Research Article

A New Hybrid Image Encryption Model Based on Custom Logic Functions and Dynamic Chaotic Keys

Volume: 8 Number: 4 December 29, 2025
EN

A New Hybrid Image Encryption Model Based on Custom Logic Functions and Dynamic Chaotic Keys

Abstract

Any secure image encryption system needs to distort the statistical and visual structure of the image to prevent unauthorized access. Unlike traditional chaos-XOR methods, this paper presents a new hybrid image encryption model based on dynamic chaotic key generation, combined with two novel dedicated bit-level logic functions. The proposed model includes image pre-processing steps, such as flattening color channels and pixel shuffling, to break down the spatial structure. Bit-level nonlinear transformations are then applied using dedicated bit-level logic functions (FLF and FOF). The Bogdanov scheme was used as the chaotic key generator. The image encryption quality was evaluated against four state-of-the-art models using Entropy, NPCR, UACI, PSNR, and SSIM, along with visual analysis of histograms and correlation indices. The experimental results reported an average Entropy value of 7.95. NPCR rate and UACI values were 99.61% and 33.2% respectively. The correlation coefficient was 0.0046. The SSIM remained at 1.0, while the average encryption execution was 0.47 seconds. These results demonstrate that the proposed system can achieve a high level of visual security. This study represents a qualitative and quantitative contribution to the development of secure digital image processing methods.

Keywords

References

  1. D. Altunkaya, F. Y. Okay, and S. Özdemir, “Encoding IoT Data: A Comprehensive Review of Image Transformation Techniques,” Sakarya University Journal of Computer and Information Sciences, vol. 8, no. 2. pp. 358–381, 2025. doi: 10.35377/saucis.1639203.
  2. M. Rafiei, J. Raitoharju, and A. Iosifidis, “Computer Vision on X-Ray Data in Industrial Production and Security Applications: A Comprehensive Survey,” IEEE Access, vol. 11. Institute of Electrical and Electronics Engineers Inc., pp. 2445–2477, Jan. 02, 2023. doi: 10.1109/ACCESS.2023.3234187.
  3. A. Khalil, A. Humeau-Heurtier, P. Abraham, and G. Mahé, “Microvascular blood flow with laser speckle contrast imaging: Analysis of static scatterers effect through modelling and simulation,” Proceedings - UKSim-AMSS 8th European Modelling Symposium on Computer Modelling and Simulation, EMS 2014, no. October, pp. 82–86, 2014, doi: 10.1109/EMS.2014.53.
  4. X. Liao, Y. Yu, B. Li, Z. Li, and Z. Qin, “A New Payload Partition Strategy in Color Image Steganography,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 30, no. 3, pp. 685–696, 2020, doi: 10.1109/TCSVT.2019.2896270.
  5. X. Liao, Z. Qin, and L. Ding, “Data embedding in digital images using critical functions,” Signal Processing: Image Communication, vol. 58, pp. 146–156, 2017, doi: 10.1016/j.image.2017.07.006.
  6. Ü. ÇAVUŞOĞLU and H. AL-SANABANİ, “The Performance Comparison of Lightweight Encryption Algorithms,” Sakarya University Journal of Computer and Information Sciences, vol. 2, no. 3, pp. 158–169, 2019, doi: 10.35377/saucis. 02.03.648493.
  7. Y. Alghamdi and A. Munir, “Image Encryption Algorithms: A Survey of Design and Evaluation Metrics,” Journal of Cybersecurity and Privacy, vol. 4, no. 1. Multidisciplinary Digital Publishing Institute, pp. 126–152, Feb. 23, 2024. doi: 10.3390/jcp4010007.
  8. C. Li, S. Li, G. Alvarez, G. Chen, and K. T. Lo, “Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations,” Physics Letters, Section A: General, Atomic and Solid State Physics, vol. 369, no. 1–2, pp. 23–30, 2007, doi: 10.1016/j.physleta.2007.04.023.

Details

Primary Language

English

Subjects

Computer Software

Journal Section

Research Article

Early Pub Date

December 11, 2025

Publication Date

December 29, 2025

Submission Date

July 23, 2025

Acceptance Date

October 27, 2025

Published in Issue

Year 2025 Volume: 8 Number: 4

APA
Khalil, A., & Al Imam, A. (2025). A New Hybrid Image Encryption Model Based on Custom Logic Functions and Dynamic Chaotic Keys. Sakarya University Journal of Computer and Information Sciences, 8(4), 762-772. https://doi.org/10.35377/saucis...1749483
AMA
1.Khalil A, Al Imam A. A New Hybrid Image Encryption Model Based on Custom Logic Functions and Dynamic Chaotic Keys. SAUCIS. 2025;8(4):762-772. doi:10.35377/saucis.1749483
Chicago
Khalil, Adil, and Adel Al Imam. 2025. “A New Hybrid Image Encryption Model Based on Custom Logic Functions and Dynamic Chaotic Keys”. Sakarya University Journal of Computer and Information Sciences 8 (4): 762-72. https://doi.org/10.35377/saucis. 1749483.
EndNote
Khalil A, Al Imam A (December 1, 2025) A New Hybrid Image Encryption Model Based on Custom Logic Functions and Dynamic Chaotic Keys. Sakarya University Journal of Computer and Information Sciences 8 4 762–772.
IEEE
[1]A. Khalil and A. Al Imam, “A New Hybrid Image Encryption Model Based on Custom Logic Functions and Dynamic Chaotic Keys”, SAUCIS, vol. 8, no. 4, pp. 762–772, Dec. 2025, doi: 10.35377/saucis...1749483.
ISNAD
Khalil, Adil - Al Imam, Adel. “A New Hybrid Image Encryption Model Based on Custom Logic Functions and Dynamic Chaotic Keys”. Sakarya University Journal of Computer and Information Sciences 8/4 (December 1, 2025): 762-772. https://doi.org/10.35377/saucis. 1749483.
JAMA
1.Khalil A, Al Imam A. A New Hybrid Image Encryption Model Based on Custom Logic Functions and Dynamic Chaotic Keys. SAUCIS. 2025;8:762–772.
MLA
Khalil, Adil, and Adel Al Imam. “A New Hybrid Image Encryption Model Based on Custom Logic Functions and Dynamic Chaotic Keys”. Sakarya University Journal of Computer and Information Sciences, vol. 8, no. 4, Dec. 2025, pp. 762-7, doi:10.35377/saucis. 1749483.
Vancouver
1.Adil Khalil, Adel Al Imam. A New Hybrid Image Encryption Model Based on Custom Logic Functions and Dynamic Chaotic Keys. SAUCIS. 2025 Dec. 1;8(4):762-7. doi:10.35377/saucis. 1749483

 

INDEXING & ABSTRACTING & ARCHIVING

 

31045 31044   ResimLink - Resim Yükle  31047 

31043 28939 28938 34240
 

 

29070    The papers in this journal are licensed under a Creative Commons Attribution-NonCommercial 4.0 International License