Secure Image Encryption with Optimized Chaotic Sequences and Multi-layer Cryptographic Operations

Security protection for digital images remains a fundamental issue in contemporary communication systems because it enables secure medical imaging, remote sensing operations, and secure transmission of multimedia content. This research develops an enhanced image encryption method that employs optimi...

Celý popis

Uložené v:
Podrobná bibliografia
Vydané v:SN computer science Ročník 6; číslo 7; s. 879
Hlavní autori: Sethi, Jagannath, Mishra, Sudhansu Kumar, Dash, Prajna Parimita, Bhutani, Monica
Médium: Journal Article
Jazyk:English
Vydavateľské údaje: Singapore Springer Nature Singapore 07.10.2025
Springer Nature B.V
Predmet:
ISSN:2661-8907, 2662-995X, 2661-8907
On-line prístup:Získať plný text
Tagy: Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
Abstract Security protection for digital images remains a fundamental issue in contemporary communication systems because it enables secure medical imaging, remote sensing operations, and secure transmission of multimedia content. This research develops an enhanced image encryption method that employs optimised hybrid chaotic mappings, adaptive permutation, and complex substitution layer procedures. The methodology surpasses ordinary encryption methods using one-dimensional maps because it utilizes various chaotic sequences to improve randomness, initial condition sensitivity, and control parameter responsiveness. Pixel permutation occurs through an adaptive key generation process, leading to a multi-stage encryption operation performed through XOR diffusion with modular transformations. Many experimental tests prove that the proposed method provides a solid defence against statistical and differential attacks. Compared to modern image encryption methods, the developed technique achieved better results in correlation reduction, entropy, Number of Pixels Change Rate (NPCR), and Unified Average Changing Intensity (UACI). This framework establishes scalability with optimal functionality for low-resource usage in security systems linked to IoT networks.
AbstractList Security protection for digital images remains a fundamental issue in contemporary communication systems because it enables secure medical imaging, remote sensing operations, and secure transmission of multimedia content. This research develops an enhanced image encryption method that employs optimised hybrid chaotic mappings, adaptive permutation, and complex substitution layer procedures. The methodology surpasses ordinary encryption methods using one-dimensional maps because it utilizes various chaotic sequences to improve randomness, initial condition sensitivity, and control parameter responsiveness. Pixel permutation occurs through an adaptive key generation process, leading to a multi-stage encryption operation performed through XOR diffusion with modular transformations. Many experimental tests prove that the proposed method provides a solid defence against statistical and differential attacks. Compared to modern image encryption methods, the developed technique achieved better results in correlation reduction, entropy, Number of Pixels Change Rate (NPCR), and Unified Average Changing Intensity (UACI). This framework establishes scalability with optimal functionality for low-resource usage in security systems linked to IoT networks.
ArticleNumber 879
Author Dash, Prajna Parimita
Bhutani, Monica
Sethi, Jagannath
Mishra, Sudhansu Kumar
Author_xml – sequence: 1
  givenname: Jagannath
  surname: Sethi
  fullname: Sethi, Jagannath
  email: iejsethi@outr.ac.in
  organization: Odisha University of Technology and Research
– sequence: 2
  givenname: Sudhansu Kumar
  surname: Mishra
  fullname: Mishra, Sudhansu Kumar
  organization: Birla Institute of Technology
– sequence: 3
  givenname: Prajna Parimita
  surname: Dash
  fullname: Dash, Prajna Parimita
  organization: Birla Institute of Technology
– sequence: 4
  givenname: Monica
  surname: Bhutani
  fullname: Bhutani, Monica
  organization: Bharati Vidyapeeth’s College of Engineering
BookMark eNp9kDFPwzAQhS1UJAr0DzBZYjbYThzHI4oKVCrqUJgtx762qVon2KlQ-fW4BAkmbrk3fO_d6V2ikW89IHTD6B2jVN7HnCupCOWC0DynkrAzNOZFwUipqBz90RdoEuOW0oQmshBjZJZgDwHwbG_WgKfehmPXN63HH02_wYuk980nOFxtTNs3Fi_h_QDeQsTGO_xy2PUN2ZkjBFydnO06mG6TuEUHwZyC4jU6X5ldhMnPvkJvj9PX6pnMF0-z6mFOLCslIyulBKfADVgBwnEqjHG1EC4TtlZZXkrl0tRZJnMBuQRQUDNjHbhCldRlV-h2yO1Cm36Mvd62h-DTSZ1xUXIpqSgTxQfKhjbGACvdhWZvwlEzqk9t6qFNnSrS321qlkzZYIoJ9msIv9H_uL4AI2t7DQ
Cites_doi 10.3390/electronics12163455
10.1109/ACCESS.2024.3446733
10.1109/ICDSIC56987.2022.10075709
10.1016/j.dsp.2022.103746
10.32604/cmc.2023.042630
10.1109/ACCESS.2024.3462547
10.1007/s11071-024-10268-9
10.1088/1402-4896/acdb01
10.1007/978-981-16-6890-6_15
10.36371/port.2023.4.3
10.1109/GCCIT63234.2024.10862295
10.1007/s11071-021-06675-x
10.1007/s11517-023-02874-3
10.1007/978-3-031-11346-8_14
10.1109/ACCESS.2020.2997838
10.2174/157340561466618080111334
10.1109/ACCESS.2019.2952030
10.1016/j.micpro.2020.103134
10.1016/j.aej.2025.02.056
10.3390/sym15051081
10.1080/19393555.2021.1963018
10.32604/cmc.2024.046797
10.1109/JIOT.2025.3540097
10.2174/157340561466618090311533
10.1109/TCSVT.2023.3246520
10.1038/s41598-024-79282-6
10.1007/s11071-024-09742-1
ContentType Journal Article
Copyright The Author(s), under exclusive licence to Springer Nature Singapore Pte Ltd. 2025 Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
The Author(s), under exclusive licence to Springer Nature Singapore Pte Ltd. 2025.
Copyright_xml – notice: The Author(s), under exclusive licence to Springer Nature Singapore Pte Ltd. 2025 Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
– notice: The Author(s), under exclusive licence to Springer Nature Singapore Pte Ltd. 2025.
DBID AAYXX
CITATION
JQ2
DOI 10.1007/s42979-025-04407-1
DatabaseName CrossRef
ProQuest Computer Science Collection
DatabaseTitle CrossRef
ProQuest Computer Science Collection
DatabaseTitleList
ProQuest Computer Science Collection
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 2661-8907
ExternalDocumentID 10_1007_s42979_025_04407_1
GroupedDBID 0R~
2JN
406
AACDK
AAHNG
AAJBT
AASML
AATNV
AAUYE
ABAKF
ABBRH
ABDBE
ABECU
ABFSG
ABHQN
ABJNI
ABMQK
ABRTQ
ABTEG
ABTKH
ABWNU
ACAOD
ACDTI
ACHSB
ACOKC
ACPIV
ACSTC
ACZOJ
ADKFA
ADKNI
ADTPH
ADYFF
AEFQL
AEMSY
AESKC
AEZWR
AFBBN
AFDZB
AFHIU
AFOHR
AFQWF
AGMZJ
AGQEE
AGRTI
AHPBZ
AHWEU
AIGIU
AILAN
AIXLP
AJZVZ
ALMA_UNASSIGNED_HOLDINGS
AMXSW
AMYLF
ATHPR
AYFIA
BAPOH
BSONS
DPUIP
EBLON
EBS
FIGPU
FNLPD
GGCAI
GNWQR
IKXTQ
IWAJR
JZLTJ
LLZTM
NPVJJ
NQJWS
PT4
ROL
RSV
SJYHP
SNE
SOJ
SRMVM
SSLCW
UOJIU
UTJUX
ZMTXR
AAYXX
CITATION
KOV
JQ2
ID FETCH-LOGICAL-c1871-f99520e2aec5e5d205aadb55d35cb934879ddddb33745e47ee9eb1acded6980d3
IEDL.DBID RSV
ISSN 2661-8907
2662-995X
IngestDate Wed Nov 05 14:58:15 EST 2025
Sat Nov 29 07:19:21 EST 2025
Wed Oct 08 03:52:43 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 7
Keywords Cryptographic security
Hybrid chaotic encryption
Multi-Layer substitution
Differential attack resistance
Adaptive permutation
Secure image transmission
Random key generation
IoT security
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c1871-f99520e2aec5e5d205aadb55d35cb934879ddddb33745e47ee9eb1acded6980d3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
PQID 3258277058
PQPubID 6623307
ParticipantIDs proquest_journals_3258277058
crossref_primary_10_1007_s42979_025_04407_1
springer_journals_10_1007_s42979_025_04407_1
PublicationCentury 2000
PublicationDate 20251007
PublicationDateYYYYMMDD 2025-10-07
PublicationDate_xml – month: 10
  year: 2025
  text: 20251007
  day: 7
PublicationDecade 2020
PublicationPlace Singapore
PublicationPlace_xml – name: Singapore
– name: Kolkata
PublicationTitle SN computer science
PublicationTitleAbbrev SN COMPUT. SCI
PublicationYear 2025
Publisher Springer Nature Singapore
Springer Nature B.V
Publisher_xml – name: Springer Nature Singapore
– name: Springer Nature B.V
References R Chu (4407_CR12) 2023; 98
UH Mir (4407_CR28) 2022; 31
4407_CR11
4407_CR10
4407_CR32
QK Abed (4407_CR17) 2024; 7
4407_CR30
4407_CR15
G Kaur (4407_CR21) 2020; 23
4407_CR14
B Zhang (4407_CR20) 2023; 61
KM Hosny (4407_CR3) 2024; 14
4407_CR18
Y Su (4407_CR16) 2023; 33
M Kumar (4407_CR5) 2020; 16
EY Baagyere (4407_CR8) 2020; 8
A Toktas (4407_CR1) 2021; 105
L Feng (4407_CR6) 2023; 12
W Alexan (4407_CR22) 2023; 15
4407_CR26
X Liu (4407_CR13) 2025; 113
K Al-Majdi (4407_CR2) 2022; 13
4407_CR24
4407_CR23
VM García (4407_CR25) 2019; 7
4407_CR7
4407_CR29
M Kumar (4407_CR4) 2020; 16
S Maniyath (4407_CR9) 2020; 77
Z Wang (4407_CR19) 2024
J Sethi (4407_CR31) 2022; 130
QK Abed (4407_CR27) 2023; 6
References_xml – volume: 12
  issue: 16
  year: 2023
  ident: 4407_CR6
  publication-title: Electronics
  doi: 10.3390/electronics12163455
– ident: 4407_CR7
  doi: 10.1109/ACCESS.2024.3446733
– ident: 4407_CR11
– ident: 4407_CR10
  doi: 10.1109/ICDSIC56987.2022.10075709
– volume: 130
  start-page: 103746
  year: 2022
  ident: 4407_CR31
  publication-title: Digit Signal Proc
  doi: 10.1016/j.dsp.2022.103746
– ident: 4407_CR18
  doi: 10.32604/cmc.2023.042630
– ident: 4407_CR24
  doi: 10.1109/ACCESS.2024.3462547
– volume: 113
  start-page: 1775
  issue: 2
  year: 2025
  ident: 4407_CR13
  publication-title: Nonlinear Dyn
  doi: 10.1007/s11071-024-10268-9
– volume: 98
  issue: 7
  year: 2023
  ident: 4407_CR12
  publication-title: Phys Scr
  doi: 10.1088/1402-4896/acdb01
– ident: 4407_CR32
  doi: 10.1007/978-981-16-6890-6_15
– volume: 6
  start-page: 332
  issue: 4
  year: 2023
  ident: 4407_CR27
  publication-title: J Port Sci Res
  doi: 10.36371/port.2023.4.3
– ident: 4407_CR30
– volume: 7
  start-page: 219
  issue: 3
  year: 2024
  ident: 4407_CR17
  publication-title: J Port Sci Res
– ident: 4407_CR23
  doi: 10.1109/GCCIT63234.2024.10862295
– volume: 105
  start-page: 1885
  issue: 2
  year: 2021
  ident: 4407_CR1
  publication-title: Nonlinear Dyn
  doi: 10.1007/s11071-021-06675-x
– volume: 61
  start-page: 2971
  issue: 11
  year: 2023
  ident: 4407_CR20
  publication-title: Med Biol Eng Comput
  doi: 10.1007/s11517-023-02874-3
– ident: 4407_CR29
  doi: 10.1007/978-3-031-11346-8_14
– volume: 8
  start-page: 100438
  year: 2020
  ident: 4407_CR8
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2020.2997838
– volume: 16
  start-page: 278
  year: 2020
  ident: 4407_CR4
  publication-title: Curr Med Imaging Vol
  doi: 10.2174/157340561466618080111334
– volume: 23
  start-page: 998
  issue: 5
  year: 2020
  ident: 4407_CR21
  publication-title: Eng Sci Technol Int J
– volume: 7
  start-page: 163729
  year: 2019
  ident: 4407_CR25
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2019.2952030
– volume: 77
  start-page: 103134
  year: 2020
  ident: 4407_CR9
  publication-title: Microprocess Microsyst
  doi: 10.1016/j.micpro.2020.103134
– ident: 4407_CR15
  doi: 10.1016/j.aej.2025.02.056
– volume: 15
  issue: 5
  year: 2023
  ident: 4407_CR22
  publication-title: Symmetry
  doi: 10.3390/sym15051081
– volume: 31
  start-page: 49
  issue: 1
  year: 2022
  ident: 4407_CR28
  publication-title: Inform Secur J Glob Perspect
  doi: 10.1080/19393555.2021.1963018
– year: 2024
  ident: 4407_CR19
  publication-title: Comput Mater Contin
  doi: 10.32604/cmc.2024.046797
– ident: 4407_CR26
  doi: 10.1109/JIOT.2025.3540097
– volume: 16
  start-page: 329
  year: 2020
  ident: 4407_CR5
  publication-title: Curr Med Imaging
  doi: 10.2174/157340561466618090311533
– volume: 33
  start-page: 4689
  issue: 9
  year: 2023
  ident: 4407_CR16
  publication-title: IEEE Trans Circuits Syst Video Technol
  doi: 10.1109/TCSVT.2023.3246520
– volume: 14
  start-page: 30597
  issue: 1
  year: 2024
  ident: 4407_CR3
  publication-title: Sci Rep
  doi: 10.1038/s41598-024-79282-6
– ident: 4407_CR14
  doi: 10.1007/s11071-024-09742-1
– volume: 13
  start-page: 1591
  issue: 2
  year: 2022
  ident: 4407_CR2
  publication-title: Int J Nonlinear Anal Appl
SSID ssj0002504465
Score 2.3054593
Snippet Security protection for digital images remains a fundamental issue in contemporary communication systems because it enables secure medical imaging, remote...
SourceID proquest
crossref
springer
SourceType Aggregation Database
Index Database
Publisher
StartPage 879
SubjectTerms Algorithms
Biometrics
Communication
Communications systems
Computer Imaging
Computer Science
Computer Systems Organization and Communication Networks
Cryptography
Cybersecurity
Data Structures and Information Theory
Diffusion
Efficiency
Encryption
Entropy
Field programmable gate arrays
Information Systems and Communication Service
Internet of Things
Literature reviews
Medical imaging
Methods
Multilayers
Multimedia
Neural networks
Optimization
Original Research
Parameter sensitivity
Pattern Recognition and Graphics
Permutations
Pixels
Remote sensing
Security systems
Software Engineering/Programming and Operating Systems
Statistical analysis
Surveillance
Vision
Title Secure Image Encryption with Optimized Chaotic Sequences and Multi-layer Cryptographic Operations
URI https://link.springer.com/article/10.1007/s42979-025-04407-1
https://www.proquest.com/docview/3258277058
Volume 6
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAVX
  databaseName: SpringerLINK Contemporary 1997-Present
  customDbUrl:
  eissn: 2661-8907
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0002504465
  issn: 2661-8907
  databaseCode: RSV
  dateStart: 20190101
  isFulltext: true
  titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22
  providerName: Springer Nature
– providerCode: PRVAVX
  databaseName: SpringerLINK Contemporary 1997-Present
  customDbUrl:
  eissn: 2661-8907
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0002504465
  issn: 2661-8907
  databaseCode: RSV
  dateStart: 20200101
  isFulltext: true
  titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22
  providerName: Springer Nature
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnR1NS8MwNMj04MX5idMpOXjTQtskTXOUsaEgmzgdu5U0ecWB68Y6Bf31Jmm7oehBeyo0CeV9v5f3gdBFJKifCco8SjJtHBRqeC6UzJMUSJymJAJXXzG64_1-PB6L-6oorKiz3esrSSepV8VuRnJy4dnxq3ZMMveMz7Np1F1sBzY8DEeryIptykUjVlXI_Lz1qxZam5bfbkOdkuk1__d7u2inMirxdUkFe2gD8n3UrAc24Ip_D5B00XXAt1MjRXA3V4t3JzGwjcbigXmfTj5A486znJmj8LDOs8Yy19jV6nov0hjpuGN3lt2uzbrBHEpCKg7RU6_72LnxqhkLngqMr-RlQrDQh1CCYsB06DMpdcqYJkylghh3RmjzpIRwyoByAGGku1QadGRAr8kRauSzHI4RjtIgA0h5pDJCQQVCQQy2oaDWgS8D3kKXNcyTedlKI1k1TXbQSwz0Ege9JGihdo2WpGKrIiEhi0POfRa30FWNhvXn3087-dvyU7QdWkzaRAHeRo3l4hXO0JZ6W06Kxbkjt0-GhdJr
linkProvider Springer Nature
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnR1NS8MwNIgKenF-4vzMwZsW2iZpmqMMx8S5iZvDW0mTVxy4KusU9NebpO1E0YP2VGgSyvt-L-8DoZNIUD8TlHmUZNo4KNTwXCiZJymQOE1JBK6-YtTlvV58fy9uqqKwos52r68knaSeF7sZycmFZ8ev2jHJ3DM-zxI1Gst2zL8djOaRFduUi0asqpD5eetXLfRpWn67DXVKpt343--to7XKqMTnJRVsoAXIN1GjHtiAK_7dQtJF1wFfTowUwRe5mr45iYFtNBb3zftk_A4atx7kkzkKD-o8ayxzjV2trvcojZGOW3Zn2e3arOs_Q0lIxTa6a18MWx2vmrHgqcD4Sl4mBAt9CCUoBkyHPpNSp4xpwlQqiHFnhDZPSginDCgHEEa6S6VBRyL2NdlBi_lTDrsIR2mQAaQ8UhmhoAKhIAbbUFDrwJcBb6LTGubJc9lKI5k3TXbQSwz0Ege9JGiigxotScVWRUJCFoec-yxuorMaDZ-ffz9t72_Lj9FKZ3jdTbqXvat9tBparNqkAX6AFmfTFzhEy-p1Ni6mR470PgBtLtVP
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LS8QwEA6yinjxLa7PHLxp2LZJmuYo6y6Ksgo-2FtJkykuaF12V0F_vUnarg_0IPZUaBLKvJKZzHyD0EEsWZBLxgmjubEOCrM6FylOFAOaZBmNwddX3F2IXi_p9-XVpyp-n-1eX0mWNQ0OpamYtIYmb00L36wVFZK4VqyuZbIg1v-ZZS6R3vnr13fTKIsD6GIxr6plfp76dUf6OGZ-uxn1G0536f-_uowWq8MmPi6lYwXNQLGKlupGDrjS6zWkfNQd8NmjtS64U-jRq7ck2EVp8aV9fxy8gcHte_Vkl8LXdf41VoXBvoaXPCh7eMdtN7NEwbbjLodQCth4Hd12OzftU1L1XiA6tD4UyaXkUQCRAs2BmyjgSpmMc0O5ziS1bo409skoFYwDEwDSWn2lDZhYJoGhG6hRPBWwiXCchTlAJmKdUwY6lBoScECDxoSBCkUTHdb0T4clxEY6BVP21Est9VJPvTRsop2aRWmlbuOURjyJhAh40kRHNUs-Pv--2tbfhu-j-auTbnpx1jvfRguRY6rLJRA7qDEZPcMumtMvk8F4tOel8B1Y794z
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Secure+Image+Encryption+with+Optimized+Chaotic+Sequences+and+Multi-layer+Cryptographic+Operations&rft.jtitle=SN+computer+science&rft.au=Sethi%2C+Jagannath&rft.au=Mishra%2C+Sudhansu+Kumar&rft.au=Dash%2C+Prajna+Parimita&rft.au=Bhutani%2C+Monica&rft.date=2025-10-07&rft.issn=2661-8907&rft.eissn=2661-8907&rft.volume=6&rft.issue=7&rft_id=info:doi/10.1007%2Fs42979-025-04407-1&rft.externalDBID=n%2Fa&rft.externalDocID=10_1007_s42979_025_04407_1
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2661-8907&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2661-8907&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2661-8907&client=summon