Enhancing Color Image Security: Encryption with Dynamic Chaotic Three-Dimensional System and Robust Security Analysis





Chaotic system, Image Encryption, Performance Evaluation, Key generation, Differential and Statistical attack


The rapid tech growth and widespread internet usage caused a surge in sharing multimedia (text, images, videos, audio) across public networks. Protecting this data is vital, demanding encryption to prevent unauthorized access. Image encryption distorts images for security. This paper highlights encryption's vital role in safeguarding multimedia, especially amid rising internet use and media exchange. It introduces a novel solution: a chaotic three-dimensional system for color image encryption. The study scrutinizes system traits using math software. It employs a new chaotic system to generate a crucial key sequence for pixel scrambling. Utilizing stream cipher encryption enhances security. Extensive security analysis tests its resilience against attacks like histogram and correlation techniques. Results are promising: a fairly uniform histogram, minimal correlation among pixels nearing zero, and entropy close to the ideal. Metrics like NPCR and UACI almost match ideal values, ensuring high security. Experiments confirm its effectiveness in encrypting diverse color images. The approach guarantees a uniform histogram, minimal pixel correlation nearing zero, entropy near the ideal value (8), and NPCR/UACI values close to ideals (99.61191% and 33.41068% respectively).


Download data is not yet available.

Author Biographies

  • Zainab Hasan Thabit , Department of Computer Science, College of Science, Mustansiriyah University, 10052 Baghdad, IRAQ.



  • Sadiq A. Mehdi , Department of Computer Science, College of Education, Mustansiriyah University, 10052 Baghdad, IRAQ.



  • Bashar M. Nema, Department of Computer Science, College of Science, Mustansiriyah University, 10052 Baghdad, IRAQ.






H. Broer and F. Takens, Dynamical Systems and Chaos. Springer, New York, 2010.


Wang, X., LI, J., and Fang, J., Si'lnikov chaos of a 3-D quadratic autonomous system with a four-wing chaotic attractor. Proceedings of the 30th Chinese Control Conference, 2011, pp. 22-24.

S. A. Mehdi and Z. L. Ali, A New Six-Dimensional Hyper-Chaotic System, 2019 International Engineering Conference (IEC), IEEE, pp. 211 - 215, 2019.


M. Sueel, Cryptographic Pseudo-Random Sequences from the Chaotic Henon Map. Sadhana, 34(5), pp.689-701, 2009.


S. A. Mehdi and A. A. Kadhim, Image Algorithm Based on a Novel Five Dimensional Hyper Chaotic System and Sudoku Matrix, 2019 International Engineering Conference (IEC), IEEE, pp. 188-193, 2019.


Z. H. Guan, F. Huang, and W. Guan, Chaos Based Image Encryption Algorithm. Physics Letters A,346, pp. 153- 157, 2005.


S. A. Mehdi, Image encryption algorithm based on a novel 4D chaotic system, International Journal of Information Security and Privacy, Vol.15(4), pp. 118-131, 2021.


Y. Zhang, P. Xu and L. Xiang, Research of image encryption algorithm based on chaotic magic square, in: Advances in Electronic Commerce, Web Application and Communication, pp. 103-109, Springer, Berlin, Heidelberg, 2012.


Q. A. Kester, Image encryption based on the RGB pixel transposition and shuffling, Int. J. Comput. Network Inform. Sec. 5 7, pp.43-50, 2013.


X. Wang and D. Luan, A novel image encryption algorithm using chaos and reversible cellular automata, Commun.11. N onlinear Sci. Numer. Simul. V.18, pp. 3075-3085, 2013.


A. N. Abdulraheem and B. M. Nema, "Secure IoT Model Based on PRESENT Lightweight Modified and Chaotic Key Generator," 2020 1st. Information Technology to Enhance e-learning and Other Application (IT-ELA, Baghdad, Iraq, pp. 12-18, 2020.



Key Dates





Original Article

How to Cite

Z. H. Thabit, S. A. Mehdi, and B. M. Nema, “Enhancing Color Image Security: Encryption with Dynamic Chaotic Three-Dimensional System and Robust Security Analysis”, Al-Mustansiriyah J. Sci., vol. 34, no. 4, pp. 87–95, Dec. 2023, doi: 10.23851/mjs.v34i4.1411.

Similar Articles

11-20 of 191

You may also start an advanced similarity search for this article.