Color Image Encryption Based on a New Symmetric Lightweight Algorithm

Main Article Content

Ala’a Talib Khudhair
Abeer Tariq Maolood
Ekhlas Khalaf Gbashi

Abstract

Many lightweight algorithms, such as the tiny lightweight algorithm, have significant weaknesses, mainly due to the lack of substitution boxes, effective confusion mechanisms, or both. In today's world, enhancing encryption and secure transmission has become increasingly vital. This paper presents a newly developed lightweight algorithm for color image encryption that is based on a new symmetric block cipher structure. The method starts by transforming each pixel channel value into a 24-bit binary number. A new F-function is introduced in this block cipher to improve diffusion and confusion. Additionally, a 3D Hindmarsh-Rose model is used to generate a dynamic 6-bit S-Box in an octal format (8×8). A new approach, which is based on the Gauss map, is proposed for generating shift values, which further enhances confusion in the block cipher alongside additive and XOR operations. Python simulation experiments were conducted to analyse the security of the encryption. Tests were performed on the Lena image with a resolution of 512×512 pixels, yielding information entropy values of 7.9992 for red, 7.9990 for green, and 7.9992 for blue. The correlation coefficients were minimal, with values of red (horizontal: -0.0027, vertical: -0.0011, diagonal: 0.0019), green (horizontal: -0.0027, vertical: -0.0015, diagonal: 0.0020), and blue (horizontal: 0.0023, vertical: 0.0031, diagonal: 0.0025). Additionally, differential attack tests, including the number of pixel change rates (NPCRs) and unified average change intensities (UACIs), yielded values of 99.6048, 99.6090, and 99.6014 for the NPCRs and 33.3680, 33.4909, and 33.4099 for the UACIs across the red, green, and blue channels, respectively. The results demonstrate that the proposed algorithm provides strong encryption performance and high resistance to differential attacks.

Article Details

Section

Articles

How to Cite

Color Image Encryption Based on a New Symmetric Lightweight Algorithm (A. T. . Khudhair, A. T. . Maolood, & E. K. . Gbashi , Trans.). (2025). Mesopotamian Journal of CyberSecurity, 5(2), 436-452. https://doi.org/10.58496/MJCS/2025/027

References

[1] M. M. Abd Zaid, and S. Hassan, “Proposal Framework to Lightweight Cryptography Primitives”, Engineering and Technology Journal, Vol. 40, pp. 516-526, 2022.

[2] A. R. Alawi, and N. F. Hassan, “A Proposal Video Encryption Using Light Stream Algorithm”, Engineering and Technology Journal, Vol. 39, pp. 184-196, 2021.

[3] R. W. Abd Aljabar, and N. F. Hassan, “Encryption VoIP based on Generated Biometric Key for RC4 Algorithm”, Engineering and Technology Journal, Vol. 39, pp. 209-221, 2021.

[4] M. A. Jumaah, Y. H. Ali, T. A. Rashid, and S. Vimal, “FOXANN: A Method for Boosting Neural Network Performance”, Journal of Soft Computing and Computer Applications, Vol. 1, 1001, 2024.

[5] Y. Cao, and Y. Song, “Color Image Encryption Based on an Evolutionary Codebook and Chaotic Systems”, Entropy, Vol. 26, No. 7, 597, 2024.

[6] J. Xu, B. Zhao, and Z. Wu, “Research on Color Image Encryption Algorithm Based on Bit-Plane and Chen Chaotic System”, Entropy, Vol. 24, No. 2, 186, 2022.

[7] Y. Xu, J. Liu, Z. You, and T. Zhang, “A Novel Color Image Encryption Algorithm Based on Hybrid Two-Dimensional Hyperchaos and Genetic Recombination”, Mathematics, Vol. 12, No.22, 3457, 2024.

[8] L. Zhang, and X. L. An, “Dynamic Analysis of a Four-Wing Chaotic System and Application in Image Encryption Based on Compressive Sensing”, IEEE Access, Vol. 12, pp. 2573-2588, 2024.

[9] B. A. Hameed, and E. K. Gbashi, “New S-Box Generation Based on Hybrid Two-Dimensional Chaotic Map for Color Image Encryption”, International Journal of Intelligent Engineering and Systems, Vol.17, No.6, pp. 702-716, 2024.

[10] S. M. Ali, A. H. Zwiad, R. M. Al-Amri, and A. K. Farhan, “Generation of Dynamic Substitution Boxes Using HSM Chaos System for Application in Color Images Encrypting”, International Journal of Intelligent Engineering and Systems, Vol. 16, No. 6, pp. 519-530, 2023.

[11] X. Li, J. Zeng, Q. Ding, and C. Fan, “A Novel Color Image Encryption Algorithm Based on 5-D Hyperchaotic System and DNA Sequence”, Entropy, Vol. 24, No. 9, 1270, 2022.

[12] H. K. Sarmah, M. C. Das, T. K. Baishya, and R. Paul, “Characterising Chaos In Gaussian Map”, International Journal of Advanced Scientific and Technical Research, Vol. 1, pp. 160-172, 2016.

[13] O. Camps, S. G. Stavrinides, C. D. Benito, and R. Picos, “Implementation of the Hindmarsh–Rose Model Using Stochastic Computing”, Mathematics, Vol. 10, No. 23, 4628, 2022.

[14] A. T. Khudhair, A. T. Maolood, and E. K. Gbashi, “A Novel Approach to Generate Dynamic S-Box for Lightweight Cryptography Based on the 3D Hindmarsh Rose Model”, Journal of Soft Computing and Computer Applications, Vol. 1, 1003, 2024.

[15] A. T. Khudhair, A. T. Maolood, and E. K. Gbashi, “Symmetric Keys for Lightweight Encryption Algorithms Using a Pre–Trained VGG16 Model”, Telecom, Vol. 5, No. 3, pp. 892-906, 2024.

[16] W. Xiangjun, W. Kunshu, W. Xingyuan, K. Haibin, and J. Kurths, “Color image DNA encryp tion using NCA map-based CML and one-time keys”, Signal Processing, Vol. 148, pp. 272-287, 2018.

[17] X. Wu, J. Kurths, and H. Kan, “A robust and lossless DNA encryption scheme for color images”, Multimedia Tools and Applications, Vol. 77, pp. 12349-12376, 2018.

[18] L. Teng, X. Wang, and J. Meng, “A chaotic color image encryption using integrated bit-level permutation”, Multimedia Tools and Applications, Vol. 77, pp. 6883-6896, 2018.

[19] W. Yao, X. Zhang, Z. Zheng, and W. Qiu, “A colour image encryption algorithm using 4-pixel Feistel structure and multiple chaotic systems”, Nonlinear Dynamics, Vol. 81, pp. 151-168, 2015.

[20] R. Enayatifar, A. H. Abdullah, and I. F. Isnin, “Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence”, Optics and Lasers in Engineering, Vol. 56, pp. 83-93, 2014.

[21] L. Yao, C. Yuan, J. Qiang, S. Feng, and S. Nie, “An asymmetric color image encryption method by using deduced gyrator transform”, Optics and Lasers in Engineering, Vol. 89, pp. 72-79, 2017.

[22] M. Kumar, G. Sathish, M. Alphonse, and R. A. M. Lahcen, “A new RGB image encryption using generalized heat equation associated with generalized Vigene`re type table over symmetric group”, Multimedia Tools and Applications, Vol. 78, pp. 28025-28061, 2019.

[23] A. Kadir, A. Hamdulla, and W. Q. Guo, “Color image encryption using skew tent map and hyper chaotic system of 6th-order CNN”, Optik, Vol. 125, pp. 1671-1675, 2014.

[24] Y. Liu, G. Cen, B. Xu, and X. Wang, “Color Image Encryption Based on Deep Learning and Block Embedding”, Security and Communication Networks, 6047349, 2022.

[25] K. M. Hosny, S. T. Kamal, and M. M. Darwish, “A color image encryption technique using block scrambling and chaos”, Multimedia Tools and Applications, Vol. 81, pp. 505–525, 2022.

[26] Y. Q. Zhang, Y. He, P. Li, and X. Wang, “A new color image encryption scheme based on 2DNLCML system and genetic operations”, Optics and Lasers in Engineering, Vol. 128, 106040, 2020.

[27] H. R. Amani, and M. Yaghoobi, “A New Approach in Adaptive Encryption Algorithm for Color Images Based on DNA Sequence Operation and Hyper-Chaotic System”, Multimedia Tools and Applications, Vol. 78, pp. 21537–21556, 2019.

[28] P. Li, J. Xu, J. Mou, and F. Yang, “Fractional-order 4D hyperchaotic memristive system and application in color image encryption”, EURASIP journal on image and video processing, 2019.

[29] E. Hasanzadeh, and M. Yaghoobi, “A Novel color image encryption algorithm based on substitution box and hyper chaotic system with fractal keys”, Multimedia Tools and Applications, Vol. 79, pp. 7279–7297, 2020.

[30] B. Arpacı, E. Kurt, K. Çelik, and B. Ciylan, “Colored Image Encryption and Decryption with a New Algorithm and a Hyperchaotic Electrical Circuit”, Journal of Electrical Engineering & Technology, Vol. 15, pp. 1413-1429, 2020.

[31] A. T. Khudhair, A. T. Maolood, and E. K. Gbashi, “Symmetry Analysis in Construction Two Dynamic Lightweight S-Boxes Based on the 2D Tinkerbell Map and the 2D Duffing Map”, Symmetry, Vol. 16, No. 7, 872, 2024.

[32] A. H. Alrubaie, M. A. A. Khodher, and A. T. Abdulameer, “Image encryption based on 2DNA encoding and chaotic 2D logistic map”, Journal of Engineering and Applied Sciece, Vol. 70, pp. 1-21, 2023.

[33] A. A. Abbod, A. K. A. Hassan, and M. Alqaseer, “Analyzing user behavior for targeted commercial advertisements using Apriori and K-means algorithms”, AIP Conf. Proc, Vol. 3169, No. 1, 2025.

[34] S. M. Shareef and R. F. Hassan, “Improved Blockchain Technique based on Modified SLIM Algorithm for Cyber Security”, Mesopotamian Journal of CyberSecurity, Vol.5, No.1, pp.147-164, 2025.

[35] J. Ayad, N. Qaddoori, and H. Maytham, “Enhanced Audio Encryption Scheme: Integrating Blowfish, HMAC-SHA256, and MD5 for Secure Communication”, Mesopotamian Journal of CyberSecurity, Vol. 5, No. 1, pp. 178-186, 2025.

Similar Articles

You may also start an advanced similarity search for this article.