Enhancing Image Encryption Security via Metaheuristic-Optimized Logistic Chaotic Mapping
Subject Areas : Computer EngineeringMajid Cheshmeh Kouhi 1 , Ali Nodehi 2 , Rasul Enayatifar 3
1 -
2 -
3 -
Keywords: Image encryption, Logistic chaotic function, Harmony search(HS), parameter tuning,
Abstract :
With the increasing reliance on digital communication, robust image encryption has become essential to protect sensitive data from unauthorized access. This paper presents a novel chaos-based image encryption technique that enhances security by dynamically adapting the logistic chaotic map to the input image’s characteristics. Unlike conventional chaotic encryption methods—which generate static pseudo-random sequences irrespective of the plain-image—our approach employs the Harmony Search (HS) metaheuristic algorithm to intelligently optimize the logistic map’s parameters. This optimization ensures that the chaotic sequences are uniquely tailored to each image, significantly improving key sensitivity and maximizing Shannon entropy in the cipher-image. The proposed method offers a versatile solution for real-world applications, including secure medical imaging, confidential military communications, and privacy-preserving cloud storage. Rigorous security analyses, including statistical tests, differential attack resistance, and key space evaluation, demonstrate the algorithm’s superiority over existing schemes in terms of both robustness and efficiency.
[1] O. Abood, S. Guirguis, A Survey on Cryptography Algorithms, International Journal of Scientific and Research Publications 8 (2018) 495-516.
[2] M. Farajallah, Survey Paper: Cryptography Is The Science Of Information Security, and Self Generating Multi Key Cryptosystem For Non-Invertible Matrices Based On Hill Cipher, 2010.
[3] I.J. Kadhim, P. Premaratne, P.J. Vial, B. Halloran, Comprehensive survey of image steganography: Techniques, Evaluations, and trends in future research, Neurocomputing 335 (2019) 299-326.
[4] S.B. Zakaria, K. Navi, Image encryption and decryption using exclusive-OR based on ternary value logic, Computers and Electrical Engineering 101 (2022) 108021.
[5] B. Zhang, L. Liu, Chaos-Based Image Encryption: Review, Application, and Challenges, Mathematics, 2023.
[6] B. Yogi, A.K. Khan, Advancements in image encryption: A comprehensive review of design principles and performance metrics, Computer Science Review 57 (2025) 100759.
[7] M. Alawida, A novel chaos-based permutation for image encryption, Journal of King Saud University - Computer and Information Sciences 35(6) (2023) 101595.
[8] M. Wang, L. Teng, W. Zhou, X. Yan, Z. Xia, S. Zhou, A new 2D cross hyperchaotic Sine-modulation-Logistic map and its application in bit-level image encryption, Expert Systems with Applications 261 (2025) 125328.
[9] R. Enayatifar, A.H. Abdullah, M. Lee, A weighted discrete imperialist competitive algorithm (WDICA) combined with chaotic map for image encryption, Optics and Lasers in Engineering 51(9) (2013) 1066-1077.
[10] A.H. Abdullah, R. Enayatifar, M. Lee, A hybrid genetic algorithm and chaotic function model for image encryption, AEU - International Journal of Electronics and Communications 66(10) (2012) 806-816.
[11] S. Bhowmik, S. Acharyya, Image encryption approach using improved chaotic system incorporated with differential evolution and genetic algorithm, Journal of Information Security and Applications 72 (2023) 103391.
[12] F. Qin, A.M. Zain, K.-Q. Zhou, Harmony search algorithm and related variants: A systematic review, Swarm and Evolutionary Computation 74 (2022) 101126.
[13] R. Kant, B. Kumar, S.P. Maurya, S. Narayan, A.P. Singh, G. Hema, Advancing post-stack seismic inversion through music-inspired harmony search optimization technique. A case study, Geoenergy Science and Engineering 250 (2025) 213854.
[14] A.M. Odlyzko, H.S. Wilf, Functional iteration and the Josephus problem, Glasgow Mathematical Journal 33(2) (1991) 235-240.
[15] P.R. Sankpal, P.A. Vijaya, Image Encryption Using Chaotic Maps: A Survey, 2014 Fifth International Conference on Signal and Image Processing, 2014, pp. 102-107.
[16] H.M. Ghadirli, A. Nodehi, R. Enayatifar, An overview of encryption algorithms in color images, Signal Processing 164 (2019) 163-185.
[17] C.E. Shannon, Communication theory of secrecy systems, The Bell System Technical Journal 28(4) (1949) 656-715.
[18] S.H.C. Dutoit, Graphical exploratory data analysis, Springer [Place of publication not identified], [Place of publication not identified], 2012.
[19] X. Wang, N. Guan, H. Zhao, S. Wang, Y. Zhang, A new image encryption scheme based on coupling map lattices with mixed multi-chaos, Scientific Reports 10(1) (2020) 9784.
[20] V. Raj, S. Janakiraman, S. Rajagopalan, R. Amirtharajan, Security analysis of reversible logic cryptography design with LFSR key on 32-bit microcontroller, Microprocessors and Microsystems 84 (2021) 104265.