call the Algorithm 2 for the scrambling of the given image img1 with the parameters of img1 and verti. It is to be noted that the same operations have been carried out in this algorithm but based on the assignment of columns from the image img1 to the randomly chosen indices for the columns of the scrambled image. Lastly, this algorithm returns the image img2.
As the given image has been sufficiently scrambled both row- and column-wise, now to embed the diffusion effects in the scrambled image img2, reshape the scrambled image img2 to the size of . Carry out the following operation between the scrambled image img2 and the key image mask.
For . Resize the image img3 to
. img3 is the final cipher image carrying both the effects of confusion and diffusion.
It is to be noted that the proposed cipher was developed using the tenets of private key cryptography, so its steps would be an exact inverse of the steps of the encryption algorithm.
5 Machine simulation
In this section, the suggested encryption algorithm for digital images would be demonstrated by taking some sample images. For this purpose, we have taken images of Chair, Bride, Flowers, and Hail. The size of all these images is . For simulation purposes, MATLAB 2024 has been used. Moreover, the precision used was 64-bit according to the IEEE Standards. Figs 8 to 11 show the plain grayscale images. Moreover, Figs 12 to 15 and Figs 16 to 19 show their encrypted and decrypted versions. One can notice that plain images got completely turned into a blurry and cloudy format which cannot be recognized at all. This signals the fact that the suggested image encryption algorithm is potent enough to thwart hackers. Besides, the Figs 20 to 25 show the plain, cipher and decrypted images whose size is
.
6 Performance and security analysis of image cipher
In this section, the suggested image cipher would be subjected to some chosen security parameters to demonstrate their immunity against various attacks.
6.1 Key space
A key space represents the complete set of all possible keys within an encryption system. It typically includes all initial values and system parameters essential to the encryption scheme. A sufficiently large key space is crucial for resisting brute-force attacks, where an adversary systematically tests all possible keys to decrypt the data. Cryptographers recommend a minimum key space size of 2100 [40] to ensure security. A limited key space makes an encryption system vulnerable to such attacks, compromising its robustness.
In the proposed encryption algorithm, key parameters—including and c—are derived from a chaotic map. Given a computational precision of 10−15, the resulting key space is approximately 1090, significantly exceeding the minimum recommended threshold of 2100. This ensures strong resistance against brute-force attacks, reinforcing the security of the proposed image cipher.
Furthermore, Table 1 presents a comparative analysis of the key space of our scheme against previously published studies. Unfortunately, our study couldn’t beat any cited work vis-à-vis the security parameter but even then we contend that the suggested work is safe from the potential brute force attack since .
6.2 Key sensitivity
A robust cipher must exhibit high sensitivity to its secret key, meaning even the slightest alteration in any key parameter should produce a completely different result. This section demonstrates the key sensitivity of the proposed image cryptosystem. The approach is as follows: first, a cipher image is generated using the encryption algorithm with a given secret key. Next, the encryption process is repeated with an almost identical key, except for a minute modification in one of its parameters. The resulting changes in pixel values are then analyzed. If the difference is substantial, it confirms the cipher’s strong key sensitivity. For this experiment, the secret key is defined as (say Key0). Using this key, the Chair image (Fig 8) is encrypted. Subsequently, a minuscule perturbation of 10−14 is introduced in one of the key variables, specifically x0. To put in other words, let
. Thus, the modified key set obtained is
denoted as Key1. The Chair image from Fig 8 has been encrypted using the modified key Key1. The resulting pixel variations are presented in Table 2. The difference rates between the cipher images generated with the original key Key0 and the altered keys Keyk (
) have been computed. The average difference rate is 99.62%, surpassing the results reported in previous studies [62, 63]. This demonstrates that the proposed cipher exhibits higher sensitivity to the secret key.
6.3 Statistical randomness analysis
Cipher images must be resilient to statistical attacks to ensure security. The NIST randomness test is a crucial measure for evaluating the randomness of encrypted data [1]. For the encrypted bit stream to be considered random, the p–value must be greater than 0.01 for the specified input parameters. Table 3 presents the NIST randomness test results [2] for the Chair cipher image. As observed, the p–value exceeds the 0.01 threshold across all sixteen parameters, confirming that the pixels in the encrypted Chair image exhibit a high degree of randomness.
6.4 Irregular deviation and maximum deviation security analyses
Cryptanalysts employ various techniques to break ciphers, one of which involves analyzing Irregular Deviation (ID) and Maximum Deviation (MD) in encrypted images. As their names suggest, these metrics quantify the degree of variation in pixel values between the plaintext and cipher images.
The mathematical formulations for these concepts are provided in [38].
and [38]
According to the equations above, represents the amplitude of discrepancy between the histograms of the encrypted and plaintext images for a given index j. The parameter Amp denotes the average sum of histogram values, while n represents the total number of pixels.
For optimal security, the values of IrregDevi should be smaller, indicating better uniformity, whereas MaxDevi should be larger, reflecting stronger deviation. As shown in Table 4, the lower values of IrregDevi confirm that the proposed image cipher maintains good pixel uniformity. Additionally, the average value of 39,384 for the selected images is an improvement over 43,506 reported in [38]. Similarly, the average MaxDevi value of 66,402 in the proposed cryptosystem outperforms the previous benchmark of 58,691 [38].
6.5 Energy and contrast analyses
Contrast analysis measures the variability in pixel intensity values within a given image. Naturally, greater intensity variations indicate a more heterogeneous image. In other words, higher values of this security parameter suggest that the encrypted image contains a broader range of gray levels, which is indicative of stronger security. This contrast measure is typically expressed as [38].
where u and v are the intensity values in the given image. Besides, refers to gray-level co-occurrence matrices’ numbers (GLCM).
This metric determines the frequency with which a pixel of grayscale value u appears in a spatial relationship with a pixel of value v. The results for this crucial security measure, obtained from the given images, are summarized in Table 5.
Specifically, the average contrast value is 10.3433, which surpasses 8.6448 reported in [38] but is slightly lower than 10.5325 from [4]. These results demonstrate that the proposed image cipher achieves competitive security performance.
Apart from that, energy of an image corresponds to the sum of squared elements in the gray level co-occurrence matrix [38]
In this equation, represents the values in the gray-level co-occurrence matrix, as previously described. Notably, smaller values of this metric indicate stronger security effects. Table 6 presents the energy analysis results for both plaintext and ciphertext images. As expected, plaintext images exhibit higher energy values, whereas encrypted images show lower values, reinforcing the effectiveness of the encryption. Furthermore, the average energy value is 0.0156, which is better than 0.1650 reported in [38] and matches 0.0156 from [4].
6.6 Homogeneity analysis
Homogeneity (H) analysis measures the closeness of pixel intensity distribution within the Gray-Level Co-Occurrence Matrix (GLCM). It evaluates the uniformity of pixel brightness values by analyzing their combinations in a structured tabular form. The mathematical expression for homogeneity is given in [12].
Here, represents the pixel value at position
. For enhanced security in the encryption algorithm, lower homogeneity values are desirable. Table 7 presents the homogeneity analysis results for the proposed scheme. The obtained average value of 0.3887 demonstrates improved performance compared to 0.4110 reported in [11].
6.7 Statistical analysis
Under this analysis, histogram and correlation coefficient of encrypted images are discussed.
6.7.1 Cartesian histogram analysis.
A histogram represents the frequency distribution of pixels in a given image. Typically, histograms of the original images exhibit a skewed distribution, while those of encrypted images display a more uniform pattern. This uniformity and smoothness in the histogram bars provide a strong defense against potential histogram-based attacks by adversaries. Figs 26 and 27 illustrate the histograms of both the original and encrypted Chair images.
Observe that the histogram of the original Chair image displays an upward and downward slant. In contrast, the histogram of the encrypted Chair image is notably uniform. This uniformity signifies the robust security attributes of the proposed image encryption algorithm.
The evenness of the histogram is commonly quantified using the following equation, as outlined in [42].
In the above equation, fi and gi denote the observed value and the expected pixel value respectively. If , the histogram is considered in the uniform distribution. Table 8 shows the values of
by the suggested algorithm.
Since the obtained results for the security parameter of satisfy the inequality
, hence we are justified in asserting that the proposed image cipher is immune to the statistical attack.
6.7.2 Polar histogram analysis.
The polar histogram of the plain image typically exhibits smooth variations with distinct peaks, corresponding to dominant intensity values. This suggests the presence of regions with consistent brightness or similar shading [64].
Uniform Distribution: In contrast, the polar histogram of the ciphered image is expected to be more uniform, displaying a rougher texture and a more evenly distributed range of intensity values. This reflects the encryption process, which aims to randomize pixel intensities and eliminate recognizable patterns from the original image.
Absence of Peaks: Unlike the plain image, the ciphered image should not contain prominent peaks, as encryption ensures an even redistribution of pixel values across the intensity range. This randomness enhances security by preventing any patterns from being detected.
Fig 28) exhibits a uniform distribution with no distinct peaks, unlike the plain image (Fig 29). This highlights the robustness of the proposed encryption method in effectively obscuring image features.
6.7.3 Correlation analysis.
A significant connection exists among neighboring pixels within an unencrypted image. When this unencrypted image undergoes encryption, its pixel color codes undergo a comprehensive transformation in both their spatial arrangement and color values. This metric quantifies this transformation. The pixel correlation within the unencrypted image approaches 1, while for the encrypted image, it approaches zero.
To assess this, we randomly selected 3,000 pairs of pixels from unencrypted as well as encrypted images. Following mathematical formula, as outlined in [43], was applied for this evaluation:
In this formula z and w denote the adjacent pixels’ intensity values. Moreover, the total number of pixels has been represented by P. Apart from that, Figs 30 to 35 show the distribution of pixels in the directions of the horizontal, vertical, and diagonal.
Correlation coefficients between the input plain image and the output encrypted image have been shown in Table 9.
These results are for the image of Chair. According to the entries in Table 9, these results are close to 1 for the plain sample image. Apart from that, these results steeply dropped and reached near zero for the encrypted and cipher images. Jointly, both Figure 8 and Table 3 depict the reality that the values of the correlation coefficient came down dramatically as soon as the encryption algorithm got applied to the plain images. Besides, a comparative analysis has also been made (Table 10). The results of the suggested scheme are comparable with the studies [44, 79–81].
6.8 Information entropy
As some image’s pixels are disturbed after applying an encryption algorithm over them, its pixels get disarrayed abundantly. To measure it, information entropy is used. Shannon [45], an information theorist, gave its mathematical formula given below:
Where Z(r) is the information entropy of a signal r. In the above equation, p(rc) corresponds to the probability of rc. For an image whose pixels have been randomized ideally with gray picture values of 256, its value is 8.
Table 11 shows the selected picture entropies and the overall results are nearly equal to 8. In this situation, it is justified to say that envisioned scheme is strong as the entropy is concerned. Besides, Table 11 has also performed a comparison between the published research studies and the current study. Our work beats the work [80].
6.9 Local Shannon entropy (LSE)
Local Shannon entropy is another security parameter for appraising the randomness present in the cipher images. Local-Shannon-entropy can be mathematically represented as [40, 41].
In this equation correspond to the non-overlapping blocks with UE pixels selected arbitrarily in the given cipher image. The
have been gotten through the equation (6). In experimentation set-up, we assigned these values l = 30,UE = 1936. It means that 1936 pixels were chosen for all the 30 blocks against the encrypted image. For the
– level confidence of 0.05, obtained local-Shannon-entropy result comes in between 7.901901305 to 7.903037329 as the study [39] indicates. Table 12 renders the local Shannon entropy results for the given images. One can see that the results of all the images successfully fell in the required threshold. It indicates that the proposed image cipher is furnished with good security effects.
6.10 Anti-jamming capability analysis
Robust image encryption systems inherently possess the ability to withstand various potential attacks. Among these, noise and data loss attacks pose significant threats to image ciphers. To evaluate the resilience of our proposed encryption scheme, we selected the cipher images of Chair and Bride.
To simulate real-world adversarial conditions, we artificially introduced salt-and-pepper noise into the cipher image of Chair (Fig 36). Additionally, we deliberately discarded the upper half of the cipher image of Bride (Fig 38). We then applied our decryption algorithm to these altered images one by one. The restored images, shown in Figs 37 and 39, remain easily recognizable.
This experiment demonstrates that the proposed encryption method effectively withstands noise and data cropping attacks, reinforcing its robustness against potential threats.
6.11 Avalanche (differential) attack analysis
Adversaries and malicious actors possess a high level of ingenuity when it comes to identifying vulnerabilities and exploiting them for their malicious intentions. In this specific attack scenario, they acquire two samples of the plaintext image: one with a subtle alteration in a pixel, and the other as the original, unaltered image. Both of these images are then subjected to the encryption process using the encryption algorithm. A meticulous examination of these two resulting cipher images enables them to deduce the secret key. The security parameters of NPCR (Number of Pixels Change Rate) and UACI (Unified Average Changing Intensity) serve as tools to assess the effectiveness of this attack. These metrics quantify the rate of pixel changes and the unified average changing intensity. The following mathematical formulas are employed for this purpose.
where F and P correspond to image’s dimensions. can be defined by:
In equation 15, the symbols R and depict the encoded images before and after the change is introduced in the image. If the values of NPCR and UACI come out to be close to 100% and 33.3% respectively then the cipher is immune to the potential differential attack threats. Table 13 shows the results against these security parameters. 33.4794% and 99.6211% came out to be the average values for UACI and NPCR respectively. According to these results, we assert that the proposed image cipher has the potential to withstand such kinds of threats from the future hackers. Apart from that, a comparison has also been made with other algorithms [44, 79–81] in Table 13. The values 99.6204 and 33.4623 (for Chair image) of metrics NPCR and UACI beat all the four studies given in the Table 13.
Apart from that, Tables 14 and 15 show theoretical (critical) values for NPCR and UACI respectively for the images with different sizes. According to the significance levels of .
,
,
denote critical values in order to reject null hypothesis (Table 14). It implies if value of NPCR for two cipher images is lower than
then two cipher images do not contain requisite randomness along with an
-level significance. According to the Table 16, NPCR results at all confidence levels (for all sizes) meet critical (theoretical) criterion of NPCR randomness test. For UACI, critical value
consists of two portions, i.e., left value (
) and right value (
). In Table 17, these values have been calculated. Null hypothesis is rejected if some value falls outside the range of (
). Values of UACI for all the sizes of suggested cipher meet critical values of UACI randomness test according to Table 17.
6.12 Ciphertext-only, known plaintext, chosen-plaintext and chosen-ciphertext attacks analysis
Cryptanalysis encompasses numerous techniques aimed at compromising ciphers and gaining unauthorized access to the secret key. Known plaintext, Chosen-plaintext, Ciphertext-only, and Chosen-ciphertext attacks are strategies employed by hackers occasionally [5, 6, 46]. In a ciphertext-only attack, attackers have limited ciphertexts at their disposal. For the known plaintext attack, they possess pairs of ciphertexts and plaintexts. Chosen plaintext attacks involve full access to the encryption algorithm, allowing attackers to transform given plaintexts into their ciphertext equivalents.
In this context, if experiments confirm the resilience of the proposed cipher to chosen plaintext attacks, then resistance to ciphertext-only, known plaintext, and chosen-ciphertext attacks is inherently assured, as the latter attacks are subsets of the chosen plaintext attack. In a chosen plaintext attack scenario, where attackers have access to the encryption machinery, they manipulate a special image, such as the White image (Fig 40), to derive the cipher’s secret key. When this White image is encrypted (Fig 41), it retrieves random data within the encryption algorithm, consequently revealing the secret key.
After these experiments, attackers take another plaintext image, let’s say the Bride image, and encrypt it (Fig 42) through the known plaintext attack, utilizing the secret key employed in the encryption of the White image. As Fig 43 illustrates, the Bride cipher image remains secure with this secret key. This experiment is similarly demonstrated using another special image, Black (Figs 44 to 47). These findings unequivocally demonstrate the proposed image cipher’s resistance to the aforementioned attacks.
6.13 PSNR and SSIM analyses
PSNR, an abbreviation for Peak Signal-to-Noise Ratio, serves as an additional security evaluation measure. It quantifies the degree of dissimilarity between plaintext and ciphertext images. Mathematically, it is expressed as follows [60]
Image dimensions are denoted as () in the equation above. Additionally, P0(i,j) and P1(i,j) represent pixel intensity values for plaintext and ciphertext images, while MSE quantifies mean squared error between these two images. For strong security outcomes, it is desirable to have larger values for MSE and smaller values for PSNR. Table 18 displays the results of this metric for various techniques.
Notably, the metric attains an infinite () value for original and decrypted images, indicating their absolute similarity due to MSE = 0. This underscores that the suggested algorithm is non-lossy. Furthermore, our algorithm achieves a superior PSNR value for the image of Chair compared to those in [59, 59], signifying a higher level of similarity between plaintext and ciphertext images.
For appreciating the quality of encryption, structural similarity index (SSIM) is also sometimes employed by the cryptographers. SSIM provides a more consistent measure of similarity between encrypted and decrypted images compared to MSE. In other words, it aligns with the concept that a blurred image is of poor quality, making it more compatible with the security parameters of SSIM than with MSE. Calculating SSIM involves considering the standard deviation, mean, and cross-correlation values for plaintext image (P) and output image(E). Formula for SSIM is detailed in [61].
where
and
Here, the pair (,
) corresponds to the means of cipher and plain images respectively. Apart from that, an other pair (
,
) refers to the standard deviations of cipher and plain images. Lastly,
denotes the cross-correlation of the given cipher and plain images. The dimensions of the images are denoted as
. Additionally, the SSIM value, which falls within the range of 0 to 1, is used for assessment. To ensure stability,
and
are employed, with D representing the dynamic range of pixel values (in this case, D = 255, k1 = 0.01, and k2 = 0.03). SSIM yields a value of 1 for identical images and nearly zero for structurally dissimilar images. At the bottom of Table 18, the SSIM results are presented. These results closely approach the ideal value of zero, indicating the effectiveness of the proposed image cipher. Moreover, our results surpass those in [61], where the SSIM value was reported as 0.0063.
6.14 Speed and time complexity analyses
The suggested cipher for images has been written under the MATLAB environment. Moreover, RAM = 8.00 GB, Intel(R) Core(TM) i7-3740QM CPU @ 2.70GHz was chosen for its hardware. Additionally, the system type is 64-bit Operating System, the x64-based processor. The speed of the cipher with the selected images has been shown in Table 19. The average speed for the chosen images has come out to be 1.2232 seconds. Besides, the proposed work beat the work [80]. Moreover, this work further executed the proposed algorithm for 100 test images with varying sizes (from to
) whose average time came out to be 3.2780 seconds. The performance of the algorithms is also checked through the time complexity analysis. Algorithm 1 takes the time O(6mn) to spawn the streams of random data. The time consuming steps of Algorithm 2 take the time
after ignoring the lower order terms. In the same fashion, Algorithm 3 takes the time O(mn). After adding all the terms, we get the time complexity of the suggested algorithm as O(8mn) which is better than O(24mn) [54] and O(24mn) [55]. It takes the form of O(8n2) in case the image is square.
7 Conclusion
Varied image encryption schemes abound, as an objective study of the concerned literature indicates. Among these, a small subset of schemes based on scrambled images has been developed. In addition, various algorithms at the pixel level using both 2D and 3D spaces have already been explored. This study proposes a novel image encryption scheme that builds on the notion of a scrambled image, where randomly selected rows and columns of pixels are inserted into arbitrary row and column positions within the scrambled image. This operation is repeated multiple times to introduce the desired scrambling effects. Diffusion is achieved via an XOR operation between the scrambled image and streams of random numbers, generated using the Rössler chaotic system. Comprehensive validation using various security parameters demonstrates that the proposed image cipher offers strong potential for practical applications, particularly in resource-constrained environments. Furthermore, its lightweight structure and efficient execution indicate real-time feasibility in IoT devices, making it a strong candidate for integration into next-generation secure communication systems. As future work, the concept of the scrambled image can be extended into the 3D space to potentially enhance security further.
Acknowledgments
The authors are grateful to Umm Al-Qura University, Saudi Arabia for supporting this research work.
References
- 1. Yavuz E, Yazıcı R, Kasapbaşı MC, Yamaç E. A chaos-based image encryption algorithm with simple logical functions. Comput Electr Eng. 2016;54:471–83.
- 2. Zaman JKMS, Ghosh R. Review on fifteen statistical tests proposed by NIST. J Theor Phys Cryptogr. 2012;1:18–31.
- 3. Iqbal N, Hanif M, Abbas S, Khan MA, Ul Rehman Z. Dynamic 3D scrambled image based RGB image encryption scheme using hyperchaotic system and DNA encoding. J Inf Secur Appl. 2021;58:102809.
- 4. Qayyum A, Ahmad J, Boulila W, Rubaiee S, Arshad, Masood F, et al. Chaos-based confusion and diffusion of image pixels using dynamic substitution. IEEE Access. 2020;8:140876–95.
- 5. Wen H, Lin Y, Yang L, Chen R. Cryptanalysis of an image encryption scheme using variant Hill cipher and chaos. Expert Syst Appl. 2024;250:123748.
- 6. Wen H, Lin Y. Cryptanalysis of an image encryption algorithm using quantum chaotic map and DNA coding. Expert Syst Appl. 2024;237:121514.
- 7. Feng W, Yang J, Zhao X, Qin Z, Zhang J, Zhu Z, et al. A novel multi-channel image encryption algorithm leveraging pixel reorganization and hyperchaotic maps. Mathematics. 2024;12(24):3917.
- 8. Feng W, Zhang J, Chen Y, Qin Z, Zhang Y, Ahmad M, et al. Exploiting robust quadratic polynomial hyperchaotic map and pixel fusion strategy for efficient image encryption. Expert Syst Appl. 2024;246:123190.
- 9. Zhou Y, Li C, Li W, Li H, Feng W, Qian K. Image encryption algorithm with circle index table scrambling and partition diffusion. Nonlinear Dyn. 2021;103(2):2043–61.
- 10. Li C, Zhang Y, Li H, Zhou Y. Visual image encryption scheme based on inter-intra-block scrambling and weighted diffusion. Vis Comput. 2023;40(2):731–46.
- 11. Khan FA, Ahmed J, Khan JS, Ahmad J, Khan MA. A novel image encryption based on Lorenz equation, Gingerbreadman chaotic map and S 8 permutation. J Intell Fuzzy Syst. 2017;33(6):3753–65.
- 12. Murillo-Escobar MA, Meranza-Castillón MO, López-Gutiérrez RM, Cruz-Hernández C. Suggested integral analysis for chaos-based image cryptosystems. Entropy (Basel). 2019;21(8):815. pmid:33267528
- 13. Hamza YA, Dahar Omer M. An efficient method of image encryption using Rossler chaotic system. Acad J Nawroz Univ. 2021;10(2):11.
- 14. Lu Q, Zhu C, Deng X. An efficient image encryption scheme based on the LSS chaotic map and single S-box. IEEE Access. 2020;8:25664–78.
- 15. Farah MAB, Farah A, Farah T. An image encryption scheme based on a new hybrid chaotic map and optimized substitution box. Nonlinear Dyn. 2019;99(4):3041–64.
- 16. Shahna KU, Mohamed A. A novel image encryption scheme using both pixel level and bit level permutation with chaotic map. Appl Soft Comput. 2020;90:106162.
- 17. Patro KAK, Soni A, Netam PK, Acharya B. Multiple grayscale image encryption using cross-coupled chaotic maps. J Inf Secur Appl. 2020;52:102470.
- 18. ElKamchouchi DH, Mohamed HG, Moussa KH. A bijective image encryption system based on hybrid chaotic map diffusion and DNA confusion. Entropy (Basel). 2020;22(2):180. pmid:33285955
- 19. Wang S, Peng Q, Du B. Chaotic color image encryption based on 4D chaotic maps and DNA sequence. Optics Laser Technol. 2022;148:107753.
- 20. Azimi Z, Ahadpour S. Color image encryption based on DNA encoding and pair coupled chaotic maps. Multimed Tools Appl. 2019;79(3–4):1727–44.
- 21. Mohamed AG, Korany NO, El-Khamy SE. New DNA coded fuzzy based (DNAFZ) S-boxes: application to robust image encryption using hyper chaotic maps. IEEE Access. 2021;9:14284–305.
- 22. Xiong Z, Wu Y, Ye C, Zhang X, Xu F. Color image chaos encryption algorithm combining CRC and nine palace map. Multimed Tools Appl. 2019;78(22):31035–55.
- 23. Iqbal N, Abbas S, Khan MA, Fatima A, Ahmed A, Anwer N. Efficient image cipher based on the movement of king on the chessboard and chaotic system. J Electron Imag. 2020;29(2):1.
- 24. Kumar A, Raghava NS. An efficient image encryption scheme using elementary cellular automata with novel permutation box. Multimed Tools Appl. 2021;80(14):21727–50.
- 25. Iqbal N, Abbas S, Khan MA, Alyas T, Fatima A, Ahmad A. An RGB image cipher using chaotic systems, 15-puzzle problem and DNA computing. IEEE Access. 2019;7:174051–71.
- 26. Chai X, Zhang J, Gan Z, Zhang Y. Medical image encryption algorithm based on Latin square and memristive chaotic system. Multimed Tools Appl. 2019;78(24):35419–53.
- 27. Li T, Shi J, Li X, Wu J, Pan F. Image encryption based on pixel-level diffusion with dynamic filtering and DNA-level permutation with 3D Latin cubes. Entropy (Basel). 2019;21(3):319. pmid:33267033
- 28. Kadhim A, Mehdi S. A new image encryption algorithm based on six dimension hyper chaotic system and KEN KEN puzzle. J Optoelectron Laser. 2022;41(3):312–21.
- 29. Iqbal N, Naqvi RA, Atif M, Khan MA, Hanif M, Abbas S, et al. On the image encryption algorithm based on the chaotic system, DNA encoding, and castle. IEEE Access. 2021;9:118253–70.
- 30. Ye G, Pan C, Huang X, Mei Q. An efficient pixel-level chaotic image encryption algorithm. Nonlinear Dyn. 2018;94(1):745–56.
- 31. Chen R, Liu L, Zhang Z. Cryptanalysis on a permutation–rewriting–diffusion (PRD) structure image encryption scheme. Multimed Tools Appl. 2022;82(3):4289–317.
- 32. Wang X, Wang X, Ma B, Li Q, Shi Y-Q. High precision error prediction algorithm based on ridge regression predictor for reversible data hiding. IEEE Signal Process Lett. 2021;28:1125–9.
- 33. Kengnou Telem AN, Tchito Tchapga C, Nkapkop JDD, Nguimfack Ndongmo JDD, Tsafack N, Boui A Boya BF. Hyperchaotic color image encryption scheme based on simultaneous color channel confusion-diffusion operations. Phys Scr. 2024;99(7):075276.
- 34. Meng F-Q, Wu G. A color image encryption and decryption scheme based on extended DNA coding and fractional-order 5D hyper-chaotic system. Expert Syst Appl. 2024;254:124413.
- 35. Iqbal N, Hussain I, Khan MA, Abbas S, Yousaf S. An efficient image cipher based on the 1D scrambled image and 2D logistic chaotic map. Multimed Tools Appl. 2023;82(26):40345–73.
- 36. Iqbal N, Abbas S, Khan MA, Alyas T, Fatima A, Ahmad A. An RGB image cipher using chaotic systems, 15-puzzle problem and DNA computing. IEEE Access. 2019;7:174051–71.
- 37. Wang X, Xu D. A novel image encryption scheme using chaos and Langton’s ant cellular automaton. Nonlinear Dyn. 2014;79(4):2449–56.
- 38. Iqbal N, Hanif M, Abbas S, Khan MA, Ul Rehman Z. Dynamic 3D scrambled image based RGB image encryption scheme using hyperchaotic system and DNA encoding. J Inf Secur Appl. 2021;58:102809.
- 39. Shatheesh SI, Devaraj P, Bhuvaneswaran R. An intertwining chaotic maps based image encryption scheme. Nonlinear Dynamics, 2012;69(4):1995–2007.
- 40. Boriga RE, Dăscălescu AC, Diaconu AV. A new fast image encryption scheme based on 2D chaotic maps. IAENG Int J Comput Sci. 2014;41(4):249–58.
- 41. Wu Y, Zhou Y, Saveriades G, Agaian S, Noonan JP, Natarajan P. Local Shannon entropy measure with statistical tests for image randomness. Inf Sci. 2013;222:323–42.
- 42. Guan M, Yang X, Hu W. Chaotic image encryption algorithm using frequency-domain DNA encoding. IET Image Process. 2019;13(9):1535–9.
- 43. Wang X, Liu C. A novel and effective image encryption algorithm based on chaos and DNA encoding. Multimed Tools Appl. 2016;76(5):6229–45.
- 44. Bashir Z, Iqbal N, Hanif M. A novel gray scale image encryption scheme based on pixels’ swapping operations. Multimed Tools Appl. 2020;80(1):1029–54.
- 45. Xian Y, Wang X. Fractal sorting matrix and its application on chaotic image encryption. Inf Sci. 2021;547:1154–69.
- 46. Alvarez G, Li S. Some basic cryptographic requirements for chaos-based cryptosystems. Int J Bifurcation Chaos. 2006;16(8):2129–51.
- 47.
Xu S, Xue H, Luo L, Yan L, Zou X. DrPIM: an adaptive and less-blocking data replication framework for processing-in-memory architecture. In: Proceedings of the Great Lakes Symposium on VLSI 2023. 2023, pp. 385–9. https://doi.org/10.1145/3583781.3590294
- 48. Bhalaji N. Efficient and secure data utilization in mobile EDGE computing by data replication. J ISMAC. 2020;2(1):1–12.
- 49. Saranya N, Geetha K, Rajan C. Data replication in mobile edge computing systems to reduce latency in internet of things. Wireless Pers Commun. 2020;112(4):2643–62.
- 50.
Tamimi AA, Dawood R, Sadaqa L. Disaster recovery techniques in cloud computing. In: 2019 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT). 2019, pp. 845–50. https://doi.org/10.1109/jeeit.2019.8717450
- 51. Yu F, Xu S, Xiao X, Yao W, Huang Y, Cai S, et al. Dynamics analysis, FPGA realization and image encryption application of a 5D memristive exponential hyperchaotic system. Integration. 2023;90:58–70.
- 52. Yu F, Shen H, Yu Q, Kong X, Sharma PK, Cai S. Privacy protection of medical data based on multi-scroll memristive hopfield neural network. IEEE Trans Netw Sci Eng. 2023;10(2):845–58.
- 53. Yu F, Shen H, Zhang Z, Huang Y, Cai S, Du S. A new multi-scroll Chua’s circuit with composite hyperbolic tangent-cubic nonlinearity: complex dynamics, hardware implementation and image encryption application. Integration. 2021;81:71–83.
- 54. Wu X, Wang K, Wang X, Kan H, Kurths J. Color image DNA encryption using NCA map-based CML and one-time keys. Signal Process. 2018;148:272–87.
- 55. Chai X, Fu X, Gan Z, Lu Y, Chen Y. A color image cryptosystem based on dynamic DNA encryption and chaos. Signal Process. 2019;155:44–62.
- 56. Gao S, Wu R, Wang X, Liu J, Li Q, Tang X. EFR-CSTP: encryption for face recognition based on the chaos and semi-tensor product theory. Inf Sci. 2023;621:766–81.
- 57. Çelik H, Doğan N. A hybrid color image encryption method based on extended logistic map. Multimed Tools Appl. 2023;83(5):12627–50.
- 58. Norouzi B, Mirzakuchaki S. A fast color image encryption algorithm based on hyper-chaotic systems. Nonlinear Dyn. 2014;78(2):995–1015.
- 59. Taneja N, Raman B, Gupta I. Combinational domain encryption for still visual data. Multimed Tools Appl. 2011;59(3):775–93.
- 60. Mansoor S, Parah SA. HAIE: a hybrid adaptive image encryption algorithm using Chaos and DNA computing. Multimed Tools Appl. 2023;82(19):28769–96.
- 61. Murillo-Escobar MA, Meranza-Castillón MO, López-Gutiérrez RM, Cruz-Hernández C. Suggested integral analysis for chaos-based image cryptosystems. Entropy (Basel). 2019;21(8):815. pmid:33267528
- 62. Kulsoom A, Xiao D, Aqeel-ur-Rehman, Abbas SA. An efficient and noise resistive selective image encryption scheme for gray images based on chaotic maps and DNA complementary rules. Multimed Tools Appl. 2014;75(1):1–23.
- 63. Aqeel-ur-Rehman, Liao X, Hahsmi MA, Haider R. An efficient mixed inter-intra pixels substitution at 2 bits-level for image encryption technique using DNA and chaos. Optik. 2018;153:117–34.
- 64. Iqbal N, Banga A, Innab N, ElZaghmouri BM, Ikram A, Diab H. Utilizing the nth root of numbers for novel random data calculus and its applications in network security and image encryption. Expert Syst Appl. 2025;265:125992.
- 65. Deb S, Das A, Biswas B, Sarkar JL, Khan SB, Alzahrani S, et al. Enhancing image security via block cyclic construction and DNA based LFSR. IEEE Trans Consum Electron. 2024;70(3):5516–23.
- 66. Deb S, Bhuyan B. Chaos-based medical image encryption scheme using special nonlinear filtering function based LFSR. Multimed Tools Appl. 2021;80(13):19803–26.
- 67. Belazi A, Talha M, Kharbech S, Xiang W. Novel medical image encryption scheme based on chaos and DNA encoding. IEEE Access. 2019;7:36667–81.
- 68. Zhu S, Deng X, Zhang W, Zhu C. Image encryption scheme based on newly designed chaotic map and parallel DNA coding. Mathematics. 2023;11(1):231.
- 69. Liang Q, Zhu C. A new one-dimensional chaotic map for image encryption scheme based on random DNA coding. Optics Laser Technol. 2023;160:109033.
- 70. Chai X, Gan Z, Yuan K, Chen Y, Liu X. A novel image encryption scheme based on DNA sequence operations and chaotic systems. Neural Comput Appl. 2017;31(1):219–37.
- 71. Rani N, Mishra V, Sharma SR. Image encryption model based on novel magic square with differential encoding and chaotic map. Nonlinear Dyn. 2022;111(3):2869–93.
- 72. Tahbaz M, Shirgahi H, Yamaghani MR. Evolutionary-based image encryption using magic square chaotic algorithm and RNA codons truth table. Multimed Tools Appl. 2023;83(1):503–26.
- 73. Wang J, Liu L. A novel chaos-based image encryption using magic square scrambling and octree diffusing. Mathematics. 2022;10(3):457.
- 74. Guleria V, Kumar Y, Mishra DC. Multiple colour image encryption using multiple parameter FrDCT, 3D Arnold transform and RSA. Multimed Tools Appl. 2023;83(16):48563–84.
- 75.
Senthilnayaki B, Venkatalakshami K, Dharanyadevi P, Nivetha G, Devi A. An efficient medical image encryption using magic square and PSO. In: 2022 International Conference on Smart Technologies and Systems for Next Generation Computing (ICSTSN), 2022, pp. 1–5. https://doi.org/10.1109/icstsn53084.2022.9761299
- 76. Feng W, Yang J, Zhao X, Qin Z, Zhang J, Zhu Z, et al. A novel multi-channel image encryption algorithm leveraging pixel reorganization and hyperchaotic maps. Mathematics. 2024;12(24):3917.
- 77. Feng W, Wang Q, Liu H, Ren Y, Zhang J, Zhang S, et al. Exploiting newly designed fractional-order 3D Lorenz chaotic system and 2D discrete polynomial hyper-chaotic map for high-performance multi-image encryption. Fractal Fract. 2023;7(12):887.
- 78. Yu F, Zhang S, Su D, Wu Y, Gracia YM, Yin H. Dynamic analysis and implementation of FPGA for a New 4D fractional-order memristive hopfield neural network. Fractal Fract. 2025;9(2):115.
- 79. Gao X, Mou J, Banerjee S, Cao Y, Xiong L, Chen X. An effective multiple-image encryption algorithm based on 3D cube and hyperchaotic map. J King Saud Univ Comput Info Sci. 2022;34(4):1535–51.
- 80. Masood F, Boulila W, Alsaeedi A, Khan JS, Ahmad J, Khan MA, et al. A novel image encryption scheme based on Arnold cat map, Newton-Leipnik system and Logistic Gaussian map. Multimed Tools Appl. 2022;81(21):30931–59.
- 81. Abduljabbar ZA, Abduljaleel IQ, Ma J, Sibahee MAA, Nyangaresi VO, Honi DG, et al. Provably secure and fast color image encryption algorithm based on S-boxes and hyperchaotic map. IEEE Access. 2022;10:26257–70.