Digital Image Confidentiality using New Encryption Method

Yaseen Hikmat Ismaiel, Omar Muayad Abdullah, Yasir Ali Mahmood

Abstract


The significant development in mobile phone cameras, in terms of the clarity and high-resolution images captured, the wide utilizing of mobile phones and other communication devices among all segments of society, and the increasing use of social networking sites and the exchange of millions of digital photos daily, all have been pointed with a great importance of digital images and the need to provide adequate security and protection for these images. Digital images contain a large amount of information and recently they have an effective and easy tools of communication without the need for a determined text.Given that digital images contain important, personal, and sensitive information, there is a great need to protect these images and prevent unauthorized persons from applying any changes to the image's contents. There is a great deal of work in this field, most of which uses encryption methods to achieve this protection. As is well known, there are two types of encryption systems (symmetric and asymmetric). Symmetric encryption systems are fast but require a secret key distribution process, while asymmetric encryption systems are relatively slow, involving complex processes. Therefore, they are not suitable for use in social networking applications that require rapid performance and interaction. In this research, a proposed method for digital image encryption is proposed, which includes the use of logical XOR operation to encrypt the digital image based on two proposed levels with scrambling operation to provide a high degree of diffusion and confusion for the resulting encrypted image. The proposed method was evaluated through a set of efficiency measurement metrics (NPCR, UACI, MSE, PSNR, SSIM, Entropy, and Correlation) and it gave results showed a difference between the original image and the image resulting from the first level of encryption. We also noted that the image resulting from the second level had a higher percentage of difference and randomness compared to the original image. Therefore, the proposed encryption method is suitable in terms of speed and confidentiality for use in encrypting digital images and thus maintaining their privacy.

Keywords


cryptogrsaphy; image encryption; xor encryption; xor gate

Full Text:

PDF

References


M. A. Khan, A. Rehman, A. A. Alnowiser, and S. Alqahtani, "A Comprehensive Survey on Image Encryption: Taxonomy, challenges, and future directions," Chaos, Solitons & Fractals, Vol. 177, p. 114370, Jan. 2024. [Online]. Available: https://doi.org/10.1016/j.chaos.2023.114370.

E. A. Jameel and S. A. Fadhel, "Digital Image Encryption Techniques: Article Review," Technium, Vol. 4, No. 2, pp. 24–35, 2022. [Online]. Available: https://www.techniumscience.com.

A. A. Alghamdi and R. Munir, "Image Encryption Algorithms: A Survey of Design and Evaluation Metrics," Journal of Cybersecurity and Privacy, Vol. 4, No. 1, p. 7, 2024. [Online]. Available: https://doi.org/10.3390/jcp4010007.

S. Alshahrani and M. K. Khan, “Survey on Image Encryption Techniques using Chaotic Maps,” International Journal of Information Security, Vol. 21, pp. 745–777, 2022. DOI: 10.1007/s10207-022-00588-5.

M. M. Eltoukhy, F. S. Alsubaei, Y. M. Elnabawy, and K. M. Hosny, “Multiple Image Encryption Techniques: Strategies, Challenges and Potential Future Directions,” Alexandria Engineering Journal, Vol. 125, pp. 367–387, Apr. 2025. DOI: 10.1016/j.aej.2025.04.006.

M. Dhakal and S. Shakya, "Enhancing Image Data Security: DNA Cryptography and XOR-based Feistel Encryption," Journal of Innovative Image Processing, Vol. 7, No. 1, pp. 1–27, 2025.

M. Essaid, I. Akharraz, A. Saaidi, and A. Mouhib, "A New Image Encryption Scheme based on Confusion-Diffusion using an Enhanced Skew Tent Map," Procedia Computer Science, Vol. 127, pp. 539–548, 2018. DOI: 10.1016/j.procs.2018.01.153

A. Afifi, "A Chaotic Confusion-Diffusion Image Encryption based on Henon Map," International Journal of Network Security & Applications (IJNSA), Vol. 11, No. 4, pp. 1–13, 2019. DOI: 10.5121/ijnsa.2019.11401.

T. Li, B. Du, and X. Liang, "Image Encryption Algorithm based on Logistic and Two-Dimensional Lorenz," IEEE Access, Vol. 8, pp. 13792–13805, 2020. DOI: 10.1109/ACCESS.2020.2966320.

L. Yao, C. Yuan, S. Noshadian, A. Ebrahimzade, and S. J. Kazemitabar, "An Asymmetric Color Image Encryption Method by using Deduced Gyrator Transform," Multimedia Tools and Applications, Vol. 79, pp. 31101–31118, 2020. DOI: 10.1007/s11042-020-08916-5.

Y. He, Y. Q. Zhang, X. He, et al., "A New Image Encryption Algorithm based on the OF-LSTMS and Chaotic Sequences," Scientific Reports, Vol. 11, p. 6398, 2021. DOI: 10.1038/s41598-021-85377-1.

K. M. Hosny, S. T. Kamal, M. M. Darwish, and G. A. Papakostas, "New Image Encryption Algorithm using Hyperchaotic System and Fibonacci Q-matrix," Electronics, Vol. 10, No. 9, p. 1066, 2021. doi: 10.3390/electronics10091066.

S. Bai, L. Zhou, M. Yan, X. Ji, and X. Tao, "Image Cryptosystem for Visually Meaningful Encryption based on Fractal Graph Generating," IETE Technical Review, Vol. 38, No. 1, pp. 130–141, 2021. DOI: 10.1080/02564602.2019.1611559.

Q. Qin, Z. Liang, S. Liu, X. Wang and C. Zhou, "A Dual-Domain Image Encryption Algorithm based on Hyperchaos and Dynamic Wavelet Decomposition," IEEE Access, Vol. 10, pp. 122726-122744, 2022, Doi: 10.1109/ACCESS.2022.3212145.

S. F. Yousif, A. J. Abboud, and R. S. Alhumaima, "A New Image Encryption based on Bit Replacing, Chaos and DNA Coding Techniques," Multimedia Tools and Applications, Vol. 81, pp. 27453–27493, 2022. DOI: 10.1007/s11042-022-12762-x.

S. Sun, "A New Image Encryption Scheme based on 6D Hyperchaotic System and Random Signal Insertion," IEEE Access, Vol. 11, pp. 66009–66016, 2023. DOI: 10.1109/ACCESS.2023.3290915.

S. Inam, S. Kanwal, R. Firdous, K. Zakria and F. Hajjej, "A New Method of Image Encryption using Advanced Encryption Standard (AES) for Network Security," Physica Scripta, Vol. 98, No. 12, p. 126005, 2023, DOI: 10.1088/1402-4896/acd3cc.

Y. Zhou and E. Zhu, "A New Image Encryption based on Hybrid Heterogeneous Time-Delay Chaotic Systems," AIMS Mathematics, Vol. 9, No. 3, pp. 5582–5608, 2024, DOI: 10.3934/math.2024270.




DOI: https://doi.org/10.32520/stmsi.v15i3.6057

Article Metrics

Abstract view : 0 times
PDF - 0 times

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.