A Novel Multi-Layered Secure Image Encryption Scheme Utilizing Protein Sequences, Dynamic Mealy Machines, 3D-AS Scrambling, and Chaotic Systems

Main Article Content

Radhwan Jawad Kadhim
Hussein K. Khafaji

Abstract

The swift rise in multimedia transmission through insecure channels has made the study of information security critically important. Image encryption holds significant importance in this context, hence necessitating the improvement of the encryption algorithms. This research introduces a Protein-Driven Mealy Machine Image Encryption with Multi-Layer Protection (PMIE-MLP) algorithm, an innovative cryptographic system to improve image security that uses a dynamic protein-based Mealy machine, a novel 3D-AS scrambling, and a chaotic system. An encryption framework comprises key generation and six protection layers: substitution, four layers of diffusion, and confusion. These layers attempt to address the confusion and diffusion principles of Shannon’s cryptographic system and meet the high security standards of encrypted images. The authors conduct rigorous experiments to measure the efficiency of the PMIE-MLP along with its security quotient. These experimental results provide evidence that the PMIE-MLP is capable of achieving resistance to attacks such as brute force, statistical, differential, occlusion, and noise attacks. Moreover, the metrics obtained by the PMIE-MLP demonstrated equal or better security results than those of prior studies. A better performance analysis was achieved through the key space, chi-square value, correlation coefficient values, and image resistance to differential attacks; thus, it is evident that the PMIE-MLP is capable of transmitting colored image information in a secure manner.


 


 


 


 

Article Details

Section

Articles

How to Cite

A Novel Multi-Layered Secure Image Encryption Scheme Utilizing Protein Sequences, Dynamic Mealy Machines, 3D-AS Scrambling, and Chaotic Systems (R. J. . Kadhim & H. K. . Khafaji , Trans.). (2025). Mesopotamian Journal of CyberSecurity, 5(2), 395-423. https://doi.org/10.58496/MJCS/2025/025

References

[1] R. M. Al-Amri, D. N. Hamood, and A. K. Farhan, “Theoretical Background of Cryptography,” Mesopotamian J. CyberSecurity, vol. 2023, pp. 7–15, 2023, doi: 10.58496/MJCS/2023/002.

[2] R. R. N. Alogaili et al., “AntDroidNet Cybersecurity Model: A Hybrid Integration of Ant Colony Optimization and Deep Neural Networks for Android Malware Detection,” Mesopotamian J. CyberSecurity, vol. 5, no. 1, pp. 104–120, 2025, doi: 10.58496/MJCS/2025/008.

[3] X. Wei, L. Guo, Q. Zhang, J. Zhang, and S. Lian, “A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system,” J. Syst. Softw., vol. 85, no. 2, pp. 290–299, 2012, doi: 10.1016/j.jss.2011.08.017.

[4] C. Zhu, Z. Gan, Y. Lu, and X. Chai, “An image encryption algorithm based on 3-D DNA level permutation and substitution scheme,” Multimed. Tools Appl., vol. 79, no. 11, pp. 7227–7258, 2020.

[5] X. Liu, X. Tong, M. Zhang, and Z. Wang, “A highly secure image encryption algorithm based on conservative hyperchaotic system and dynamic biogenetic gene algorithms,” Chaos, Solitons and Fractals, vol. 171, no. February, p. 113450, 2023, doi: 10.1016/j.chaos.2023.113450.

[6] Q. Wang, X. Zhang, and X. Zhao, “Color image encryption algorithm based on bidirectional spiral transformation and DNA coding,” Phys. Scr., vol. 98, no. 2, 2023, doi: 10.1088/1402-4896/acb322.

[7] L. Huang, S. Wang, J. Xiang, and Y. Sun, “Chaotic Color Image Encryption Scheme Using Deoxyribonucleic Acid (DNA) Coding Calculations and Arithmetic over the Galois Field,” Math. Probl. Eng., vol. 2020, 2020, doi: 10.1155/2020/3965281.

[8] Q. Li and L. Chen, “An image encryption algorithm based on 6-dimensional hyper chaotic system and DNA encoding,” Multimed. Tools Appl., vol. 83, no. 2, pp. 5351–5368, 2024, doi: 10.1007/s11042-023-15550-3.

[9] A. S. Almasoud, B. Alabduallah, H. Alqahtani, S. S. Aljameel, S. S. Alotaibi, and A. Mohamed, “Chaotic image encryption algorithm with improved bonobo optimizer and DNA coding for enhanced security,” Heliyon, vol. 10, no. 3, p. e25257, 2024, doi: 10.1016/j.heliyon.2024.e25257.

[10] Q. Cun, X. Tong, Z. Wang, and M. Zhang, “A new chaotic image encryption algorithm based on dynamic DNA coding and RNA computing,” Vis. Comput., vol. 39, no. 12, pp. 6589–6608, 2023, doi: 10.1007/s00371-022-02750-5.

[11] X. Gao, B. Sun, Y. Cao, S. Banerjee, and J. Mou, “A color image encryption algorithm based on hyperchaotic map and DNA mutation,” Chinese Phys. B, vol. 32, no. 3, 2023, doi: 10.1088/1674-1056/ac8cdf.

[12] F. Meng and Z. Gu, “A Color Image-Encryption Algorithm Using Extended DNA Coding and Zig-Zag Transform Based on a Fractional-Order Laser System,” Fractal Fract., vol. 7, no. 11, 2023, doi: 10.3390/fractalfract7110795.

[13] H. Lu, L. Teng, and L. Du, “Image encryption with 1D-MS chaotic systems and improved zigzag disambiguation,” Eur. Phys. J. Plus, vol. 139, no. 4, pp. 1–16, 2024, doi: 10.1140/epjp/s13360-024-05146-7.

[14] M. Abdul-Hameed, H. El-Metwally, S. Askar, A. M. Alshamrani, M. Abouhawwash, and A. A. Karawia, “Advanced color image encryption using third-order differential equations and three-dimensional logistic map,” AIP Adv., vol. 14, no. 7, 2024, doi: 10.1063/5.0214794.

[15] W. Alexan, M. ElBeltagy, and A. Aboshousha, “Rgb image encryption through cellular automata, s-box and the lorenz system,” Symmetry (Basel)., vol. 14, no. 3, p. 443, 2022.

[16] T. Zhang and S. Wang, “Image encryption scheme based on a controlled zigzag transform and bit-level encryption under the quantum walk,” Front. Phys., vol. 10, pp. 1–12, 2023, doi: 10.3389/fphy.2022.1097754.

[17] W. Alexan, M. Elkandoz, M. Mashaly, E. Azab, and A. Aboshousha, “Color Image Encryption Through Chaos and KAA Map,” IEEE Access, vol. 11, no. October 2022, pp. 11541–11554, 2023, doi: 10.1109/ACCESS.2023.3242311.

[18] X. Wang, X. Zhang, M. Gao, Y. Tian, C. Wang, and H. H. C. Iu, “A Color Image Encryption Algorithm Based on Hash Table, Hilbert Curve and Hyper-Chaotic Synchronization,” Mathematics, vol. 11, no. 3, 2023, doi: 10.3390/math11030567.

[19] R. J. Kadhim and H. K. Khafaji, “Unprecedented Security Analysis Results for a Novel Steganography Approach Based on Protein Sequences,” Int. J. Intell. Eng. Syst., vol. 16, no. 2, pp. 464–476, 2023, doi: 10.22266/ijies2023.0430.37.

[20] P. N. Lone, D. singh, and U. H. Mir, “Image encryption using DNA coding and three-dimensional chaotic systems,” Multimed. Tools Appl., vol. 81, no. 4, pp. 5669–5693, 2022, doi: 10.1007/s11042-021-11802-2.

[21] P. N. Khade and P. M. Narnaware, “3D Chaotic Functions for Image Encryption,” Int. J. Comput. Sci. Issues (IJCSI), vol. 9, no. 3, pp. 323–328, 2012.

[22] X. Ma, J. Mou, L. Xiong, S. Banerjee, Y. Cao, and J. Wang, “A novel chaotic circuit with coexistence of multiple attractors and state transition based on two memristors,” Chaos, Solitons and Fractals, vol. 152, p. 111363, 2021, doi: 10.1016/j.chaos.2021.111363.

[23] P. Garapati and S. Musala, “Moore and Mealy Negative Edge detector A VHDL Example for Finite State Machine,” Proc. 2020 IEEE Int. Conf. Commun. Signal Process. ICCSP 2020, pp. 1159–1161, 2020, doi: 10.1109/ICCSP48568.2020.9182310.

[24] A. Bhowmik, S. Karforma, and J. Dey, “Symmetric key and artificial neural network with mealy machine: A neoteric model of cryptosystem for cloud security,” Mach. Learn. Tech. Anal. Cloud Secur., pp. 81–101, 2021, doi: 10.1002/9781119764113.ch5.

[25] B. B. Kodada and D. A. D’Mello, “Symmetric Key Cryptosystem based on Sequential State Machine,” IOP Conf. Ser. Mater. Sci. Eng., vol. 1187, no. 1, p. 012026, 2021, doi: 10.1088/1757-899x/1187/1/012026.

[26] P. Pavithran, S. Mathew, S. Namasudra, and P. Lorenz, “A novel cryptosystem based on DNA cryptography and randomly generated mealy machine,” Comput. Secur., vol. 104, p. 102160, 2021, doi: 10.1016/j.cose.2020.102160.

[27] P. Pavithran, S. Mathew, S. Namasudra, and A. Singh, “Enhancing randomness of the ciphertext generated by DNA-based cryptosystem and finite state machine,” Cluster Comput., vol. 26, no. 2, pp. 1035–1051, 2023, doi: 10.1007/s10586-022-03653-9.

[28] R. J. Kadhim, “Unprecedented Security Analysis Results for a Novel Key Expansion Algorithm Based on Protein Sequences , Dynamic Mealy Machine , and 3D Logistic Map,” vol. 17, no. 3, pp. 171–188, 2024, doi: 10.22266/ijies2024.0630.15.

[29] W. Xingyuan, Z. Junjian, and C. Guanghui, “An image encryption algorithm based on ZigZag transform and LL compound chaotic system,” Optics and Laser Technology, vol. 119. 2019. doi: 10.1016/j.optlastec.2019.105581.

[30] University of Southern California, “USC-SIPI Image Database”, [Online]. Available: https://sipi.usc.edu/database/

[31] X. Chai, Z. Gan, K. Yuan, Y. Chen, and X. Liu, “A novel image encryption scheme based on DNA sequence operations and chaotic systems,” Neural Comput. Appl., vol. 31, no. 1, pp. 219–237, 2019, doi: 10.1007/s00521-017-2993-9.

[32] H. M. M. Alibraheemi, M. M. A. Al Ibraheemi, and Z. H. Radhy, “Design and Practical Implementation of a Stream Cipher Algorithm Based on a Lorenz System,” Mesopotamian J. CyberSecurity, vol. 4, no. 3, pp. 136–151, 2024, doi: 10.58496/MJCS/2024/019.

[33] X. Yan, X. Wang, and Y. Xian, “Chaotic image encryption algorithm based on arithmetic sequence scrambling model and DNA encoding operation,” Multimed. Tools Appl., vol. 80, no. 7, pp. 10949–10983, 2021, doi: 10.1007/s11042-020-10218-8.

[34] H. Qiu, X. Xu, Z. Jiang, K. Sun, and C. Xiao,“A color image encryption algorithm based on hyperchaotic map and Rubik’s Cube scrambling,”Nonlinear Dyn.,vol.110, no.3, pp. 2869–2887, 2022, doi: 10.1007/s11071-022-077561.

[35] Q. Lai and Y. Liu, “A cross-channel color image encryption algorithm using two-dimensional hyperchaotic map,” Expert Syst. Appl., vol. 223, no. November 2022, 2023, doi: 10.1016/j.eswa.2023.119923.

[36] C. Li, Y. Zhang, H. Li, and Y. Zhou, “Visual image encryption scheme based on inter-intra-block scrambling and weighted diffusion,” Vis. Comput., vol. 40, no. 2, pp. 731–746, 2024, doi: 10.1007/s00371-023-02812-2.

[37] E. Alotaibi, R. B. Sulaiman, and M. Almaiah, “Assessment of cybersecurity threats and defense mechanisms in wireless sensor networks,” J. Cyber Secur. Risk Audit., vol. 2025, no. 1, pp. 47–59, 2025.

Similar Articles

You may also start an advanced similarity search for this article.