Proceedings of International Conference on Applied Innovation in IT
2025/06/27, Volume 13, Issue 2, pp.79-92

An Optimal Parameters and Initial Values Selection Approach for a New Image Encryption Chaotic System


Sura Hasballah Shnawa, Emad Abdul Kareem and Sadiq A. Mehdi


Abstract: With the rapid escalation of cybersecurity threats, the demand for robust and efficient encryption techniques to secure sensitive visual data has become increasingly critical. Conventional algorithms such as AES and DES, although widely used, exhibit limitations when applied to digital images due to their high computational overhead and inadequate adaptability to the intrinsic characteristics of visual content. This study introduces a novel image encryption scheme grounded in chaotic systems, incorporating an optimized selection mechanism for system parameters and initial conditions to enhance both security and computational performance. Leveraging the inherent properties of chaotic dynamics - such as extreme sensitivity to initial states and pseudo-random behavior - the proposed approach achieves high levels of confusion and diffusion. Experimental evaluations confirm that the encrypted images exhibit uniform histogram distributions, effectively concealing visual structures and thwarting statistical analysis. Entropy measurements ranged from 7.9993 to 7.9998, indicating an exceptionally high degree of randomness. Furthermore, correlation analysis revealed a substantial reduction in adjacent pixel correlation, with values between -0.0003 and -0.0025, signifying strong decorrelation and noise-like behavior in the encrypted outputs. The method also demonstrated strong resilience against differential attacks, achieving a 100% NPCR (Number of Pixels Change Rate), underscoring its sensitivity to minor input alterations. UACI (Unified Average Changing Intensity) values ranged from 33.48% to 33.50%, highlighting the algorithm’s effectiveness in uniformly diffusing changes throughout the image. In terms of efficiency, the proposed system outperforms traditional methods by offering reduced encryption and decryption times, rendering it highly suitable for contemporary digital environments where both security and performance are paramount.

Keywords: Image Encryption, 7D Chaotic System, Simulated Annealing, Chaos-based Cryptography, Hyperchaotic System, Security Analysis.

DOI: 10.25673/120408

Download: PDF

References:

  1. J. Fridrich, "Symmetric Ciphers Based on Two-Dimensional Chaotic Maps," International Journal of Bifurcation and Chaos, vol. 08, no. 06, pp. 1259-1284, Jun. 1998, [Online]. Available: https://doi.org/10.1142/S021812749800098X.
  2. A. S. Edu, D. Agozie, and M. Agoyi, "Digital security vulnerabilities and threats implications for financial institutions deploying digital technology platforms and application: FMEA and FTOPSIS analysis," PeerJ Comput Sci, vol. 7, pp. 1-26, 2021, [Online]. Available: https://doi.org/10.7717/PEERJ-CS.658.
  3. A. A. Rashid and K. A. Hussein, "A Lightweight Image Encryption Algorithm Based on Elliptic Curves and a 5D Logistic Map," Iraqi Journal of Science, vol. 64, no. 11, pp. 5985-6000, 2023, [Online]. Available: https://doi.org/10.24996/ijs.2023.64.11.41.
  4. G. Alvarez and S. Li, "Some basic cryptographic requirements for chaos-based cryptosystems," International Journal of Bifurcation and Chaos, vol. 16, no. 8, pp. 2129-2151, 2006, [Online]. Available: https://doi.org/10.1142/S0218127406015970.
  5. G. Chen, Y. Mao, and C. Chui, "A symmetric image encryption based on 3D chaotic cat maps," Chaos Solitons Fractals, vol. 21, pp. 749-761, Jul. 2004, [Online]. Available: https://doi.org/10.1016/j.chaos.2003.12.022.
  6. S. Kulkarni-Pai, "Attribute Based Cryptography: Overview & Applications," [Online]. Available: http://www.ripublication.com.
  7. Md. M. Ahamad and Md. I. Abdullah, "Comparison of Encryption Algorithms for Multimedia," Rajshahi University Journal of Science and Engineering, vol. 44, pp. 131-139, Nov. 2016, [Online]. Available: https://doi.org/10.3329/rujse.v44i0.30398.
  8. A. Fultz, K. Hmieleski, and T. Baker, "The Effect of Resource Constraints and Bricolage on Dynamic Capabilities and New Venture Performance," Academy of Management Proceedings, vol. 2023, Aug. 2023, [Online]. Available: https://doi.org/10.5465/AMPROC.2023.18365abstract.
  9. J.-Y. Oh and H.-J. Kouh, "A Study on AES Extension for Large-Scale Data," The Journal of the Institute of Webcasting, Internet and Telecommunication, vol. 9, Jan. 2009.
  10. S. C. Koduru and V. Chandrasekaran, "Integrated confusion-diffusion mechanisms for chaos based image encryption," in Proceedings - 8th IEEE International Conference on Computer and Information Technology Workshops, CIT Workshops 2008, 2008, pp. 260-263, [Online]. Available: https://doi.org/10.1109/CIT.2008.Workshops.33.
  11. Z. E. Musielak and D. E. Musielak, "High-dimensional chaos in dissipative and driven dynamical systems," 2009, World Scientific Publishing Co. Pte Ltd., [Online]. Available: https://doi.org/10.1142/S0218127409024517.
  12. B. J. Alkhafaji, M. A. Salih, S. A. Shnain, O. A. Rashid, A. A. Rashid, and M. T. Hussein, "Applying the Artificial Neural Networks with Multiwavelet Transform on Phoneme recognition," in Journal of Physics: Conference Series, IOP Publishing Ltd, Mar. 2021, [Online]. Available: https://doi.org/10.1088/1742-6596/1804/1/012040.
  13. M. Marwan, A. Xiong, M. Han, and R. Khan, "Chaotic Behavior of Lorenz−Based Chemical System under the Influence of Fractals," Match, vol. 91, no. 2, pp. 307-336, 2024, [Online]. Available: https://doi.org/10.46793/match.91-2.307M.
  14. M. Rizki, E. Iman, H. Ujianto, and R. Rianto, "Digital Image Encryption Using Logistic Map," Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), vol. 7, no. 6, pp. 1292-1299, Nov. 2023, [Online]. Available: https://doi.org/10.29207/resti.v7i6.5389.
  15. M. I. Kopp and I. Samuilik, "Chaotic dynamics of a new 7D memristor-based generator: computer modeling and circuit design," Mathematical Modeling and Computing, vol. 12, no. 1, pp. 116-131, 2025, [Online]. Available: https://doi.org/10.23939/mmc2025.01.116.
  16. A. Hedayatipour, R. Monani, A. Rezaei, M. Aliasgari, and H. Sayadi, "A Comprehensive Analysis of Chaos-Based Secure Systems," 2022, pp. 90-105, [Online]. Available: https://doi.org/10.1007/978-3-030-96057-5_7.
  17. H. K. Zghair, S. A. Mehdi, and S. B. Sadkhan, "Analysis of novel seven-dimension hyper chaotic by using SDIC and waveform," in 2020 3rd International Conference on Engineering Technology and its Applications, IICETA 2020, Institute of Electrical and Electronics Engineers Inc., Sep. 2020, pp. 95-99, [Online]. Available: https://doi.org/10.1109/IICETA50496.2020.9318940.
  18. R. Lan, J. He, S. Wang, Y. Liu, and X. Luo, "A Parameter-Selection-Based Chaotic System," IEEE Transactions on Circuits and Systems II: Express Briefs, vol. PP, p. 1, Aug. 2018, [Online]. Available: https://doi.org/10.1109/TCSII.2018.2865255.
  19. N. N. Jasem and S. A. Mehdi, "Multiple Random Keys for Image Encryption Based on Sensitivity of a New 6D Chaotic System," International Journal of Intelligent Engineering and Systems, vol. 16, no. 5, pp. 576-585, 2023, [Online]. Available: https://doi.org/10.22266/ijies2023.1031.49.
  20. F. Budiman, P. N. Andono, and D. R. I. M. Setiadi, "Image Encryption using Double Layer Chaos with Dynamic Iteration and Rotation Pattern," International Journal of Intelligent Engineering and Systems, vol. 15, no. 2, pp. 57-67, Apr. 2022, [Online]. Available: https://doi.org/10.22266/ijies2022.0430.06.
  21. R. Li, Q. Liu, and L. Liu, "Novel image encryption algorithm based on improved logistic map," IET Image Process, vol. 13, no. 1, pp. 125-134, Jan. 2019, [Online]. Available: https://doi.org/10.1049/iet-ipr.2018.5900.
  22. A. A. Rashed and K. A. Hussein, "A Lightweight Image Encryption Algorithm Based on Elliptic Curves and Chaotic In Parallel," in 3rd Information Technology to Enhance e-Learning and Other Application, IT-ELA 2022, Institute of Electrical and Electronics Engineers Inc., 2022, pp. 24-30, [Online]. Available: https://doi.org/10.1109/IT-ELA57378.2022.10107924.
  23. O. A. Jasim, S. R. Amer, S. F. Hussein, and S. A. Mehdi, "Enhanced Image Encryption Using a Novel Chaotic System and Scramble Dithering Technique," International Journal of Safety and Security Engineering, vol. 14, no. 5, pp. 1465-1476, Oct. 2024, [Online]. Available: https://doi.org/10.18280/ijsse.140514.
  24. H. R. Shakir, S. A. Mehdi, and A. A. Hattab, "A New Method for Color Image Encryption Using Chaotic System and DNA Encoding," Mustansiriyah Journal of Pure and Applied Sciences, vol. 1, no. 1, pp. 68–79, Nov. 2022, [Online]. Available: https://doi.org/10.47831/mjpas.v1i1.9.
  25. H. J. S. Sadiq A. Mehdi, "Enhancing Data Security with a New Color Image Encryption Algorithm Based on 5D Chaotic System and Delta Feature for Dynamic Initialization," pp. 90-105, 2024.
  26. H. K. Zghair, S. A. Mehdi, and S. B. Sadkhan, "Design and Analytic of A Novel Seven-Dimension Hyper Chaotic Systems," in Proceedings of 2020 1st Information Technology to Enhance E-Learning and other Application Conference, IT-ELA 2020, Institute of Electrical and Electronics Engineers Inc., Jul. 2020, pp. 77-81, [Online]. Available: https://doi.org/10.1109/IT-ELA50150.2020.9253077.
  27. D. F. Chalob, R. H. Hasan, and R. F. Yaser, "Image Cryptography Based on Confusion and Diffusion Using 6D Hyper Chaotic System and Fibonacci Q-matrix," International Journal of Intelligent Engineering and Systems, vol. 17, no. 4, pp. 944-956, 2024, [Online]. Available: https://doi.org/10.22266/IJIES2024.0831.71.
  28. Z. Qiu-yu and J. Han, "A novel color image encryption algorithm based on image hashing, 6D hyperchaotic and DNA coding," Multimed Tools Appl, vol. 80, Apr. 2021, [Online]. Available: https://doi.org/10.1007/s11042-020-10437-z.


    HOME

       - Conference
       - Journal
       - Paper Submission to Journal
       - For Authors
       - For Reviewers
       - Important Dates
       - Conference Committee
       - Editorial Board
       - Reviewers
       - Last Proceedings


    PROCEEDINGS

       - Volume 13, Issue 2 (ICAIIT 2025)
       - Volume 13, Issue 1 (ICAIIT 2025)
       - Volume 12, Issue 2 (ICAIIT 2024)
       - Volume 12, Issue 1 (ICAIIT 2024)
       - Volume 11, Issue 2 (ICAIIT 2023)
       - Volume 11, Issue 1 (ICAIIT 2023)
       - Volume 10, Issue 1 (ICAIIT 2022)
       - Volume 9, Issue 1 (ICAIIT 2021)
       - Volume 8, Issue 1 (ICAIIT 2020)
       - Volume 7, Issue 1 (ICAIIT 2019)
       - Volume 7, Issue 2 (ICAIIT 2019)
       - Volume 6, Issue 1 (ICAIIT 2018)
       - Volume 5, Issue 1 (ICAIIT 2017)
       - Volume 4, Issue 1 (ICAIIT 2016)
       - Volume 3, Issue 1 (ICAIIT 2015)
       - Volume 2, Issue 1 (ICAIIT 2014)
       - Volume 1, Issue 1 (ICAIIT 2013)


    PAST CONFERENCES

       ICAIIT 2025
         - Photos
         - Reports

       ICAIIT 2024
         - Photos
         - Reports

       ICAIIT 2023
         - Photos
         - Reports

       ICAIIT 2021
         - Photos
         - Reports

       ICAIIT 2020
         - Photos
         - Reports

       ICAIIT 2019
         - Photos
         - Reports

       ICAIIT 2018
         - Photos
         - Reports

    ETHICS IN PUBLICATIONS

    ACCOMODATION

    CONTACT US

 

        

         Proceedings of the International Conference on Applied Innovations in IT by Anhalt University of Applied Sciences is licensed under CC BY-SA 4.0


                                                   This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License


           ISSN 2199-8876
           Publisher: Edition Hochschule Anhalt
           Location: Anhalt University of Applied Sciences
           Email: leiterin.hsb@hs-anhalt.de
           Phone: +49 (0) 3496 67 5611
           Address: Building 01 - Red Building, Top floor, Room 425, Bernburger Str. 55, D-06366 Köthen, Germany

        site traffic counter

Creative Commons License
Except where otherwise noted, all works and proceedings on this site is licensed under Creative Commons Attribution-ShareAlike 4.0 International License.