Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (140)

Search Parameters:
Keywords = image scrambling encryption

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
29 pages, 4563 KB  
Article
Performance Enhancement of Secure Image Transmission over ACO-OFDM VLC Systems Through Chaos Encryption and PAPR Reduction
by Elhadi Mehallel, Abdelhalim Rabehi, Ghadjati Mohamed, Abdelaziz Rabehi, Imad Eddine Tibermacine and Mustapha Habib
Electronics 2026, 15(1), 43; https://doi.org/10.3390/electronics15010043 - 22 Dec 2025
Viewed by 274
Abstract
Visible Light Communication (VLC) systems commonly employ optical orthogonal frequency division multiplexing (O-OFDM) to achieve high data rates, benefiting from its robustness against multipath effects and intersymbol interference (ISI). However, a key limitation of asymmetrically clipped direct current biased optical–OFDM (ACO-OFDM) systems lies [...] Read more.
Visible Light Communication (VLC) systems commonly employ optical orthogonal frequency division multiplexing (O-OFDM) to achieve high data rates, benefiting from its robustness against multipath effects and intersymbol interference (ISI). However, a key limitation of asymmetrically clipped direct current biased optical–OFDM (ACO-OFDM) systems lies in their inherently high peak-to-average power ratio (PAPR), which significantly affects signal quality and system performance. This paper proposes a joint chaotic encryption and modified μ-non-linear logarithmic companding (μ-MLCT) scheme for ACO-OFDM–based VLC systems to simultaneously enhance security and reduce PAPR. First, image data is encrypted at the upper layer using a hybrid chaotic system (HCS) combined with Arnold’s cat map (ACM), mapped to quadrature amplitude modulation (QAM) symbols and further encrypted through chaos-based symbol scrambling to strengthen security. A μ-MLCT transformation is then applied to mitigate PAPR and enhance both peak signal-to-noise ratio (PSNR) and bit-error-ratio (BER) performance. A mathematical model of the proposed secured ACO-OFDM system is developed, and the corresponding BER expression is derived and validated through simulation. Simulation results and security analyses confirm the effectiveness of the proposed solution, showing gains of approximately 13 dB improvement in PSNR, 2 dB in BER performance, and a PAPR reduction of about 9.2 dB. The secured μ-MLCT-ACO-OFDM not only enhances transmission security but also effectively reduces PAPR without degrading PSNR and BER. As a result, it offers a robust and efficient solution for secure image transmission with low PAPR, making it well-suitable for emerging wireless networks such as cognitive and 5G/6G systems. Full article
(This article belongs to the Section Microwave and Wireless Communications)
Show Figures

Figure 1

30 pages, 8767 KB  
Article
State-Dependent Variable Fractional-Order Hyperchaotic Dynamics in a Coupled Quadratic Map: A Novel System for High-Performance Image Protection
by Wei Feng, Zixian Tang, Xiangyu Zhao, Zhentao Qin, Yao Chen, Bo Cai, Zhengguo Zhu, Heping Wen and Conghuan Ye
Fractal Fract. 2025, 9(12), 792; https://doi.org/10.3390/fractalfract9120792 - 2 Dec 2025
Cited by 3 | Viewed by 582
Abstract
Amid growing threats of image data leakage and misuse, image encryption has become a critical safeguard for protecting visual information. However, many recent image encryption algorithms remain constrained by trade-offs between security, efficiency, and practicability. To address these challenges, this paper first proposes [...] Read more.
Amid growing threats of image data leakage and misuse, image encryption has become a critical safeguard for protecting visual information. However, many recent image encryption algorithms remain constrained by trade-offs between security, efficiency, and practicability. To address these challenges, this paper first proposes a novel two-dimensional variable fractional-order coupled quadratic hyperchaotic map (2D-VFCQHM), which incorporates a state-dependent dynamic memory effect, wherein the fractional-order is adaptively determined at each iteration by the mean of the system’s current state. This mechanism substantially enhances the complexity and unpredictability of the underlying chaotic dynamics. Building upon the superior hyperchaotic properties of the 2D-VFCQHM, we further develop a high-performance image encryption algorithm that integrates a novel fusion strategy within a dynamic vector-level diffusion-scrambling framework (IEA-VMFD). Comprehensive security analyses and experimental results demonstrate that the proposed algorithm achieves robust cryptographic performance, including a key space of 2298, inter-pixel correlation coefficients below 0.0018, ciphertext entropy greater than 7.999, and near-ideal plaintext sensitivity. Crucially, the algorithm attains an encryption speed of up to 126.2963 Mbps. The exceptional balance between security strength and computational efficiency underscores the practical viability of our algorithm, rendering it well-suited for modern applications such as telemedicine, instant messaging, and cloud computing. Full article
(This article belongs to the Special Issue Advances in Fractional-Order Chaotic and Complex Systems)
Show Figures

Figure 1

21 pages, 4687 KB  
Article
Research on Image Encryption with Multi-Level Keys Based on a Six-Dimensional Memristive Chaotic System
by Xiaobin Zhang, Yaxuan Chai, Shitao Xiang and Shaozhen Li
Entropy 2025, 27(11), 1152; https://doi.org/10.3390/e27111152 - 13 Nov 2025
Viewed by 518
Abstract
To address the security of digital images, this paper proposes a novel image encryption algorithm based on a six-dimensional memristive chaotic system. First, the algorithm uses the Secure Hash Algorithm 256 (SHA-256) to generate a hash value, from which the initial dynamic key [...] Read more.
To address the security of digital images, this paper proposes a novel image encryption algorithm based on a six-dimensional memristive chaotic system. First, the algorithm uses the Secure Hash Algorithm 256 (SHA-256) to generate a hash value, from which the initial dynamic key is derived. Next, it integrates Zigzag scrambling, chaotic index scrambling, and diffusion operations to form an encryption scheme with multiple rounds of scrambling and diffusion. In this framework, after each encryption operation, a part of the dynamic key is changed according to the input parameters, and the six-dimensional memristive chaotic system continues iterating to generate the pseudo-random sequence for the next operation. Finally, the proposed algorithm is evaluated using indicators including information entropy, histograms, the Number of Pixels Change Rate (NPCR) and Unified Average Changing Intensity (UACI), encryption time, and so on. The results show that the information entropy of the encrypted image reaches 7.9979; its Chi-square statistic is 186.6875; the average NPCR and UACI are 99.6111% and 33.4643%, respectively; and the encryption time is 0.342 s for the 256 × 256 Cameraman image. These indicate that image encryption is not only effective in encrypting images but also resistant to many conventional attacks. Full article
Show Figures

Figure 1

37 pages, 25662 KB  
Article
A Hyperspectral Remote Sensing Image Encryption Algorithm Based on a Novel Two-Dimensional Hyperchaotic Map
by Zongyue Bai, Qingzhan Zhao, Wenzhong Tian, Xuewen Wang, Jingyang Li and Yuzhen Wu
Entropy 2025, 27(11), 1117; https://doi.org/10.3390/e27111117 - 30 Oct 2025
Viewed by 578
Abstract
With the rapid advancement of hyperspectral remote sensing technology, the security of hyperspectral images (HSIs) has become a critical concern. However, traditional image encryption methods—designed primarily for grayscale or RGB images—fail to address the high dimensionality, large data volume, and spectral-domain characteristics inherent [...] Read more.
With the rapid advancement of hyperspectral remote sensing technology, the security of hyperspectral images (HSIs) has become a critical concern. However, traditional image encryption methods—designed primarily for grayscale or RGB images—fail to address the high dimensionality, large data volume, and spectral-domain characteristics inherent to HSIs. Existing chaotic encryption schemes often suffer from limited chaotic performance, narrow parameter ranges, and inadequate spectral protection, leaving HSIs vulnerable to spectral feature extraction and statistical attacks. To overcome these limitations, this paper proposes a novel hyperspectral image encryption algorithm based on a newly designed two-dimensional cross-coupled hyperchaotic map (2D-CSCM), which synergistically integrates Cubic, Sinusoidal, and Chebyshev maps. The 2D-CSCM exhibits superior hyperchaotic behavior, including a wider hyperchaotic parameter range, enhanced randomness, and higher complexity, as validated by Lyapunov exponents, sample entropy, and NIST tests. Building on this, a layered encryption framework is introduced: spectral-band scrambling to conceal spectral curves while preserving spatial structure, spatial pixel permutation to disrupt correlation, and a bit-level diffusion mechanism based on dynamic DNA encoding, specifically designed to secure high bit-depth digital number (DN) values (typically >8 bits). Experimental results on multiple HSI datasets demonstrate that the proposed algorithm achieves near-ideal information entropy (up to 15.8107 for 16-bit data), negligible adjacent-pixel correlation (below 0.01), and strong resistance to statistical, cropping, and differential attacks (NPCR ≈ 99.998%, UACI ≈ 33.30%). The algorithm not only ensures comprehensive encryption of both spectral and spatial information but also supports lossless decryption, offering a robust and practical solution for secure storage and transmission of hyperspectral remote sensing imagery. Full article
(This article belongs to the Section Signal and Data Analysis)
Show Figures

Figure 1

21 pages, 4354 KB  
Article
Exploring the Application and Characteristics of Homomorphic Encryption Based on Pixel Scrambling Algorithm in Image Processing
by Tieyu Zhao
Big Data Cogn. Comput. 2025, 9(10), 250; https://doi.org/10.3390/bdcc9100250 - 30 Sep 2025
Viewed by 919
Abstract
Homomorphic encryption is well known to researchers, yet its application in image processing is scarce. The diversity of image processing algorithms makes homomorphic encryption implementation challenging. Current research often uses the CKKS algorithm, but it has core bottlenecks in image encryption, such as [...] Read more.
Homomorphic encryption is well known to researchers, yet its application in image processing is scarce. The diversity of image processing algorithms makes homomorphic encryption implementation challenging. Current research often uses the CKKS algorithm, but it has core bottlenecks in image encryption, such as the mismatch between image data and the homomorphic operation mechanism, high 2D-structure-induced costs, noise-related visual quality damage, and poor nonlinear operational support. This study, based on image pixel characteristics, analyzes homomorphic encryption via pixel scrambling algorithms. Using magic square, Arnold, Henon map, and Hilbert curve transformations as starting points, it reveals their homomorphic properties in image processing. This further explores general pixel scrambling algorithm homomorphic encryption properties, offering valuable insights for homomorphic encryption applications in image processing. Full article
Show Figures

Figure 1

32 pages, 14643 KB  
Article
Image Encryption Algorithm Based on Dynamic Rhombus Transformation and Digital Tube Model
by Xiaoqiang Zhang, Yupeng Song and Ke Huang
Entropy 2025, 27(8), 874; https://doi.org/10.3390/e27080874 - 18 Aug 2025
Cited by 1 | Viewed by 1068
Abstract
With the rapid advancement of information technology, as critical information carriers, images are confronted with significant security risks. To ensure the image security, this paper proposes an image encryption algorithm based on a dynamic rhombus transformation and digital tube model. Firstly, a two-dimensional [...] Read more.
With the rapid advancement of information technology, as critical information carriers, images are confronted with significant security risks. To ensure the image security, this paper proposes an image encryption algorithm based on a dynamic rhombus transformation and digital tube model. Firstly, a two-dimensional hyper-chaotic system is constructed by combining the Sine map, Cubic map and May map. The analysis results demonstrate that the constructed hybrid chaotic map exhibits superior chaotic characteristics in terms of bifurcation diagrams, Lyapunov exponents, sample entropy, etc. Secondly, a dynamic rhombus transformation is proposed to scramble pixel positions, and chaotic sequences are used to dynamically select transformation centers and traversal orders. Finally, a digital tube model is designed to diffuse pixel values, which utilizes chaotic sequences to dynamically control the bit reversal and circular shift operations, and the exclusive OR operation to diffuse pixel values. The performance analyses show that the information entropy of the cipher image is 7.9993, and the correlation coefficients in horizontal, vertical, and diagonal directions are 0.0008, 0.0001, and 0.0005, respectively. Moreover, the proposed algorithm has strong resistance against noise attacks, cropping attacks, and exhaustive attacks, effectively ensuring the security of images during storage and transmission. Full article
(This article belongs to the Section Signal and Data Analysis)
Show Figures

Figure 1

19 pages, 8180 KB  
Article
Weighted Color Image Encryption Algorithm Based on RNA Extended Dynamic Coding and Quantum Chaotic System
by Xiangyu Zhang, Heping Wen, Wei Feng, Shenghao Kang, Zhiyu Xie, Xuexi Zhang and Yiting Lin
Entropy 2025, 27(8), 852; https://doi.org/10.3390/e27080852 - 11 Aug 2025
Viewed by 1053
Abstract
The rapid development of Internet technology, while providing convenient services for users, has also aroused deep concern among the public about the issue of privacy leakage during image data transmission. To address this situation, this article proposes a color image encryption algorithm based [...] Read more.
The rapid development of Internet technology, while providing convenient services for users, has also aroused deep concern among the public about the issue of privacy leakage during image data transmission. To address this situation, this article proposes a color image encryption algorithm based on RNA extended dynamic coding and quantum chaos (CIEA-RQ). This algorithm significantly improves the ability of the system to withstand cryptographic attacks by introducing RNA extended dynamic encoding with 384 encoding rules. The employed quantum chaotic map improves the randomness of chaotic sequences and increases the key space. First, the algorithm decomposes the plaintext image into bit planes and obtains two parts, high 4-bit and low 4-bit planes, based on different weights of information. Then, the high 4-bit planes are partitioned into blocks and scrambled, and the scrambled planes are confused using RNA extended coding rules. Meanwhile, the low 4-bit planes employ a lightweight XOR operation to improve encryption efficiency. Finally, the algorithm performs cross-iterative diffusion on the processed high 4-bit and low 4-bit planes and then synthesizes a color ciphertext image. Experimental simulations and security assessments demonstrate the superior numerical statistical outcomes of the CIEA-RQ. According to the criteria of cryptanalysis, it can effectively resist known-plaintext attacks and chosen-plaintext attacks. Therefore, the CIEA-RQ presented in this article serves as an efficient digital image privacy safeguard technique, promising extensive applications in image secure transmission for the upcoming generation of networks. Full article
(This article belongs to the Section Multidisciplinary Applications)
Show Figures

Figure 1

32 pages, 41108 KB  
Article
A Novel Medical Image Encryption Algorithm Based on High-Dimensional Memristor Chaotic System with Extended Josephus-RNA Hybrid Mechanism
by Yixiao Wang, Yutong Li, Zhenghong Yu, Tianxian Zhang and Xiangliang Xu
Symmetry 2025, 17(8), 1255; https://doi.org/10.3390/sym17081255 - 6 Aug 2025
Viewed by 931
Abstract
Conventional image encryption schemes struggle to meet the high security demands of medical images due to their large data volume, strong pixel correlation, and structural redundancy. To address these challenges, we propose a grayscale medical image encryption algorithm based on a novel 5-D [...] Read more.
Conventional image encryption schemes struggle to meet the high security demands of medical images due to their large data volume, strong pixel correlation, and structural redundancy. To address these challenges, we propose a grayscale medical image encryption algorithm based on a novel 5-D memristor chaotic system. The algorithm integrates a Symmetric L-type Josephus Spiral Scrambling (SLJSS) module and a Dynamic Codon-based Multi-RNA Diffusion (DCMRD) module to enhance spatial decorrelation and diffusion complexity. Simulation results demonstrate that the proposed method achieves near-ideal entropy (e.g., 7.9992), low correlation (e.g., 0.0043), and high robustness (e.g., NPCR: 99.62%, UACI: 33.45%) with time complexity of O(11MN), confirming its effectiveness and efficiency for medical image protection. Full article
(This article belongs to the Special Issue Symmetry in Chaos Theory and Applications)
Show Figures

Figure 1

24 pages, 90648 KB  
Article
An Image Encryption Method Based on a Two-Dimensional Cross-Coupled Chaotic System
by Caiwen Chen, Tianxiu Lu and Boxu Yan
Symmetry 2025, 17(8), 1221; https://doi.org/10.3390/sym17081221 - 2 Aug 2025
Cited by 2 | Viewed by 986
Abstract
Chaotic systems have demonstrated significant potential in the field of image encryption due to their extreme sensitivity to initial conditions, inherent unpredictability, and pseudo-random behavior. However, existing chaos-based encryption schemes still face several limitations, including narrow chaotic regions, discontinuous chaotic ranges, uneven trajectory [...] Read more.
Chaotic systems have demonstrated significant potential in the field of image encryption due to their extreme sensitivity to initial conditions, inherent unpredictability, and pseudo-random behavior. However, existing chaos-based encryption schemes still face several limitations, including narrow chaotic regions, discontinuous chaotic ranges, uneven trajectory distributions, and fixed pixel processing sequences. These issues substantially hinder the security and efficiency of such algorithms. To address these challenges, this paper proposes a novel hyperchaotic map, termed the two-dimensional cross-coupled chaotic map (2D-CFCM), derived from a newly designed 2D cross-coupled chaotic system. The proposed 2D-CFCM exhibits enhanced randomness, greater sensitivity to initial values, a broader chaotic region, and a more uniform trajectory distribution, thereby offering stronger security guarantees for image encryption applications. Based on the 2D-CFCM, an innovative image encryption method was further developed, incorporating efficient scrambling and forward and reverse random multidirectional diffusion operations with symmetrical properties. Through simulation tests on images of varying sizes and resolutions, including color images, the results demonstrate the strong security performance of the proposed method. This method has several remarkable features, including an extremely large key space (greater than 2912), extremely high key sensitivity, nearly ideal entropy value (greater than 7.997), extremely low pixel correlation (less than 0.04), and excellent resistance to differential attacks (with the average values of NPCR and UACI being 99.6050% and 33.4643%, respectively). Compared to existing encryption algorithms, the proposed method provides significantly enhanced security. Full article
(This article belongs to the Special Issue Symmetry in Chaos Theory and Applications)
Show Figures

Figure 1

26 pages, 12108 KB  
Article
Image Encryption Algorithm Based on an Improved Tent Map and Dynamic DNA Coding
by Wei Zhou, Xianwei Li and Zhenghua Xin
Entropy 2025, 27(8), 796; https://doi.org/10.3390/e27080796 - 26 Jul 2025
Viewed by 1120
Abstract
As multimedia technologies evolve, digital images have become increasingly prevalent across various fields, highlighting an urgent demand for robust image privacy and security mechanisms. However, existing image encryption algorithms (IEAs) still face limitations in balancing strong security, real-time performance, and computational efficiency. Therefore, [...] Read more.
As multimedia technologies evolve, digital images have become increasingly prevalent across various fields, highlighting an urgent demand for robust image privacy and security mechanisms. However, existing image encryption algorithms (IEAs) still face limitations in balancing strong security, real-time performance, and computational efficiency. Therefore, we proposes a new IEA that integrates an improved chaotic map (Tent map), an improved Zigzag transform, and dynamic DNA coding. Firstly, a pseudo-wavelet transform (PWT) is applied to plain images to produce four sub-images I1, I2, I3, and I4. Secondly, the improved Zigzag transform and its three variants are used to rearrange the sub-image I1, and then the scrambled sub-image is diffused using XOR operation. Thirdly, an inverse pseudo-wavelet transform (IPWT) is employed on the four sub-images to reconstruct the image, and then the reconstructed image is encoded into a DNA sequence utilizing dynamic DNA encoding. Finally, the DNA sequence is scrambled and diffused employing DNA-level index scrambling and dynamic DNA operations. The experimental results and performance evaluations, including chaotic performance evaluation and comprehensive security analysis, demonstrate that our IEA achieves high key sensitivity, low correlation, excellent entropy, and strong resistance to common attacks. This highlights its potential for deployment in real-time, high-security image cryptosystems, especially in fields such as medical image security and social media privacy. Full article
(This article belongs to the Section Multidisciplinary Applications)
Show Figures

Figure 1

23 pages, 16115 KB  
Article
Image Privacy Protection Communication Scheme by Fibonacci Interleaved Diffusion and Non-Degenerate Discrete Chaos
by Zhiyu Xie, Weihong Xie, Xiyuan Cheng, Zhengqin Yuan, Wenbin Cheng and Yiting Lin
Entropy 2025, 27(8), 790; https://doi.org/10.3390/e27080790 - 25 Jul 2025
Cited by 4 | Viewed by 897
Abstract
The rapid development of network communication technology has led to an increased focus on the security of image storage and transmission in multimedia information. This paper proposes an enhanced image security communication scheme based on Fibonacci interleaved diffusion and non-degenerate chaotic system to [...] Read more.
The rapid development of network communication technology has led to an increased focus on the security of image storage and transmission in multimedia information. This paper proposes an enhanced image security communication scheme based on Fibonacci interleaved diffusion and non-degenerate chaotic system to address the inadequacy of current image encryption technology. The scheme utilizes a hash function to extract the hash characteristic values of the plaintext image, generating initial perturbation keys to drive the chaotic system to generate initial pseudo-random sequences. Subsequently, the input image is subjected to a light scrambling process at the bit level. The Q matrix generated by the Fibonacci sequence is then employed to diffuse the obtained intermediate cipher image. The final ciphertext image is then generated by random direction confusion. Throughout the encryption process, plaintext correlation mechanisms are employed. Consequently, due to the feedback loop of the plaintext, this algorithm is capable of resisting known-plaintext attacks and chosen-plaintext attacks. Theoretical analysis and empirical results demonstrate that the algorithm fulfils the cryptographic requirements of confusion, diffusion, and avalanche effects, while also exhibiting a robust password space and excellent numerical statistical properties. Consequently, the security enhancement mechanism based on Fibonacci interleaved diffusion and non-degenerate chaotic system proposed in this paper effectively enhances the algorithm’s resistance to cryptographic attacks. Full article
Show Figures

Figure 1

20 pages, 4398 KB  
Article
A Mixed Chaotic Image Encryption Method Based on Parallel Rotation Scrambling in Rubik’s Cube Space
by Lu Xu, Yun Chen, Yanlin Qin and Zhichao Yang
Entropy 2025, 27(6), 574; https://doi.org/10.3390/e27060574 - 28 May 2025
Viewed by 908
Abstract
Most image encryption methods based on Rubik’s cube scrambling adopt the idea of cyclic shift or map the image pixels to the cube surface, not fully considering the cube’s three-dimensional (3D) properties. In response to this defect, we propose a mixed chaotic color [...] Read more.
Most image encryption methods based on Rubik’s cube scrambling adopt the idea of cyclic shift or map the image pixels to the cube surface, not fully considering the cube’s three-dimensional (3D) properties. In response to this defect, we propose a mixed chaotic color image encryption method based on parallel rotation scrambling in 3D Rubik’s cube space. First, a seven-dimensional hyperchaotic system is introduced to generate chaotic pseudo-random integer sequences. Then, a proven lemma is applied to preprocess the red (R), green (G), and blue (B) channels of the plain image to realize the first diffusion. Next, the chaotic integer sequence is employed to control Arnold transformation, and the scrambled two-dimensional (2D) pixel matrix is converted into a 3D matrix. Then, the 3D cube is scrambled by dynamically selecting the rotating axis, layer number, and angle through the chaotic integer sequence. The scrambled 3D matrix is converted into a 2D matrix, realizing the second diffusion via exclusive OR with the chaotic matrix generated by logistic mapping. Finally, the matrices of the R, G, and B channels are combined into an encrypted image. By performing the encryption algorithm in reverse, the encrypted image can be decrypted into the plain image. A simulation analysis shows that the proposed method has a larger key space and exhibits stronger key sensitivity than some existing methods. Full article
(This article belongs to the Section Signal and Data Analysis)
Show Figures

Figure 1

23 pages, 2867 KB  
Article
A Novel Image Encryption Scheme Based on a Quantum Logistic Map, Hyper-Chaotic Lorenz Map, and DNA Dynamic Encoding
by Peiyi Wang, Yi Xiang and Lanlan Huang
Electronics 2025, 14(10), 2092; https://doi.org/10.3390/electronics14102092 - 21 May 2025
Cited by 2 | Viewed by 1269
Abstract
In the digital information age, although digital images are widely used, the security issues associated with them have become increasingly severe. Consequently, ensuring secure image transmission has become a critical challenge in contemporary information security research. Chaotic systems are characterized by non-periodic behavior, [...] Read more.
In the digital information age, although digital images are widely used, the security issues associated with them have become increasingly severe. Consequently, ensuring secure image transmission has become a critical challenge in contemporary information security research. Chaotic systems are characterized by non-periodic behavior, strong dependence on initial conditions, and other favorable characteristics, and have been widely employed in the scrambling and diffusion processes of image encryption. Compared to classical chaotic maps, a quantum Logistic map exhibits better randomness and stronger sensitivity to initial values, effectively overcoming the attractor problem inherent in classical Logistic maps, thereby significantly enhancing the robustness of encryption methodologies. This article focuses on a innovative integration of a quantum Logistic map, hyper-chaotic Lorenz map, and DNA dynamic encoding technology, to design and implement a highly secure and efficient image encryption scheme. First, high-quality random number sequences are produced utilizing the quantum Logistic map, which is then employed to perform a scrambling operation on the image. Next, by integrating the chaotic sequences yielded from the hyper-chaotic Lorenz map with DNA dynamic encoding and operation rules, we implement a diffusion process, thereby increasing the strength of the image encryption. Experimental simulation results and multiple security analyses demonstrated that our encryption methodology achieved excellent encryption performance, effectively resisting a variety of attack strategies, and it holds significant potential for research on protecting image information through encryption. Full article
Show Figures

Figure 1

20 pages, 24982 KB  
Article
A Novel One-Dimensional Chaotic System for Image Encryption in Network Transmission Through Base64 Encoding
by Linqing Huang, Qingye Huang, Han Chen, Shuting Cai, Xiaoming Xiong and Jian Yang
Entropy 2025, 27(5), 513; https://doi.org/10.3390/e27050513 - 10 May 2025
Cited by 4 | Viewed by 1109
Abstract
Continuous advancements in digital image transmission technology within network environments have heightened the necessity for secure, convenient, and well-suited image encryption systems. Base64 encoding possesses the ability to convert raw data into printable ASCII characters, facilitating excellent stability transmission across various communication protocols. [...] Read more.
Continuous advancements in digital image transmission technology within network environments have heightened the necessity for secure, convenient, and well-suited image encryption systems. Base64 encoding possesses the ability to convert raw data into printable ASCII characters, facilitating excellent stability transmission across various communication protocols. In this paper, base64 encoding is first used in image encryption to pursue high application value in network transmission. First, a novel one-dimensional discrete chaotic system (1D-LSCM) with complex chaotic behavior is introduced and extensively tested. Second, a new multi-image encryption algorithm based on the proposed 1D-LSCM and base64 encoding is presented. Technically, three original grayscale images are constructed as a color image and encoded in base64 characters. To purse high plaintext sensitivity, the original image is input to the SHA-256 hash function and its output is used to influence the generated keystream employed in the permutation and diffusion process. After scramble and diffusion operations, the base64 ciphertext is obtained. Finally, test results derived from comprehensive tests prove that our proposed algorithm has remarkable security and encryption efficiency. Full article
(This article belongs to the Section Multidisciplinary Applications)
Show Figures

Figure 1

30 pages, 31241 KB  
Article
Coupled Sub-Feedback Hyperchaotic Dynamical System and Its Application in Image Encryption
by Zelong You, Jiaoyang Liu, Tianqi Zhang and Yaoqun Xu
Electronics 2025, 14(10), 1914; https://doi.org/10.3390/electronics14101914 - 8 May 2025
Cited by 1 | Viewed by 686
Abstract
Images serve as significant conduits of information and are extensively utilized in several facets of life. As chaotic encryption evolves, current chaotic key generators have grown increasingly prevalent and susceptible to compromise. We present an advanced chaos architecture that integrates numerous nonlinear functions [...] Read more.
Images serve as significant conduits of information and are extensively utilized in several facets of life. As chaotic encryption evolves, current chaotic key generators have grown increasingly prevalent and susceptible to compromise. We present an advanced chaos architecture that integrates numerous nonlinear functions and incorporates common chaotic maps as perturbation factors. The produced two-dimensional QWT chaotic map exhibits a more stable chaotic state and a broader chaotic range in comparison to existing maps. Simultaneously, we developed a novel roulette scrambling technique that shifts the conventional in-plane scrambling to cross-plane scrambling. Upon evaluation, the encrypted image demonstrates commendable performance regarding information entropy, correlation, and other parameters, while its encryption algorithm exhibits robust security. Full article
(This article belongs to the Section Computer Science & Engineering)
Show Figures

Figure 1

Back to TopTop