Volume 16 , Issue 2 , PP: 77-95, 2025 | Cite this article as | XML | Html | PDF | Full Length Article
Sameeh Abdulghafour Jassim 1 * , Alaa Abulqahar Jihad 2 , Mohammed I. Khalaf 3
Doi: https://doi.org/10.54216/JCIM.160206
In an era where digital technologies dominate all aspects of life, image encryption has emerged as a fundamental pillar of data protection and securing sensitive information. With the rise of sophisticated cyber threats and attacks, the search for innovative and stronger encryption methods has become an urgent necessity. This research proposes an enhanced image encryption scheme combining the Arnold map, 2D Henon map, memristor elements, and exponential nonlinearity chaos techniques to address vulnerabilities in conventional encryption methods. The hybrid approach ensures robustness against statistical, differential, and brute-force attacks. Experimental results demonstrate superior performance with unified histogram distribution, including near-ideal information entropy (7.99941), infinite peak signal-to-noise ratio (PSNR), and high resistance to differential attacks (NPCR = 99.61%, UACI = 35.08%). A keyspace of and key sensitivity correlation difference rate (CDR) of 99.61% further validate security. Comparative analysis with recent studies confirms the proposed method’s superiority in encryption strength and computational performance. Consequently, the results of the proposed method making it a promising option for high-security image protection applications.
Security , Cryptography , Chaos system , Cipher image
[1] N. Khurana and M. Dua, “A novel one-dimensional Cosine within Sine chaotic map and novel permutation–diffusion based medical image encryption,” Nonlinear Dyn., vol. 113, no. 5, pp. 4839–4859, 2025.
[2] Y. A. A. S. Aldeen and H. M. Abdulhadi, “Data communication for drone-enabled internet of things,” Indonesian J. Electr. Eng. Comput. Sci., vol. 22, no. 2, pp. 1216-1222, 2021.
[3] S. A. Jassim, A. K. Farhan, and A. H. Radie, “Using a Hybrid Pseudorandom Number Generator for Cryptography in the Internet of Things,” in 2021 4th International Iraqi Conference on Engineering Technology and Their Applications (IICETA), 2021, pp. 264–269.
[4] S. T. Faraj, S. A. Jassim, and K. K. Kifayat, “Mediated IBC-Based Management System of Identity and Access in Cloud Computing,” Tikrit J. Eng. Sci., vol. 20, no. 3, pp. 1–9, 2013.
[5] W. K. Awad, “Searching over encrypted shared data via cloud data storage,” Available SSRN 4468120, 2018.
[6] Q. Kadhim and W. A. M. Al-Jawher, “A new multiple-chaos image encryption algorithm based on block compressive sensing, swin transformer, and wild horse optimization,” Multidiscip. Sci. J., vol. 7, no. 1, p. 2025012, 2025.
[7] Q. K. Abed and W. A. M. Al-Jawher, “Optimized Color Image Encryption Using Arnold Transform, URUK Chaotic Map and GWO Algorithm,” J. Port Sci. Res., vol. 7, no. 3, pp. 219–236, 2024.
[8] Z. Zhuang, Z. Zhuang, and T. Wang, “Medical image encryption algorithm based on a new five-dimensional multi-band multi-wing chaotic system and QR decomposition,” Sci. Rep., vol. 14, no. 1, p. 402, 2024.
[9] E. Moya-Albor, A. Romero-Arellano, J. Brieva, and S. L. Gomez-Coronel, “Color image encryption algorithm based on a chaotic model using the modular discrete derivative and Langton’s ant,” Mathematics, vol. 11, no. 10, p. 2396, 2023.
[10] K. M. Hosny, S. T. Kamal, and M. M. Darwish, “Novel encryption for color images using fractional-order hyperchaotic system,” J. Ambient Intell. Humaniz. Comput., vol. 13, no. 2, pp. 973–988, 2022.
[11] I. Ahmad and S. Shin, “A novel hybrid image encryption–compression scheme by combining chaos theory and number theory,” Signal Process. Image Commun., vol. 98, p. 116418, 2021.
[12] W. Alexan, M. Elkandoz, M. Mashaly, E. Azab, and A. Aboshousha, “Color image encryption through chaos and KAA map,” IEEE Access, vol. 11, pp. 11541–11554, 2023.
[13] S. A. Jassim and A. K. Farhan, “Combined Chebyshev and logistic maps to generate pseudorandom number generator for Internet of Things,” Int. J. Electr. Comput. Eng., vol. 12, no. 3, 2022.
[14] Z. Hua, Y. Zhang, and Y. Zhou, “Two-dimensional modular chaotification system for improving chaos complexity,” IEEE Trans. Signal Process., vol. 68, pp. 1937–1949, 2020.
[15] H. Nasry, A. A. Abdallah, A. K. Farhan, H. E. Ahmed, and W. I. El Sobky, “Multi chaotic system to generate novel S-box for image encryption,” in Journal of Physics: Conference Series, 2022, vol. 2304, no. 1, p. 12007.
[16] S. Kvatinsky, E. G. Friedman, A. Kolodny, and U. C. Weiser, “TEAM: Threshold adaptive memristor model,” IEEE Trans. Circuits Syst. I Regul. Pap., vol. 60, no. 1, pp. 211–221, 2012.
[17] I. V. Boylo and K. L. Metlov, “Nonlinear effects in memristors with mobile vacancies,” R. Soc. Open Sci., vol. 8, no. 10, p. 210677, 2021.
[18] S. Liu, Q. Wang, C. Liu, Y. Sun, and L. He, “Natural Exponential and Three‐Dimensional Chaotic System,” Adv. Sci., vol. 10, no. 15, p. 2204269, 2023.
[19] N. Chaudhary, T. B. Shahi, and A. Neupane, “Secure image encryption using chaotic, hybrid chaotic and block cipher approach,” J. Imaging, vol. 8, no. 6, p. 167, 2022.
[20] H. Liu, B. Zhao, and L. Huang, “Quantum image encryption scheme using Arnold transform and S-box scrambling,” Entropy, vol. 21, no. 4, p. 343, 2019.
[21] “Mathship Technologies.” [Online]. Available: https://www.hlevkin.com/hlevkin/06testimages.htm. [Accessed: Mar. 29, 2025].
[22] Y. Wu, S. Chu, H. Bao, D. Wang, and J. Zhou, “Optimization of Image Encryption Algorithm Based on Henon Mapping and Arnold Transformation of Chaotic Systems,” IEEE Access, 2024.
[23] A. R. Smith and B. J. Johnson, “A Review of Cryptographic Techniques for Secure Image Transmission,” J. Inf. Sec. Appl., vol. 58, pp. 102-110, 2022.
[24] L. M. Patel and R. K. Verma, “Performance Analysis of Image Encryption Techniques: A Survey,” Int. J. Comput. Appl., vol. 184, no. 9, pp. 29-36, 2021.
[25] T. H. Nguyen and P. A. Tran, “Chaotic Image Encryption Using a Hybrid Approach,” J. Cybersecur. Privacy, vol. 1, no. 3, pp. 123-135, 2021.
[26] S. A. Jassim, “Enhancing S-box Generation Using African Buffalo Optimization Algorithm Techniques,” Int. J. Intell. Eng. Syst., vol. 18, no. 3, 2025.