Protecting Digital Images Using Keys Enhanced by 2D Chaotic Logistic Maps

: This research paper presents a novel digital color image encryption approach that ensures high-level security while remaining simple and efﬁcient. The proposed method utilizes a composite key r and x of 128-bits to create a small in-dimension private key (a chaotic map), which is then resized to match the color matrix dimension. The proposed method is uncomplicated and can be applied to any image without any modiﬁcation. Image quality, sensitivity analysis, security analysis, correlation analysis, quality analysis, speed analysis, and attack robustness analysis are conducted to prove the efﬁciency and security aspects of the proposed method. The speed analysis shows that the proposed method improves the performance of image cryptography by minimizing encryption–decryption time and maximizing the throughput of the process of color cryptography. The results demonstrate that the proposed method provides better throughput than existing methods. Overall, this research paper provides a new approach to digital color image encryption that is highly secure, efﬁcient, and applicable to various images.


Introduction
Encrypting digital images is an important security measure that can help protect the confidentiality and integrity of sensitive information. When digital images are transmitted over the internet or stored on a device, they are vulnerable to interception and unauthorized access. Encryption can help prevent unauthorized access to these images by making the data unreadable without the proper decryption key [1][2][3].
Encrypting digital images can help protect against data tampering or alteration as well. With encryption, if someone tries to modify the encrypted data, the decryption process will fail, alerting the recipient that the data have tampered with [4,5].
In many industries, such as healthcare, finance, and legal services, images often contain sensitive personal information, such as medical records, financial statements, or legal documents. Encrypting these images can help ensure this information remains confidential and secure [5][6][7].
Overall, encrypting digital images is an important security measure that can help to protect sensitive information and prevent unauthorized access to data [8][9][10][11][12].
Color digital images are among social media's most popular digital data types. Their ubiquity is due to several reasons, the most important of which are [9][10][11][12][13][14]: • Ease of obtaining a digital color image because of the diversity of the sources it provides and the diversity of the equipment that generates it. • The digital image can be processed easily because it is presented as a matrix with three dimensions, which consist of a two-dimensional matrix for each of the primary colors (red, green, and blue), as shown in Figure 1. • Ease of dealing with the matrix of each color, ease of extracting each color from the three colors matrices, and ease of re-combining these matrices to produce the colored image. • Using the digital revolution in many vital applications, especially engineering, medical, and data security and protection applications. In this context, the topic of private key cryptography for digital color image encryption is of great importance and relevance, as shown in Figure 2 [15][16][17]. Digital color image encryption refers to the process of converting a color image into an unreadable format by using mathematical algorithms to protect its confidentiality during transmission and storage. With the proliferation of digital media and the increasing amount of sensitive information being transmitted online, digital image encryption has become an essential component of data security. The encryption process involves using a secret key known only to the sender and receiver, which is used to transform the image into a cipher that is unintelligible to anyone else. Decryption is performed by applying the same key in reverse, which converts the cipher back into the original image [16][17][18].
The importance of digital color image encryption is clear when considering the sensitive nature of many types of visual data, such as medical images, financial documents, and legal records. Without encryption, these images could be intercepted or accessed by unauthorized individuals, potentially leading to identity theft, financial fraud, or other malicious activity. Encrypting images maintains this information's confidentiality, ensuring that only the intended recipient can access the data. This is especially important in today's digital age, where data breaches and cyberattacks have become increasingly common. As such, digital image encryption is a critical tool in protecting the privacy and security of digital assets and is essential for maintaining trust in online transactions and communications [19,20].
The Mean Squared Error (MSE), Peak Signal-to-Noise Ratio (PSNR), and Correlation Coefficient (CC) are commonly used metrics in image processing and analysis. These metrics can be used to measure the quality and accuracy of image encryption techniques [2,3].
MSE is a metric used to measure the difference between two images. It is calculated as the average of the two images' squared differences between corresponding pixels. A lower MSE value indicates a better match between the original and decrypted image. MSE is often used in image encryption to evaluate the level of distortion introduced during encryption and decryption [12,14].
PSNR is another commonly used metric in image processing. It is calculated as the ratio of the maximum possible power of a signal to the power of the noise that corrupts the signal. PSNR is often used in image encryption to evaluate the level of noise introduced during encryption and decryption. A higher PSNR value indicates less noise and better quality of the decrypted image [19,20].
CC is a metric used to measure the degree of similarity between two images. It measures the linear relationship between the two images, where a value of 1 indicates a perfect positive correlation, −1 indicates a perfect negative correlation, and 0 indicates no correlation. CC is often used in image encryption to evaluate the level of similarity between the original and encrypted image. A higher CC value indicates better similarity between the original and decrypted image [2,8].
In image encryption, MSE, PSNR, and CC can be used to evaluate the quality and effectiveness of different encryption techniques. For example, a good encryption technique should have a low MSE value, high PSNR value, and high CC value. These metrics can be used to optimize encryption parameters and to compare the performance of different encryption algorithms [12,19].
The proposed approach in this research paper presents a novel digital color image encryption method that uses enhanced 2D chaotic logistic maps to generate a complex private key. The generated key has a large space, making hacking or guessing impossible. The method is simple and is applicable to any image without any modification. Furthermore, the proposed method has been tested for its efficiency aspects; the results show that it can improve the performance of image cryptography by minimizing encryption-decryption time and maximizing the throughput of the process of color cryptography. This research is important, as it provides a practical solution to address the security concerns surrounding the confidentiality of digital color images, which is critical in fields such as medical imaging, national security, and commerce.
The proposed method for digital image encryption using chaotic logistic maps aims to achieve the following objectives: first, to develop efficient, high-level security, and simple digital image encryption method that can work with any size of an image without any modifications; second, to study and evaluate the performance of the proposed method in terms of throughput and compare its results with the state-of-the-art methods; third, to devise an encryption method that is sensitive to initial conditions and robust against various attacks, and conduct an extensive analysis of the proposed method in terms of security, quality, sensitivity, and speed; and finally, to investigate the potential of using chaotic logistic maps in digital image cryptography and the effect on the performance and time requirements.
The structure of this paper is as follows: Section 2 discusses related work to the proposed method; the proposed method is discussed in detail in Section 3; Section 4 shows the implementation details and the obtained results; and Section 5 presents our conclusions.
These methods use a fixed-length Private Key (PK), fixed-length block size, and fixed number of rounds to accomplish the encryption and decryption phases. While all of these methods are based on encryption standards that provide good values of quality parameters, they have low speed and can only be used to encrypt/decrypt data with small size, such as messages and text files [22][23][24][25].
In [26], the authors evaluated several different encryption techniques, finding that the DES, 3DES, AES, and BF methods produced throughputs of 7988, 2683, 5326, and 10,176 bytes per second, respectively. However, due to their small size, these rates are not suitable for encrypting or decrypting data with larger size such as digital color images.
Because there is a necessity to deal with massive data sizes and protect these data, chaos-based algorithms for encryption are heavily used. They provide high security, good throughput, sizeable key space, randomness, and sensitivity to initial conditions, all of which make them a great candidate for encryption algorithms [20].
In [38], the authors proposed a novel encryption method for 3D point and mesh data in fog computing using chaotic maps. The proposed method utilizes the chaotic dynamics of a chaotic map to generate a sequence of pseudo-random numbers, which is then used as the encryption key. The method was applied to 3D point and mesh data and tested for encryption quality, time complexity, and resistance against attacks. Their experimental results showed that the proposed method provides a high level of encryption security with low time complexity, making it suitable for edge computing applications.
In [19], the authors proposed a color image encryption algorithm that is both provably secure and fast. The algorithm utilizes a combination of substitution boxes (S-boxes) and hyperchaotic maps to generate the encryption key and perform the encryption process. The S-boxes are used to substitute the pixel values of the input image, while the hyperchaotic maps generate the sequence of pseudo-random numbers used as the encryption key. The proposed algorithm can be applied in various fields, such as secure image transmission and storage, video surveillance, and medical imaging, ensuring data confidentiality and integrity.
In [27], the authors introduced a method based on the chaotic map model, realizing improved throughput and reaching 0.1691 M bytes per second, while in [44] the introduced method achieved a throughput equal to 0.71 Mbyte per second. In [28], the authors made performance comparisons between chaotic and non-chaotic methods of data cryptography; a comparison of the results is shown in Table 1. In [39], the authors proposed an image encryption algorithm based on a logistic map. The algorithm uses the logistic map to generate a sequence of pseudo-random numbers, which is used as the encryption key to scramble the pixel values of the input image. The algorithm's implementation is computationally efficient, making it suitable for resourceconstrained devices in real-time applications.
In [40], the authors introduced a technique for encrypting images that utilizes chaotic and logistic maps in three dimensions. The method they proposed involves using both a 3D chaotic map and a logistic map to produce two chaotic sequences that mix and spread out the image.
In [41,43], the authors proposed an image encryption scheme based on a chaotic map and a logistic map. The proposed schemes use a chaotic map to generate a key stream and a logistic map to generate a sequence of substitution boxes that are used to encrypt the images.
In [42], the authors presented a chaotic image encryption algorithm based on a fractional-order chaotic map and a logistic map. The proposed algorithm uses a fractionalorder chaotic map to generate a chaotic sequence and a logistic map to generate a pseudorandom permutation matrix that is used to scramble the image.
In [29], the authors presented a method for encrypting images using a cosine transformbased chaotic system. The proposed system employs a four-dimensional chaotic map to create a secret key and a logistic map to generate a random sequence, which is then combined with the image using a cosine transform. The resulting encrypted image resists various attacks, including statistical analysis attacks and differential attacks. The authors evaluated the performance of the proposed method using several metrics and compared it with other encryption methods. In [30], the authors introduced an image encryption technique based on a chaotic system that uses cosine transformations. In contrast, another paper [31] presented a new image encryption algorithm combining chaotic maps and dynamic function generation. In [32], the authors suggested a DNA encoding and chaotic system-based algorithm for encrypting multiple images, while in [33] the authors proposed a multiple-image encryption technique using bit-plane decomposition and chaotic maps. These methods all produce good results while offering varying speeds, as shown in Table 2. Table 2. Performance comparisons of the methods in [29][30][31][32][33].

Method Throughput (Kbytes per Sec)
Yepioda et al. [29] 888.8867 Hua et al. [30] 638.4082 Asgari-chenaphlu [31] 911.0352 Zhang and Wang [32] 360.4102 Zhenjun and Sun [33] 384.9609 In conclusion, chaos theory and logistic maps have been extensively used in image encryption thanks to their ability to generate complex and unpredictable patterns. The latest research in this field shows that combining different chaotic maps and logistic maps can improve the security and robustness of image encryption algorithms.

The Proposed Method
This paper introduces a method of image cryptography that is able to meet all the requirements of data cryptography, in particular the following [45,46]: The private key must be complicated to guess; in addition, it must provide sufficient key space (KS) in order to make the hacking process difficult and provide a high degree of image protection. • The private key must be sensitive even to very slight changes in order to ensure that any change in the key when decrypting leads to the generation of a bad image, allowing any changes to be accurately considered an attempt to hack the key. Furthermore, the encryption process must change the image to become incomprehensible and useless, while the decryption process must produce an image that is entirely identical to the original image. • The method must generate high quality parameter values during the encryption-decryption process. An image's level of damage and subsequent restoration can be evaluated by calculating its MSE, PSNR, and/or CC; these measures of quality can be determined by comparing two images, and can be calculated using Equations (1)-(3) [47][48][49].
where m is the number of rows in the cover image, n is the number of columns in the cover image, x ij is the pixel value of the original image, and y ij is the pixel value of the sent image.
where MAX I is the maximum signal value that exists in the original ("known to be good") image.
where CC is the correlation coefficient, X i is the value of the first message,X is the mean of X, Y i is the value of the second message,Ȳ is the mean of Y, and n is the total number of pixels in the image. • In the encryption phase, the MSE must be very high and the PSNR must be very low, while in the decryption phase the MSE must be zero and thePSNR must be infinite. A good image encryption algorithm should aim to produce an encrypted image that has low correlation with the original image in order to ensure that the encrypted image is highly distorted and difficult to recover without the decryption key. • The method must minimize both the encryption and decryption times and maximize the encryption and decryption throughput in terms of bytes encrypted or decrypted per second. • The method should be easy to use and able to process any image without causing any change in the processes implemented by the method.
A chaotic logistic map is a one-dimensional function that can be modified to be twodimensional for application to a 2D key, as we show later in the paper. The proposed method uses a 2D chaotic key generated using a chaotic logistic map model following Equation (4). The chaotic logistic map key (CLMK) is generated using the model parameters r and x. Equation (4) is used to generate the chaotic logistic map, with the generated numbers being susceptible to the selected initial values of r and x.
Here, the first parameter of the logistic function, denoted as X n , varies between 0 and 1, while the second parameter, denoted as r, varies between 0 and 4. The behavior of the logistic function depends on the value chosen for r. Specifically, when r is within certain ranges, the logistic function generates different output types. For instance, if r is between 0 and 1, the output consists of fixed and stable values near zero, while if r is between 1 and 3 the output consists if fixed and stable values near ((r − 1)/r). The output consists of periodic attractors if r is between 3 and 3.57, while if r is between 3.57 and 4 the output is chaotic [28][29][30][31].
Based on applying the CLM model using the parameters r and x, the R and C parameters are used to set the dimension of the key. Equation (5) describes how the 2D CLM map is generated: where CLM is a 2D map of size R × C, i ≤ R is the row index, and j ≤ C is the column index. The 2D chaotic key requires varying times for generation depending on the key size. Table 3 shows the time required to generate a 2D CLM key with various sizes. The 2D chaotic key, Table 3, shows the required time to generate a 2D CLM key of various sizes. From Table 3, it can be seen that increasing the number of elements in the key increases the generation time (see Figure 3). For a vast size, the generation time grows rapidly, and the efficiency of cryptography is negatively affected. To overcome this problem, a key with a smaller size can be used; such a key must be resized to match the size of the color matrix, as shown in Figure 4.  Figure 4 depicts the proposed encryption method, which is a private key consisting of four parameters used to generate the 2D logistic key; the parameters are the number of rows and columns in the generated 2D logistic key and the chaotic parameters r and x. The plaintext image to be encrypted is split into three different matrices, one for each color channel. After that, the matrix passes through a permutation box that shuffles the matrix row-and column-wise. The generated 2D logistic key is then resized to match the size of each color matrix, then they are XORed together; this is considered one round and then repeated for four rounds. Each round has a unique private key. Finally, the three matrices are combined together to form the encrypted image. The encryption phase of the proposed method can be implemented by applying Algorithm 1 (see Figure 5).

Inputs:
Color image to be encrypted, Private Key Output: Encrypted image Process 1.
Get the image to be encrypted.

2.
Retrieve the size of the image.

4.
for k = 1, k++, while k <= 4 Get a random index for row shuffling Shuffle the rows Get a random index for column shuffling Shuffle the columns Get the Private Key for this round Use the information in Private Key to generate a 2D key, R and C are used to apply two loops to create a 2D matrix, r and x are used to find each element in the matrix. Resize the generated key to match the size of the color matrix. Apply XORing of the resized key with the associated color matrix.
Combine the encrypted color matrices in one matrix to get the encrypted color image. The decryption phase of the proposed method can be implemented by applying Algorithm 2 (see Figure 6).  Get the encrypted image.

2.
Retrieve the size of the image.
for k = 1, k++, while k <= 4 Get a random index for row shuffling Reshuffle the rows Get a random index for column shuffling Reshuffle the columns Get the Private Key for this round. Use the information in Private Key to generate a 2D key, R and C are used to apply two loops to create a 2D matrix, r, and x are used to find each element in the matrix. Resize the generated key to match the size of the color matrix. Apply XORing of the resized sub key with the associated color matrix.
Combine the decrypted color matrices in one matrix to get the decrypted color image.

Implementation and Results
To test the proposed method, we applied a proposed encryption-decryption approach to random images from a standard image dataset. The selected images were encrypted and decrypted using the proposed method in order to conduct a performance assessment and to ensure that the results can be reproduced by other researchers. The analysis involved comparing the source (original), encrypted, and decrypted images using their plots and histograms.
We utilized the Kodak Lossless True Color Image Suite to evaluate the effectiveness of our proposed encryption approach. We accessed the dataset from [51], which provided a diverse range of high-quality images to test our algorithm's performance. Overall, the Kodak dataset provides a standardized platform to evaluate the robustness and security of an image encryption approach, and can ensure that our proposed approach is reliable and effective. The pictures in this dataset are lossless actual-color (24 bits per pixel, known as "full color") images.  A successful encryption process can be observed by comparing Figure 7 (source image) with Figure 9 (encrypted image). The significant differences in their plots indicate that the encryption is effective and that it would be very challenging to restore the original image from the encrypted one either partially or wholly.  On the other hand, the similarity between the source image file (Figure 7) and the decrypted image file (Figure 8) demonstrates the effectiveness of the decryption process. This means that the original image can be accurately recovered after decryption, ensuring the integrity of the image data.
Multiple images from the Kodak dataset were selected and tested to further validate the proposed encryption-decryption approach in order to provide a comprehensive evaluation of the method's performance across different types of images. This approach allows researchers to assess the robustness and reliability of the encryption-decryption process in various scenarios, ensuring the method's applicability in real-world applications.
The obtained experimental results are studied and analyzed in the following subsections, with several types of analyses performed in order to demonstrate the enhancements achieved by the proposed method.

Image Quality
A number of different metrics can be used to assess a security method's resistance to differential attack. Among these are the Unified Average Changing Intensity (UACI), which can be calculated using Equation (6) (where M and N are the dimension of the two images to compare I and K) and the Number of Pixels Change Rate (NPCR), for which the mathematical formula is shown in Equation (7): where The obtained values for various metrics in Table 4 are very close to the results reported in [38], demonstrating the robustness of the proposed method against differential attacks.
Our results indicate that a minor change in the original image makes a maximum difference in the encrypted image. This feature leads to the diffusion property, indicating immunity to ciphertext-only attacks. The Structural Similarity Index Measure (SSIM), computed using Equation (8), is a metric utilized to evaluate the quality of an image after decryption and to gauge the resemblance between the original and encrypted images. The SSIM index ranges from −1 to 1 as a decimal value, with 1 signifying complete similarity, 0 denoting no similarity, and −1 representing perfect anti-correlation.
where µ x is the pixel sample mean of image x, µ y is the pixel sample mean of image y, σ 2 x is the variance of image x, σ 2 y is the variance of image y, σ xy is the covariance of image x and image y, c 1 = (k 1 L) 2 , c 2 = (k 2 L) 2 are two variables used to stabilize division with a weak denominator, and L is the dynamic range of the pixel-value (2 bits per pixel − 1); here, by default k 1 = 0.01 and k 2 = 0.03.

Sensitivity Analysis
The private key is composed of four elements, and even a slight alteration in one or more of these elements results in the creation of a new key. Utilizing this new key during the decryption process yields a corrupted decrypted image, which indicates that any modifications to the private key can be viewed as a hacking attempt. An identical private key must be employed for both the encryption and decryption phases. Figures 10 and 11 display the 2D key's contents when using varying parameter values; minor changes in the chaotic parameters r and x generate keys with distinct values.  For an ideal match between the input image and the decrypted image, the quality parameters should be MSE = 0 and PSNR = infinite. Table 5 demonstrates the values of these parameters when slight alterations are made to the private key during the decryption stage.  Figure 12) In Figure 12, the image has been encrypted using a selected private key and the encrypted image has been decrypted using another private key; the resulting decrypted image is a corrupted and damaged image. In this case, the errors in the private key during the decryption phase are considered a hacking attempt that results in a damaged image file being produced. This experiment proves the sensitivity of the proposed method to its initial conditions, as any minor change in the key results in a corrupted image.

Security Analysis
In this research, the r and x parameters of the chaotic map, described in Section 3, determine the key. Thus, in a brute-force attack the main parameters are determined by the sizes of r and x.
Here, r and x use a double data type, which has the structure shown below.

Bit 1bits 52 bits Sign Exponent Mantissa
Thus, x may use up to 52 bits for its values, resulting in a total of 2 52 different values. However, to obtain the desired chaotic characteristic, the value for r has to be between 3.57 to 4 [52]. Thus, the number of different values for r when using 52 bits is determined by the formula 4 − 3.57 4 × 2 52 ≈ 4.84 × 10 14 Using this value for r and 64-bits for x, we have 4.84 × 10 14 × 2 64 ≈ 8.93 × 10 33 . With this, we can assume that any hacking attempt will be conducting using a bruteforce approach. Table 6 shows the performance results. It can be seen that the method throughput can be increased by increasing the image size and using moderate values for R and C. Here, we can minimize the times required to generate each color private key. As seen in Table 6, it takes approximately 4.3714 s on average to generate the chaotic map from r and x and perform either encryption or decryption. Assuming that a hacker has a more powerful machine capable of doing this in 1s and that the average number of attempts is half the search space, brute-force hacking would require 8.93 × 10 33 2 = 4.465 × 10 33 attempts.
Having a computer 1000 times faster or computing on 1000 computers in parallel would reduce the time to 1.415 × 10 21 centuries.
Additionally, because a slight change in the key brings about drastic changes in the cryptogram or the plain image, using an AI algorithm dependent on "getting closer" to the desired image during decryption is of little value.

Correlation Analysis
The Correlation Coefficient (CC) calculated between two datasets can be used to measure the strength of rapprochement between them. If the CC between image 1 and image 2 is equal to one, then we can say that image 2 is identical (equal) to image 1. The selected images were encrypted and decrypted using the proposed method and the CC was calculated; the results show that the CC between the input image and the decrypted image is always zero. The CC between the input image and the encrypted one is always minimal, indicating that the encryption phase destroys the input image. Table 7 shows the calculated CC between the input image and the encrypted image using the proposed method; it can be seen that the CC values between the input and encrypted images are very small, which indicates that there is no rapprochement between them.  Figure 13 shows a sample output, where the calculated CC value between two image files expresses the dependency between their corresponding gray values.

Quality Analysis
The above image was encrypted and decrypted using various lengths of rows and columns for the 2D key. Table 8 shows the MSE and PSNR quality parameters.  Figure 14 shows a sample output. A suitable image cryptography method should maximize the MSE value in the encryption phase while minimizing the value of PSNR; conversely, in the decryption phase the MSE should be minimized and the PSNR should be maximized. From Table 8, it can be seen that the obtained values for MSE and PSNR are acceptable and that the proposed method satisfies the requirement of providing suitable quality parameters during the encryption and decryption phases. In the decryption phase, the MSE is always zero, while the PSNR is always infinite.
The private keys shown in Table 9 were used in four rounds of encryption and the selected images in the Kodak dataset were treated using the proposed method. The obtained results for MSE and PSNR are shown in Table 10. The results provided in Table 10 demonstrate that the proposed method achieves excellent quality parameters. From Table 11, we can draw the following conclusions:

Speed Analysis
• Increasing R and C increases the time required to generate the keys. • As the values of R and C increase, the time required for encryption increases slightly, suggesting that moderate values of R and C should be selected in order to optimize the efficiency of the proposed method to match the large size of the images in the dataset. Table 12 compares the average throughput of our proposed method (Table 6) to the state-of-the-art methods discussed in Section 2. It can be seen that our method results in an enhancement of up to 2.14 times compared to other chaotic approaches, and that its throughput is very close to the other methods.

Attack Robustness Analysis
This subsection discusses the robustness of the proposed method against various attacks. For instance, in occlusion attacks parts of the transmitted data may be tampered with, becoming either hidden or overridden during transmission. Various percentages of occlusion were tested, with the obtained results listed in Table 13; the numbers in Table 13 show the degradation of various quality measurements as the occlusion percentage increases. From Figures 15 and 16, it is clear that while decrypted images with 6.25%, 25%, and 50% occlusion of the encrypted images are distorted, they remain perceptible to the human eye, while decrypted images with 75% occlusion of the encrypted image are not recoverable. This indicates that our proposed method can withstand up to 50% occlusion attacks. Another common type of attack is a chosen-plaintext attack, in which the attacker has the ability to choose plaintext images and access their corresponding encrypted ciphertext images. This is considered a very dangerous attack.
In [53], the authors discussed a chosen-plaintext attack on an image encryption scheme that uses a modified permutation-diffusion structure. The authors first introduced the encryption scheme and its architecture, which involves permutation and diffusion phases. The authors then proposed a chosen-plaintext attack on the encryption scheme involving the attacker choosing specific plaintext images and analyzing the corresponding ciphertext images produced by the encryption scheme. Through a series of mathematical analyses, the authors showed that the encryption scheme is vulnerable to this attack and that the secret key used in the scheme can be easily recovered by the attacker. In the same study, the authors presented experimental results to support their analysis, demonstrating that the proposed attack effectively breaks the encryption scheme. They further discussed the limitations of the encryption scheme and suggested possible modifications that to enhance its security. They suggested that a robust image encryption technique should incorporate than one round; in our proposed method we used four rounds of permutation, making the proposed approach robust against chosen-plaintext attacks.

Conclusions
In this paper, we have evaluated a new method for color images file cryptography. The proposed cryptographic algorithm uses a chaotic logistic map model to generate two complicated secret keys for encryption and decryption. A chaotic logistic map model is used to generate the 2D key by adding the matrix dimensions R and C to the model. The pseudo-random numbers generated for the chaotic map were tested and found to have acceptable values comparable to those in the related literature. Various image files were tested and several types of analysis were performed, showing that the proposed method can provide a high level of security. The chaotic logistic map derived from the private key has a complicated structure that is sensitive to minor key component changes. In addition, it provides a huge key space, thereby decreasing the possibility of key hacking. A speed analysis showed that the proposed method can provide increased image cryptography performance by minimizing the encryption-decryption time and maximizing the throughput of the color cryptography process. The results obtained in this study show that the provided throughput is better than that provided by existing chaotic methods.

Conflicts of Interest:
The authors declare no conflict of interest.

Abbreviations
The following abbreviations are used in this manuscript: