Robust Image Encryption Framework Leveraging Multi-Chaotic Map Synergy for Advanced Data Security | ||||
International Journal of Telecommunications | ||||
Volume 05, Issue 01, January 2025, Page 1-28 PDF (3.68 MB) | ||||
Document Type: Original Article | ||||
DOI: 10.21608/ijt.2025.354464.1079 | ||||
![]() | ||||
Authors | ||||
Mostafa A Abodawood1; abeer A tawakol1; Hanan Amer1; Mohamed Maher Ata ![]() | ||||
1Electronics and Communications Engineering Department, Faculty of Engineering, Mansoura University, Mansoura, Egypt | ||||
2School of Computational Sciences and Artificial Intelligence (CSAI) Zewail City of Science and Technology 6th of October City, Giza, Egypt | ||||
Abstract | ||||
In the field of data security, image encryption is a crucial technique created especially for protecting visual data from abuse and unwanted access. Digital images are more vulnerable to illegal inter-ception, duplication, and manipulation as they are exchanged and stored more frequently across public and private networks. These images are rendered unintelligible by encryption, which guar-antees that the original images may only be accessed by authorized users or systems that the pos-sess decryption keys. The model for image encryption presented in this research uses chaotic maps, making use of chaotic systems' inherent unpredictability to produce a strong encryption technique. Five chaotic maps are used in this approach to carry out the encryption procedure: Logistic, Tent, Circle, Chebyshev, and Piecewise maps. Because each map adds distinct chaotic features, a com-plex and safe foundation for image encryption is produced. We used a variety of performance in-dicators to evaluate this encryption method's efficiency such as histo-gram analysis, cross-correlation, execution time, and entropy It showed how effective the suggested algorithm was. | ||||
Keywords | ||||
Network; Imaging; Algorithm; Interception; Key | ||||
Statistics Article View: 107 PDF Download: 73 |
||||