Experimental Evaluation of Various Chaos-based Image Encryption Schemes

Authors

  • Abubakar Abba Federal University of Education Zaria
  • Nisar Ahmed University of Engineering and Technology
  • Hakeem Adewale Sulaimon Federal University of Education

DOI:

https://doi.org/10.62411/jcta.13483

Keywords:

Cryptography, Cryptographic security, Encryption performance, Histogram analysis, Image encryption, Security

Abstract

The widespread use of digital images, driven by low-cost, handheld acquisition devices, has increased the need for robust security measures to safeguard privacy. This demand is further underscored by rising identity theft and other image-related crimes. This study presents a chaos-based experimental evaluation of contemporary image encryption algorithms. Owing to intrinsic properties such as sensitivity to initial conditions and pseudo-randomness, chaos theory has become increasingly prominent in image encryption. Five chaos-based image encryption schemes were selected and applied to a dataset of 26 color images. The evaluation covers both encryption performance and cryptographic security. Decryption quality is measured using Mean Squared Error (MSE), Peak Signal-to-Noise Ratio (PSNR), Structural Similarity Index (SSIM), and DeepEns. Cryptographic security is assessed using entropy, correlation coefficient, Number of Pixel Change Rate (NPCR), Unified Average Changing Intensity (UACI), average and maximum deviation, and histogram analysis. Experimental results indicate that all evaluated schemes demonstrate strong cryptographic security and comparable encryption performance, with broadly similar effectiveness across methods.

Author Biographies

Abubakar Abba, Federal University of Education Zaria

Department of Computer Science, Federal University of Education, Zaria, P.M.B 1041, Nigeria

Nisar Ahmed, University of Engineering and Technology

Department of Computer Science (New Campus), University of Engineering and Technology, Lahore, 54000 Pakistan

Hakeem Adewale Sulaimon, Federal University of Education

Department of Computer Science, Federal University of Education, Zaria, P.M.B 1041, Nigeria

References

R. Matthews, “On the derivation of a ‘chaotic’ encryption algorithm,” Cryptologia, vol. 13, no. 1, pp. 29–42, Jan. 1989, doi: 10.1080/0161-118991863745.

F. A. Alaba, M. Othman, I. A. T. Hashem, and F. Alotaibi, “Internet of Things security: A survey,” J. Netw. Comput. Appl., vol. 88, pp. 10–28, Jun. 2017, doi: 10.1016/j.jnca.2017.04.002.

Q. Lai, G. Hu, U. Erkan, and A. Toktas, “A novel pixel-split image encryption scheme based on 2D Salomon map,” Expert Syst. Appl., vol. 213, no. PA, p. 118845, Mar. 2023, doi: 10.1016/j.eswa.2022.118845.

D. R. I. M. Setiadi, R. Robet, O. Pribadi, S. Widiono, and M. K. Sarker, “Image Encryption using Half-Inverted Cascading Chaos Cipheration,” J. Comput. Theor. Appl., vol. 1, no. 2, pp. 61–77, Oct. 2023, doi: 10.33633/jcta.v1i2.9388.

A. Singh, K. B. Sivangi, and A. N. Tentu, “Machine Learning and Cryptanalysis: An In-Depth Exploration of Current Practices and Future Potential,” J. Comput. Theor. Appl., vol. 1, no. 3, pp. 257–272, Feb. 2024, doi: 10.62411/jcta.9851.

A. Malik, M. Ali, F. S. Alsubaei, N. Ahmed, and H. Kumar, “A Color Image Encryption Scheme Based on Singular Values and Chaos,” Comput. Model. Eng. Sci., vol. 137, no. 1, pp. 965–999, 2023, doi: 10.32604/cmes.2023.022493.

S. Maqbool, N. Ahmad, A. Muhammad, and A. M. Martinez Enriquez, “Simultaneous Encryption and Compression of Digital Images Based on Secure-JPEG Encoding,” in Pattern Recognition, 2016, pp. 145–154. doi: 10.1007/978-3-319-39393-3_15.

N. Ahmed, H. M. Shahzad Asif, and G. Saleem, “A Benchmark for Performance Evaluation and Security Assessment of Image Encryption Schemes,” Int. J. Comput. Netw. Inf. Secur., vol. 8, no. 12, pp. 28–29, Dec. 2016, doi: 10.5815/ijcnis.2016.12.03.

N. Ahmed, Y. Saleem, H. A. Habib, S. M. Afzal, and S. K. Khurshid, “A Novel Image Encryption Scheme Based on Orthogonal Vectors,” Nucl., vol. 52, no. 2, pp. 71–78, Jun. 2015, doi: 10.71330/thenucleus.2015.652.

B. Jasra and A. Hassan Moon, “Color image encryption and authentication using dynamic DNA encoding and hyper chaotic system,” Expert Syst. Appl., vol. 206, no. December 2021, p. 117861, Nov. 2022, doi: 10.1016/j.eswa.2022.117861.

Z. A. N. Fauzyah, A. Sambas, P. W. Adi, and D. R. I. M. Setiadi, “Quantum Key Distribution-Assisted Image Encryption Using 7D and 2D Hyperchaotic Systems,” J. Futur. Artif. Intell. Technol., vol. 2, no. 1, pp. 47–62, Apr. 2025, doi: 10.62411/faith.3048-3719-93.

H. Liu and X. Wang, “Color image encryption based on one-time keys and robust chaotic maps,” Comput. Math. with Appl., vol. 59, no. 10, pp. 3320–3327, May 2010, doi: 10.1016/j.camwa.2010.03.017.

H. Liu and X. Wang, “Color image encryption using spatial bit-level permutation and high-dimension chaotic system,” Opt. Commun., vol. 284, no. 16–17, pp. 3895–3903, Aug. 2011, doi: 10.1016/j.optcom.2011.04.001.

W.-W. Hu, R.-G. Zhou, J. Luo, S.-X. Jiang, and G.-F. Luo, “Quantum image encryption algorithm based on Arnold scrambling and wavelet transforms,” Quantum Inf. Process., vol. 19, no. 3, p. 82, Mar. 2020, doi: 10.1007/s11128-020-2579-9.

N. Ahmad, M. U. Younus, M. R. Anjum, G. Saleem, Z. A. Gondal, and S. Narejo, “Efficient JPEG Encoding Using Bernoulli Shift Map for Secure Communication,” Research Square. Jun. 08, 2021. doi: 10.21203/rs.3.rs-485453/v1.

E. Z. Zefreh, “An image encryption scheme based on a hybrid model of DNA computing, chaotic systems and hash functions,” Multimed. Tools Appl., vol. 79, no. 33–34, pp. 24993–25022, Sep. 2020, doi: 10.1007/s11042-020-09111-1.

S. Rohith, K. N. H. Bhat, and A. N. Sharma, “Image encryption and decryption using chaotic key sequence generated by sequence of logistic map and sequence of states of Linear Feedback Shift Register,” in 2014 International Conference on Advances in Electronics Computers and Communications, Oct. 2014, pp. 1–6. doi: 10.1109/ICAECC.2014.7002404.

N. Ahmed, H. M. Shahzad Asif, A. R. Bhatti, and A. Khan, “Deep ensembling for perceptual image quality assessment,” Soft Comput., vol. 26, no. 16, pp. 7601–7622, Aug. 2022, doi: 10.1007/s00500-021-06662-9.

K. M. Hosny, S. T. Kamal, M. M. Darwish, and G. A. Papakostas, “New Image Encryption Algorithm Using Hyperchaotic System and Fibonacci Q-Matrix,” Electronics, vol. 10, no. 9, p. 1066, Apr. 2021, doi: 10.3390/electronics10091066.

X. Wang and X. Chen, “An image encryption algorithm based on dynamic row scrambling and Zigzag transformation,” Chaos, Solitons & Fractals, vol. 147, p. 110962, Jun. 2021, doi: 10.1016/j.chaos.2021.110962.

U. Erkan, A. Toktas, S. Enginoğlu, E. Akbacak, and D. N. H. Thanh, “An image encryption scheme based on chaotic logarithmic map and key generation using deep CNN,” Multimed. Tools Appl., vol. 81, no. 5, pp. 7365–7391, Feb. 2022, doi: 10.1007/s11042-021-11803-1.

Y. Zhou, L. Bao, and C. L. P. Chen, “A new 1D chaotic system for image encryption,” Signal Processing, vol. 97, pp. 172–182, Apr. 2014, doi: 10.1016/j.sigpro.2013.10.034.

Downloads

Published

2025-08-29

How to Cite

Abba, A., Ahmed, N., & Sulaimon, H. A. (2025). Experimental Evaluation of Various Chaos-based Image Encryption Schemes. Journal of Computing Theories and Applications, 3(1), 91–103. https://doi.org/10.62411/jcta.13483