Abstract
This paper proposes an innovative image encryption scheme exploiting the chaotic nature of a four-dimensional chaotic system and the computational capability of Langton’s Ant cellular automaton. Traditional three-dimensional chaotic systems often have restricted key space and limited complexity, making them vulnerable to cryptanalysis. To address these limitations, the proposed scheme integrates multi-layered transformations, including chaotic diffusion, symbolic encoding, and dynamic keystream generation. Comprehensive security analyses demonstrate that the proposed scheme achieves near-optimal results, including a large key space of approximately 1\(10^{840}\), high entropy (7.9977), and excellent differential attack resistance indicated by NPCR ( 99.61%) and UACI ( 33.44%) metrics. The proposed method effectively disrupts pixel correlations, providing robust protection against various cryptographic threats. These results confirm that our encryption approach offers a secure, efficient, and practical solution for protecting multimedia data in modern digital communication systems.
Similar content being viewed by others
Introduction
Cryptography is one of the cornerstones behind modern digital security, covering confidentiality, integrity, and authenticity of data in today’s increasingly connected world1,2. Be it safeguarding online financial transactions3 or enabling private communications, cryptographic systems find indispensable applications in both civilian and military worlds4.
The exponential growth in digital communication technologies has made the transmission of multimedia data an indispensable part of modern life. While such growth in digital communication technologies has raised the need for robust mechanisms of data security, especially in image encryption, the uniqueness of images as compared to text is their high redundancy, bulk size, and strong correlation between adjacent pixels. These features make it impossible for standard cryptographic algorithms5,6, which usually are developed to fit text data, to efficiently meet the challenges laid down by them. This makes the development of image data-specific encryption algorithms an important current priority in information security research.
Chaotic systems have come out to be promising ground for developing secure cryptographic algorithms7. Chaotic systems possess all the properties required for getting secure encryption, such as sensitivity to initial conditions, randomness that is deterministic, and unpredictability for long terms. Various works have taken advantage of the capabilities of low-dimensional chaotic maps for generating pseudo-random sequences; these include logistic maps, tent maps, and sine maps. But usually, those low-dimensional mapping functions suffer from some drawbacks on the limited key space and less complexity, so that it can be vulnerable under various kinds of attack. The use of higher-order chaotic systems considers providing higher-order complexity with large key space and thus security8.
Another fascinating attack, much less intuitively computational in nature, is a variety of a simple but powerful cellular automaton and has been to do with Langton’s Ant - a variant of a two-dimensional Turing machine. Toughi et al. proposed an image encryption scheme that combined elliptic curve pseudo-random sequences with AES to enhance security and computational efficiency9. In the respective grid, it acts to modify its state according to the direction changes dictated by the deterministic instructions followed by the Langton ant. Being so naive, after several moves, it weaves a fairly complicated pattern thus objectifying computational one-way processes. This property makes it the right candidate for scrambling images and confusing processes. Also, when combined with chaotic systems, Langton’s Ant can further extend this cryptographic strength by adding even more layers of unpredictability and hence complexity.
Nowadays, image encryption finds a wide range of applications in various fields of interest, including secure communications, medical imaging, and military operations. In recent years, a number of techniques have been developed to meet the demand for secure, efficient, and robust methods of encryption. Chaos-based systems, parallel processing, and innovative key management strategies have significantly enhanced this field. This increases the requirement for strong image encryption techniques in order to maintain privacy, with an ever-growing dependency on digital communication and multi-media applications. Encryption transforms the plain images into some coded forms that enable only the authorized to decrypt them. There are, however, problems in managing the big size of the image data and special features, such as pixel correlations and redundancies, theoretically applicable in classical text-based traditional methods. The main propelling factors to develop the particular encryption technique in respect of an image are that different methodologies will find difficulties in providing all-round efficient performances in different types.
In order to reduce computational complexity, the Chaotic Dynamical State Variables Selection Procedure developed by Bashir et al. is adopted to select Chaotic Dynamical State Variables Selection Procedure (CDSVSP). More precisely, for encrypting a color image of size, more than chaotic variables in each encryption process should be used for maintaining high security10. Malik et al. presented a color image encryption algorithm based on the hyperchaotic systems and DNA computing for strong encryption11.
Man et al. proposed a double-image encryption algorithm based on convolutional neural networks and dynamic adaptive diffusion12. Chaos maps are used in the initial conditions, while CNN-generated chaotic pointers for scrambling have been utilized in the proposed scheme, which enhances its robustness against various plaintext attacks. Mirzaei et al. proposed a parallel sub-image encryption method that decomposes the plain image into four sub-images. To address computational challenges, researchers have focused on parallel processing and low-complexity designs13. Chen et al. presented a fast chaos-based image encryption scheme using a dynamic state variables selection mechanism for enhanced performance14. Wang et al. presented a parallel image encryption algorithm which used a cyclic shift and sorting together for permutation along with a new kind of parallel diffusion method15. Zhou et al. proposed a novel bitplane-based encryption algorithm in which key bitplanes could be selected by the users for encryption16. Fu et al. had proposed a chaos-based digital image encryption scheme based on an enhanced diffusion strategy, which provides greater security levels17. However, it cannot be said to be secure because frequency analysis attacks were not considered.
Zhang and Xiao presented a rotation grid and block distribution method for increasing the randomness of pixels in encrypted images18. Rhouma et al. proposed a piecewise linear chaotic map for improving robustness in image encryption by transforming vectors uniquely19. Van Droogenbroeck and Benedett proposed selective encryption for the significant bit planes that can ensure efficiency with acceptable visual corruption20. Wang et al. proposed the chaos-based image encryption algorithm with variable control parameters, which can enhance encryption adaptability and robustness21. Sinha and Singh proposed the 3-D jigsaw transformation with a fractional Fourier transformation for robust encryption in frequency-domain22. Ramakrishna et al. presented an elliptic curve cryptography-based secure and authenticated image encryption scheme that assures confidentiality and authentication23. El-Latif et al. worked on the passive approach of the detection of image splicing based on the deep learning-wavelet transforms24. Ye et al. proposed a new double image encryption framework that contains compressive sensing and elliptic curve cryptography to offer both higher data reduction and security25. Abuturab presented a color information security system based on DCT in the gyrator transform domain with radial-Hilbert phase encoding26. Hu et al. proposed a chaotic image cryptosystem using DNA deletion and insertion operations to enhance the complexity of encryption27. Taneja et al. integrated spatial wavelets and Arnold Cat transformations for partial encryption of critical image components28. Norouzi and Mirzakuchaki came up with the image encryption algorithm based on DNA sequence operations along with a cellular neural network, whereby the security for encryption was improved accordingly29. Patidar et al. proposed a robust and secure image encryption scheme based on chaotic standard maps,30.
Recent advances in image encryption prove a significant trend toward chaos-based techniques. Liu et al. introduced various schemes that exploit chaotic maps, dynamic S-box constructions, and cipher feedback mechanisms to enhance security in color image encryption31,32,33,34. Feng et al. further extended these ideas by proposing multi-image encryption methods and secure transmission schemes leveraging hyperchaotic systems and fractional-order dynamics35,36,37,38. In parallel, Alexan and co-authors integrated unconventional techniques such as DNA coding and cellular automata, expanding the design space for secure image cryptosystems39,40,41,42,43.
Complementing these encryption schemes, research on noncommutative cryptosystems has broadened the theoretical foundation of secure communications44,45,46. Moreover, critical cryptanalysis of chaos-based encryption schemes has identified vulnerabilities and motivated the development of more robust methods47,48. Recent works continue to refine these approaches by addressing emerging challenges in both image encryption and secure key exchange49,50,51,52,53.
Yang and Kim proposed a 3D phase encoding scheme for the security of the biometric images by using holographic interference patterns54. Bashir et al. proposed a 4D chaos-based encryption mechanism that used dynamic state variable selection for pixel-level confusion and diffusion55. Mastan et al. proposed hybrid encryption using discrete wavelet transforms and chaotic systems for secure storage of multimedia56. A new layer-based image encryption framework was put forward by Rad et al., which incorporates multiple efficient encryption algorithms and provides variable security for image blocks concerning their significance to balance the computational cost-security ratio57. Experimental analyses demonstrated improved metrics of entropy and correlation with no increase in computational time. Su et al. proposed a model dealing with 3D space permutation and diffusion and incorporating DNA coding for improved sensitivity in encryption58.
In this paper, we introduce the new image encryption scheme using a four-dimensional chaotic system and Langton’s Ant cellular automaton. The proposed encryption technique ensures security on multiple layers through both the transformation and permutation/diffusion processes. Our algorithm achieves a ciphertext with very high entropy and eliminates pixel correlations, making the proposed algorithm resistance against various kinds of cryptographic attacks. Several intensive simulations were performed to confirm that our method provides high diffusion, sensitivity to the initial conditions, statistical, and differential attack resistance. The mathematical basis, algorithm design, implementation, and full security analysis are given in the following sections, followed by the discussion of experimental results and comparative evaluation. Our choice of a four-dimensional (4D) chaotic system in our encryption algorithm is motivated by its intrinsic advantages over traditional three-dimensional (3D) chaotic systems such as Lorenz or Chen systems. Specifically, 4D chaotic systems provide much wider key spaces, which lead to a high resistance to brute-force attacks. Moreover, with more dimensions comes hyperchaotic behavior, with a higher complexity and richer dynamics and more initial-condition sensitivities, making the algorithm more secure against cryptanalytic attacks. This added complexity also ensures improved diffusion and confusion properties, which are essential in efficiently securing image data against statistical and differential attacks. The remainder of this paper is organized as follows: Section “Preliminaries” provides essential preliminaries, detailing the foundational concepts of the four-dimensional chaotic system, the chaotic tent map, and the cellular automaton dynamics employed. Section “Proposed encryption scheme” describes our proposed encryption methodology, including preprocessing steps, keystream generation, and the multi-stage encryption process. Section “Simulation” discusses the theoretical merits of our proposed method, emphasizing its complexity and cryptographic advantages. In “Discussion”, extensive simulation results and experimental validations are presented, while “Security analysis“ offers comprehensive security analyses addressing resistance to brute-force, statistical, and cryptanalytic attacks. Finally, “Conclusion” concludes the paper, summarizing key findings and proposing directions for future research.
The images used in the paper are available in the USC-SIPI Image Database, which can be accessed online at http://sipi.usc.edu/databas (Weber, A. G. (2006). The USC-SIPI image database: Version 5. http://sipi.usc.edu/database/).
Preliminaries
The proposed image encryption scheme will be based on some foundational concepts and techniques reviewed in this section, presenting the four-dimensional chaotic system, Langton’s Ant cellular automaton, and cryptographic operations of permutation, confusion, and diffusion. In fact, they are the core of the encryption algorithm that ensures security due to its inherent randomness and complexity.
Four-dimensional chaotic system
Chaotic systems are mathematical models that have deterministic behaviors, but with sensitive dependence on initial conditions. The intrinsic unpredictability and ergodic properties of chaotic systems make them very suitable for cryptographic applications, especially in pseudo-random sequence generation and key management. In this paper, we will use a four-dimensional chaotic system introduced by Yong and Yun-Qing59, described by the following equations
Here, \(y_1, y_2, y_3, y_4\) are state variables, and \(p, q, r, s, c_1, c_2, c_3, c_4\) are system parameters that govern the system’s dynamics. These equations, implemented in MATLAB, generate a high-dimensional chaotic sequence with increased complexity compared to traditional low-dimensional systems. Figure 1 shows the chaotic behavior of the attractors the four dimensional chaotic dynamical system.
This sequence is used for generating keys, pixel permutation, and driving the dynamic rules of Langton’s Ant.
Chaotic tent map
The tent map is a piecewise-defined chaotic function that has been used to generate random data in several chaos-based applications, including image encryption schemes. The form of the tent map used is defined as60
where \(\eta\) and \(u\) are parameters controlling the map’s behavior. \(v\) is the current state variable, constrained within the range \([0, \eta ]\). \(u \in (0, \eta )\), and it is an integer.
Chaotic dynamical state variables selection procedure
The most relevant factors in ensuring cryptographic strength of the proposed encryption scheme are the selection and utilisation of chaotic state variables. The sequences generated by the chaotic system, described by four-dimensional differential equations, have all properties of high sensitivity for initial conditions, deterministic randomness, and long-term unpredictability. Following, this section provides in detail the methodology adopted to choose the state variables of chaos efficiently, inspired by the CDSVSP presented in related works.
Selection procedure
To efficiently utilize chaotic data and reduce computational overhead, we adapt the CDSVSP procedure as follows
Generate Chaotic Data: The chaotic system is iterated for \(n_0 + \frac{MN}{4}\) steps (with \(n_0 \ge 100\)) to ensure the initial transients are eliminated. Here, \(M \times N\) is the total number of pixels in the input image.
Define the State Set: At each iteration, the system produces four state variables, \(\{X, Y, Z, W\}\). A one-dimensional array of pixel values \(P = \{P(0), P(1), \dots , P(MN-1)\}\) is used to map these states.
Selection Mechanism: For each pixel \(P(i)\), a dynamic indicator determines the selected variable \(S(i)\) from the state set. The indicator, \(index~(i)\), is calculated as
where the tent map introduces randomness, and \(u, \eta\) are secret parameters contributing to the key.
State Update: Based on \(index~(i)\), the chaotic system’s state set is updated as
Langton’s ant cellular automaton
In addition to the ongoing chaotic dynamics provided by the four-dimensional system, Langton’s Ant is incorporated into the encryption scheme to add another layer of symbolic transformation. While the overall purpose of the chaotic system is to generate complex, high-dimensional sequences, Langton’s Ant operates on the basis of a set of certain rules that, when iteratively applied, lead to highly non-linear and unpredictable symbolic patterns. This discrete, rule-based process enhances the confusion and diffusion properties of the scheme. In effect, the incorporation of Langton’s Ant complements the continuous chaos by making even minor changes to the input lead to highly different symbolic outputs. Rather than simply adding to the chaotic nature, the inclusion of Langton’s Ant greatly improves the overall security of the encryption process by combining the benefits of continuous and discrete chaotic systems. Langton’s Ant has the reputation of being among the most chaotic and dynamic cellular automaton. Because its movements are determined though well-nigh unpredictable, this automaton will create new ways of inserting confusion and diffusion into the scheme for encryption. The rule-based mapping of pixel values, which is dynamic in nature, thus helps to incorporate additional security and robustness within the algorithm through the use of Langton’s Ant.
Langton’s Ant is a two-dimensional Turing machine that moves on a grid according to simple rules. It is defined by
States: Each cell in the grid is either black or white.
Rules about Movement:
-
1.
If the ant stands on a white cell, which changes color to black before moving forward by one step \(90^{\circ }\) to the right.
-
2.
If the ant is on a black cell, it rotates 90\(^{\circ }\) left, then changes the color of that cell to white and moves.
Langton’s ant rule
The conceptual framework of the Langton’s Ant represents this process of encryption in which the pixel data gets encoded and manipulated symbolically. To be specific, mapping pixel values into sequences of ‘L’ and ‘R’ characters relies on rules dependent on chaotic systems and key parameters.
Mapping Decimal to Ant Rules: Each pixel value - an 8-bit decimal number between 0 and 255 is first converted to its binary representation and then mapped to sequences of ‘L’ and ‘R’. This mapping depends on a rule number, which is derived from a chaotic keystream or another key-dependent mechanism. Rule number generation, For each pixel index \(i\), the rule number is computed as
where \(l_1(i)\) is a key stream value generated using the chaotic data.
Figure 2 shows the Langton’s ant after 100,000 steps. After some time, the Langton’s Ant starts to develop chaotic behavior in the form of unpredictable paths and complex patterns.
Binary to Ant Rule Mapping For each rule \(r(i)\), the mapping of binary pairs to ‘L’/‘R’ is defined in Table 1.
For each pixel, convert the decimal pixel value into an 8-bit binary string. The binary string is divided into four 2-bit pairs. Each pair is mapped to ‘L’ or ‘R’ based on the rule number chosen. For example, for 156 as the pixel value and for rule number 3, binary ‘10011100’, pairs ‘10, 01, 11, 00.’ Mapping as per Rule 3: \(10 \rightarrow R, 01 \rightarrow L, 11 \rightarrow R, 00 \rightarrow L.\) The resultant ant rule sequence is RLRL.
After the decimal-to-ant conversion, antrule sequences are diffused by symbolic operations. Three major operations are defined. Ant XOR applies a symbolic XOR operation on two ant-rule sequences \(A\) and \(B\). Each corresponding character in \(A\) and \(B\) is combined as
Ant addition combines two sequences bitwise modulo 2,
Ant subtraction performs the usual subtraction modulo 2,
This all ensures that ant-rule sequences do not become non-linearly mixed across channels.
Proposed encryption scheme
In this section, we present the detailed methodology of the Proposed Image Encryption Scheme (PIES), which effectively integrates a four-dimensional chaotic system and a cellular automaton to ensure high security. To enhance readability and clarity, we have structured the encryption process into distinct, clearly defined steps, preprocessing and initial chaotic data generation, chaotic keystream generation, pixel permutation, symbolic-level encoding using cellular automaton rules, multi-stage diffusion (both decimal and symbolic), and reconstruction of the encrypted cipher image. Utilizing these multi-level transformations-decimal-level diffusion, chaotic permutation, and symbolic representation using cellular automata-our scheme of encryption significantly enhances the resilience to security, with outstanding resistance to statistical, differential, and brute-force attacks. A simple flowchart have also been provided to describe these steps of the encryption to make it more readable and reproducible.
Preprocessing and chaotic data generation
Given a \(M \times N\) colour image with Red (R), Green (G) and Blue (B) channels, each channel converts to a one-dimensional vector of length \(MN\). Denote these vectors by
Initialize a 4D chaotic system with secret keys \((x_0, y_0, z_0, w_0)\). Numerically integrate this system for \((MN)/4 + n_0\) iterations, where \(n_0 \ge 200\). This produces a set of chaotic values
where each \(D_i\) is a vector of chaotic values for each dimension in the system, these will serve as sources of randomness for subsequent processes.
Key stream generation procedure
The proposed image encryption algorithm will generate secure and random key streams using a Key Stream Generation Procedure (KSGP) based on the chaotic system and Langton’s Ant dynamics. KSGP will ensure that very small changes in initial conditions or input data generate completely different key streams, hence enhancing cryptographic strength. The keystream generation utilizes the chaotic sequences generated by a four-dimensional chaotic system with secret parameters \(x_0, y_0, z_0, w_0\). The red, green, and blue pixel channels of the input image (\(RC, GC, BC\)) are first unraveled into one-dimensional arrays of size \(MN\). These are further combined into a single array \(S\) using a linear combination with secret integer coefficients \(\sigma _1, \sigma _2, \sigma _3\) as
That gives, for every index of a pixel, the following key-dependent chaotic map is used in order to calculate the selection state ss
Nonlinear transformations are dictated by the tent map. According to \(ss\), each of the four chaotic series chose the respective counter \(n_1, n_2, n_3, n_4\). Then, the chaotic value \(st(i)\) is selected from the selected sequence using
Then, the fractional part of this chaotic value is extracted, multiplied by \(10^{15}\), and then reduced modulo 256 using
to generate an 8-bit keystream value. The above-mentioned process is iteratively done for each MN pixel in order to prepare a keystream array \(K={K(0),K(1),\dots ,K(MN-1)}\) to perform pixel-level encryption in a totally secure manner. High key sensitivity and sensitivity on the initial conditions ensures resistance from any kind of cryptanalysis attack. Figure 3 shown the key stream generation procedure.
Encryption steps
This encryption scheme follows a series of transformations that will result in robust security due to the combination of chaotic keys, dynamic rule-based mapping, and operations from Langton’s Ant. The transformation, therefore, assures heavy confusion and diffusion of pixel values. The detailed steps for encryption are given as follows.
Step 1: Initial Decimal Diffusion
First step - mix of pixel values from input channels (\(RC, GC, BC\)) with chaotic keystreams and constants for good initial diffusion. For each pixel at index \(i\),
1. For \(i = 0\)
2. For \(i > 0\)
This process introduces chained dependencies between pixel values and chaotic keys, amplifying the diffusion effect.
Output: Arrays \(RC_{1}, GC_{1}, BC_{1}\).
Step 2: Permutation of Pixels
To disrupt the spatial correlations in the image, permutation is applied
1. Combine \(RC_{1}, GC_{1}, BC_{1}\) into a single array \(T\) of size \(3MN\)
2. Use a chaotic tent map to compute a permutation vector \(\sigma\) based on chaotic keys. Reorder the indices of \(T\) according to \(\sigma\)
3. Split \(T'\) back into three separate arrays
Output: Arrays \(RC_{2}, GC_{2}, BC_{2}\).
Step 3: Symbolic (Ant-Rule) Encoding and Diffusion
1. Decimal-to-Symbolic Conversion: Each pixel in \(RC_{2}, GC_{2}, BC_{2}\) is mapped to Langton’s Ant movement sequences (\(`L'\) for left, \(`R'\) for right). The mapping is determined by chaotic keys, which select a dynamic rule for encoding
Similar conversions are applied to \(GC_{2}\) and \(BC_{2}\).
2. Ant-Rule Level Diffusion: The symbolic arrays \(RC_{3}, GC_{3}, BC_{3}\) are diffused by applying symbolic operations. These operations are analogous to binary XOR, addition, and subtraction, but they act on sequences of \(`L'\) and \(`'\). For each pixel: - Select an operation type based on chaotic keys. - Combine symbolic sequences from one channel with another to generate a new, diffused sequence.
Output: Symbolic arrays \(RC_{3}, GC_{3}, BC_{3}\).
Step 4: Symbolic-to-Decimal Re-Conversion
The symbolic sequences from the previous step are mapped back into decimal pixel values. The reconversion uses chaotic keys to determine the mapping for each sequence
and similarly for \(GC_{3}\) and \(BC_{3}\).
Output: Arrays \(RC_{4}, GC_{4}, BC_{4}\).
Step 5: Final Decimal Diffusion
A final diffusion step is applied to the arrays \(RC_{4}, GC_{4}, BC_{4}\) to further mix the pixel values. This step is similar to the initial decimal diffusion but uses transformed pixel values
Output: Arrays \(RC_{5}, GC_{5}, BC_{5}\).
Step 6: Cipher Image Reconstruction
Finally, the arrays \(RC_{5}, GC_{5}, BC_{5}\) are reshaped into their original \(M \times N\) dimensions
The channels are stacked to produce the encrypted image
Output: The final encrypted image \(I_{cipher}\).
The flow chart of encryption procedure is shown in Fig. 4.
Simulation
The proposed encryption scheme has been coded and compiled using MATLAB R2020a running on Microsoft Windows 11 Home (64-bit, Version 10.0.26100), powered by an AMD Ryzen 9 8945HS processor with integrated Radeon 780M graphics (Firmware version M5406UA.310, released on 2024-10-24) and 16GB of RAM. In the domain of image cryptography, robust security and resistance against common attacks are very important challenges. Chosen plaintext/ciphertext attack, statistical attack, differential attack, brute force attack, and so on pose serious challenges in the design of secure encryption algorithms. Therefore, the main objective of any encryption technique is to show resilience against these types of threats while maintaining computational efficiency.
In order to assess the performance and security of the proposed encryption algorithm, several color images from the USC-SIPI Image Database are considered. The images used include ‘Lena,’ ‘Beans,’ and ‘Peppers,’. These are all resized to a standard resolution of \(256\times 256\) pixels. All the simulations have been carried out in MATLAB R2023a using double-precision computations as per the IEEE 754 standard for numerical accuracy.
In order to simulate the proposed encryption algorithm, initial values and system parameters are selected for the four-dimensional chaotic system as \(x_0 = 19, \, y_0 = 37, \, z_0 = 113, \, w_0 = 12, \, p = -7, \, q = 3, \, r = -1.2, \, s = -2, \, c_1 = 2, \, c_2 = -1, \, c_3 = 1, \, c_4 = 1.\) Great care has been taken in choosing the step size for solving the chaotic system to be small enough to provide numerical stability and avoid any unwanted chaotic degradation during simulations.
Each of the test images shown in Fig. 5a was then applied with the encryption process and correspondingly encrypted and decrypted images were obtained. Figure 5b results show that the encryption process completely destroyed the visual structure of the original images for the sake of confidentiality. The decrypted images shown in Fig. 5c are perfectly reconstructed with the use of correct secret keys, which validates the reversibility and accuracy of the algorithm. Any slight modification in the initial keys leads to a failure in decryption, showing that the proposed method is highly sensitive to the key.
Discussion
The proposed image encryption algorithm provides a fresh and robust approach toward image security with a four-dimensional chaotic system in conjunction with Langton’s Ant cellular automaton. In fact, inherent sensitivity of initial conditions and unpredictability are exclusive characteristics of chaos that may combine with the complex and, at the same time, deterministic behavior of Langton’s Ant to enhance processes for confusion and diffusion towards attaining high-level security that is resistant to any sort of cryptanalytic attack.
The use of a four-dimensional chaotic system significantly increases the algorithm’s complexity, compared to traditional low-dimensional chaotic models. This provides a large key space and high sensitivity to initial conditions, making it highly resistant against brute-force attacks. Chaotic systems drive the permutation and diffusion by pseudo-random sequences, hence the generated outputs are completely different even for small changes in the initial parameters. This sensitivity is one of the most important features for preventing chosen-plaintext and known-plaintext attacks.
This ant cellular automaton improves symbolic-level operation in the whole process of encryption. In image encryption, the pixel value is changed into ant sequences of rules ‘L’ and ‘R’ via algorithms. It essentially just adds another layer of difficulty - obfuscation. These ensure strong randomness and uniformity of the encrypted image, symbolic diffusions such as Ant XOR, addition, and subtraction. These symbolic operations disrupt the statistical pattern to avoid statistical and differential attacks.
It provides strong security without sacrificing computational efficiency. Fast key generation and dynamic pixel mapping can be achieved based on the mathematical properties of the chaotic system. The tent map provides randomness for pixel permutation and the selection of rule numbers with low computational complexity. Besides, the algorithm works on RGB channels independently, which allows parallelism and is very useful for real-time encryption applications.
Diffusion and confusion are multi-layered processes that hide the spatial relationship of an image, achieved by decimal-level and symbolic-level transformations, respectively. This can also be represented from the uniform histogram and low correlation between adjacent pixels in the encrypted image. These features point to the robustness of the algorithm for the maintenance of image confidentiality with the guarantee of efficient execution.
Security analysis
The basic requirements of the field of image cryptography are to provide high security and be resistant to various common attacks. These may be different types of cryptanalytic attacks, such as a chosen plaintext/ciphertext attack, statistical attack, differential attack, brute force attack, and others, that have to be faced by a secure design of encryption algorithms. Thus, any encryption technique must try to resist all such threats while being computationally efficient.
Key space analysis
Key space analysis is concerned with the total number of unique keys available within the encryption scheme to make it resistant against any brute-force attack. In the proposed algorithm, keys have been generated from different components, namely the CDS, KSGP, and certain values for the decimal diffusion and conversion stages. The total key space can be computed based on the number of keys in each category and their precision.
The proposed encryption scheme will use 56 keys divided into the four main components that include the chaotic dynamical system (CDS), the key stream generation procedure, decimal diffusion, and decimal conversion. Here, the CDS with initial conditions and parameters may be represented as \(x_0, y_0, z_0, w_0, c_1, c_2, c_3, c_4\) comprises 8 keys. KSGP adds 42 keys, each iteration requires 6 parameters \(\kappa _i, \lambda _i, \mu _i, \nu _i, \varrho _i, S_i(-1) \quad \text {for} \quad i \in \{1, 2, \dots , 7\}.\) Decimal diffusion and decimal conversion stages introduce each 3 keys obtained from initial and final pixel values of red, green, and blue channels \(RC_{1}(-1), GC_{1}(-1), BC_{1}(-1) \quad \text {and} \quad RC_{5}(-1), GC_{5}(-1), BC_{5}(-1),\) respectively. Each key is represented as a double-precision floating-point number, giving approximately \(10^{15}\) possible values per key.
For each category, the total key space is computed as \(10^{15}\) raised to the number of keys in that category. Considering CDS, with 8 keys, the key space is \(10^{120}\). KSGP, with 42 keys, contributes \(10^{630}\). Decimal diffusion and decimal conversion, each with 3 keys, contribute \(10^{48}\) each. Merging these together, the total key space is given by \(10^{120} \times 10^{630} \times 10^{45} \times 10^{45} = 10^{840}\), see Table 2. This enormous key space far exceeds that required by modern cryptographic standards and provides the algorithm with resistance against brute-force attack.
Table 3 compares key space of the proposed method with some other available algorithms. It is clear and obvious that the key space of proposed image encryption algorithm is much superior to others.
Sensitivity to secret key
Key sensitivity is one of the important properties of all encrypting algorithms, which essentially means that even a little change in the key will vastly alter the encrypted output. This property makes attacks impossible, wherein an attacker would take advantage of slight key variations to get clues for cryptographic analysis. In order to test the key sensitivity of the presented image encryption algorithm, a perturbation of \(10^{-14}\) was added to only one key parameter, namely \(y_0\), while keeping the other key parameters \(x_0, ~z_0,~ w_0\) unchanged. The perturbed key can be written as \(y_0'= y_0 + 10^{-14}.\) Original and perturbed keys were used for encrypting eight standard test images Lena, Baboon, Peppers, Tree, House, Beans, F16, and Girl. The two out of two encrypted images resulting from each test image were then compared by using well-known metrics, such as a Number of Pixels Change Rate (NPCR) and Unified Average Changing Intensity(UACI).
Table 4 illustrates the experimental results, which intuitively reflect that the proposed encryption scheme is very sensitive to the key variation. NPCR reflects the percentage of pixel changes between the two encrypted images, and UACI characterizes the mean value of the intensity difference between the two encrypted images. The average values of NPCR for R, G, and B components are 99.6197%, 99.6045%, and 99.6020%, respectively. These results depict that almost all pixel values differed in encrypted images while bringing slight perturbation in the key. Likewise, the average calculated UACI values assessed for red, green and blue channels are 33.4162%, 33.4070% and 33.4826% indicating high level of Pixel intensity differences.
For instance, for Lena, the NPCR values are 99.6582%, 99.6368%, and 99.5926% for the red, green, and blue channels, respectively, while the UACI values are 33.3672%, 33.3832%, and 33.3231%. It can also be said about other images, such as Baboon and Peppers, that maybe the proposed algorithm works well for different picture contents. The results authenticate that even the tiniest variation of a single key parameter, lets the encrypted output be highly unpredictable and uncorrelated. Very high values of NPCR and UACI give testimony to the achieved excellent properties in diffusion and sensitivity that are significant for any effective image encryption technique. This justifies the potential of the proposed algorithm toward full resistance against any differential attacks and other analyses in cryptology.
Avalanche effect
The avalanche effect is a fundamental property of any good cryptographic system: after a slight modification of the plaintext (for example, one bit in the image) or the secret key parameters, a significant change in the ciphertext produced is obtained with unpredictable properties. In other words, changing one bit in either the key or the original image should turn out an entirely different encrypted output. This will ensure that no adversary can deduce any useful structural or statistical information by observing how small variations propagate through the encryption process.
The avalanche effect is an important guarantee against attacks based on the correlation between neighboring image pixels or repeated patterns in image encryption with the proposed 4D hyperchaotic system and Langton’s Ant scrambling. Chaotic systems are sensitive to initial conditions; hence, even minuscule changes in chaotic parameters (such as \(x_{0}, y_{0}, z_{0}, w_{0}\)) result in widely diverging trajectories and a strong avalanche effect.
Table 5 shows the encryption for eight standard test images, Lena, Baboon, Peppers, Tree, House, Beans, F16 and Girl by changing each parameter of chaotic systems by highly infinitesimal changes of \(10^{-13}\) or even \(10^{-14}\) order. Columns from the measure of difference-mostly quantified through metrics like the Number of Pixels Change Rate (NPCR) or a similar indicator-remain around 99-99.6%. In other words, with a tiny variation in one parameter, over 99% of the pixels change in the encrypted image relative to its baseline encryption.
This gives evidence of truly strong avalanche effect, proving high sensitive dependence on initial condition and unpredictability characters from the 4D hyperchaotic-Lantong’s Ant cryptography approach. Concerning security, this allows one tiny error in assumed key or reconstructed chaotic setup to give a completely different decrypted output image. Thus, this obtained encryption mechanism is resistant toward differential cryptanalysis and full-key space brute-force Key Search attacks as there must be no direct relationship between small variations, which are related to both key/initial stage versus final encrypted images.
Entropy analysis
Information entropy is a concept of information theory, introduced by Claude Shannon, characterizing the uncertainty or randomness associated with a set of data. In the context of image encryption, entropy quantifies the level of unpredictability in the pixel intensity values of an image. A higher entropy means the distribution of the pixel values will be uniform and random, which in turn makes the identification of patterns or correlations to compromise the encryption scheme harder for the attacker. Entropy in the case of an ideal encryption algorithm for an 8-bit grayscale or RGB image should be near to theoretical maximum of 8-that is, the encrypted image must look like random noise, and hence, will resist any type of statistical and cryptographic attack.
In the presented work, a deep analysis of the entropy for the proposed algorithm of image encryption is performed; the methodology is applied to some standard test images such as Lena, Baboon, Peppers, Tree, House, Beans, F16, and Girl. Later, the value of entropy for both plain images and encrypted images in RGB is computed by using the following formula for every channel
where \(H(m)\) is the entropy of the message \(m\), \(p(m_i)\) is the probability of occurrence of the \(i^{th}\) symbol, and \(n\) is the bit depth of the pixel values. For an ideal encryption scheme, the entropy of the encrypted image should approach the theoretical maximum value, which for an 8-bit image is \(H(m) = 8\).
The entropy values for the encrypted images were much higher than that of the original images, according to the analysis see Table 6. For instance, in Lena, the entropy values in the red, green, and blue channels of the original are 7.2507, 7.5931, and 6.9659, respectively. These increase to 7.9974, 7.9971, and 7.9971, respectively after encryption, which is fairly close to the ideal of 8. All test images showed similar trends, their average entropy values being 7.9978, 7.9976, and 7.9977 for the encrypted images in the red, green, and blue channels, respectively.
It gives evidence that the values of entropy for the proposed algorithm are near-ideal and prove the effectiveness of it in producing highly random, thus secure, outputs. Thereafter, the encryption scheme introduces indistinguishability of the encrypted images with the random noise by significantly enhancing the unpredictability of the pixel values, hence making them robust against the various attacks of statistical analysis. It infuses high entropy into this algorithm to be reliably used in many secure image encryption applications.
Table 7 depicts the entropy values of various existing methodologies along with the proposed one. The entropy of the proposed algorithm is 7.9977, which is closer to Norouzi et al.7 and Benaissi62, whereas slightly lesser in comparison to Jnana Ramakrishna et al.23 having 7.9987. A very high entropy value depicts the high randomization of the pixel intensities and hence more resistance to statistical attacks.
Correlation analysis
Correlation reflects the linear dependence of neighboring pixels in an image and is a very important measure concerning how well an encryption algorithm masks the underlying structures. Normally, high values of the correlation between original image adjacent pixels are close to 1, indicating the intrinsic redundancy and smooth regions that may be present in common images. An effective cipher should strongly reduce this correlation, at least toward zero, for all spatial directions: horizontal, vertical, and diagonal.
Table 8 presents the correlation coefficients of adjacent pixels in the original versus encrypted images for the R, G, and B channels of Lena, Baboon, Peppers, Tree, House, Beans, F16, and Girl test images. For each color channel, a separate line is drawn for every direction (horizontal, vertical, diagonal), showing the performance of the cipher in correlating the pixels.
Original Images: The correlation coefficients are in the range of approximately 0.73 to 0.98, showing a strong linear dependence of adjacent pixels in all three color channels. Indeed, this is expected in natural images where neighboring pixels are similar in intensity and color.
Encrypted Images: This correlation value drops sharply toward zero after encryption in a range of -0.02 to approximately +0.03, there exists no relationship apparently linear in adjacent pixels in different directions (horizontal and vertical and even diagonal direction) or between different color planes R, G, and B. From the near zero values for many directions and multiple color channels, this in fact suggests that the Diffusion-confusion properties that are implemented in the encryption scheme have a very substantial strength.
The scatter plots show the correlation of adjacent pixels in original and encrypted images along horizontal, vertical, and diagonal directions in Fig. 6. In the original image, the intensities of the pixels are highly correlated, as noticed by the tendency of the points to cluster along a line in all three directions. This is because natural images always have highly correlated pixel intensities, since there is always some form of redundancy in the magnitude of the pixels. While the encrypted image has a completely random distribution of pixel intensities, proving that the proposed algorithm disrupts the relationships between pixels effectively. It is observed that the distribution is uniform in horizontal, vertical, and diagonal directions without any trace of patterns. These confirm the strong diffused capability of the algorithm, which wipes out statistical dependencies and resists cryptanalytic attacks like statistical and differential analysis.
From Table 9, it is observed that the proposed algorithm achieves the correlation coefficient close to zero in all horizontal, vertical, and diagonal directions more effectively or comparably with other methods. It means that low correlation ensures that the adjacent pixels are strongly decorrelated, which gives rise to a robust security by breaking the spatial relationships. The decorrelation of adjacent pixel values, done by the encryption algorithm itself, is intrinsic in providing resistance against attacks based on statistical patterns. Even in highly correlated image Lena, the output cipher texts from the encryption stage do not show meaningful statistical dependencies in any direction in adjacent pixels. Therefore, the 4D hyperchaotic-Langton’s Ant method proposed herein provides an excellent resistance against common attacks that rely on exploiting the local or global structure of the image.
Histogram
A histogram is a graph plotting the distribution of pixel intensities in an image. Within the context of encryption, the histogram is an important tool to visually and quantitatively determine whether or not the algorithm is sufficiently masking the spatial redundancies and frequency patterns present in the original image. Ideally, an unencrypted image should have peaks and valleys in its histogram corresponding to dominant colors or intensities. For instance, a bright image will have more pixel counts concentrated at higher intensity values, while darker images skew toward lower intensities. However, for the robustness of security, a histogram of an encrypted image should appear as uniform as possible, no single intensity or range of intensities should dominate, hence giving evidence that the cipher has successfully diffused and confused the original pixel values.
The histograms of the Lena image before and after encryption are given in Fig. 7. The histograms of the red, green, and blue channels (for instance, Fig. 7a) of the original image have a number of evident peaks, which means the intensity of pixels is not uniformly distributed. These kinds of patterns in the original image may provide statistical clues for attackers. On the other hand, it can be observed from Figs. 7a–c that the histograms of the encrypted image are uniformly distributed. The uniformity of distribution of pixel intensities shows that the encryption algorithm diffuses them effectively enough to mask any inherent structure and features that the image may possess. Hence, it will be highly impossible for an intruder to identify from this either the content of the image or the encryption key.
An important statistical measure with respect to the spread of these histogram values is the variance. Variance essentially a measure of how much the data points (pixel count) deviate from their mean value. In the following Table 10, variance has been calculated for nine different keys \(K_{e_1}\) through \(K_{e_8}\) for several standard test images-Lena, Baboon, Peppers, Tree, House, Beans, F16, and Girl. Larger or smaller variance can then show the dispersion of the image’s pixel distribution over the range of possible intensities. Commonly, a well-encrypted image will have an appropriate value of variance that does not suggest clustering or strong peaks, which again would claim the hypothesis of uniformity in pixel value distribution.
Through these variance results and visual histogram inspections, it becomes clear that the proposed encryption approach spreads out pixel intensities effectively, rendering the cipher robust against statistical attacks aimed at uncovering patterns in pixel distributions. Consequently, a near-uniform histogram signals a higher level of security, since each encrypted pixel is indistinguishable in terms of intensity likelihood-a crucial hallmark for modern image encryption schemes.
Chi-Square analysis
Chi-square analysis is a powerful statistical tool used in order to test the likelihood that an image’s pixel intensities come from some common (usually uniform) distribution. More specifically, we model the occurrence frequency of each pixel intensity level, from 0 to 255, for both the original and encrypted images, and compare the resulting sets of observed frequencies against the theoretical uniform distribution. The chi-square value, \(\chi ^2\), is the sum of the squared deviations of observed counts from expected counts, normalized by the expected count of each intensity. Formally, for every intensity level \(i\), if \(P_i\) is the observed count and \(C_i\) is the expected count, then
In general, the lower the chi-square values, the closer the observed distribution is to the theoretical uniform distribution. The higher values mean larger deviation from uniformity.
Table 11 reports the chi-square values in the R, G and B channels of several images before and after encryption. It can be seen that the original images have considerably larger chi-square values. The R-channel of the original F16 reaches \(6.7842\times 10^5\) and the G-channel of Girl is \(8.6097\times 10^5\). Large value indicates that the pixel intensities of these plain images cluster around certain intensity levels, hence they are far from uniform distribution.
In contrast, the chi-square values of each channel of the encrypted images are considerably lower, often a couple of orders of magnitude smaller. For example, the R-channel of Lena drops from \(63888\) in the original version to only \(235.54\) after encryption. This sharp drop confirms that the ciphered images lose the characteristic peaks of the original histograms and approach a more flattened, uniform-like distribution. This decorrelating and histogram flattening are, in other words, intrinsic to good encryption, as it minimizes clues an attacker might use about the underlying image content.
Chi-square analysis thereby presents quantitative evidence that indeed, the encryption scheme is effectively redistributing the pixel intensities to be much more consistent with a uniform distribution. High chi-square values in the original images only validate their naturally uneven intensity structure, while the vastly reduced chi-square values in these encrypted images show successful mask, diffusion, and confusion properties. From a security power standpoint, a near uniform histogram means each pixel intensity is Equi-probable, and hence any pattern that was there is now concealed, thus not being exploited.
Differential cryptanalysis
The main principle of differential cryptanalysis is checking the sensitivity of an encryption algorithm to small perturbations in the input data. In the image encryption framework, this method investigates how a minute modification in the plain image-for example, the flipping of one pixel-affects the resulting encrypted image. A robust cipher is expected to diffuse such a tiny change to the whole ciphertext, so that the encrypted result is very different from the version generated by the unmodified plaintext. Two commonly used metrics to quantify this behavior are the Number of Pixels Change Rate (NPCR) and the Unified Average Changing Intensity (UACI).
Let us take two encrypted images obtained using nearly identical inputs, \(E_{1}\) and \(E_{2}\). Let one be obtained from the unaltered image and the other from the very same image with a single pixel flipped. Let \(\textrm{rows} \times \textrm{cols}\) be the image dimension. To get NPCR, define an indicator function \(\Delta (i, j)\) which is \(1\) provided the two encrypted pixels are different at coordinates \((i, j)\) or else \(0\). Then, NPCR will be
where the larger the NPCR is, it denotes that more pixel positions have been changed, which means the effect of diffusion is stronger. As a matter of fact, all NPCR values larger than 99% can already be considered an evidence of robustness in the process of encryption.
UACI, on the other hand, measures how much the pixel intensities differ, on average, between \(E_{1}\) and \(E_{2}\). Let \(\wp\) be the maximum possible pixel intensity difference (commonly 255 for 8-bit images). UACI is defined by
This metric reflects how large the absolute differences between corresponding pixel intensities become. Higher UACI values indicate that even when a single pixel is changed in the plain image, it causes widespread intensity alterations in the cipher image.
Table 12 shows the NPCR and UACI values of several standard test images in the differential cryptanalysis attack. Most of the images’ NPCR is close to 99.5% while the UACI value is close to 33.5%, confirming most strong encryption algorithms have high sensitivity to small changes of the original image. What’s more, Girl can reach an NPCR value as high as \(99.876\%\), and its UACI value is \(33.567\%\), proving that the encryption algorithm can be very sensitive to small changes. In general, the test images confirm that one pixel flipping in the plain image results in large, apparently unpredictable changes in the encrypted version. Consequently, a high NPCR and UACI value means excellent sensitivity of the encryption scheme to make it resistant against attacks that are based on partial knowledge of the plaintext or incremental changes.
In general, differential cryptanalysis gives the important idea about how effectively an encryption algorithm spreads small changes in the input data to the ciphertext. The large NPCR and UACI values ensure that any manipulation or guessing of segments of the plain image will result in a totally different encrypted output, hence strengthening the security of the cipher.
In Table 13, we have compared the NPCR and UACI values of the proposed scheme with various existing algorithms present in the literature. One can observe that the proposed method achieves competitive results, with NPCR as high as 99.61% and UACI of about 33.44%. These numbers demonstrate that even a very small change in the plain text image introduces significant changes to the cipher text image.
Mean square error (MSE) and peak signal to noise ratio analysis (PSNR)
PSNR is usually adopted for comparing the fidelity between two images, where one usually represents the original image, and the other one is somehow perturbed or altered. For this work, the altered version is the encrypted, or ciphered, image that now represents how much the encryption algorithm deviates from the original regarding the pixel intensity values. PSNR originates from the Mean Squared Error, which is the mean squared difference between the original and the encrypted images. The MSE may be formally defined as
where \(M\) and \(N\) are the width and height of the image, respectively. \(P_{0}(i,j)\) and \(P_{1}(i,j)\) denote the intensity values of the pixel at position \((i, j)\) in the original and ciphered images, respectively. A larger MSE indicates a greater average difference between the two images.
From the MSE, the PSNR is computed as
Here, 255 is the maximum possible pixel intensity in an 8-bit grayscale channel. A high value of PSNR usually indicates that the two images are highly similar; but for image encryption, it should be such that the cipher image is quite different from the original one. Therefore, high MSE provides low PSNR, which, in fact, depicts that the encryption algorithm introduces severe distortion compared to the original image. This in return would mean a stronger security, as the cipher will increasingly be hard for an adversary to infer anything meaningful.
Table 14 gives PSNR values (in decibel) of several standard test images - Lena, Baboon, Peppers, Tree, House, Beans, F16 after encryption with the proposed technique. PSNR is the ratio between maximum power of an original signal and that of noise or error value added to the signal. Clearly lower PSNR value around 7-10 dB indicates a greater perturbation over the content which means there is little scope of getting back the features from these images without going for an appropriate decryption. The outcome therefore establishes that the given visual content has been reasonably blurred by the proposed encryption technique.
Noise and occlusion attacks
The proposed encryption scheme resists many cryptographic attacks like known-plaintext (KPA), chosen-plaintext (CPA), differential, and occlusion attacks through the use of robust diffusion and confusion. Unpredictable encryption patterns are created by chaotic key generation so that even minor plaintext variations produce vastly different ciphertexts, and it becomes computationally infeasible for the attacker to extract meaningful information without the proper decryption key.
For verification, we used the proposed algorithm on standard test images (Lena, Peppers, and Beans) with added salt & pepper noise (density = 0.2) and occlusion attacks prior to encryption. Experimental results demonstrated that the encryption process transforms the originals into highly randomized cipher images with no visible structure, while the decryption process restores the originals with minimal distortion even when the input is intentionally corrupted.
For the sake of clarity, we display images see Figs. 8 in an ordered sequence: (a) the original images, (b) the cipher images with noise and (c) the decrypted images. Figure 9a–c draw the cipher version of Lena, Beans, and Peppers with data loss attack, and the Fig. 9d,e corresponding decrypted images. This arrangement clearly shows the ability of the algorithm to encrypt images under adverse conditions, maintaining the integrity of the information and thus making it an effective solution for secure image transmission.
Computational complexity
Computational complexity for the proposed encryption scheme was studied by dividing the process into various stages like image preprocessing, pixel reordering, chaotic keystream generation, symbolic encoding with Langton’s Ant, multi-stage diffusion, and final image reconstruction. For an \(m\times n\)-sized image, each of these processes is performed for each pixel, resulting in a complexity proportional to O(mn) for every step. When all the stages are combined together, the overall complexity amounts to about \(27 \cdot m \cdot n.\). This linear time complexity indicates that even with the multi-layered structure and utilization of various chaotic transformations, the proposed scheme is computationally efficient and scalable for the handling of big-sized images.
Conclusion
The proposed image encryption algorithm effectively integrates the unpredictability of a four-dimensional chaotic system with the symbolic manipulation capability of Langton’s Ant cellular automaton, hence providing a very secure and efficient framework for image cryptography. In this regard, the algorithm ensures strong diffusion and confusion properties, considered crucial for resisting statistical and differential cryptographic attacks by integrating multi-level transformations such as decimal diffusion, chaotic permutation, and symbolic encoding. The inherent sensitivity of the chaotic system to initial conditions, along with the dynamic rule-based encoding by Langton’s Ant, ensures that the variations in the ciphertext image are going to be quite secure and immensely varied. The key performance evaluations demonstrate the resistance of the algorithm to various types of cryptanalysis. This scheme has an enormously large key space of \(10^{840}\), far larger than the modern cryptographic threshold, hence it can be very resistant against any kind of brute-force attack. Entropy analysis reveals that the pixel intensity distribution of the encrypted images is almost random and reaches a value very close to the theoretical maximum value 8 for 8-bit images, proving the capability of the algorithm to generate indistinguishable ciphertexts. Moreover, the proposed algorithm is effective in eliminating the spatial dependency between adjacent pixels, as confirmed by the correlation analysis showing a correlation near to zero in all horizontal, vertical, and diagonal directions. This means the statistical pattern in the encrypted image is not distinguishable. The scheme, due to the modular nature of the chaotic and symbolic operations, ensures computational efficiency for parallel processing in real-time applications. It also shows a very good avalanche effect: a small change in either plaintext or any of the key parameters results in a drastic change in the ciphertext produced. This property enhances the security of the encryption scheme by ensuring high sensitivity to inputs. The proposed algorithm represents a milestone in chaos-based image encryption, offering strong security with computational practicality. Such an algorithm is sure to meet almost all complex cryptographic requirements and might turn out to be very effective in a number of applications, including secure communications, medical imaging, and military operations involving the transmission of multimedia data. Further research may be directed to the extension of this framework to higher-dimensional chaotic systems and the optimization of its realization under resource-constrained conditions.
Our scheme guarantees high security, multi-stage chaotic keystream generation, symbolic encoding, and multi-stage diffusion incur more computations compared to simpler schemes. This may have implications on real-time applications with high-speed demands. The scheme could be applied to bigger images of size 512\(\times\)512 and 1024\(\times\)1024, but the bigger volume of data leads to longer processing times, rendering it inefficient for large-scale multimedia encryption without optimization. The scheme’s security greatly depends on the initial chaotic parameters. While the scheme is highly sensitive to small parameter changes, improper parameter selection may lead to performance degradation with the necessity of careful tuning for different applications. Using the proposed method of encryption on constrained platforms like the IoT and embedded systems may prove to be challenging due to its higher computations, with the need for additional optimization to fit lightweight applications.
Data availability
All the data used to finding the results is included in the manuscript.
References
Bertaccini, M. Cryptography Algorithms: A guide to algorithms in blockchain, quantum cryptography, zero-knowledge protocols, and homomorphic encryption (Packt Publishing Ltd., 2022)
Vasani, V., Prateek, K., Amin, R., Maity, S., & Dwivedi, A. D. Embracing the quantum frontier: Investigating quantum communication, cryptography, applications and future directions. J. Ind. Inf. Integr. 100594 (2024).
Ahmed, A., Paruchuri, H., Vadlamudi, S. & Ganapathy, A. Cryptography in Financial Markets: potential channels for future financial stability. Acad. Account. Financ. Stud. J. 25(4), 1–9 (2021).
Anwar, M., Hasan, M., Hasan, M. M., Loren, J. Z. & Hossain, S. T. Comparative study of cryptography algorithms and its’ applications. Int. J. Comput. Netw. Commun. Secur. 7(5), 96–103 (2019).
Hamouda, B. Comparative study of different cryptographic algorithms. J. Inf. Secur. 11(3), 138–148 (2020).
Hercigonja, Z. Comparative analysis of cryptographic algorithms. Int. J. Digit. Technol. Econ. 1(2), 127–134 (2016).
Norouzi, B., Mirzakuchaki, S., Seyedzadeh, S. M. & Mosavi, M. R. A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process. Multimedia Tools Appl. 71, 1469–1497 (2014).
Hu, G. Hyper chaos of higher order and its circuit implementation. Int. J. Circuit Theory Appl. 39(1), 79–89 (2011).
Toughi, S., Fathi, M. H. & Sekhavat, Y. A. An image encryption scheme based on elliptic curve pseudo random and advanced encryption system. Signal Process. 141, 217–227 (2017).
Bashir, Z., Watrobski, J., Rashid, T., Zafar, S. & Sałabun, W. Chaotic dynamical state variables selection procedure based image encryption scheme. Symmetry 9(12), 312 (2017).
Malik, M. A., Bashir, Z., Iqbal, N. & Imtiaz, M. A. Color image encryption algorithm based on hyper-chaos and DNA computing. IEEE Access 8, 88093–88107 (2020).
Man, Z., Li, J., Di, X., Sheng, Y. & Liu, Z. Double image encryption algorithm based on neural network and chaos. Chaos Solitons Fractals 152, 111318 (2021).
Mirzaei, O., Yaghoobi, M. & Irani, H. A new image encryption method: Parallel sub-image encryption with hyper chaos. Nonlinear Dyn. 67(1), 557–566 (2012).
Chen, J. X., Zhu, Z. L., Fu, C., Yu, H. & Zhang, L. B. A fast chaos-based image encryption scheme with a dynamic state variables selection mechanism. Commun. Nonlinear Sci. Numer. Simul. 20(3), 846–860 (2015).
Wang, X., Feng, L. & Zhao, H. Fast image encryption algorithm based on parallel computing system. Inf. Sci. 486, 340–358 (2019).
Zhou, Y., Cao, W. & Chen, C. P. Image encryption using binary bitplane. Signal Process. 100, 197–207 (2014).
Fu, C. et al. A chaos-based digital image encryption scheme with an improved diffusion strategy. Opt. Express 20(3), 2363–2378 (2012).
Zhang, Y. & Xiao, D. An image encryption scheme based on rotation matrix bit-level permutation and block diffusion. Commun. Nonlinear Sci. Numer. Simul. 19(1), 74–82 (2014).
Rhouma, R., Arroyo, D., & Belghith, S. A new color image cryptosystem based on a piecewise linear chaotic map. In 2009 6th International Multi-Conference on Systems, Signals and Devices (pp. 1-6) (IEEE, 2009).
Van Droogenbroeck, M., & Benedett, R. Techniques for a selective encryption of uncompressed and compressed images. In advanced concepts for intelligent vision systems (ACIVS) (2002).
Wang, Y., Wong, K. W., Liao, X., Xiang, T. & Chen, G. A chaos-based image encryption algorithm with variable control parameters. Chaos, Solitons & Fractals 41(4), 1773–1783 (2009).
Sinha, A. & Singh, K. Image encryption using fractional Fourier transform and 3D Jigsaw transform. Opt. Eng. 9, 158–166 (2013).
Jnana Ramakrishna, C., Reddy, Bharath Kalyan, D., Amritha, P. P., Lakshmy, K. V., & Sachnev, V.,. A secure authenticated image encryption scheme based on elliptic curve cryptography. Int. J. Comput. Appl. 46(3), 184–193 (2024).
Abd El-Latif, E. I., Taha, A. & Zayed, H. H. A passive approach for detecting image splicing based on deep learning and wavelet transform. Arab. J. Sci. Eng. 45(4), 3379–3386 (2020).
Ye, G., Liu, M. & Wu, M. Double image encryption algorithm based on compressive sensing and elliptic curve. Alex. Eng. J. 61(9), 6785–6795 (2022).
Abuturab, M. R. Color information security system using discrete cosine transform in gyrator transform domain radial-Hilbert phase encoding. Opt. Lasers Eng. 50(9), 1209–1216 (2012).
Hu, T., Liu, Y., Gong, L. H., Guo, S. F., & Yuan, H. M. Chaotic image cryptosystem using DNA deletion and DNA insertion. Signal Process. 134, 234–243 (2017).
Taneja, N., Raman, B. & Gupta, I. Combinational domain encryption for still visual data. Multimedia Tools Appl. 59, 775–793 (2012).
Norouzi, B. & Mirzakuchaki, S. An image encryption algorithm based on DNA sequence operations and cellular neural network. Multimedia Tools Appl. 76, 13681–13701 (2017).
Patidar, V., Pareek, N. K., Purohit, G. & Sud, K. K. A robust and secure chaotic standard map based pseudorandom permutation-substitution scheme for image encryption. Optics Commun. 284(19), 4331–4339 (2011).
Liu, H., Kadir, A. & Niu, Y. Chaos-based color image block encryption scheme using S-box. AEU Int. J. Electron. Commun. 68(7), 676–686 (2014).
Liu, H., Kadir, A. & Liu, J. Color pathological image encryption algorithm using arithmetic over Galois field and coupled hyper chaotic system. Opt. Lasers Eng. 122, 123–133 (2019).
Liu, H., Kadir, A. & Xu, C. Color image encryption with cipher feedback and coupling chaotic map. Int. J. Bifur. Chaos 30(12), 2050173 (2020).
Liu, H., Liu, J. & Ma, C. Constructing dynamic strong S-Box using 3D chaotic map and application to image encryption. Multimedia Tools Appl. 82(16), 23899–23914 (2023).
Feng, W., Zhang, J. & Qin, Z. A secure and efficient image transmission scheme based on two chaotic maps. Complexity 2021(1), 1898998 (2021).
Feng, W. et al. Exploiting newly designed fractional-order 3D Lorenz chaotic system and 2D discrete polynomial hyper-chaotic map for high-performance multi-image encryption. Fract. Fraction. 7(12), 887 (2023).
Feng, W. et al. Image encryption algorithm based on plane-level image filtering and discrete logarithmic transform. Mathematics 10(15), 2751 (2022).
Feng, W. et al. A novel multi-channel image encryption algorithm leveraging pixel reorganization and hyperchaotic maps. Mathematics 12(24), 3917 (2024).
Alexan, W., Gabr, M., Mamdouh, E., Elias, R. & Aboshousha, A. Color image cryptosystem based on sine chaotic map, 4D chen hyperchaotic map of fractional-order and hybrid DNA coding. Ieee Access 11, 54928–54956 (2023).
Gabr, M., Elias, R., Hosny, K. M., Papakostas, G. A. & Alexan, W. Image encryption via base-n prngs and parallel base-n s-boxes. IEEE Access 11, 85002–85030 (2023).
Alexan, W. et al. Anteater: When arnold’s cat meets langton’s ant to encrypt images. IEEE Access 11, 106249–106276 (2023).
Alexan, W., El-Damak, D. & Gabr, M. Image encryption based on fourier-DNA coding for hyperchaotic chen system, chen-based binary quantization S-box, and variable-base modulo operation. IEEE Access 12, 21092–21113 (2024).
Alexan, W., ElBeltagy, M. & Aboshousha, A. Rgb image encryption through cellular automata, s-box and the lorenz system. Symmetry 14(3), 443 (2022).
Kanwal, S. & Ali, R. A cryptosystem with noncommutative platform groups. Neural Comput. Appl. 29, 1273–1278 (2018).
Inam, S., Kanwal, S., Zahid, A. & Abid, M. A novel public key cryptosystem and digital signatures. Eur. J Eng. Sci. Technol. 3(1), 22–30 (2020).
Kanwal, S., Inam, S., Ali, R., Cheikhrouhou, O. & Koubaa, A. Lightweight noncommutative key exchange protocol for IoT environments. Front. Environ. Sci. 10, 996296 (2022).
Wen, H., Lin, Y., Yang, L. & Chen, R. Cryptanalysis of an image encryption scheme using variant Hill cipher and chaos. Expert Syst. Appl. 250, 123748 (2024).
You, K., Chen, P., & Li, C. Cryptanalyzing an Image Encryption Algorithm Underpinned by 3D-BCNN. IEEE MultiMedia (2024).
Kanwal, S. et al. Analytic study of a novel color image encryption method based on the chaos system and color codes. Complexity 2021(1), 5499538 (2021).
Kanwal, S., Inam, S., Quddus, S. & Hajjej, F. Research on color image encryption approach based on chaotic Duffing map. Phys. Scr. 98(12), 125252 (2023).
Inam, S., Kanwal, S., Firdous, R., Zakria, K. & Hajjej, F. A new method of image encryption using advanced encryption Standard (AES) for network security. Phys. Scr. 98(12), 126005 (2023).
Ye, G. & Guo, L. A visual meaningful encryption and hiding algorithm for multiple images. Nonlinear Dyn. 112(16), 14593–14616 (2024).
Guo, Z., Chen, S. H., Zhou, L. & Gong, L. H. Optical image encryption and authentication scheme with computational ghost imaging. Appl. Math. Model. 131, 49–66 (2024).
Yang, H. G. & Kim, E. S. Practical image encryption scheme by real-valued data. Opt. Eng. 35(9), 2473–2478 (1996).
Bashir, Z., Rashid, T. & Zafar, S. Hyperchaotic dynamical system based image encryption scheme with time-varying delays. Pac. Sci. Rev. A Nat. Sci. Eng. 18(3), 254–260 (2016).
Mastan, J. M. K., Sathishkumar, G. A., & Bagan, K. B. (2011). A color image encryption technique based on a substitution-permutation network. In Advances in Computing and Communications: First International Conference, ACC. Kochi, India, July 22–24, 2011, Proceedings, Part IV 1 524–533 (Springer, Berlin Heidelberg, 2011).
Rad, R. M., Attar, A. & Atani, R. E. A comprehensive layer based encryption method for visual data. Int. J. Signal Process. Image Process. Pattern Recogn. 6(1), 37–48 (2013).
Su, Y., Wang, X., Xu, M., Zou, C. & Liu, H. A three-dimensional (3d) space permutation and diffusion technique for chaotic image encryption using Merkel tree and dna code. Sens. Imaging 24(1), 5 (2023).
Chen, Y. & Yang, Y. Q. A new four-dimensional chaotic system. Chin. Phys. B 19(12), 120510 (2010).
Masuda, N. & Aihara, K. Cryptosystems with discretized chaotic maps. IEEE Trans. Circ. Syst. i Fund. Theory Appl. 49(1), 28–40 (2002).
Chen, Z. & Ye, G. An asymmetric image encryption scheme based on hash SHA-3. RSA Compress. Sensing. Optik 267, 169676 (2022).
Benaissi, S., Chikouche, N. & Hamza, R. A novel image encryption algorithm based on hybrid chaotic maps using a key image. Optik 272, 170316 (2023).
Funding
This work was supported and funded by the Deanship of Scientific Research at Imam Mohammad Ibn Saud Islamic University (IMSIU) (grant number IMSIU-DDRSP2502).
Author information
Authors and Affiliations
Contributions
Conceptualization, I.A., M.F.N., and B.S.A.; methodology, M.F.N.; M.A.K. and B.S.A.; validation, I.A., M.F.N., M.A.K., and B.S.A.; formal analysis, I.A., M.F.N., and M.A.K.; investigation, I.A., M.F.N., M.A.K., and B.S.A.; writing-original draft preparation, I.A. and M.F.N.; writing-review and editing, M.F.N., M.A.K., and B.S.A. All authors have read and agreed to the published version of the manuscript.
Corresponding author
Ethics declarations
Competing interests
The authors declare no competing interests.
Ethical statement
This article does not contain any studies with human or animals.
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.
About this article
Cite this article
Al-Dayel, I., Nadeem, M.F., Khan, M.A. et al. An image encryption scheme using 4-D chaotic system and cellular automaton. Sci Rep 15, 19499 (2025). https://doi.org/10.1038/s41598-025-95511-y
Received:
Accepted:
Published:
Version of record:
DOI: https://doi.org/10.1038/s41598-025-95511-y
Keywords
This article is cited by
-
A lightweight multi round confusion-diffusion cryptosystem for securing images using a modified 5D chaotic system
Scientific Reports (2025)
-
Design and analysis of a secure image encryption algorithm using proposed non-linear RN chaotic system and ECC/HKDF key derivation with authentication support
Scientific Reports (2025)
-
Lca-sm-iot: lightweight image encryption based on rule 60 cellular automata and sine map for IoT devices
Discover Applied Sciences (2025)











