The International Arab Journal of Information Technology (IAJIT)

..............................
..............................
..............................


Simplified and Effective Dual-Round Image Encryption Robust Technique

A simplified and efficient technique of cryptography of an image will be developed. The technique will utilize two simple rounds to apply image encryption and decryption, each round will be implemented by performing a simple rows shuffling and columns shuffling, eliminating the need for computational logical and arithmetic operations required for other techniques of image encryption. Our approach, while simplifying computational demands by eliminating complex arithmetic and logical operations, maintains robust security through the integration of dual Chaotic Logistic Map Models (CLMM) to generate highly sensitive indices keys. These indices keys control row and column shuffling, which provides a high degree of permutation and resists known-plaintext and cipher text-only attacks. The technique will require two secret indices keys, these keys will be variable in the length and the contents and they will depend on the image to be encrypted-decrypted, generation of these keys will be very easy and simple. The shuffling operations will be implemented using two secret indices keys, and by implementing couple of chaotic logistic map these keys will be produced using selected chaotic parameters values included in the private key. The technique uses a 256-bit private key, chaotic logistic maps, and high sensitivity to parameter variations to achieve "Very strong" key space entropy, with encryption throughput of 19,540 KB/s and robust performance across diverse image sizes. The generated decrypted image may become so sensitive to chosen of private key values, and any little variation in the private key through the decryption task, it will be showed as a hacking try. The proposed technique will be flexible, it will be used to process every image with any size (gray and/or color), and image changing will not require any updating in the decryption and encryption processes. The developed technique will be efficient; it will decrease both the encryption and decryption times, and lead to accelerate the image encryption process comparing with other techniques. The study systematically utilizes specific evaluation metrics to substantiate claims regarding the quality, security, and velocity of the proposed cryptographic technique. Quality is assessed by Mean Square Error (MSE) and Peak Signal-to-Noise Ratio (PSNR) metrics.

[1] Alkhonaini M., Gemeay E., Mahmood F., Ayari M., Alenizi F., and Lee S., “A New Encryption Algorithm for Image Data Based on Two-Way Chaotic Maps and Iterative Cellular Automata,” Scientific Reports, vol. 14, no. 1, pp. 16701, 2024. https://doi.org/10.1038/s41598-024-64741-x

[2] Al-Laham M., Al-Ma’aitah M., and Alqadi Z., “A Simple and Stable Method of Creating Fingerprint Features with Image Rotation,” The International Arab Journal of Information Technology, vol. 20, no. 4, pp. 686-692, 2023. DOI:10.34028/iajit/20/4/15

[3] Arumugam S., “An Effective Hybrid Encryption Model using Biometric Key for Ensuring Data Security,” The International Arab Journal of Information Technology, vol. 20, no. 5, pp. 796- 807, 2023. https://doi.org/10.34028/iajit/20/5/12

[4] Asgari-Chenaghlu M., Balafar M., and Feizi- Derakhshi M., “A Novel Image Encryption Algorithm Based on Polynomial Combination of Chaotic Maps and Dynamic Function Simplified and Effective Dual-Round Image Encryption Robust Technique 325 Generation,” Signal Processing, vol. 157, pp. 1- 13, 2019. https://doi.org/10.1016/j.sigpro.2018.11.010

[5] Chu R. and Zhang S., “A Color Image Encryption Based on Chaotic System and PSO-BP Neural Network and DNA Mutation,” Physica Scripta, vol. 97, no. 12, pp. 125216, 2022. DOI:10.1088/1402-4896/aca0cd

[6] Das R. and Das I., “Secure Data Transfer in IoT Environment: Adopting both Cryptography and Steganography Techniques,” in Proceedings of the 2nd International Conference on Research in Computational Intelligence and Communication Networks, Kolkata, pp. 296-301, 2016. DOI:10.1109/ICRCICN.2016.7813674

[7] Elazzaby F., Elakkad N., and Sabour K., “The Coupling of a Multiplicative Group and the Theory of Chaos in the Encryptions of Images,” The International Arab Journal of Information Technology, vol. 21, no. 1, pp. 1-16, 2024. https://doi.org/10.34028/iajit/21/1/1

[8] Emam M., Ali A., and Omara F., “An Improved Image Steganography Technique Based on LSB Technique with Random Pixel Selection,” International Journal of Advanced Computer Science and Applications, vol. 7, no. 3, pp. 361- 366, 2016. DOI:10.14569/IJACSA.2016.070350

[9] Fei X., Zhang J., and Qin W., “Design a New Image Encryption Algorithm Based on a 2D- ASCC Map,” Physica Scripta, vol. 97, no. 12, pp. 125206, 2022. DOI:10.1088/1402-4896/ac95d9

[10] Gilmolk A. and Aref M., “Lightweight Image Encryption Using a Novel Chaotic Technique for the Safe Internet of Things,” International Journal of Computational Intelligence Systems, vol. 17, no. 146, pp. 1-22, 2024. https://doi.org/10.1007/s44196-024-00535-3

[11] Gudimetla S., “Data Encryption in Cloud Storage,” International Research Journal of Modernization in Engineering Technology and Science, vol. 6, pp. 2582-5208, 2024. DOI:10.56726/IRJMETS50637

[12] Hua Z., Zhou Y., and Huang H., “Cosine- Transform-Based Chaotic System for Image Encryption,” Information Sciences, vol. 480, pp. 403-419, 2019. https://doi.org/10.1016/j.ins.2018.12.048

[13] Jeon J., Lee S., and Choi S., “A Systematic Review of Research on Speech-Recognition Chatbots for Language Learning: Implications for Future Directions in the Era of Large Language Models,” Interactive Learning Environments, vol. 32, no. 8, pp. 1-19, 2023. https://doi.org/10.1080/10494820.2023.2204343

[14] Kumara M., Karthikkab P., Dhivyac N., and Gopalakrishnan T., “A Performance Comparison of Encryption Algorithms for Digital Images,” International Journal of Engineering Research and Technology, vol. 3 no. 2, pp. 2169-2174, 2014. https://typeset.io/pdf/a-performance-comparison- of-encryption-algorithms-for-khzuyhvs3i.pdf

[15] Lai Q., Yang L., and Liu Y., “Design and Realization of Discrete Memristive Hyperchaotic Map with Application in Image Encryption,” Chaos, Solitons and Fractals, vol. 165, pp. 112781, 2022. https://doi.org/10.1016/j.chaos.2022.112781

[16] Li M., Cui Q., Wang X., Zhang Y., and Xiang Y., “FTPE-BC: Fast Thumbnail-Preserving Image Encryption Using Block-Churning,” Expert Systems with Applications, vol. 255, pp. 124574, 2024. https://doi.org/10.1016/j.eswa.2024.124574

[17] Majeed A., Mat Kiah M., Madhloom H., Zaidan B., Zaidan A., “Novel Approach for High Secure and High Rate Data Hidden in the Image Using Image Texture Analysis,” International Journal of Engineering and Technology, vol. 1, no. 2, pp. 63- 69, 2009.

[18] Meng F. and Wu G., “A Color Image Encryption and Decryption Scheme based on Extended DNA Coding and Fractional-Order 5D Hyper-Chaotic System,” Expert Systems with Applications, vol. 254, pp. 124413, 2024. https://doi.org/10.1016/j.eswa.2024.124413

[19] Rehman H., Bajwa U., Raza R., Alfarhood S., Safran M., and Zhang F., “Leveraging Coverless Image Steganography to Hide Secret Information by Generating Anime Characters Using GAN,” Expert Systems with Applications, vol. 248, pp. 123420, 2024. https://doi.org/10.1016/j.eswa.2024.123420

[20] Safdar M., Shah T., and Ali A., “Enhancing Image Data Security with Chain and Non-Chain Galois Ring Structures,” Mathematics and Computers in Simulation, vol. 225, pp. 659-694, 2024. https://doi.org/10.1016/j.matcom.2024.06.008

[21] Shi H., Ji’e M., Li C., Yan D., Duan S., and Wang L., “A Novel Image Encryption Algorithm Based on 2D Self-Coupling Sine Map,” International Journal of Bifurcation and Chaos, vol. 32, no. 15, pp. 2250233, 2022. https://doi.org/10.1142/S0218127422502339

[22] Singh M., Baranwal N., Singh K., Singh A., and Zhou H., “Deep Learning-Based Biometric Image Feature Extraction for Securing Medical Images through Data Hiding and Joint Encryption- Compression,” Journal of Information Security and Applications, vol. 79, pp. 103628, 2023. https://doi.org/10.1016/j.jisa.2023.103628

[23] Soni A., Sharma S., Bhardwaj D., and Kumar S., “An Improved JPEG Image Blocking Artifact Detector,” Brazilian Archives of Biology and Technology, vol. 66, no. 2, pp. 1-10, 2023. DOI:10.1590/1678-4324-2023230384

[24] Wang M., Wang X., Wang C., Zhou S., Xia Z., and Li Q., “Color Image Encryption Based on 2D 326 The International Arab Journal of Information Technology, Vol. 22, No. 2, March 2025 Enhanced Hyperchaotic Logistic-Sine Map and Two-way Josephus Traversing,” Digital Signal Processing, vol. 132, pp. 103818, 2023. https://doi.org/10.1016/j.dsp.2022.103818

[25] Wu H., Zhang Y., Bao H., Zhang Z., Chen M., and Xu Q., “Initial-Offset Boosted Dynamics in Memristor-Sine-Modulation-based System and its Image Encryption Application,” AEU- International Journal of Electronics and Communications, vol. 157, pp. 154440, 2022. https://doi.org/10.1016/j.aeue.2022.154440

[26] Yepdia L., Tiedeu A., and Kom G., “A Robust and Fast Image Encryption Scheme Based on a Mixing Technique,” Security and Communication Networks, vol. 2021 no. 6615708, pp. 1-17, 2021. https://doi.org/10.1155/2021/6615708

[27] Zaidan A., Majeed A., and Zaidan B., “High Securing Cover-File of Hidden Data Using Statistical Technique and AES Encryption Algorithm,” World Academy of Science Engineering and Technology, vol. 3, pp. 1588- 1599, 2009. https://api.semanticscholar.org/CorpusID:143357 37

[28] Zaidan A., Zaidan B., Abdulrazzaq M., Raji R., and Mohammed S., “Implementation Stage for High Securing Cover-File of Hidden Data Using Computation among Cryptography and Steganography,” International Association of Computer Science and Information Technology, vol. 19, pp. 482-489, 2009.

[29] Zhang T., Lin L., and Xue Z., “A Voice Feature Extraction Technique Based on Fractional Attribute Topology for Parkinson’s Disease Detection,” Expert systems with applications, vol. 219, pp. 119650, 2023. https://doi.org/10.1016/j.eswa.2023.119650

[30] Zhenjun J., Song J., Zhang X., and Sun R., “Multiple-Image Encryption with Bit-Plane Decomposition and Chaotic Maps,” Optics and Lasers in Engineering, vol. 80, pp. 1-11, 2016. https://doi.org/10.1016/j.optlaseng.2015.12.004