Document Type : Research Paper


1 Department of Computer Sciences, University of Technology, Baghdad, Iraq,

2 bDepartment of Computer Sciences, University of Technology, Baghdad , Iraq


This research presents a method of image encryption that has been designed based on the algorithm of complete shuffling, transformation of substitution box, and predicated image crypto-system. This proposed algorithm presents extra confusion in the first phase because of including an S-box based on using substitution by AES algorithm in encryption and its inverse in Decryption. In the second phase, shifting and rotation were used based on secrete key in each channel depending on the result from the chaotic map, 2D logistic map and the output was processed and used for the encryption algorithm. It is known from earlier studies that simple encryption of images based on the scheme of shuffling is insecure in the face of chosen cipher text attacks. Later, an extended algorithm has been projected. This algorithm performs well against chosen cipher text attacks. In addition, the proposed approach was analyzed for NPCR, UACI (Unified Average Changing Intensity), and Entropy analysis for determining its strength.


[1] Y. Song, Z. Zhu, W. Zhang, H. Yu and Y. Zhao, “Efficient and Secure Image Encryption Algorithm Using a Novel Key-Substitution Architecture,” in IEEE Access, vol. 7, pp. 84386-84400, 2019, doi: 10.1109/ACCESS.2019.2923018. [2] A Kadhim , “Mouse Movement with 3D Chaotic Logistic Maps to Generate Random Numbers”, - Diyala Journal For Pure Science, vol. 13, no. 3-part 2, pp. 24-39, 2017. [3] H. Natiq, “A new hyper chaotic map and its application for image encryption”, Eur. Phys. J. Plus 133, 6, 2018. [4] F. Alaa Kadhim, G. H. Abdul-Majeed and R. S. Ali, "Enhancement CAST block algorithm to encrypt big data," 2017 Annual Conference on New Trends in Information & Communications Technology Applications (NTICT), Baghdad, 2017, pp. 80-85, doi: 10.1109/NTICT.2017.7976119. [5] M. Benssalah, Y. Rhaskali and M. S. Azzaz, "Medical Images Encryption Based on Elliptic Curve Cryptography and Chaos Theory," 2018 International Conference on Smart Communications in Network Technologies (SaCoNeT), El Oued, 2018, pp. 222-226, doi10.1109/SaCoNeT.2018.8585512. [6] A. K. Farhan and M. A. A. Ali, "Database protection system depend on modified hash function", Proc. Conf. Cihan Univ.-Erbil Commun. Eng. Compute. Sci., pp. 1-101, Mar. 2017. [7] X. Liu, D. Xiao, W. Huang and C. Liu, "Quantum Block Image Encryption Based on Arnold Transform and Sine Chaotification Model," in IEEE Access, vol. 7, pp. 57188-57199, 2019. doi: 10.1109/ACCESS.2019.2914184. [8] A. Kadhim, S. Khalaf, ”New Approach for Security Chatting in Real Time”, International Journal of Emerging Trends and Technology in Computer Science (IJETTCS),vol. 4, no.3, 2015. [9] T. K. Hazra and S. Bhattacharyya, "Image encryption by blockwise pixel shuffling using Modified Fisher Yates shuffle and pseudorandom permutations," 2016 IEEE 7th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), Vancouver, BC, 2016, pp. 1-6, doi: 10.1109/IEMCON.2016.7746312 [10] X. Wang, S. Gao, L. Yu, Y. Sun and H. Sun, "Chaotic Image Encryption Algorithm Based on Bit-Combination Scrambling in Decimal System and Dynamic Diffusion," in IEEE Access, vol. 7, pp. 103662-103677, 2019, doi: 10.1109/ACCESS.2019.2931052. [11] Z. Wu, X. Zhang and X. Zhong, "Generalized Chaos Synchronization Circuit Simulation and Asymmetric Image Encryption," in IEEE Access, vol. 7, pp. 37989-38008, 2019, doi: 10.1109/ACCESS.2019.2906770. [12] M. I. Wade, M. Chouikha, T. Gill, W. Patterson, T. M. Washington and J. Zeng, "Distributed Image Encryption Based On a Homomorphic Cryptographic Approach," 2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), New York City, NY, USA, 2019, pp. 0686-0696, doi: 10.1109/UEMCON47517.2019.8993025. [13] A. U. Rehman, H. Wang, M. M. Ali Shahid, S. Iqbal, Z. Abbas and A. Firdous, "A Selective Cross-Substitution Technique for Encrypting Color Images Using Chaos, DNA Rules and SHA-512," in IEEE Access, vol. 7, pp. 162786-162802, 2019, doi: 10.1109/ACCESS.2019.2951749 [14] R. Das, S. Manna and S. Dutta, "Cumulative image encryption approach based on user defined operation, character repositioning, text key and image key encryption technique and secret sharing scheme," 2017 IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI), Chennai, 2017, pp. 748-753, doi: 10.1109/ICPCSI.2017.8391813. [15] M. K. Abdmouleh, A. Khalfallah and M. S. Bouhlel, "A Novel Selective Encryption DWT-Based Algorithm for Medical Images," 2017 14th International Conference on Computer Graphics, Imaging and Visualization, Marrakesh, 2017, pp. 79-84, doi: 10.1109/CGiV.2017.10. [16] X. Geng and Q. Ding, "Similar-short Periodicity Analysis and Application in Image Compression Encryption of Digital Chaos," 2012 Fifth International Workshop on Chaos-fractals Theories and Applications, Dalian, 2012, pp. 167-171, doi: 10.1109/IWCFTA.2012.44. [17] Wenting Yuan, Xuelin Yang, Wei Guo and Weisheng Hu, "A double-domain image encryption using hyper chaos," 2017 19th International Conference on Transparent Optical Networks (ICTON), Girona, 2017, pp. 1-4, doi: 10.1109/ICTON.2017.8025092. [18] Y. Luo, M. Du and D. Liu, "JPEG Image Encryption Algorithm Based on Spatiotemporal Chaos," 2012 Fifth International Workshop on Chaos-fractals Theories and Applications, Dalian, 2012, pp. 191-195, doi: 10.1109/IWCFTA.2012.49.