Secure Image Encryption with Optimized Chaotic Sequences and Multi-layer Cryptographic Operations

Security protection for digital images remains a fundamental issue in contemporary communication systems because it enables secure medical imaging, remote sensing operations, and secure transmission of multimedia content. This research develops an enhanced image encryption method that employs optimi...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:SN computer science Jg. 6; H. 7; S. 879
Hauptverfasser: Sethi, Jagannath, Mishra, Sudhansu Kumar, Dash, Prajna Parimita, Bhutani, Monica
Format: Journal Article
Sprache:Englisch
Veröffentlicht: Singapore Springer Nature Singapore 07.10.2025
Springer Nature B.V
Schlagworte:
ISSN:2661-8907, 2662-995X, 2661-8907
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Security protection for digital images remains a fundamental issue in contemporary communication systems because it enables secure medical imaging, remote sensing operations, and secure transmission of multimedia content. This research develops an enhanced image encryption method that employs optimised hybrid chaotic mappings, adaptive permutation, and complex substitution layer procedures. The methodology surpasses ordinary encryption methods using one-dimensional maps because it utilizes various chaotic sequences to improve randomness, initial condition sensitivity, and control parameter responsiveness. Pixel permutation occurs through an adaptive key generation process, leading to a multi-stage encryption operation performed through XOR diffusion with modular transformations. Many experimental tests prove that the proposed method provides a solid defence against statistical and differential attacks. Compared to modern image encryption methods, the developed technique achieved better results in correlation reduction, entropy, Number of Pixels Change Rate (NPCR), and Unified Average Changing Intensity (UACI). This framework establishes scalability with optimal functionality for low-resource usage in security systems linked to IoT networks.
Bibliographie:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:2661-8907
2662-995X
2661-8907
DOI:10.1007/s42979-025-04407-1