Layered Image Encryption Method Based on Combination of Logistic Map, Henon Map, and Sine Map to Enhance Digital Image Security

Authors

  • Amir Musthofa Universitas Dian Nuswantoro
  • De Rosal Ignatius Moses Setiadi Teknik Informatika, Universitas Dian Nuswantoro

DOI:

https://doi.org/10.30871/jaic.v9i4.9569

Keywords:

Chaos Encryption, Logistic Map, Henon Map, Sine Map, Image Security

Abstract

In today's digital era, ensuring the confidentiality of image data is crucial due to the widespread use of images in fields such as medical imaging, military communication, and multimedia applications. This study proposes a layered image encryption method by integrating three chaotic systems: Logistic Map, Henon Map, and Sine Map. Each layer in the encryption process applies a different chaotic map to sequentially perform pixel permutation, XOR-based substitution, and modulus-based substitution. Key generation is carried out by producing pseudo-random number sequences derived from the iterations of each chaotic map: the Logistic Map (using specific initial and control parameters), the Henon Map (with two initial condition variables), and the Sine Map (based on a sine function), all of which are highly sensitive to initial conditions and control parameters. These sequences are then used as keys in each encryption stage. The proposed method strengthens the principles of confusion and diffusion, thereby enhancing the security and randomness of the encrypted images. Evaluation was conducted using metrics such as histogram analysis, entropy, chi-square, correlation coefficient, PSNR, and BER. The experimental results demonstrate that the method produces encrypted images with strong statistical characteristics and high resilience against common cryptographic attacks. Thus, this approach makes a significant contribution to the development of secure and efficient image encryption techniques based on chaos theory.

Downloads

Download data is not yet available.

References

[1] R. D. Syah, S. Madenda, R. J. Suhatril, and S. Harmanto, “Digital Image Encryption using Composition of RaMSH-1 Map Transposition and Logistic Map Keystream Substitution,” International Journal of Advanced Computer Science and Applications, vol. 14, no. 3, pp. 565–571, 2023, doi: 10.14569/IJACSA.2023.0140365.

[2] A. Alaa Hammad, F. Tarik Jasim, and C. Author, “Adaptive Cyber Defense using Advanced Deep Reinforcement Learning Algorithms: A Real-Time Comparative Analysis,” Journal of Computing Theories and Applications, vol. 2, no. 4, pp. 523–535, Apr. 2025, doi: 10.62411/jcta.12560.

[3] K. A. Santoso, M. F. Fakih, and A. Kamsyakawuni, “Text Insertion and Encryption Using The Bit-Swapping Method in Digital Images,” Journal of Applied Informatics and Computing, vol. 8, no. 1, pp. 86–90, Jul. 2024, doi: 10.30871/JAIC.V8I1.7395.

[4] A. Singh, K. B. Sivangi, and A. N. Tentu, “Machine Learning and Cryptanalysis: An In-Depth Exploration of Current Practices and Future Potential,” Journal of Computing Theories and Applications, vol. 1, no. 3, pp. 257–272, Feb. 2024, doi: 10.62411/jcta.9851.

[5] D. B. P. Pamungkas, I. Isnawaty, and L. M. F. Aksara, “Implementation of Samba Server Using OpenVPN Based on Single Board Computer (SBC) for Private Cloud Storage,” Journal of Applied Informatics and Computing, vol. 8, no. 2, pp. 316–325, Nov. 2024, doi: 10.30871/JAIC.V8I2.8324.

[6] J. P. Ntayagabiri, Y. Bentaleb, J. Ndikumagenge, and H. El Makhtoum, “OMIC: A Bagging-Based Ensemble Learning Framework for Large-Scale IoT Intrusion Detection,” Journal of Future Artificial Intelligence and Technologies, vol. 1, no. 4, pp. 401–416, Feb. 2025, doi: 10.62411/faith.3048-3719-63.

[7] D. R. I. M. Setiadi, S. K. Ghosal, and A. K. Sahu, “AI-Powered Steganography: Advances in Image, Linguistic, and 3D Mesh Data Hiding – A Survey,” Journal of Future Artificial Intelligence and Technologies, vol. 2, no. 1, pp. 1–23, Apr. 2025, doi: 10.62411/faith.3048-3719-76.

[8] A. Susanto et al., “Triple layer image security using bit-shift, chaos, and stream encryption,” Bulletin of Electrical Engineering and Informatics, vol. 9, no. 3, pp. 980–987, Jun. 2020, doi: 10.11591/EEI.V9I3.2001.

[9] S. Sahid, A. Dhoruri, D. Lestari, E. R. Sari, and M. Fauzan, “Sistem Kriptografi Stream Cipher Berbasis Fungsi Chaos untuk Keamanan Informasi,” Jurnal Sains Dasar, vol. 8, no. 1, pp. 6–12, Feb. 2019, doi: 10.21831/JSD.V8I1.38666.

[10] Z. A. N. Fauzyah, A. Sambas, P. W. Adi, and D. R. I. M. Setiadi, “Quantum Key Distribution-Assisted Image Encryption Using 7D and 2D Hyperchaotic Systems,” Journal of Future Artificial Intelligence and Technologies, vol. 2, no. 1, pp. 47–62, Apr. 2025, doi: 10.62411/faith.3048-3719-93.

[11] Y. Pourasad, R. Ranjbarzadeh, and A. Mardani, “A New Algorithm for Digital Image Encryption Based on Chaos Theory,” Entropy 2021, Vol. 23, Page 341, vol. 23, no. 3, p. 341, Mar. 2021, doi: 10.3390/E23030341.

[12] T. Gbaden and B. Nachaba, “Chaos Based Image Encryption Scheme Using One Dimensional Exponential Logistic Map,” Current Journal of Applied Science and Technology, vol. 38, no. 6, pp. 1–14, Jan. 2020, doi: 10.9734/cjast/2019/v38i630451.

[13] A. Afifi, “A Chaotic Confusion-Diffusion Image Encryption Based On Henon Map,” International Journal of Network Security & Applications (IJNSA), vol. 11, no. 4, 2019, doi: 10.5121/ijnsa.2019.11402.

[14] A. A. P. Ratna et al., “Chaos-based image encryption using Arnold’s cat map confusion and Henon map diffusion,” Advances in Science, Technology and Engineering Systems, vol. 6, no. 1, pp. 316–326, 2021, doi: 10.25046/aj060136.

[15] X. Wang Maozhen Zhang, C. Xingyuan Wang, and M. Zhang, “High-sensitivity synchronous image encryption based on improved one-dimensional compound sine map,” IET Image Process, vol. 15, no. 10, pp. 2247–2265, Aug. 2021, doi: 10.1049/IPR2.12193.

[16] M. A. Khan, J. Khan, A. A. Alghamdi, and S. M. A. B. Saidan, “Image Encryption Enabling Chaotic Ergodicity with Logistic and Sine Map,” International Journal of Advanced Computer Science and Applications, vol. 12, no. 7, pp. 437–442, Sep. 2021, doi: 10.14569/IJACSA.2021.0120750.

[17] G. Zhou, D. Zhang, Y. Liu, Y. Yuan, and Q. Liu, “A novel image encryption algorithm based on chaos and Line map,” Neurocomputing, vol. 169, pp. 150–157, Dec. 2015, doi: 10.1016/J.NEUCOM.2014.11.095.

[18] I. A. Pikrammenos, P. Tolis, and P. Perakis, “A Chaotic Confusion-Diffusion Image Encryption Based on Henon Map,” International Journal of Network Security & Its Applications (IJNSA) Vol. 11, No.4, vol. 11, no. 4, p. 19, Jul. 2019, doi: 10.5121/IJNSA.2019.11401.

[19] X. Wang Maozhen Zhang, C. Xingyuan Wang, and M. Zhang, “High‐sensitivity synchronous image encryption based on improved one‐dimensional compound sine map,” IET Image Process, vol. 15, no. 10, pp. 2247–2265, May 2021, doi: 10.1049/IPR2.12193.

[20] E. W. Weisstein, “Logistic Map”, Accessed: Apr. 29, 2025. [Online]. Available: https://mathworld.wolfram.com/LogisticMap.html

[21] M. Benedicks and L. Carleson, “The Dynamics of the Henon Map,” The Annals of Mathematics, vol. 133, no. 1, p. 73, Jan. 1991, doi: 10.2307/2944326.

[22] J. Griffin, “The Sine Map,” 2013.

[23] “Repository.” Accessed: Apr. 29, 2025. [Online]. Available: https://links.uwaterloo.ca/Repository.html

[24] M. M. Hazzazi, M. U. Rehman, A. Shafique, A. Aljaedi, Z. Bassfar, and A. B. Usman, “Enhancing image security via chaotic maps, Fibonacci, Tribonacci transformations, and DWT diffusion: a robust data encryption approach,” Sci Rep, vol. 14, no. 1, Dec. 2024, doi: 10.1038/s41598-024-62260-3.

[25] Y. Luo, J. Yu, W. Lai, and L. Liu, “A novel chaotic image encryption algorithm based on improved baker map and logistic map,” Multimed Tools Appl, vol. 78, no. 15, pp. 22023–22043, Aug. 2019, doi: 10.1007/s11042-019-7453-3.

[26] M. N. E. Farandi, A. Marjuni, N. Rijati, and D. R. I. M. Setiadi, “Enhancing image encryption security through integration multi-chaotic systems and mixed pixel-bit level,” Imaging Science Journal, 2024, doi: 10.1080/13682199.2024.2398954.

[27] D. R. I. M. Setiadi, R. Robet, O. Pribadi, S. Widiono, and M. K. Sarker, “Image Encryption using Half-Inverted Cascading Chaos Cipheration,” Journal of Computing Theories and Applications, vol. 1, no. 2, pp. 61–77, Oct. 2023, doi: 10.33633/jcta.v1i2.9388.

[28] I. A. M. Aslam, T. R. rashid, and G. M. Murtaza, “Hybrid encryption for image security using improved Henon map with sine and cosine and Arnold’s transformation,” Sep. 27, 2024. doi: 10.21203/rs.3.rs-4975978/v1.

[29] J. Wu, X. Liao, and B. Yang, “Image encryption using 2D Hénon-Sine map and DNA approach,” Signal Processing, vol. 153, pp. 11–23, Dec. 2018, doi: 10.1016/j.sigpro.2018.06.008.

[30] B. K. ShreyamshaKumar and C. R. Patil, “JPEG image encryption using fuzzy PN sequences,” Signal Image Video Process, vol. 4, no. 4, pp. 419–427, Nov. 2010, doi: 10.1007/s11760-009-0131-6.

Downloads

Published

2025-08-04

How to Cite

[1]
Amir Musthofa and D. R. I. Moses Setiadi, “Layered Image Encryption Method Based on Combination of Logistic Map, Henon Map, and Sine Map to Enhance Digital Image Security”, JAIC, vol. 9, no. 4, pp. 1280–1289, Aug. 2025.

Issue

Section

Articles

Similar Articles

1 2 3 4 5 > >> 

You may also start an advanced similarity search for this article.