INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND MATHEMATICAL THEORY (IJCSMT )

E-ISSN 2545-5699
P-ISSN 2695-1924
VOL. 11 NO. 2 2025
DOI: 10.56201/ijcsmt.v11.no2.2025.pg59.72


Chaos-Based Image Encryption Using Refined Hash Function

Ejiiobe Precious Nyimeobari, Dr DJS Sako


Abstract


This study presents an enhanced chaos-based image encryption framework that integrates refined hash functions to address modern challenges in secure image transmission and cryptographic robustness. Conventional encryption techniques often struggle to defend against sophisticated cyberattacks and ensure data integrity, especially in critical applications such as medical imaging and IoT security. The proposed encryption system combines the inherent unpredictability of chaotic systems with advanced hashing mechanisms to develop a robust security framework. A chaos generator and mapping function produce high-quality chaotic signals, which are transformed into the cryptographic domain to enhance encryption strength. The refined hash function incorporates image-specific attributes, generating unique and highly sensitive hash values capable of detecting even the slightest data alterations. The encryption system is implemented in Python, leveraging its extensive cryptographic libraries for precision and efficiency. Performance evaluation is conducted using statistical metrics such as histogram analysis, adjacent pixel autocorrelation, and key sensitivity tests, which reveal significant improvements in randomness and robustness against differential attacks. Experimental results indicate an NPCR of 99.81%, UACI of 33.69%, and Shannon entropy of 7.998, demonstrating superior encryption quality compared to traditional methods. Additionally, the proposed system achieves faster execution times, making it suitable for real-time applications requiring high security and computational efficiency. This research contributes to cryptography by proposing a scalable and efficient encryption model that mitigates existing vulnerabilities while ensuring robust protection of sensitive data. The practical applications of this system extend to secure communications, healthcare data protection, and IoT security, where confidentiality and integrity are pa


keywords:

Chaos, Image Encryption, Refined Hash Function


References:


Basir, R., Qaisar, S., Ali, M., Aldwairi, M., Ashraf, M., Mahmood, A., … & Gidlund, M. (2019).
Fog computing enabling industrial internet of things: state-of-the-art and research challenges.
Sensors, 19(21), 4807.
Bozdal, M., Samie, M., Aslam, S., &Jennions, I. (2020). Evaluation of can bus security challenges.
Sensors, 20(8), 2364.
Hong, W., Yuan, Z., & Chen, X. (2020). Structural color materials for optical anticounterfeiting.
Small, 16(16).
Liu, S., Liu, X., Yuan, J., & Bao, J. (2021). Multidimensional information encryption and storage:
when the input is light. Research, 2021. https://doi.org/10.34133/2021/7897849
Hussein, N. (2023). A deep dive into chaos-based image encryption - reviewing, implementing,
and addressing challenges. International Research Journal of Innovations in Engineering and
Technology, 07(12), 271-280.
Murillo-Escobar, M., Meranza-Castillón, M., López-Gutiérrez, R., & Cruz-Hernández, C. (2019).
Suggested integral analysis for chaos-based image cryptosystems. Entropy, 21(8), 815.
Sun, X., Yu, F., Zhang, P., Xie, W., & Peng, X. (2020). A survey on secure computation based on
homomorphic encryption in vehicular ad hoc networks. Sensors, 20(15), 4253


DOWNLOAD PDF

Back


Google Scholar logo
Crossref logo
ResearchGate logo
Open Access logo
Google logo