Abstract
This paper proposes an innovative method to enhance the security of color images by integrating hybrid cryptographic techniques, specifically using Sine maps and a double application of the logistic map. The proposed method encrypts a color image in several distinct phases. In the first phase, the image is converted into an M×N matrix. In addition, the Sine maps generate sequences for each color channel: red, green, and blue. A bit-by-bit XOR operation is applied between the matrix and the sequences, producing the first encrypted image. In the second phase, the logistic map is applied to the output from the first phase, following the same sequence-generation procedure until the encrypted image is obtained. The final phase involves reapplying the Logistic map to the image from phase two using modified Logistic map parameters. A comparison with established techniques demonstrates the effectiveness of the proposed strategy in terms of both security and computational efficiency. Experimental results confirm strong performance, with an average correlation coefficient of −0.00014, NPCR = 99.61%, UACI = 33.61%, entropy = 7.9992, and PSNR = 8.60 dB. The average encryption time is 0.445 s for a 512 × 512 color image, demonstrating high robustness and resistance to various attacks, thereby offering valuable insights for practical integration into image-security frameworks.
Introduction
The security of color images is a primary concern in various areas1, including the secure transmission of visual information and the protection of sensitive graphical data2,3. Due to the widespread use of digital images, ensuring their protection against unauthorized access, modification, or interception has become a major challenge4. Traditional encryption algorithms such as AES or DES are often insufficient for image data because of its large size, high redundancy, and strong pixel correlation. Consequently, many chaos-based cryptographic approaches have been proposed to enhance the confidentiality and robustness of visual information5. In this paper, we propose a new approach to enhance the security of color images by exploiting the robust properties of Sine maps. Additionally, we integrate one-dimensional chaotic transformations to further strengthen the encryption process. This approach relies on the joint application of 1D chaotic transformations (Sine and Logistic maps) to generate highly secure pseudo-random sequences6,7,8.
Sine maps are mathematical tools that exhibit deterministic chaotic behavior9,10,11,−12. Their use in cryptography has shown promise due to their ability to generate robust random sequences, making encryption algorithms resistant to attacks13,14,,14. This intrinsic property makes Sine maps suitable for designing encryption techniques capable of withstanding cryptanalytic attacks15,16.
Simultaneously, the dual application of Logistic chaotic maps17 is an advanced strategy that exploits the chaotic behavior of logistic maps. The use of multiple instances of this map in the encryption process increases the algorithm’s complexity, thereby improving its resistance to intrusion attempts18,19,20,21. Logistic maps, known for their unpredictable and deterministic nature, provide a solid foundation for encryption methods22.
The integration of Sine maps and Logistic maps allows the advantages of both chaotic approaches to be combined. By using these two types of transformations together, we can create an encryption system that exploits the chaotic properties to generate highly secure pseudo-random sequences23,24. This approach provides enhanced protection of color images against cryptanalytic attacks and intrusion attempts.
In this article, we detail our approach based on the synergistic combination of these two powerful techniques Sine maps and the double application of Logistic maps in order to optimize the security of color images. We explore the theoretical aspects of these methods by highlighting their respective advantages25,26, and describe how they are integrated into our proposal for increased security.
Extensive research conducted on applications of Sine and Logistic maps in cryptography27. demonstrate their effectiveness in designing robust encryption schemes. However, exploration of their combined potential particularly for improving the security of color images remains limited28.
In the following sections, we will describe our methodological approach, present the results of our experiments, and discuss the practical and theoretical implications of our method in the context of color image security. This research aims to contribute significantly to the evolution of cryptographic techniques dedicated to the protection of visual information.
Related work
The security of color images is a dynamic area of research, crucial to ensuring the confidentiality and integrity of visual data in various sectors. To reinforce this security, many researchers have studied the field of image encryption in order to design algorithms adapted to the specificities of multimedia data. Most of these algorithms rely on the use of chaotic maps29,30,31,32, which are characterized by sensitivity to initial conditions, parameter variability, non-periodicity, and pseudo-random value generation.
A range of studies have focused on harnessing chaotic maps for image encryption. For instance, Singh et al.33, developed a secure communication framework centered on the Logistic map as a principal component. Their analysis underscored the efficacy of this methodology in protecting the privacy of transmitted information. In a parallel effort, Goumidi et al.34 presented an image-encryption technique tailored for satellite imagery, which utilized a modified confusion-diffusion paradigm that incorporated standard, Logistic, and Sine chaotic maps. Their method strategically merged various chaotic maps to boost encryption security through customized confusion and diffusion procedures.
Following a similar thread Zeng et al.35 introduced an image-encryption scheme that employed a composite Logistic–Sine chaotic system. Their findings emphasized this method’s capability in preserving image confidentiality within distributed settings, offering an efficient and sturdy encryption solution by blending the attributes of the Logistic and Sine maps.
More recent contributions include the work of Zhou et al.22 who detailed an innovative image-encoding system that exploits a conservative hyperchaotic system in conjunction with closed-loop block diffusion. Their investigation demonstrated that this design enhances visual data security by uniting chaotic encryption with inter-block diffusion to maximize confusion. Finally, Kiran et al.36 proposed a partial image-encryption technique relying on the Sine–Logistic Map (LSM), showcasing its ability to ensure the confidentiality of selected image areas by effectively employing the LSM maps as a cryptographic instrument.
Elazzaby et al.37 present a significant advancement in image cryptography using the bidimensional Arnold Cat Map to rearrange pixel positions based on parameters from the original image. Combined with blur patterns, the multiplicative group \(\:Z/nZ\) generated from a 2D logistic–sinusoidal hyperchaotic sequence adds randomness to the statistical properties of the encrypted image. By exploiting the properties of multiplicative groups and chaotic systems, they demonstrate a robust and efficient method for encrypting visual data. In26, an image-encryption method using a 2D sinusoidal–Logistic modulation map and the \(\:Z/nZ\) group was proposed to create a highly secure encryption system. By exploiting hyperchaotic properties, it generates a blurred pattern that obscures the original image.
Comparative tests show that this approach achieves high security, optimal complexity, and strong protection against unauthorized access, surpassing existing methods. Es-Sabry et al.38, present a highly efficient color-image-encryption algorithm using Logistic, Sine, and Chebyshev maps along with an intersecting-plane technique in a cube. The algorithm encrypts each color channel (red, green, blue) by first extracting pixel values and performing circular rotations to ensure uniqueness, followed by encryption through intersecting planes and the Arnold Cat Map for confusion. The method demonstrates high performance, reliability, and robustness compared to existing techniques. Another recent work by Es-Sabry et al.39, proposes a method for encrypting 32-bit color images using four one-dimensional chaotic maps (Tent, Logistic, Chebyshev, and Sine) and 16 × 16 matrices for each color channel. The process involves shifting pixel values, encrypting them with the Four-Square cipher, and using the Arnold Cat Map for pixel rearrangement. Evaluations demonstrate the algorithm’s strong performance and security against common attacks.
Recently, several notable studies have advanced chaos-based image encryption, particularly focusing on enhancing security metrics through complex chaotic structures. Alexan and Megalli40 developed a method incorporating a memristive hyperchaotic system for multiple image encryption, aiming for high-speed hardware implementation. Similarly, Alexan et al.41 proposed an efficient scheme based on multiple chaotic systems combined with nonlinear transformations to fortify resistance against statistical and differential attacks.
In another approach, Moysis et al.42 introduced a chaotic encryption technique that leverages circular shifts for enhanced efficiency. Addressing the need for high-speed multimedia applications, Alexan et al.43 presented an optimized algorithm featuring an enhanced permutation-diffusion architecture. Furthermore, Alexan et al.44 demonstrated a strong multiple image encryption algorithm by combining hyperchaotic systems with Singular Value Decomposition (SVD) and a modified RC5 cipher to achieve strong diffusion.
While the aforementioned studies demonstrate the effectiveness of various chaotic systems, they often rely on single hyperchaotic maps, direct combinations of maps into a single chaotic system, or other complex transformations. The novelty of our proposed method lies in its unique sequential three-phase architecture that synergistically combines distinct cryptographic operations.
Unlike methods that merge chaotic maps into a single formula, our approach first employs a Sine map for a substitution-based XOR encryption. It then significantly enhances security by subjecting the result to a dual application of the Logistic map, utilizing different parameters at each stage to create a deep and complex confusion-diffusion effect. This layered strategy of sequential and distinct chaotic processes offers a more robust defense against cryptanalytic attacks compared to single-stage or blended-chaos systems.
Proposed method
In this section, we detail our proposed algorithm, which combines chaotic techniques based on the Sine map and the Logistic maps for color image encryption. The process begins by applying the Sine map method to the original color image of dimensions \(\:M\times\:N\). From this, a key is automatically generated from the calculated variance between the image pixels. Next, the resulting output undergoes two successive application of the Logistic map, using different keys at each step. In other words, the cipher image that emerges after the application of the Sine map must go through a two-step process of the Logistic map. As illustrated in (Fig. 1), the proposed methodology describes the sequential steps involved in transforming the original color image into its final encrypted form.
Logistic map
The Logistic map is a widely utilized chaotic function, holding a primary role in the development of chaotic cryptosystems. A comprehensive understanding of its inherent characteristics and dynamics is essential for its application. This function is acutely susceptible to its initial value, a property critical for cryptography. Its non-linear nature ensures the exhibition of chaotic behavior when the control parameter \(\:\alpha\:\) is bounded within the range [\(\:3.57,\:4\)]. The mathematical definition of the Logistic map is formally given by the following equation45:
With α ∈ [0, 4] and \(\:{y}_{0}\) \(\:\in\:\) [0, 1].
Fig. 2 visually presents the chaotic features of this system. The bifurcation diagram highlights the chaos zone in the interval [\(\:3.57,\:4\)], an observation supported by the Lyapunov exponent diagram. More specifically, Lyapunov exponent values are negative for \(\:\alpha\:\:<\:3.57\) and become positive for \(\:\alpha\:\:>\:3.57\). In addition, the values recorded on the diagram are in the range [\(\:0,\:1\)].
To formalize the sequences generated with the logistic maps for the different channels (red, green and blue) in matrices that match size of original image, the following formula is used:
Sine map
The Sine map incorporates the sine function into security algorithms to produce unpredictable elements (Fig. 3). This approach exploits the chaotic characteristics of the sine function to introduce randomness, thus strengthening data protection in cryptographic systems. It is a non-linear function exhibiting a chaotic attitude same to the Logistic maps, and it’s defined by46:
with \(\:r\:\in\:\:[0,\:4]\) and \(\:{x}_{0}\) ∈ \(\:[0,\:1]\).
Proposed encryption process
The suggested system relies on chaotic sine and logistic maps to encrypt a color image, the high-efficiency image encryption algorithm. The proposed detailed Method procedure is described as follows:
→Input: a color image I of size \(\:M\times\:N\) with 3 channels (R, G, B), where each value is in the interval [\(\:\text{0,255}\)].
S1. Sine-map sequence generation:
-
A chaotic sequence \(\:X\) is first generated using the sine map.
-
A normalization function is applied to scale the values between 0 and 1:
Then, the sequence is further transformed follows:
S2. Encryption using the Sine map:
The original image \(\:\text{I}\) is encrypted using the Sine Map through the XOR operation for each pixel:
→\(\:{\text{C}}_{\text{S}}\): Image encrypt with sine map.
S3. Generation of New Chaotic Sequences with the Logistic Map (First Application).
Two new chaotic sequences \(\:X^{{\prime\:}{\prime\:}}\) and \(\:Y^{{\prime\:}{\prime\:}}\) are generated using the Logistic Map defined by:
where \(\:\alpha\:\:\in\:\:\left(\text{3.57,4}\right]\).
S4. First Application of Logistic Map:
-
The encryption of \(\:{\text{C}}_{\text{S}}\) (Sine map encryption) with the Logistic Map is performed as follows:
where\(\:\:k\) is a shift parameter used to rearrange the pixel indices and enhance diffusion.
S5. Generation of New Chaotic Sequences (Second Application of Logistic Map):
-
A second set of logistic sequences \(\:X^{{\prime\:}{\prime\:}{\prime\:}}\:\)and \(\:Y^{{\prime\:}{\prime\:}{\prime\:}}\:\)is generated from the previous ones as follows:
where \(\:\alpha\:{\prime\:}\) represents a new control parameter.
S6. Second Application of Logistic Map Encryption:
-
The previously encrypted image \(\:{\text{C}}_{\text{R}1}\) is re-encrypted using the second logistic map application:
where \(\:k{\prime\:}\) is a new shift parameter.
S7. Reconstruction of the Final Encrypted Image:
-
Finally, the three-color channels (R, G, B) of the encrypted image \(\:{\text{C}}_{\text{R}2}\) are recombined to form the final ciphered image:
→output
-
The final encrypted image \(\:{\mathbf{C}}_{\mathbf{F}\mathbf{I}\mathbf{N}\mathbf{A}\mathbf{L}\mathbf{E}}\).
Following this analysis, we present an explanation of the proposed workflow procedure, illustrated by a diagram. This graphical representation, designed as a didactic tool, facilitates the understanding of the encryption process. The visual format, known for its pedagogical effectiveness, enhances the clarity and accessibility of our cryptographic innovation, as shown in (Fig. 4).
Experimental results
Statistical analysis
The purpose of this section is to present a comprehensive analysis of the proposed primitive cryptographic scheme in terms of its security and efficiency against well-known attack methods reported in the literature. Statistical techniques are applied to the cryptographic data to evaluate its resistance to various attacks. This process involves examining specific features or characteristics of the encrypted and decrypted data in order to identify potential weaknesses or information leakage. To achieve this, five different types of security analyses were conducted on encrypted images, and all operations were implemented using the Python programming language.
Computational complexity analysis
The computational efficiency of the proposed encryption algorithm is analyzed in terms of its theoretical complexity. For a color image of size \(\:M\times\:N\) with three channels (R, G, and B), each pixel undergoes a fixed number of arithmetic and logical operation in both the confusion and diffusion phases, while the chaotic sequences are generated once the algorithm can be expressed as:
This linear complexity indicates that the algorithm scales efficiently with the image size, ensuring a good balance between computational cost and encryption strength.
Execution time analysis
Execution time in-depth analysis was performed for a variety of image sizes, in order to dispel any doubts about the computational cost of the proposed hybrid cryptographic method. The main points that will be discussed in this section are performance according to the algorithm’s execution time and its comparison to similar cryptographic methods.
Experimental setup
-
Processor: Intel(R) Core (TM) i7-4600U CPU @ 2.10 GHz (2.69 GHz).
-
Programming Environment: Python 3.12, with libraries including NumPy and Pillow for optimized calculations.
-
RAM:8Go.
-
Dataset: A dataset consisting of multiple-sized 32-bit color images was used. The encryption technique put forward was applied to every image in sequence, with execution times measured by Python’s time module. Each operation was independently timed and repeated across scenarios for consistency and measurement of true performance metrics.
The results are summarized in Table 1. It can be observed that the execution time is approximately proportional to the number of pixels in the image. For medium-sized images (512 × 512), the execution time is as low as 0.445 s, demonstrating the suitability of the proposed method for applications that prioritize security over real-time performance. For larger images (1024 × 1024), the execution time remains reasonable at 1.747 s.
Table 2 compares the suggested scheme’s execution time to alternative techniques for encrypting 512 × 512 pixel color images. Even under different testing conditions, our proposed algorithm performs better than others, which are optimized under similar conditions. The findings obtained show that the encryption process may be completed at remarkable speeds using the method we have provided, making it ideal for real-time applications.
Histogram
To evaluate the intensity distribution in both the original and encrypted images, the histogram is commonly used as the most effective and widely recognized tool for representing pixel value distributions50,51. Based on this principle, we performed a comparative histogram analysis on eight different original images, each with distinct content, and their corresponding encrypted counterparts generated using our proposed method. Looking at the details of the study and referring to (Figs. 5, 6, 7, 8 and 9), they found that the histogram, expressed in terms of pixels of the encrypted images, resembles a uniform assignment. However, when comparing the original pictures histograms, there was a big difference in one image, while the other had much higher values in a different region. These substantial differences between the histograms of the original and encrypted images confirm that the proposed encryption algorithm effectively ensures security and provides strong resistance against statistical attacks.
Correlation analysis between neighboring pixels
Unencrypted images are typically characterized by a strong statistical correlation between adjacent pixels. A robust cryptographic system for visual data must, therefore, be capable of effectively disrupting these correlations to guarantee sufficient protection against various statistical analysis attacks. To quantify the effectiveness of the proposed method in achieving this decorrelation, we selected a random sample consisting of 30,000 pairs of adjacent pixels from the original image and their corresponding positions in the encrypted image. Subsequently, we computed the correlation coefficients across three primary directions horizontal, vertical, and diagonal using the following formula52,53:
Table 3 represents the calculated values of the correlation coefficient. It is obvious that the correlation coefficients display values close to 1, indicates that these pixels are strongly correlated with those of original images. Conversely, the encrypted image has a correlation coefficient that is approaching to 0, suggesting the absence of correlation between pixels.
We therefore conclude that, as shown in Figs. 10, 11, and 12 our method demonstrates a strong ability to break the dependency between neighboring pixels.
Table 4 compares the correlation coefficients of adjacent pixels for several encryption methods. Lower values particularly those near zero indicate stronger resistance to statistical attacks. The proposed method achieves the lowest average coefficient (-0.00014), outperforming all referenced schemes and confirming excellent decorrelation. While L. Moysis et al.42 reported a strong result with 0.00023, our method goes further by producing negative correlations in all directions, including Horizontal (-0.00006) and Vertical (-0.0024). Such negative values are rare and demonstrate a highly effective disruption of pixel relationships. This, combined with the near-zero average, highlights the strong scrambling capability of our three-phase architecture and confirms its superiority over recent approaches, including Alexan et al.40.
The primary objective of this specific analysis is to determine the quantitative relationship linking each pixel value in the source image to its counterpart in the ciphered output. This computation relies on the following established formulas:
With
where C is the simple image and \(\:\overline{C}\) s its meaning. Similarly, C’ is the encrypted image, and \(\:\overline{{C}^{{\prime\:}}}\) is its meaning. The dimensions of the matrices C and C’ are denoted by N is the length and M is the width, respectively.
Table 5 demonstrates that our methodology performs exceptionally in comparison to the outcomes derived from the methodologies outlined in37, which introduce an innovative image encryption algorithm using multiple chaotic maps with the intersection plane method. Moreover, our approach goes beyond the technique described in13, which depends on the coupling of a multiplicative group and the chaos theory in the image ciphers, as well as the method explained in57 And58. The value obtained is responsible for this superiority, which shows a remarkable proximity to 0.
Differential attacks
The cryptographic system is resistant to differential attacks, which are similar to was cantered attacks on a single image selected with the objective of identifying the secret key to be protected51. A robust cryptographic scheme, whether employing symmetric or asymmetric techniques, must demonstrate an exceptionally high sensitivity to minor alterations in the input image. This mandates that even a minute single-bit modification within the plaintext image should lead to substantial changes in the resulting cipher image. To quantitatively assess this crucial sensitivity characteristic of the cryptosystem, especially concerning the source image, two standard metrics are employed: the Number of Pixels Changing Rate (NPCR) and the Unified Average Change Intensity (UACI)59. We conducted this evaluation by introducing a minute single-pixel change in the source images (Peppers, Baboon, and Bird). The calculated NPCR and UACI values, derived using Eqs. 20 and 21 respectively, consistently yielded results exceeding 99.63 and 33.61% (detailed results are available in Tables 6 and 7). Furthermore, our approach demonstrates a superior level of efficiency compared to most existing and recent methods, with only a few specific schemes exhibiting marginally higher performance.
With
where \(\:{C}_{1}\) and\(\:{\:C}_{2}\) denote two different levels of image encryption. \(\:M,\:N\) make up the total number of image pixels. According to the optimal holding values, the NPCR threshold denoted as \(\:{N}_{\alpha\:}^{*}\),while the UACI should remain within the designated critical range (\(\:{U}_{\alpha\:}^{*-},{U}_{\alpha\:}^{*+})\).This can be expressed through the following equations:
Sensitivity key
Sensitivity of the ideal image to the private key is a crucial property of an encryption technique. Any minimal change in this key must yield an entirely different image. As such, we thoroughly tested the key sensitivity for the new image encryption technique. The aim of this study was to determine whether a change of the algorithm’s chaotic maps by 10− 15 in the algorithm’s parameter would result in a successful decryption process (see Tables 8, 9).
The outcomes of the decryption using the correct key and the modified key are shown in Figs. 13 and 14. These findings demonstrate that a small adjustment to the key produced a noteworthy change of more than 99.63%.
Entropy analysis
In image cryptography, entropy is used to evaluate the randomness or unpredictability of pixel values within an image. A high entropy value indicates that the image contains a large amount of random information, making it more difficult to compress or predict. The confusion and diffusion processes employed during encryption increase entropy, thereby enhancing the security of the encrypted image and protecting sensitive visual data from malicious attacks46. To calculate entropy, the following equation is used:
where \(\:P\left({x}_{i}\right)\) represents the probability of each \(\:{x}_{i}\) occurring.
In this study, the information entropy is assessed independently for each color channel (Red, Green, and Blue). Given that each pixel in a grayscale (or color channel) image can adopt 256 distinct intensity levels, the inherent number of bits per pixel is \(\:n=8\). The theoretical maximum value for entropy, \(\:H\left(x\right)\), is reached when the source data exhibits complete statistical unpredictability. To successfully simulate a truly random data source and effectively preempt any potential prediction of the generated values, an encryption algorithm of high quality must aim to achieve this maximum entropy threshold.
For each color channel (red, green, and blue), the results of our method’s entropy calculation for the original and encrypted image are shown in Tables 10 and 11 using various images. Additional techniques are also employed for comparison.
The results obtained in Table 11 are close to the optimal value of 8. This suggests that our method can effectively withstand entropy attacks, thus exceeding the performance of the methods of El Azzaby et al.37, Chen et al.60 and Es-sabry et al.39
Key space analysis
A crucial aspect in assessing the robustness of an encryption algorithm is the key space size, which defines the total number of possible key combinations. A sufficiently large key space guarantees strong resistance against brute-force attacks, as testing all potential keys becomes computationally impractical.
In the proposed encryption algorithm, six independent parameters are employed as secret keys:\(\:\:r\:\)and \(\:x\)0 for the Sine map, \(\:\alpha\:\) and \(\:y\)0 for the first Logistic map application, and \(\:\beta\:\) and \(\:z\)0 for the second Logistic map application. Each parameter is represented using the IEEE 754 double-precision floating-point standard, which provides an accuracy of approximately 10− 15. This precision implies that each parameter can take around 1015 distinct possible values within its defined range. Hence, the total key space can be estimated as:
This exceptionally large key space makes exhaustive key search attacks computationally infeasible, ensuring a high degree of confidentiality and robustness. Therefore, the proposed encryption algorithm demonstrates excellent resistance to brute-force attacks and meets modern cryptographic security standards.
MSE and PSNR analysis
The Mean Squared Error (MSE) and the Peak Signal-to-Noise Ratio (PSNR) are two widely utilized measures employed for evaluating image quality, particularly within the context of image encryption performance. The MSE quantifies the average of the squared intensity differences between the pixel values of the original image and those of the encrypted (or decrypted) image. In the case of robust encryption, a high MSE value is expected, as it signifies a substantial disparity between the original and ciphered versions. Conversely, the PSNR serves as a metric to gauge the fidelity of image reconstruction, achieved by comparing the encrypted (or decrypted) output against the initial source image. It is measured in decibels (dB) and is based on the MSE. A low PSNR usually indicates better data protection. These two values are calculated between an encrypted image and the original image using the following equations:
With:
\(\:M\) and \(\:N\) are the image size.
\(\:I\:(i,\:j)\) the value of the pixel at the position \(\:(i,\:j)\) in the original picture.
\(\:K\:(i,\:j)\) the value of the pixel at the position (i, j) in the encrypted image.
\(\:L\) is the largest possible value of a single pixel in the image.
The calculated MSE and PSNR values for the original and encrypted images across all three color channels (blue, green, and red) are documented in Table 12. The data presented robustly substantiates the high efficacy and cryptographic strength of our proposed algorithm, particularly in creating a significant distinction between the plaintext and ciphertext images.
Noise attack analysis
To further experiment with the strength of the proposed encryption scheme, additional experiments were conducted in noisy conditions. Two sources of commonly encountered noises, the Gaussian noise and Salt & Pepper noise, were imposed on the encrypted image. Real-world interference that may be encountered during image acquisition, transmission, or storage was simulated using Gaussian noise with variance 0.02 and Salt & Pepper noise with density 0.02.
Figure 15 clearly shows that both types of noise-affected encrypted images suffer severe distortion and are visually indistinguishable from the original image. This is to be expected and thus validates that the proposed algorithm continues to possess its encryption strength notwithstanding external interference from noise. These results demonstrate the strength and integrity of the encryption process, establishing their suitability in secure image transmission over noisy communication links.
NIST randomness test analysis
To comprehensively evaluate the robustness and statistical quality of the proposed image encryption algorithm, we employed the National Institute of Standards and Technology (NIST) statistical test suite (SP 800–22). This suite is internationally recognized for assessing the randomness and cryptographic strength of binary sequences generated by encryption systems. The NIST test suite produces P-values, which serve as critical indicators of randomness. A test is considered passed if its P-value exceeds 0.01, corresponding to a 99% confidence level that the evaluated data exhibits no detectable deviation from ideal randomness. During our assessment, the encrypted image was first converted into a binary sequence and then subjected to all 15 standard NIST tests, including Frequency, Runs, Rank, and Linear Complexity analyses.
The obtained results, summarized in Table 13, confirm that all P-values surpass the 0.01 threshold. This indicates that the encrypted data demonstrates excellent random statistical characteristics, comparable to those of a truly random sequence. These outcomes provide strong evidence of the high randomness and robustness of the proposed encryption scheme, confirming its resilience against statistical and probabilistic attacks.
Overall, the successful completion of the NIST tests validates the effectiveness and reliability of the encryption process, making it highly suitable for secure image transmission and data protection applications.
Future work
Although the obtained results have shown the robustness of the proposed encryption method, some improvement is still necessary to optimize its applicability in practical contexts. Therefore, the following avenues will be followed within this paper:
-
Experimental evaluation in real-life conditions: Implementation of the method under different hardware conditions will enable in-depth analysis of its performance when necessary to operate under constraints given by limited computing capacities, or network fluctuations. These tests will allow checking the resistance of the encryption under real conditions of use.
-
Performance optimization: Although our approach is competitive from the computational perspective, the use of optimization methods, such as parallelization or GPU, will be studied to improve the efficiency of encryption to enable real-time implementation.
-
Securing and Managing Chaotic Keys: It is about developing a proper key management mechanism in order to enhance the security of the system. The work will consider the integration of efficient cryptographic protocols, such as Diffie-Hellman or elliptic curves, along with digital signatures for key integrity.
-
Post-quantum attack resilience: Evaluating the resistance of the proposed scheme against quantum attacks is a priority research area because of the emergence of quantum computing. Concretely, exploring post-quantum algorithms will be considered to let encryption live for a longer time, especially those based on code-based cryptography.
Specifically, the incorporation of these enhancements is expected to significantly augment the robustness and operational efficiency of the proposed scheme. This increased capability enables its practical deployment in security-critical domains, such as the protection of sensitive industrial and medical communication channels.
Conclusion
In this scientific article, a new encryption method is proposed, consists in combining two 1D chaotic maps to create a fast and secure encryption technique, namely the logistic map and sine map, with the addition of an additional layer of security thanks to the dual application of logistic maps. This is to ensure an adequate response to the confusion criteria within the cryptosystem. We reinforce this method during the diffusion phase by modifying the keys used during the encryption process. A rigorous procedure guarantees a high level of encryption and successfully removes any resemblance or binding to the original image. There is judicious use of a wide range of evaluation criteria, including careful entropy analyses, accurate histogram analyses, a careful correlation coefficient that includes neighboring pixels and plain and encrypted images, and a careful examination of differential attacks NPCR, UACI, MSE, and PSNR. Every criterion is carefully and thoroughly examined. As a result, it is evident that the suggested method offers a practical way to encrypt images, improving both the security of such images and the resilience of image processing security systems.
Nevertheless, the system presents some limitations. Its strong sensitivity to initial conditions, while beneficial for security, can make it vulnerable to computational rounding errors or parameter mismatches. Moreover, the method’s computational cost may increase for large or real-time image datasets. Future work will focus on optimizing computational efficiency and exploring higher-dimensional or hybrid chaotic models to further enhance encryption strength.
Data availability
The datasets used and/or analysed during the current study available from the corresponding author on reasonable request.
References
Kocarev, L. & Jakimoski, G. Logistic maps as a block encryption algorithm. Phys. Lett. A. 289, 199–206 (2001).
Wong, K. W. A fast chaotic cryptographic scheme with dynamic lookup table. Phys. Lett. A. 298, 238–242 (2002).
Pareek, N. K., Patidar, V. & Sud, K. Image encryption using chaotic logistic maps. Image Vis. Comput. 24 (9), 926–934 (2006).
Wei, J., Liao, X., Wong, K. & Xiang, T. A new chaotic cryptosystem. Chaos Solitons Fractals. 30, 1143–1152 (2006).
Yang, H., Lia, X., wo Wong, K., Zhang, W. & Wei, P. A new cryptosystem based on chaotic map and operations algebraic. Accepted by Chaos, Solitons and Fractals, (in the press).
Wang, X., Qing & Yu A block encryption algorithm based on dynamic sequences of multiple chaotic systems. Commun. Nonlinear Sci. Numer. Simul. 14 (2), 574–581 https://doi.org/10.1016/j.cnsns.2007.10.011 (2009).
Pastor, G., Romera, M. & Montoya, F. A revision of the Lyapunov exponent in 1D quadratic maps. Phys. D. 107, 17–22 (1997).
Shahna, K. U. & Anuj, M. A novel image encryption scheme using both pixel level and bit level permutation with chaotic map. Appl. Soft Comput. 90, 106162 (2020).
Huiqing, H., Shouzhi, Y. & Ruisong, Y. Image encryption scheme combining a modified Gerchberg–Saxton algorithm with hyper-chaotic system. Soft. Comput. 23, 7045–7053 (2018).
Alvarez, G., Montoya, F., Romera, M. & Pastor, G. Cryptanalysis of a chaotic encryption system. Phys. Lett. A. 276, 191–196 (2000).
Volos, C., Kyprianidis, I. & Stouboulos, I. Text encryption scheme realized with a chaotic pseudo-random bit generator. J. Eng. Technol. Rev. 6 (4), 9–14 (2013).
Es-Sabry, M., El Akkad, N., Merras, M., Saaidi, A. & Satori, K. Grayscale image encryption using shift Bits operations. Int. Conf. Intell. Syst. Comput. https://doi.org/10.1109/ISACV.2018.8354028 (2018).
Es-Sabry, M., El Akkad, N., Merras, M., Saaidi, A. & Satori, K. A new color image encryption algorithm using random number generation and linear functions. Adv. Intell. Syst. Comput. 1076, 581–588 (2020).
Patidar, V., Sud, K. K. & Pareek, N. K. A Pseudo random bit generator based on chaotic logistic map and its statistical testing. Informatica 33 (4), 441–452 (2009).
Kumar, M., Kumar, S., Budhiraja, R., Das, M. K. & Singh, S. A cryptographic model based on logistic map and a 3-D matrix. J. Inform. Secur. Appl. 32, 47–58 (2017).
Wang, A. X. & Gu, S. New chaotic encryption algorithm based on chaotic sequence and plain text. IET Inf. Secur. 8 (3), 213–216 (2014).
Jakimoski, G. & Kocarev, L. Analysis of some recently proposed chaos-based encryption algorithms. Phys. Lett. A. 291 (6), 381–384 (2001).
Elazzaby, F., ElAkkad, N. & Kabbaj, S. Advanced encryption of image based on S-box and chaos 2D (LSMCL). In 1st International Conference on Innovative Research in Applied Science, Engineering and Technology (IRASET). (2020).
Elazzaby, F., ElAkkad, N. & Kabbaj, S. New encryption approach based on Four-Square and zigzag encryption (C4CZ). Adv. Intell. Syst. Comput. 1076, 589–597 (2020).
Touil, H., ElAkkad, N. & Satori, K. Text encryption: Hybrid cryptographic method using vigenere and Hill Ciphers. In International Conference on Intelligent Systems and Computer Vision (ISCV). (2020).
Hu, G. & Li, B. Coupling chaotic system based on unit transform and its applications in image encryption. Sig. Process. 178, 107790 (2021).
Zhou, M. & Wang, C. A novel image encryption scheme based on Conservative hyperchaotic system and closed-loop diffusion between blocks. Sig. Process. 171, 107484 (2020).
Touil, H., Akkad, N. E. & Satori, K. H-rotation: Secure storage and retrieval of passphrases on the authentication process. Int. J. Saf. Secur.Eng. 10 (6), 785–796 (2020).
Touil, H., Akkad, N. E. & Satori, K. ‘Secure and guarantee QoS in a video sequence: A new approach based on TLS protocol to secure data and RTP to ensure real-time exchanges. Int. J. Saf. Secur. Eng. 11, 59–68 ( 2021).
Touil, H., El Akkad, N., Satori, K., Soliman, N. F. & El-Shafai, W. Efficient braille transformation for secure password hashing. IEEE Access (2024).
Elazzaby, F., El Akkad, N., Sabour, K. & Kabbaj, S. An RGB image encryption algorithm based on Clifford attractors with a bilinear transformation. In Proc. Int. Conf. Big Data Internet Things pp. 116–127 (2022).
Sabour, K. H., Kabbaj, S., Elazzaby, F., Akkad, N. E. & A new contribution of image encryption based on chaotic maps and the Z/nZ group. J. Theoret Appl. Inf. Technol., 101, 11, 37–47, Jan. (2023).
Es-Sabry, M., El Akkad, N., Merras, M., Saaidi, A. & Satori, K. A novel text encryption algorithm based on the two-square cipher and Caesar cipher. Commun. Comput. Inf. Sci. 872, 78–88 (2018).
Elazzaby, F., El akkad, N., Sabour, K. H. & kabbaj, S. A new encryption scheme for RGB color images by coupling 4D chaotic laser systems and the Heisenberg group. Multimed Tools Appl. https://doi.org/10.1007/s11042-023-16139-6 (2023).
Elazzaby, F. et al. Color image encryption using a zigzag transformation and sine–cosine maps. Sci. Afr. 22, e01955 (2023).
Khedr, W. A new efficient and configurable image encryption structure for secure transmission. Multimed. Tools Appl. 79, 16797–16821 (2019).
El ogri, O., Karmouni, H., Sayyouri, M. & Qjidaaa, H. A novel image encryption method based on fractional discrete Meixner moments. Opt. Lasers Eng. 137, 106346 (2021).
Singh, N. & Sinha, A. Chaos-based secure communication system using logistic map. Opt. Lasers Eng. 48, 398–404 (2010).
Goumidi, D. E. & Hachouf, F. et Modified confusion-diffusion based satellite image cipher using chaotic standard, logistic and Sine maps. 2010 2ème Atelier européen Sur Le traitement de l’information visuelle (EUVIP), Paris, France.
Zeng, H. & Chen, D. et al. Algorithme de chiffrement d’images basé sur le chaos composé Logistic-Sine. In Conférence internationale 2020 sur l’informatique distribuée cybernétique et la découverte des connaissances (CyberC), Chongqing, Chine pp. 120–123 (2020).
Kiran, P. & Parameshachari, B. D. et al. Logistic Sine map (LSM) based partial image encryption. In 2021 National Computing Colleges Conference (NCCC), Taif, Arabie Saoudite pp. 1–6 (2021).
Elazzaby, F., Elakkad, N. & Sabour, K. The coupling of a multiplicative group and the theory of chaos in the encryptions of images. Int. Arab. J. Inform. Technol. 21 (1), 1–16 (2024).
Es-Sabry, M., El Akkad, N., Merras, M., Saaidi, A. & Satori, K. A new color image encryption algorithm using multiple chaotic maps with the intersecting planes method. Sci. Afr. 16 (2022).
Es-sabry, M. et al. Rajkumar Singh Rathore,An efficient 32-bit color image encryption technique using multiple chaotic maps and advanced ciphers,Egyptian. Inf. J. Volume. 25, https://doi.org/10.1016/j.eij.2024.100449 (2024).
Alexan, W. & Megalli, Y. A new fast high dimensional and memristive hyperchaotic multiple image encryption method and its FPGA implementation. Discov Electron. 2, 75. https://doi.org/10.1007/s44291-025-00116-4 (2025).
Alexan, W. et al. A secure and efficient image encryption scheme based on chaotic systems and nonlinear transformations. Sci. Rep. 15, 31246. https://doi.org/10.1038/s41598-025-15794-z (2025).
Moysis, L. et al. Exploiting Circular Shifts for Efficient Chaotic Image Encryption. In IEEE Access 13, 92997–93016, https://ieeexplore.ieee.org/document/11009169 (2025).
Alexan, W., Hosny, K. & Gabr, M. A new fast multiple color image encryption algorithm. Cluster Comput. 28, 325. https://doi.org/10.1007/s10586-024-04919-0 (2025).
Alexan, W. et al. A new multiple image encryption algorithm using hyperchaotic systems, SVD, and modified RC5. Sci. Rep. 15, 9775. https://doi.org/10.1038/s41598-025-92065-x (2025).
Wang, X. & Liu, L. Yingqian Zhang,A novel chaotic block image encryption algorithm based on dynamic random growth technique. Opt. Lasers Eng. Volume. 66, 10–18 (2015).
Es-Sabry, M. et al. Securing Images Using High. Dimensional Chaotic Maps DNA Encoding Techniques IEEE Access., 11, 100856–100878, (2023).
El-Hajj, M., Mousawi, H. & Fadlallah, A. Analysis of lightweight cryptographic algorithms on IoT hardware platform. Future Internet. 15 (2), 54 (2023).
Chai, X. et al. Color image compression and encryption scheme based on compressive sensing and double random encryption strategy. Signal Process. 176 107684. (2020).
Xuejing, K. & Zihui, G. A new color image encryption scheme based on DNA encoding and Spatiotemporal chaotic system, signal process. Image Commun. 80, 115670 (2020).
Koulouh, F., Safae, A., Es-Sabry, M., Mostafa, M. & Elakkad, N. Optimization of Grayscale Image Security through the use of Hybrid Cryptographic Techniques based on Sine and Logistics Maps, 2024 4th International Conference on Innovative Research in Applied Science, Engineering and Technology (IRASET), FEZ, Morocco, pp. 1–7, (2024).
Kolouh, F., Amine, S., Es-sabry, M. & Akkad, E. L. N. Enhancing data security through hybrid cryptographic techniques: XOR and RSA integration for RGB image encryption. In Digital Technologies and Applications. ICDTA 2024. Lecture Notes in Networks and Systems. (eds Motahhir, S. & Bossoufi, B.) vol 1099. https://doi.org/10.1007/978-3-031-68653-5_13 (Springer, 2024).
Amine, S., Koulouh, F., Es-sabry, M. & Akkad, N. E. Image Confidentiality through 1D Chaotic Map Integration and Shift Operation, In 2024 International Conference on Circuit, Systems and Communication (ICCSC), Fes, Morocco pp. 1–7. https://doi.org/10.1007/s11224-022-02056-1 (2024).
Amine, S., Koulouh, F., Es-sabry, M. & akkad, E. N. Securing visual data: A fresh approach with Arnold Cat map and Chebyshev map encryption. In: (eds Motahhir, S. & Bossoufi, B.) Digital Technologies and Applications. ICDTA 2024. Lecture Notes in Networks and Systems, vol 1099. Springer, Cham. https://doi.org/10.1007/978-3-031-68653-5_27. (2024).
Folifack Signing, V. R., Fozin Fonzin, T., Kountchou, M., Kengne, J. & Njitacke, Z. T. Chaotic jerk system with hump structure for text and image encryption using DNA coding. Circuits Syst. Signal. Process. 40, 4370–4406 (2021).
Benssalah, M., Rhaskali, Y. & Drouiche, K. An efficient image encryption scheme for TMIS based on elliptic curve integrated encryption and linear cryptography. Multimed Tools Appl. 80, 2081–2107 (2021).
Shyamalendu Kandar, D., Chaudhuri, A. & Bhattacharjee Bibhas Chandra Dhara,Image encryption using sequence generated by Cyclic group. J. Inform. Secur. Appl. Volume. 44, 117–129 (2019).
Faragallah, O. et al. Soh B.Block-Based optical color image encryption based on double random phase encoding. IEEE Access 7, 4184–4194 (2019).
Arif, J. et al. Al-Dubai, a novel chaotic permutation-substitution image encryption scheme based on logistic map and random substitution. IEEE Access. 10, 12966–12982 (2022).
Wu, Y., Noonan, J. & Agaian, S. NPCR and UACI randomness tests for image Encryption,Cyber journals: multidisciplinary journals in science and technology. J. Sel. Areas Telecommunications. 1 (2), 31–38 (2011).
Chen, J., Tang, J., Zhang, F., Ni, H. & Tang, Y. a novel digital color image encryption algorithm based on A new 4-D hyper-chaotic system and an improvedS-box. Int. J. Innov. Comput. Inf. Control. 18 (1), 73–92 (2022).
Acknowledgements
The authors would like to thank the Deanship of Postgraduate Studies and Scientific Research at Majmaah University, Saudi Arabia, for supporting this work under Project Number R-2025-2222. The authors specially acknowledge the Automated Systems and Computing Lab (ASCL) at Prince Sultan University, Riyadh, Saudi Arabia. In addition, the authors wish to thank Prince Sultan University, Riyadh, Saudi Arabia, for their support.
Funding
The authors would like to thank the Deanship of Postgraduate Studies and Scientific Research at Majmaah University, Saudi Arabia, for supporting this work under Project Number R-2025-2222.
Author information
Authors and Affiliations
Contributions
Fatima KOULOUH was responsible for the conceptualization of the study, developing the methodology, and preparing the original manuscript draft. Safae AMINE significantly contributed to methodology refinement, provided technical supervision, and critically reviewed and revised the manuscript. Mohammed ES-SABRY contributed to data analysis, validation, and participated in manuscript review and editing. Nabil EL AKKAD was involved in dataset curation, validation of experimental results, and manuscript review. Ahmed I. Shahin was involved in dataset curation, validation of experimental results, and manuscript review. Walid El-Shafai managed project administration, supervised the research process, performed the final editing, and acted as the corresponding author.
Corresponding authors
Ethics declarations
Competing interests
The authors declare no competing interests.
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License, which permits any non-commercial use, sharing, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if you modified the licensed material. You do not have permission under this licence to share adapted material derived from this article or parts of it. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by-nc-nd/4.0/.
About this article
Cite this article
Koulouh, F., Amine, S., Es-Sabry, M. et al. Optimizing color image security using hybrid cryptographic techniques based on sine and logistic maps. Sci Rep 16, 3324 (2026). https://doi.org/10.1038/s41598-025-33319-6
Received:
Accepted:
Published:
Version of record:
DOI: https://doi.org/10.1038/s41598-025-33319-6














