Fast and Secure Image Encryption Using Josephus Ring Permutation and Logistic Map Diffusion
Subject Areas : Computer EngineeringZahra Rafieian Bahabadi 1 , Ali Nodehi 2 * , Rasul Enayatifar 3
1 - Department of Computer Engineering, Go.C., Islamic Azad University, Gorgan, Iran
2 - Department of Computer Engineering, Go.C., Islamic Azad University, Gorgan, Iran
3 - Department of Computer Engineering, Fi.C., Islamic Azad University, Firoozkooh, Iran
Keywords: Image encryption, Josephus Ring, logistic map chaotic function,
Abstract :
In recent years, the demand for efficient and secure image encryption techniques has grown significantly due to the increasing transmission of sensitive visual data. This paper proposes a novel hybrid image encryption scheme combining a Josephus Ring-based permutation phase with a logistic map-based diffusion phase to achieve both high security and computational efficiency. In the permutation phase, pixel positions are dynamically swapped using a Josephus Ring traversal, effectively disrupting spatial correlations. Subsequently, the diffusion phase employs a chaotic logistic map to generate temporary keys, which are XORed with permuted pixel values to enhance randomness and resist statistical attacks. The proposed method leverages the simplicity of the Josephus Ring for fast permutation and the inherent unpredictability of chaotic maps for robust diffusion. Experimental results demonstrate that the algorithm achieves strong encryption performance, with high sensitivity to initial keys, resistance against differential attacks, and low computational overhead. Security analysis confirms its effectiveness in terms of key space robustness, statistical entropy, and resistance to common cryptographic threats. The combination of these two lightweight mechanisms makes the proposed scheme suitable for real-time secure image transmission applications.
[1] H.M. Ghadirli, A. Nodehi, R. Enayatifar, An overview of encryption algorithms in color images, Signal Processing 164 (2019) 163-185.
[2] O. Abood, S. Guirguis, A Survey on Cryptography Algorithms, International Journal of Scientific and Research Publications 8 (2018) 495-516.
[3] M. Alawida, A novel chaos-based permutation for image encryption, Journal of King Saud University - Computer and Information Sciences 35(6) (2023) 101595.
[4] R. Enayatifar, A.H. Abdullah, I.F. Isnin, Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence, Optics and Lasers in Engineering 56 (2014) 83-93.
[5] D. Singh, H. Kaur, C. Verma, N. Kumar, Z. Illés, A novel 3-D image encryption algorithm based on SHA-256 and chaos theory, Alexandria Engineering Journal 122 (2025) 564-577.
[6] M.-K. Miao, L.-H. Gong, Y.-J. Zhang, N.-R. Zhou, Image encryption and authentication scheme based on computational ghost imaging and lifting wavelet transform, Optics and Lasers in Engineering 184 (2025) 108560.
[7] F. Nawaz, S. Inam, S. Kanwal, S. Al-Otaibi, F. Hajjej, A resilient image encryption scheme using Laplace transform, Egyptian Informatics Journal 27 (2024) 100512.
[8] U. Zia, M. McCartney, B. Scotney, J. Martinez, M. AbuTair, J. Memon, A. Sajjad, Survey on image encryption techniques using chaotic maps in spatial, transform and spatiotemporal domains, International Journal of Information Security 21(4) (2022) 917-935.
[9] B. Rezaei, H. Ghanbari, R. Enayatifar, An image encryption approach using tuned Henon chaotic map and evolutionary algorithm, Nonlinear Dynamics 111(10) (2023) 9629-9647.
[10] H. Zhang, H. Hu, W. Ding, A time-varying image encryption algorithm driven by neural network, Optics & Laser Technology 186 (2025) 112751.
[11] L. Chen, J. Wang, An image decryption technology based on machine learning in an irreversible encryption system, Optics Communications 541 (2023) 129561.
[12] M. Alawida, A novel DNA tree-based chaotic image encryption algorithm, Journal of Information Security and Applications 83 (2024) 103791.
[13] A.S. Almasoud, B. Alabduallah, H. Alqahtani, S.S. Aljameel, S.S. Alotaibi, A. Mohamed, Chaotic image encryption algorithm with improved bonobo optimizer and DNA coding for enhanced security, Heliyon 10(3) (2024) e25257.
[14] R. Enayatifar, A.H. Abdullah, I.F. Isnin, A. Altameem, M. Lee, Image encryption using a synchronous permutation-diffusion technique, Optics and Lasers in Engineering 90 (2017) 146-154.
[15] H. Ghanbari, R. Enayatifar, H. Motameni, Chaos-based image encryption using hybrid model of linear-feedback shift register system and deoxyribonucleic acid, Multimedia Tools and Applications 81(22) (2022) 31815-31830.
[16] A.M. Odlyzko, H.S. Wilf, Functional iteration and the Josephus problem, Glasgow Mathematical Journal 33(2) (1991) 235-240.
[17] L. Wang, Y. Cao, H. Jahanshahi, Z. Wang, J. Mou, Color image encryption algorithm based on Double layer Josephus scramble and laser chaotic system, Optik 275 (2023) 170590.
[18] S. Kaçar, Ü. Çavuşoğlu, H. Jahanshahi, Chapter 3 - Chaos-based image encryption, in: S.R. Nayak, J. Nayak, K. Muhammad, Y. Karaca (Eds.), Intelligent Fractal-Based Image Analysis, Academic Press2024, pp. 47-71.
[19] I. Ahmad, S. Shin, A novel hybrid image encryption–compression scheme by combining chaos theory and number theory, Signal Processing: Image Communication 98 (2021) 116418.
[20] B. Li, J. Liu, Y. Liu, H. Xu, J. Wang, Image encryption algorithm with 2D coupled discrete chaos, Multimedia Tools and Applications 82(23) (2023) 35379-35400.