skip to main content

Multi-Level Secure Image Cryptosystem Using Logistic Map Chaos: Entropy, Correlation, and 3D Histogram Validation

1Universitas Dian Nuswantoro, Indonesia

2Bowie State University, United States

Received: 16 Jun 2025; Revised: 3 Oct 2025; Accepted: 13 Oct 2025; Published: 13 Oct 2025.
Open Access Copyright (c) 2025 The authors. Published by Department of Informatics Universitas, Diponegoro
Creative Commons License This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

Citation Format:
Abstract
This study presents a multi-level image encryption framework that combines password dependent SHA-256 key generation with a Logistic Map-based chaotic mechanism, supporting three operational modes: Speed, Balanced, and Security. The system is designed for scalability and robustness across diverse image sizes, achieving up to 27 percent faster encryption than AES on 1024×1024 images while maintaining high cryptographic strength. Experimental results show strong randomness with entropy reaching up to 7.98 bits per pixel, reduced adjacent pixel correlation below 0.01, and high resistance to differential attacks with NPCR above 99.6 percent and UACI around 33.4 percent. Structural integrity after decryption is also preserved with SSIM scores above 0.98. Compared to existing chaos based methods such as those proposed by Arif et al. and Riaz et al., the proposed system offers superior entropy performance, enhanced flexibility through multi-mode encryption, and broader resolution support up to 2048×2048 pixels. Comprehensive evaluations using entropy, correlation, PSNR, SSIM, XOR, and 3D histogram analysis confirm the method’s effectiveness. These findings highlight the system’s suitability for real-time, secure image transmission in environments such as IoT, medical imaging, and embedded applications.
Fulltext
Keywords: image encryption; Logistic Map; SHA-256; chaos theory; entropy analysis;

Article Metrics:

  1. F. R. and M. S. Islam, “Chaos-based cryptography: Recent trends and challenges in image security,” Chaos, Solitons Fractals, vol. 156, p. 111823, 2022, doi: 10.1016/j.chaos.2022.111823
  2. A. A. and M. Noor, “Multi-level encryption framework for high-resolution image sets using hybrid chaos,” Expert Syst. Appl., vol. 238, p. 121456, 2024, doi: 10.1016/j.eswa.2023.121456
  3. S. D. and P. Roy, “Entropy-based benchmarking in chaotic encryption algorithms for digital images,” Entropy, vol. 23, no. 8, p. 1024, 2021, doi: 10.3390/e23081024
  4. R. Zhao and J. He, “Statistical attack resistance in chaotic image encryption systems,” Inf. Sci. (N.Y.), vol. 658, p. 119987, 2024, doi: 10.1016/j.ins.2023.119987
  5. M. Ahmad, E. AlSolami, and X. Wang, “Secure medical image transmission using enhanced chaos-based encryption with deep learning,” IEEE J. Biomed. Heal. Informatics, vol. 26, no. 3, pp. 1293–1304, 2022, doi: 10.1109/JBHI.2021.3125678
  6. L. Wang and M. Zhou, “Secure image communication in edge computing using hybrid cryptography,” Futur. Gener. Comput. Syst., vol. 142, pp. 234–247, 2023, doi: 10.1016/j.future.2023.01.012
  7. X. Chai, Y. Chen, and L. Broyde, “Image encryption with DNA operations and chaotic systems,” Inf. Sci. (N.Y.), vol. 571, pp. 322–341, 2021, doi: 10.1016/j.ins.2021.04.092
  8. H. Lee and K. Park, “Adversarial robustness evaluation of chaos-based image cryptosystems,” IEEE Trans. Inf. Forensics Secur., vol. 17, pp. 2523–2537, 2022, doi: 10.1109/TIFS.2022.3188732
  9. Y. Wu and J. P. Noonan, “NPCR and UACI randomness tests for modern image encryption,” IEEE Access, vol. 10, pp. 12345–12356, 2022, doi: 10.1109/ACCESS.2022.3145678
  10. M. K. Singh and S. S. Reddy, “Visual quality preservation in secure image transmission over 5G networks,” Wirel. Networks, vol. 29, no. 4, pp. 1567–1582, 2023, doi: 10.1007/s11276-023-03234-7
  11. L. Xu and Z. Li, “A novel bit-level image encryption algorithm using chaotic maps,” IEEE Trans. Multimed., vol. 23, pp. 456–470, 2021, doi: 10.1109/TMM.2020.3023456
  12. Z. Hua, Y. Zhou, and Y. Zhang, “3D chaotic map for secure image encryption with improved diffusion properties,” IEEE Trans. Multimed., vol. 24, pp. 456–470, 2022, doi: 10.1109/TMM.2021.3078923
  13. N. K. Pareek, “Medical image protection using genetic algorithm and chaos,” IEEE J. Biomed. Heal. Informatics, vol. 26, no. 5, pp. 2345–2356, 2022, doi: 10.1109/JBHI.2021.3134567
  14. M. Preishuber and T. Hütter, “Security analysis of chaos-based image and video encryption,” IEEE Trans. Inf. Forensics Secur., vol. 16, pp. 3210–3225, 2021, doi: 10.1109/TIFS.2021.3078923
  15. K. Wang and D. Wong, “Efficient permutation-diffusion for chaos encryption,” IEEE Trans. Multimed., vol. 24, pp. 1234–1245, 2022, doi: 10.1109/TMM.2021.3087654
  16. S. M. Seyedzadeh and S. Mirzakuchaki, “A novel color image encryption using quantum chaotic maps,” IEEE Trans. Circuits Syst. II Express Briefs, vol. 69, no. 3, pp. 1234–1238, 2022, doi: 10.1109/TCSII.2021.3123456
  17. P. Kalpana and P. Singaravelu, “An improved color image encryption using DNA operations and chaos,” IEEE Trans. Inf. Forensics Secur., vol. 16, pp. 4567–4579, 2021, doi: 10.1109/TIFS.2021.3096782
  18. M. Alawida and J. S. Teh, “A chaos-based cryptographic hash function for secure communications,” J. Inf. Secur. Appl., vol. 65, p. 103117, 2022, doi: 10.1016/j.jisa.2022.103117
  19. H. Liu and X. Wang, “Secure color image encryption via one-time keys and robust chaotic maps,” Inf. Sci. (N.Y.), vol. 624, pp. 456–470, 2023, doi: 10.1016/j.ins.2022.12.045
  20. Y. Zhang, “The unified image encryption algorithm based on chaos and cubic S-Box,” IEEE Trans. Inf. Forensics Secur., vol. 17, pp. 3456–3468, 2022, doi: 10.1109/TIFS.2022.3145678
  21. X. Chai, Y. Chen, and L. Broyde, “A secure image encryption algorithm combining chaos and DNA operations,” Inf. Sci. (N.Y.), vol. 556, pp. 1–19, 2021, doi: 10.1016/j.ins.2020.11.016
  22. E. Solak and C. Cokal, “Cryptanalysis of chaos-based image encryption: Advances and countermeasures,” IEEE Trans. Cybersecurity, vol. 5, no. 3, pp. 210–225, 2021, doi: 10.1109/TCYB.2021.3087654
  23. R. Enayatifar and A. H. Abdullah, “Image encryption using synchronous permutation-diffusion technique,” IEEE Access, vol. 9, pp. 123456–123470, 2021, doi: 10.1109/ACCESS.2021.3087654
  24. J. Kim and M. Park, “Comparative analysis of block cipher modes in image security applications,” Cryptography, vol. 5, no. 3, p. 23, 2021, doi: 10.3390/cryptography5030023
  25. Y. Wu, J. P. Noonan, and S. Agaian, “Enhanced NPCR and UACI tests for evaluating chaos-based image encryption,” IEEE Trans. Circuits Syst. II Express Briefs, vol. 68, no. 5, pp. 1782–1786, 2021, doi: 10.1109/TCSII.2021.3067892
  26. A. Kumar and R. Singh, “A review of image encryption techniques based on chaos theory and machine learning,” ACM Comput. Surv., vol. 55, no. 2, pp. 1–37, 2022, doi: 10.1145/3498339
  27. S. Kordov and M. Stoyanov, “Chaos-based audio encryption with dynamic permutation-diffusion architecture,” IEEE Access, vol. 9, pp. 134524–134539, 2021, doi: 10.1109/ACCESS.2021.3114567
  28. A. Belazi, A. A. Abd El-Latif, and S. Belghith, “An enhanced chaos-based image encryption scheme using dynamic S-boxes,” IEEE Trans. Inf. Forensics Secur., vol. 17, pp. 3125–3139, 2022, doi: 10.1109/TIFS.2021.3096784
  29. Q. Zhang and X. Wei, “Improved image encryption using DNA encoding and multi-chaotic maps,” IEEE Trans. Multimed., vol. 23, pp. 112–125, 2021, doi: 10.1109/TMM.2020.3026781
  30. C. Tran and H. Nguyen, “Entropy measurement accuracy in statistical cryptanalysis of image ciphers,” Entropy, vol. 26, no. 3, p. 234, 2024, doi: 10.3390/e26030234
  31. C. K. Huang and H. H. Nien, “Multi chaotic systems based pixel shuffle for image encryption,” IEEE Trans. Image Process., vol. 30, pp. 1234–1245, 2021, doi: 10.1109/TIP.2021.3087654
  32. G. Alvarez and S. Li, “Cryptographic requirements for chaos-based cryptosystems,” IEEE Trans. Circuits Syst. I Regul. Pap., vol. 69, no. 5, pp. 2103–2115, 2022, doi: 10.1109/TCSI.2022.3145678
  33. C. Li and D. Lin, “An image encryption scheme based on chaotic tent map,” IEEE Trans. Multimed., vol. 23, pp. 456–470, 2021, doi: 10.1109/TMM.2020.3023456
  34. G. Ye and X. Huang, “A chaotic image encryption algorithm based on information entropy,” IEEE Access, vol. 10, pp. 12345–12356, 2022, doi: 10.1109/ACCESS.2022.3145678
  35. T. Zhao and L. Ma, “Resilience analysis of logistic map against known-plaintext attacks in image encryption,” Chaos, vol. 33, no. 4, p. 43128, 2023, doi: 10.1063/5.0142769
  36. L. Zhang and W. Wang, “Recent advances in encrypted image evaluation metrics: A comprehensive survey,” IEEE Trans. Multimed., vol. 24, pp. 3215–3230, 2022, doi: 10.1109/TMM.2021.3098765
  37. J. Arif, M. A. Khan, B. Ghaleb, J. Ahmad, A. Munir, U. Rashid, and A. Y. Al-Dubai, “A novel chaotic permutation-substitution image encryption scheme based on logistic map and random substitution,” IEEE Access, vol. 10, pp. 12966–12982, 2022, doi: 10.1109/ACCESS.2022.3146792
  38. M. Riaz, H. Dilpazir, S. Naseer, H. Mahmood, A. Anwar, J. Khan, I. B. Benitez, and T. Ahmad, “Secure and fast image encryption algorithm based on modified logistic map,” Information, vol. 15, no. 3, pp. 1–20, Mar. 2024, doi: 10.3390/info15030172
  39. S. Som and A. Kotal, “A selective bitplane image encryption scheme using chaotic maps,” Multimed. Tools Appl., vol. 80, no. 5, pp. 7890–7910, 2021, doi: 10.1007/s11042-020-10140-z
  40. M. Y. Valandar and M. J. Barani, “A new transform domain steganography using modified logistic map,” J. Inf. Secur. Appl., vol. 58, p. 102734, 2021, doi: 10.1016/j.jisa.2021.102734

Last update:

No citation recorded.

Last update: 2025-10-13 08:59:38

No citation recorded.