A New Hybrid Image Encryption Model Based on Custom Logic Functions and Dynamic Chaotic Keys
Abstract
Keywords
References
- D. Altunkaya, F. Y. Okay, and S. Özdemir, “Encoding IoT Data: A Comprehensive Review of Image Transformation Techniques,” Sakarya University Journal of Computer and Information Sciences, vol. 8, no. 2. pp. 358–381, 2025. doi: 10.35377/saucis.1639203.
- M. Rafiei, J. Raitoharju, and A. Iosifidis, “Computer Vision on X-Ray Data in Industrial Production and Security Applications: A Comprehensive Survey,” IEEE Access, vol. 11. Institute of Electrical and Electronics Engineers Inc., pp. 2445–2477, Jan. 02, 2023. doi: 10.1109/ACCESS.2023.3234187.
- A. Khalil, A. Humeau-Heurtier, P. Abraham, and G. Mahé, “Microvascular blood flow with laser speckle contrast imaging: Analysis of static scatterers effect through modelling and simulation,” Proceedings - UKSim-AMSS 8th European Modelling Symposium on Computer Modelling and Simulation, EMS 2014, no. October, pp. 82–86, 2014, doi: 10.1109/EMS.2014.53.
- X. Liao, Y. Yu, B. Li, Z. Li, and Z. Qin, “A New Payload Partition Strategy in Color Image Steganography,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 30, no. 3, pp. 685–696, 2020, doi: 10.1109/TCSVT.2019.2896270.
- X. Liao, Z. Qin, and L. Ding, “Data embedding in digital images using critical functions,” Signal Processing: Image Communication, vol. 58, pp. 146–156, 2017, doi: 10.1016/j.image.2017.07.006.
- Ü. ÇAVUŞOĞLU and H. AL-SANABANİ, “The Performance Comparison of Lightweight Encryption Algorithms,” Sakarya University Journal of Computer and Information Sciences, vol. 2, no. 3, pp. 158–169, 2019, doi: 10.35377/saucis. 02.03.648493.
- Y. Alghamdi and A. Munir, “Image Encryption Algorithms: A Survey of Design and Evaluation Metrics,” Journal of Cybersecurity and Privacy, vol. 4, no. 1. Multidisciplinary Digital Publishing Institute, pp. 126–152, Feb. 23, 2024. doi: 10.3390/jcp4010007.
- C. Li, S. Li, G. Alvarez, G. Chen, and K. T. Lo, “Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations,” Physics Letters, Section A: General, Atomic and Solid State Physics, vol. 369, no. 1–2, pp. 23–30, 2007, doi: 10.1016/j.physleta.2007.04.023.
Details
Primary Language
English
Subjects
Computer Software
Journal Section
Research Article
Early Pub Date
December 11, 2025
Publication Date
December 29, 2025
Submission Date
July 23, 2025
Acceptance Date
October 27, 2025
Published in Issue
Year 2025 Volume: 8 Number: 4
