A light and Secure Way to Encrypt Images by Shuffling and Substituting Pixels
DOI:
https://doi.org/10.58564/IJCCN.1.2.2025.9Abstract
As digital images share and store is booming, the security of digital image data has become one of the most crucial issues. A lightweight and efficient pixel shuffled and conditional substitution-based image encryption algorithm was proposed in this paper. It first shuffles pixel locations with a key-based chaotic map to increase the confusion and then substitutes pixel values to improve the diffusion. This double encryption process achieves maximal security with negligible computation, and is suitable for real-time execution or resource-limited platforms e.g., mobile systems, or IoT devices. The experimental results show that this method has strong encryption ability, low correlation, high entropy, and a good resistance against common attacks such as brute-force and statistical analysis.
References
[1] N. Bourbakis and S. Alexopoulos, "Picture data encryption using scan patterns," Pattern Recognition, vol. 25, no. 6, pp. 567–581, 1992.
[2] S. Lian, J. Sun, and Z. Wang, "Security analysis of a chaos-based image encryption algorithm," Physics Letters A, vol. 351, no. 1–2, pp. 26–30, 2006.
[3] C. E. Shannon, "Communication Theory of Secrecy Systems," Bell System Technical Journal, vol. 28, no. 4, pp. 656–715, 1949.
[4] G. Chen, Y. Mao, and C. K. Chui, "A symmetric image encryption scheme based on 3D chaotic cat maps," Chaos, Solitons & Fractals, vol. 21, no. 3, pp. 749–761, 2004.
[5] M. Khan and T. Shah, "A literature review on image encryption techniques," Journal of Information Security, vol. 7, no. 2, pp. 53–62, 2016.
[6] K. Wang, W. Pei, L. Zou, and A. Song, "A novel image encryption algorithm based on chaos and cross diffusion," Signal Processing: Image Communication, vol. 28, no. 8, pp. 914–926, 2013.
[7] N. Bourbakis and S. Alexopoulos, “Picture data encryption using scan patterns,” Pattern Recognition, vol. 25, no. 6, pp. 567–581, 1992.
[8] S. Lian, J. Sun, and Z. Wang, “Security analysis of a chaos-based image encryption algorithm,” Physics Letters A, vol. 351, no. 1–2, pp. 26–30, 2006.
[9] G. Chen, Y. Mao, and C. K. Chui, “A symmetric image encryption scheme based on 3D chaotic cat maps,” Chaos, Solitons & Fractals, vol. 21, no. 3, pp. 749–761, 2004.
[10] K. Wang, W. Pei, L. Zou, and A. Song, “A novel image encryption algorithm based on chaos and cross diffusion,” Signal Processing: Image Communication, vol. 28, no. 8, pp. 914–926, 2013.
[11] Y. Zhang, L. Liu, and W. Liu, “A fast image encryption scheme based on chaotic systems and DNA computing,” Signal Processing, vol. 158, pp. 118–131, 2019.
[12] S. Lian, J. Sun, G. Wang, and Z. Wang, “A block cipher based on a suitable use of the chaotic standard map,” Chaos, Solitons & Fractals, vol. 26, no. 1, pp. 117–129, 2005.
[13] X. Zhang and Z. Zhu, “An image encryption algorithm based on a lightweight block scrambling and key-dependent diffusion,” Multimedia Tools and Applications, vol. 79, pp. 30233–30250, 2020.
[14] M. Khan and T. Shah, “A literature review on image encryption techniques,” Journal of Information Security, vol. 7, no. 2, pp. 53–62, 2016.
[15] G. Chen, Y. Mao, and C. K. Chui, “A symmetric image encryption scheme based on 3D chaotic cat maps,” Chaos, Solitons & Fractals, vol. 21, no. 3, pp. 749–761, 2004.
[16] K. Wang, W. Pei, L. Zou, and A. Song, “A novel image encryption algorithm based on chaos and cross diffusion,” Signal Processing: Image Communication, vol. 28, no. 8, pp. 914–926, 2013.
[17] S. Lian, J. Sun, and Z. Wang, “Security analysis of a chaos-based image encryption algorithm,” Physics Letters A, vol. 351, no. 1–2, pp. 26–30, 2006.
[18] X. Zhang and Z. Zhu, “An image encryption algorithm based on a lightweight block scrambling and key-dependent diffusion,” Multimedia Tools and Applications, vol. 79, pp. 30233–30250, 2020.
[19] M. Khan and T. Shah, “A literature review on image encryption techniques,” Journal of Information Security, vol. 7, no. 2, pp. 53–62, 2016.
[20] Y. Zhang, L. Liu, and W. Liu, “A fast image encryption scheme based on chaotic systems and DNA computing,” Signal Processing, vol. 158, pp. 118–131, 2019.
[21] S. Behnia, A. Akhshani, H. Mahmodi, and A. Akhavan, “A novel algorithm for image encryption based on mixture of chaotic maps,” Chaos, Solitons & Fractals, vol. 35, no. 2, pp. 408–419, 2008.
[22] C. İnce, K. İnce, and D. Hanbay, “Novel image pixel scrambling technique for efficient color image encryption in resource-constrained IoT devices,” Multimedia Tools and Applications, vol. 83, pp. 72789–72817, 2024.
[23] W. M. Saleh, M. H. Taha, and R. J. Mohammad, “Image Encryption Using High-Speed Scrambling and Modular Arithmetic,” Iraqi Journal of Science, vol. 65, no. 10, 2024.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Yasmine M. Khazaal, Monji Kherallah

This work is licensed under a Creative Commons Attribution 4.0 International License.