Image Encryption Using New Non-Linear Stream Cipher Cryptosystem


  • Adnan M. Ali Department of Mathematics, Collage of Science, Mustansiriyah University, 10052 Baghdad, IRAQ.
  • Faez Hassan Ali Department of Mathematics, Collage of Science, Mustansiriyah University, 10052 Baghdad, IRAQ.
  • Sabah Manfi Redha Statistic Department, Collage of Administration and Economics, University of Baghdad, Baghdad, IRAQ.
  • Nurideen Abubakari Linn-Benton Community College Albany, Oregon, USA.



Stream Cipher, Image Encryption, Chaotic Map, Randomness


In this paper, we designed a new efficient stream cipher cryptosystem that depends on a chaotic map to encrypt (decrypt) different types of digital images. The designed encryption system passed all basic efficiency criteria (like Randomness, MSE, PSNR, Histogram Analysis, and Key Space) that were applied to the key extracted from the random generator as well as to the digital images after completing the encryption process.


Download data is not yet available.


A. Oad, H. Yadav and A. Jain, "A Review: Image Encryption Techniques and its Terminologies," International Journal of Engineering and Advanced Technology (IJEAT), vol. 3, p. 2249 - 8958, 2014.

J. P. Aumasson, "Serious cryptography: A practical introduction to modern encryption phone," 2017.

J. W. Yoon and H. Kim, "An image encryption scheme with a pseudorandom permutation based on chaotic maps," Communication in nonlinear science and numerical simulation, vol. 15, p. 3998 - 4006, 2010.


Ü. Çavusoglu and K. I. Pehlivan, "Secure image encryption algorithm design using a novel chaos based S-Box," vol. 95, pp. 92-101, 2017.


H. H. Hussein, M. T. Elkandoz and W. Alexan, "Logistic sine map based image encryption," 2019.

S. M. Ismail and L. A. Said, "Generalized double - humped logistic map based medical image encryption," Journal of advanced research, vol. 10, no. 85-98, 2018.

CrossRef | PubMed

M. Gad, E. Hagras, H. Soliman and N. Hikal, "A New Parallel Fuzzy Multi Modular Chaotic Logistic Map for Image Encryption," The International Arab Journal of Information Technology, vol. 18, no. 2, 2021.


Y. Chen, S. Xie and J. Zhang, "A Hybrid Domain Image Encryption Algorithm Based on Improved Henon Map," Entropy (Basel), vol. 24, no. 2, 287, 2022.

CrossRef | PubMed

Y. Allemami, M. Afendee and S. Atiewi, "Research on various cryptography techniques,," International Journal of Recent Technology and Engineering (IJRTE), vol. 8, no. 2S3, 2019.


F. H. Ali and M. G. Sabri, "Cryptanalysis of the Stream Cipher Systems Using the Genetic Algorithm," in Information Technology & National Security Conference, Al-Riyadh-KSA, 2007.

R. J. Anderson, Security Engeneering: A Guide to Bulding Dependable Distributed System, Indianapolis, IN 46256: Wiley Publishing, Inc., 2008.

L. Wu and H. Cai, "Novel stream ciphering algorithm for big data images Using Zeckendorf Representation," Hindawi Wireless Communications and Mobile Computing, Article, 2021.

CrossRef | PubMed

K. J. Lee and W. L. Wang, "A general structure of feedback shift registers for Built-In Self-Test," Journal information science and engineering, pp. 645-667, 1998.

Z. Hua and Y. Zhou, "One - dimensional nonlinear model for producing chaos," IEEE transactions on circuits and systems, vol. 65, no. 1, pp. 235- 246, 2018.


N. A. Hikal and M. M. Eid, "A New Approach for Palmprint Image Encryption Based on Hybrid Chaotic Maps," Journal of King Saud University - Computer and Information Sciences, vol. 32, pp. 870-882, 2020.


A. A. Mohammed, Bifurcation analysis and design of classes of nonlinear dynamical systems with applications, Baghdad, Iraq: M. Sc. Thesis, Mustansiriyah university, College of Science, Mathematics Science department, 2019.

F. H. Ali, "Use the Multiplicative Cyclic Group to Generate Pseudo Random Digital Sequences," Journal of Al-Rafidain University College for Sciences, vol. 20, pp. 122-135, 2006.

F. H. Ali and A. G. Nasser, "High Efficient Sequences Generate from Developed MCG Generator," Journal of Al-Rafidian University College, vol. 21, no. 25, pp. 169-182, 2009.

A. M. Ali, F. H. Ali and S. M. Redha, "Randomness of the Stream Cipher Digital Sequences in the Field GF(28)," Iraqi Journal of Sceince (Accepted), 2023.

G. Ivarez and S. Li, "Some basic cryptographic requirements for chaos-based cryptosystems," international journal of bifurcation and chaos, vol. 16, no. 3, p. 2129 - 2151, 2006.



Key Dates





Original Article

How to Cite

A. M. Ali, F. H. Ali, S. M. Redha, and N. . Abubakari, “Image Encryption Using New Non-Linear Stream Cipher Cryptosystem”, Al-Mustansiriyah J. Sci., vol. 34, no. 2, pp. 103–112, Jun. 2023, doi: 10.23851/mjs.v34i2.1294.

Similar Articles

1-10 of 63

You may also start an advanced similarity search for this article.