Robust Image Encryption Framework Leveraging Multi-Chaotic Map Synergy for Advanced Data Security | ||
International Journal of Telecommunications | ||
Volume 05, Issue 01, January 2025, Pages 1-28 PDF (3.68 M) | ||
Document Type: Original Article | ||
DOI: 10.21608/ijt.2025.354464.1079 | ||
Authors | ||
Mostafa A Abodawood1; abeer A tawakol1; Hanan Amer1; Mohamed Maher Ata* 2 | ||
1Electronics and Communications Engineering Department, Faculty of Engineering, Mansoura University, Mansoura, Egypt | ||
2School of Computational Sciences and Artificial Intelligence (CSAI) Zewail City of Science and Technology 6th of October City, Giza, Egypt | ||
Abstract | ||
In the field of data security, image encryption is a crucial technique created especially for protecting visual data from abuse and unwanted access. Digital images are more vulnerable to illegal inter-ception, duplication, and manipulation as they are exchanged and stored more frequently across public and private networks. These images are rendered unintelligible by encryption, which guar-antees that the original images may only be accessed by authorized users or systems that the pos-sess decryption keys. The model for image encryption presented in this research uses chaotic maps, making use of chaotic systems' inherent unpredictability to produce a strong encryption technique. Five chaotic maps are used in this approach to carry out the encryption procedure: Logistic, Tent, Circle, Chebyshev, and Piecewise maps. Because each map adds distinct chaotic features, a com-plex and safe foundation for image encryption is produced. We used a variety of performance in-dicators to evaluate this encryption method's efficiency such as histo-gram analysis, cross-correlation, execution time, and entropy It showed how effective the suggested algorithm was. | ||
Keywords | ||
Network; Imaging; Algorithm; Interception; Key | ||
Statistics Article View: 175 PDF Download: 161 |