Secure Image Encryption with Optimized Chaotic Sequences and Multi-layer Cryptographic Operations
Security protection for digital images remains a fundamental issue in contemporary communication systems because it enables secure medical imaging, remote sensing operations, and secure transmission of multimedia content. This research develops an enhanced image encryption method that employs optimi...
Uložené v:
| Vydané v: | SN computer science Ročník 6; číslo 7; s. 879 |
|---|---|
| Hlavní autori: | , , , |
| Médium: | Journal Article |
| Jazyk: | English |
| Vydavateľské údaje: |
Singapore
Springer Nature Singapore
07.10.2025
Springer Nature B.V |
| Predmet: | |
| ISSN: | 2661-8907, 2662-995X, 2661-8907 |
| On-line prístup: | Získať plný text |
| Tagy: |
Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
|
| Abstract | Security protection for digital images remains a fundamental issue in contemporary communication systems because it enables secure medical imaging, remote sensing operations, and secure transmission of multimedia content. This research develops an enhanced image encryption method that employs optimised hybrid chaotic mappings, adaptive permutation, and complex substitution layer procedures. The methodology surpasses ordinary encryption methods using one-dimensional maps because it utilizes various chaotic sequences to improve randomness, initial condition sensitivity, and control parameter responsiveness. Pixel permutation occurs through an adaptive key generation process, leading to a multi-stage encryption operation performed through XOR diffusion with modular transformations. Many experimental tests prove that the proposed method provides a solid defence against statistical and differential attacks. Compared to modern image encryption methods, the developed technique achieved better results in correlation reduction, entropy, Number of Pixels Change Rate (NPCR), and Unified Average Changing Intensity (UACI). This framework establishes scalability with optimal functionality for low-resource usage in security systems linked to IoT networks. |
|---|---|
| AbstractList | Security protection for digital images remains a fundamental issue in contemporary communication systems because it enables secure medical imaging, remote sensing operations, and secure transmission of multimedia content. This research develops an enhanced image encryption method that employs optimised hybrid chaotic mappings, adaptive permutation, and complex substitution layer procedures. The methodology surpasses ordinary encryption methods using one-dimensional maps because it utilizes various chaotic sequences to improve randomness, initial condition sensitivity, and control parameter responsiveness. Pixel permutation occurs through an adaptive key generation process, leading to a multi-stage encryption operation performed through XOR diffusion with modular transformations. Many experimental tests prove that the proposed method provides a solid defence against statistical and differential attacks. Compared to modern image encryption methods, the developed technique achieved better results in correlation reduction, entropy, Number of Pixels Change Rate (NPCR), and Unified Average Changing Intensity (UACI). This framework establishes scalability with optimal functionality for low-resource usage in security systems linked to IoT networks. |
| ArticleNumber | 879 |
| Author | Dash, Prajna Parimita Bhutani, Monica Sethi, Jagannath Mishra, Sudhansu Kumar |
| Author_xml | – sequence: 1 givenname: Jagannath surname: Sethi fullname: Sethi, Jagannath email: iejsethi@outr.ac.in organization: Odisha University of Technology and Research – sequence: 2 givenname: Sudhansu Kumar surname: Mishra fullname: Mishra, Sudhansu Kumar organization: Birla Institute of Technology – sequence: 3 givenname: Prajna Parimita surname: Dash fullname: Dash, Prajna Parimita organization: Birla Institute of Technology – sequence: 4 givenname: Monica surname: Bhutani fullname: Bhutani, Monica organization: Bharati Vidyapeeth’s College of Engineering |
| BookMark | eNp9kDFPwzAQhS1UJAr0DzBZYjbYThzHI4oKVCrqUJgtx762qVon2KlQ-fW4BAkmbrk3fO_d6V2ikW89IHTD6B2jVN7HnCupCOWC0DynkrAzNOZFwUipqBz90RdoEuOW0oQmshBjZJZgDwHwbG_WgKfehmPXN63HH02_wYuk980nOFxtTNs3Fi_h_QDeQsTGO_xy2PUN2ZkjBFydnO06mG6TuEUHwZyC4jU6X5ldhMnPvkJvj9PX6pnMF0-z6mFOLCslIyulBKfADVgBwnEqjHG1EC4TtlZZXkrl0tRZJnMBuQRQUDNjHbhCldRlV-h2yO1Cm36Mvd62h-DTSZ1xUXIpqSgTxQfKhjbGACvdhWZvwlEzqk9t6qFNnSrS321qlkzZYIoJ9msIv9H_uL4AI2t7DQ |
| Cites_doi | 10.3390/electronics12163455 10.1109/ACCESS.2024.3446733 10.1109/ICDSIC56987.2022.10075709 10.1016/j.dsp.2022.103746 10.32604/cmc.2023.042630 10.1109/ACCESS.2024.3462547 10.1007/s11071-024-10268-9 10.1088/1402-4896/acdb01 10.1007/978-981-16-6890-6_15 10.36371/port.2023.4.3 10.1109/GCCIT63234.2024.10862295 10.1007/s11071-021-06675-x 10.1007/s11517-023-02874-3 10.1007/978-3-031-11346-8_14 10.1109/ACCESS.2020.2997838 10.2174/157340561466618080111334 10.1109/ACCESS.2019.2952030 10.1016/j.micpro.2020.103134 10.1016/j.aej.2025.02.056 10.3390/sym15051081 10.1080/19393555.2021.1963018 10.32604/cmc.2024.046797 10.1109/JIOT.2025.3540097 10.2174/157340561466618090311533 10.1109/TCSVT.2023.3246520 10.1038/s41598-024-79282-6 10.1007/s11071-024-09742-1 |
| ContentType | Journal Article |
| Copyright | The Author(s), under exclusive licence to Springer Nature Singapore Pte Ltd. 2025 Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law. The Author(s), under exclusive licence to Springer Nature Singapore Pte Ltd. 2025. |
| Copyright_xml | – notice: The Author(s), under exclusive licence to Springer Nature Singapore Pte Ltd. 2025 Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law. – notice: The Author(s), under exclusive licence to Springer Nature Singapore Pte Ltd. 2025. |
| DBID | AAYXX CITATION JQ2 |
| DOI | 10.1007/s42979-025-04407-1 |
| DatabaseName | CrossRef ProQuest Computer Science Collection |
| DatabaseTitle | CrossRef ProQuest Computer Science Collection |
| DatabaseTitleList | ProQuest Computer Science Collection |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 2661-8907 |
| ExternalDocumentID | 10_1007_s42979_025_04407_1 |
| GroupedDBID | 0R~ 2JN 406 AACDK AAHNG AAJBT AASML AATNV AAUYE ABAKF ABBRH ABDBE ABECU ABFSG ABHQN ABJNI ABMQK ABRTQ ABTEG ABTKH ABWNU ACAOD ACDTI ACHSB ACOKC ACPIV ACSTC ACZOJ ADKFA ADKNI ADTPH ADYFF AEFQL AEMSY AESKC AEZWR AFBBN AFDZB AFHIU AFOHR AFQWF AGMZJ AGQEE AGRTI AHPBZ AHWEU AIGIU AILAN AIXLP AJZVZ ALMA_UNASSIGNED_HOLDINGS AMXSW AMYLF ATHPR AYFIA BAPOH BSONS DPUIP EBLON EBS FIGPU FNLPD GGCAI GNWQR IKXTQ IWAJR JZLTJ LLZTM NPVJJ NQJWS PT4 ROL RSV SJYHP SNE SOJ SRMVM SSLCW UOJIU UTJUX ZMTXR AAYXX CITATION KOV JQ2 |
| ID | FETCH-LOGICAL-c1871-f99520e2aec5e5d205aadb55d35cb934879ddddb33745e47ee9eb1acded6980d3 |
| IEDL.DBID | RSV |
| ISSN | 2661-8907 2662-995X |
| IngestDate | Wed Nov 05 14:58:15 EST 2025 Sat Nov 29 07:19:21 EST 2025 Wed Oct 08 03:52:43 EDT 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 7 |
| Keywords | Cryptographic security Hybrid chaotic encryption Multi-Layer substitution Differential attack resistance Adaptive permutation Secure image transmission Random key generation IoT security |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c1871-f99520e2aec5e5d205aadb55d35cb934879ddddb33745e47ee9eb1acded6980d3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| PQID | 3258277058 |
| PQPubID | 6623307 |
| ParticipantIDs | proquest_journals_3258277058 crossref_primary_10_1007_s42979_025_04407_1 springer_journals_10_1007_s42979_025_04407_1 |
| PublicationCentury | 2000 |
| PublicationDate | 20251007 |
| PublicationDateYYYYMMDD | 2025-10-07 |
| PublicationDate_xml | – month: 10 year: 2025 text: 20251007 day: 7 |
| PublicationDecade | 2020 |
| PublicationPlace | Singapore |
| PublicationPlace_xml | – name: Singapore – name: Kolkata |
| PublicationTitle | SN computer science |
| PublicationTitleAbbrev | SN COMPUT. SCI |
| PublicationYear | 2025 |
| Publisher | Springer Nature Singapore Springer Nature B.V |
| Publisher_xml | – name: Springer Nature Singapore – name: Springer Nature B.V |
| References | R Chu (4407_CR12) 2023; 98 UH Mir (4407_CR28) 2022; 31 4407_CR11 4407_CR10 4407_CR32 QK Abed (4407_CR17) 2024; 7 4407_CR30 4407_CR15 G Kaur (4407_CR21) 2020; 23 4407_CR14 B Zhang (4407_CR20) 2023; 61 KM Hosny (4407_CR3) 2024; 14 4407_CR18 Y Su (4407_CR16) 2023; 33 M Kumar (4407_CR5) 2020; 16 EY Baagyere (4407_CR8) 2020; 8 A Toktas (4407_CR1) 2021; 105 L Feng (4407_CR6) 2023; 12 W Alexan (4407_CR22) 2023; 15 4407_CR26 X Liu (4407_CR13) 2025; 113 K Al-Majdi (4407_CR2) 2022; 13 4407_CR24 4407_CR23 VM García (4407_CR25) 2019; 7 4407_CR7 4407_CR29 M Kumar (4407_CR4) 2020; 16 S Maniyath (4407_CR9) 2020; 77 Z Wang (4407_CR19) 2024 J Sethi (4407_CR31) 2022; 130 QK Abed (4407_CR27) 2023; 6 |
| References_xml | – volume: 12 issue: 16 year: 2023 ident: 4407_CR6 publication-title: Electronics doi: 10.3390/electronics12163455 – ident: 4407_CR7 doi: 10.1109/ACCESS.2024.3446733 – ident: 4407_CR11 – ident: 4407_CR10 doi: 10.1109/ICDSIC56987.2022.10075709 – volume: 130 start-page: 103746 year: 2022 ident: 4407_CR31 publication-title: Digit Signal Proc doi: 10.1016/j.dsp.2022.103746 – ident: 4407_CR18 doi: 10.32604/cmc.2023.042630 – ident: 4407_CR24 doi: 10.1109/ACCESS.2024.3462547 – volume: 113 start-page: 1775 issue: 2 year: 2025 ident: 4407_CR13 publication-title: Nonlinear Dyn doi: 10.1007/s11071-024-10268-9 – volume: 98 issue: 7 year: 2023 ident: 4407_CR12 publication-title: Phys Scr doi: 10.1088/1402-4896/acdb01 – ident: 4407_CR32 doi: 10.1007/978-981-16-6890-6_15 – volume: 6 start-page: 332 issue: 4 year: 2023 ident: 4407_CR27 publication-title: J Port Sci Res doi: 10.36371/port.2023.4.3 – ident: 4407_CR30 – volume: 7 start-page: 219 issue: 3 year: 2024 ident: 4407_CR17 publication-title: J Port Sci Res – ident: 4407_CR23 doi: 10.1109/GCCIT63234.2024.10862295 – volume: 105 start-page: 1885 issue: 2 year: 2021 ident: 4407_CR1 publication-title: Nonlinear Dyn doi: 10.1007/s11071-021-06675-x – volume: 61 start-page: 2971 issue: 11 year: 2023 ident: 4407_CR20 publication-title: Med Biol Eng Comput doi: 10.1007/s11517-023-02874-3 – ident: 4407_CR29 doi: 10.1007/978-3-031-11346-8_14 – volume: 8 start-page: 100438 year: 2020 ident: 4407_CR8 publication-title: IEEE Access doi: 10.1109/ACCESS.2020.2997838 – volume: 16 start-page: 278 year: 2020 ident: 4407_CR4 publication-title: Curr Med Imaging Vol doi: 10.2174/157340561466618080111334 – volume: 23 start-page: 998 issue: 5 year: 2020 ident: 4407_CR21 publication-title: Eng Sci Technol Int J – volume: 7 start-page: 163729 year: 2019 ident: 4407_CR25 publication-title: IEEE Access doi: 10.1109/ACCESS.2019.2952030 – volume: 77 start-page: 103134 year: 2020 ident: 4407_CR9 publication-title: Microprocess Microsyst doi: 10.1016/j.micpro.2020.103134 – ident: 4407_CR15 doi: 10.1016/j.aej.2025.02.056 – volume: 15 issue: 5 year: 2023 ident: 4407_CR22 publication-title: Symmetry doi: 10.3390/sym15051081 – volume: 31 start-page: 49 issue: 1 year: 2022 ident: 4407_CR28 publication-title: Inform Secur J Glob Perspect doi: 10.1080/19393555.2021.1963018 – year: 2024 ident: 4407_CR19 publication-title: Comput Mater Contin doi: 10.32604/cmc.2024.046797 – ident: 4407_CR26 doi: 10.1109/JIOT.2025.3540097 – volume: 16 start-page: 329 year: 2020 ident: 4407_CR5 publication-title: Curr Med Imaging doi: 10.2174/157340561466618090311533 – volume: 33 start-page: 4689 issue: 9 year: 2023 ident: 4407_CR16 publication-title: IEEE Trans Circuits Syst Video Technol doi: 10.1109/TCSVT.2023.3246520 – volume: 14 start-page: 30597 issue: 1 year: 2024 ident: 4407_CR3 publication-title: Sci Rep doi: 10.1038/s41598-024-79282-6 – ident: 4407_CR14 doi: 10.1007/s11071-024-09742-1 – volume: 13 start-page: 1591 issue: 2 year: 2022 ident: 4407_CR2 publication-title: Int J Nonlinear Anal Appl |
| SSID | ssj0002504465 |
| Score | 2.3054593 |
| Snippet | Security protection for digital images remains a fundamental issue in contemporary communication systems because it enables secure medical imaging, remote... |
| SourceID | proquest crossref springer |
| SourceType | Aggregation Database Index Database Publisher |
| StartPage | 879 |
| SubjectTerms | Algorithms Biometrics Communication Communications systems Computer Imaging Computer Science Computer Systems Organization and Communication Networks Cryptography Cybersecurity Data Structures and Information Theory Diffusion Efficiency Encryption Entropy Field programmable gate arrays Information Systems and Communication Service Internet of Things Literature reviews Medical imaging Methods Multilayers Multimedia Neural networks Optimization Original Research Parameter sensitivity Pattern Recognition and Graphics Permutations Pixels Remote sensing Security systems Software Engineering/Programming and Operating Systems Statistical analysis Surveillance Vision |
| Title | Secure Image Encryption with Optimized Chaotic Sequences and Multi-layer Cryptographic Operations |
| URI | https://link.springer.com/article/10.1007/s42979-025-04407-1 https://www.proquest.com/docview/3258277058 |
| Volume | 6 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAVX databaseName: SpringerLINK Contemporary 1997-Present customDbUrl: eissn: 2661-8907 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0002504465 issn: 2661-8907 databaseCode: RSV dateStart: 20190101 isFulltext: true titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22 providerName: Springer Nature – providerCode: PRVAVX databaseName: SpringerLINK Contemporary 1997-Present customDbUrl: eissn: 2661-8907 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0002504465 issn: 2661-8907 databaseCode: RSV dateStart: 20200101 isFulltext: true titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22 providerName: Springer Nature |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnR1NS8MwNMj04MX5idMpOXjTQtskTXOUsaEgmzgdu5U0ecWB68Y6Bf31Jmm7oehBeyo0CeV9v5f3gdBFJKifCco8SjJtHBRqeC6UzJMUSJymJAJXXzG64_1-PB6L-6oorKiz3esrSSepV8VuRnJy4dnxq3ZMMveMz7Np1F1sBzY8DEeryIptykUjVlXI_Lz1qxZam5bfbkOdkuk1__d7u2inMirxdUkFe2gD8n3UrAc24Ip_D5B00XXAt1MjRXA3V4t3JzGwjcbigXmfTj5A486znJmj8LDOs8Yy19jV6nov0hjpuGN3lt2uzbrBHEpCKg7RU6_72LnxqhkLngqMr-RlQrDQh1CCYsB06DMpdcqYJkylghh3RmjzpIRwyoByAGGku1QadGRAr8kRauSzHI4RjtIgA0h5pDJCQQVCQQy2oaDWgS8D3kKXNcyTedlKI1k1TXbQSwz0Ege9JGihdo2WpGKrIiEhi0POfRa30FWNhvXn3087-dvyU7QdWkzaRAHeRo3l4hXO0JZ6W06Kxbkjt0-GhdJr |
| linkProvider | Springer Nature |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnR1NS8MwNIgKenF-4vzMwZsW2iZpmqMMx8S5iZvDW0mTVxy4KusU9NebpO1E0YP2VGgSyvt-L-8DoZNIUD8TlHmUZNo4KNTwXCiZJymQOE1JBK6-YtTlvV58fy9uqqKwos52r68knaSeF7sZycmFZ8ev2jHJ3DM-zxI1Gst2zL8djOaRFduUi0asqpD5eetXLfRpWn67DXVKpt343--to7XKqMTnJRVsoAXIN1GjHtiAK_7dQtJF1wFfTowUwRe5mr45iYFtNBb3zftk_A4atx7kkzkKD-o8ayxzjV2trvcojZGOW3Zn2e3arOs_Q0lIxTa6a18MWx2vmrHgqcD4Sl4mBAt9CCUoBkyHPpNSp4xpwlQqiHFnhDZPSginDCgHEEa6S6VBRyL2NdlBi_lTDrsIR2mQAaQ8UhmhoAKhIAbbUFDrwJcBb6LTGubJc9lKI5k3TXbQSwz0Ege9JGiigxotScVWRUJCFoec-yxuorMaDZ-ffz9t72_Lj9FKZ3jdTbqXvat9tBparNqkAX6AFmfTFzhEy-p1Ni6mR470PgBtLtVP |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LS8QwEA6yinjxLa7PHLxp2LZJmuYo6y6Ksgo-2FtJkykuaF12V0F_vUnarg_0IPZUaBLKvJKZzHyD0EEsWZBLxgmjubEOCrM6FylOFAOaZBmNwddX3F2IXi_p9-XVpyp-n-1eX0mWNQ0OpamYtIYmb00L36wVFZK4VqyuZbIg1v-ZZS6R3vnr13fTKIsD6GIxr6plfp76dUf6OGZ-uxn1G0536f-_uowWq8MmPi6lYwXNQLGKlupGDrjS6zWkfNQd8NmjtS64U-jRq7ck2EVp8aV9fxy8gcHte_Vkl8LXdf41VoXBvoaXPCh7eMdtN7NEwbbjLodQCth4Hd12OzftU1L1XiA6tD4UyaXkUQCRAs2BmyjgSpmMc0O5ziS1bo409skoFYwDEwDSWn2lDZhYJoGhG6hRPBWwiXCchTlAJmKdUwY6lBoScECDxoSBCkUTHdb0T4clxEY6BVP21Est9VJPvTRsop2aRWmlbuOURjyJhAh40kRHNUs-Pv--2tbfhu-j-auTbnpx1jvfRguRY6rLJRA7qDEZPcMumtMvk8F4tOel8B1Y794z |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Secure+Image+Encryption+with+Optimized+Chaotic+Sequences+and+Multi-layer+Cryptographic+Operations&rft.jtitle=SN+computer+science&rft.au=Sethi%2C+Jagannath&rft.au=Mishra%2C+Sudhansu+Kumar&rft.au=Dash%2C+Prajna+Parimita&rft.au=Bhutani%2C+Monica&rft.date=2025-10-07&rft.issn=2661-8907&rft.eissn=2661-8907&rft.volume=6&rft.issue=7&rft_id=info:doi/10.1007%2Fs42979-025-04407-1&rft.externalDBID=n%2Fa&rft.externalDocID=10_1007_s42979_025_04407_1 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2661-8907&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2661-8907&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2661-8907&client=summon |