Robust Image Encryption Framework Leveraging Multi-Chaotic Map Synergy for Advanced Data Security

Document Type : Original Article

Authors

1 Electronics and Communications Engineering Department, Faculty of Engineering, Mansoura University, Mansoura, Egypt

2 School of Computational Sciences and Artificial Intelligence (CSAI) Zewail City of Science and Technology 6th of October City, Giza, Egypt

Abstract

In the field of data security, image encryption is a crucial technique created especially for protecting visual data from abuse and unwanted access. Digital images are more vulnerable to illegal inter-ception, duplication, and manipulation as they are exchanged and stored more frequently across public and private networks. These images are rendered unintelligible by encryption, which guar-antees that the original images may only be accessed by authorized users or systems that the pos-sess decryption keys. The model for image encryption presented in this research uses chaotic maps, making use of chaotic systems' inherent unpredictability to produce a strong encryption technique. Five chaotic maps are used in this approach to carry out the encryption procedure: Logistic, Tent, Circle, Chebyshev, and Piecewise maps. Because each map adds distinct chaotic features, a com-plex and safe foundation for image encryption is produced. We used a variety of performance in-dicators to evaluate this encryption method's efficiency such as histo-gram analysis, cross-correlation, execution time, and entropy It showed how effective the suggested algorithm was.

Keywords