Dynamic Multi-Layered Image Encryption scheme using User Driven Chaotic Sequences Article Swipe
YOU?
·
· 2025
· Open Access
·
· DOI: https://doi.org/10.21203/rs.3.rs-3399892/v3
The paper introduces a novel approach that leverages the unique characteristics of users' authenticated usernames to determine the sequence in which image blocks are encrypted. This methodology employs two key strategies: the utilization of four individual chaotic maps - Sin, Chebyshev, Logistic, and Gaussian - for encryption, and the encryption of image blocks using a novel 4D chaotic map. The process begins with the segmentation of an N×N×3 color image into its red, blue, and green components, each of size N×N. The image components are further subdivided into four arrays, each sized (4×4) × (N/4) × (N/4). Chaotic sequences generated via schemes 1 and 2 aid in the encryption of various image bands, serving as fundamental encryption keys that guide both confusion and diffusion processes. The proposed encryption systems, Scheme 1 and Scheme 2, were rigorously evaluated using extensive simulations and compared to a standard approach. Both methods outperformed against statistical analysis differential attacks, with NPCR and UACI values approaching ideal standards. Notably, Scheme 2, with the proposed 4D map, performed better than Scheme 1, especially with regard to UACI and NPCR. Furthermore, the systems had a large key space, making decryption impossible within an astronomical timeframe. Entropy and correlation analysis validation yielded values consistent with established techniques, whereas pixel distribution analyses confirmed homogeneity in horizontal, vertical, and diagonal directions. The research presents a new encryption approach that takes advantage of user-specific attributes and outperforms standard methods in terms of security and performance.
Related Topics
- Type
- preprint
- Language
- en
- Landing Page
- https://doi.org/10.21203/rs.3.rs-3399892/v3
- OA Status
- gold
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4406635314
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4406635314Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.21203/rs.3.rs-3399892/v3Digital Object Identifier
- Title
-
Dynamic Multi-Layered Image Encryption scheme using User Driven Chaotic SequencesWork title
- Type
-
preprintOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2025Year of publication
- Publication date
-
2025-01-21Full publication date if available
- Authors
-
P. Mathivanan, K AshwiniList of authors in order
- Landing page
-
https://doi.org/10.21203/rs.3.rs-3399892/v3Publisher landing page
- Open access
-
YesWhether a free full text is available
- OA status
-
goldOpen access status per OpenAlex
- OA URL
-
https://doi.org/10.21203/rs.3.rs-3399892/v3Direct OA link when available
- Concepts
-
Encryption, Image (mathematics), Chaotic, Scheme (mathematics), Computer science, Computer vision, Computer security, Artificial intelligence, Mathematics, Mathematical analysisTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
0Total citation count in OpenAlex
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4406635314 |
|---|---|
| doi | https://doi.org/10.21203/rs.3.rs-3399892/v3 |
| ids.doi | https://doi.org/10.21203/rs.3.rs-3399892/v3 |
| ids.openalex | https://openalex.org/W4406635314 |
| fwci | 0.0 |
| type | preprint |
| title | Dynamic Multi-Layered Image Encryption scheme using User Driven Chaotic Sequences |
| biblio.issue | |
| biblio.volume | |
| biblio.last_page | |
| biblio.first_page | |
| topics[0].id | https://openalex.org/T11017 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9933000206947327 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1707 |
| topics[0].subfield.display_name | Computer Vision and Pattern Recognition |
| topics[0].display_name | Chaos-based Image/Signal Encryption |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C148730421 |
| concepts[0].level | 2 |
| concepts[0].score | 0.7498965263366699 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q141090 |
| concepts[0].display_name | Encryption |
| concepts[1].id | https://openalex.org/C115961682 |
| concepts[1].level | 2 |
| concepts[1].score | 0.6697161197662354 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q860623 |
| concepts[1].display_name | Image (mathematics) |
| concepts[2].id | https://openalex.org/C2777052490 |
| concepts[2].level | 2 |
| concepts[2].score | 0.6592794060707092 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q5072826 |
| concepts[2].display_name | Chaotic |
| concepts[3].id | https://openalex.org/C77618280 |
| concepts[3].level | 2 |
| concepts[3].score | 0.6510849595069885 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q1155772 |
| concepts[3].display_name | Scheme (mathematics) |
| concepts[4].id | https://openalex.org/C41008148 |
| concepts[4].level | 0 |
| concepts[4].score | 0.5939064621925354 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[4].display_name | Computer science |
| concepts[5].id | https://openalex.org/C31972630 |
| concepts[5].level | 1 |
| concepts[5].score | 0.3817400634288788 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q844240 |
| concepts[5].display_name | Computer vision |
| concepts[6].id | https://openalex.org/C38652104 |
| concepts[6].level | 1 |
| concepts[6].score | 0.2968056797981262 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[6].display_name | Computer security |
| concepts[7].id | https://openalex.org/C154945302 |
| concepts[7].level | 1 |
| concepts[7].score | 0.2939301133155823 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q11660 |
| concepts[7].display_name | Artificial intelligence |
| concepts[8].id | https://openalex.org/C33923547 |
| concepts[8].level | 0 |
| concepts[8].score | 0.20910006761550903 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q395 |
| concepts[8].display_name | Mathematics |
| concepts[9].id | https://openalex.org/C134306372 |
| concepts[9].level | 1 |
| concepts[9].score | 0.0 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q7754 |
| concepts[9].display_name | Mathematical analysis |
| keywords[0].id | https://openalex.org/keywords/encryption |
| keywords[0].score | 0.7498965263366699 |
| keywords[0].display_name | Encryption |
| keywords[1].id | https://openalex.org/keywords/image |
| keywords[1].score | 0.6697161197662354 |
| keywords[1].display_name | Image (mathematics) |
| keywords[2].id | https://openalex.org/keywords/chaotic |
| keywords[2].score | 0.6592794060707092 |
| keywords[2].display_name | Chaotic |
| keywords[3].id | https://openalex.org/keywords/scheme |
| keywords[3].score | 0.6510849595069885 |
| keywords[3].display_name | Scheme (mathematics) |
| keywords[4].id | https://openalex.org/keywords/computer-science |
| keywords[4].score | 0.5939064621925354 |
| keywords[4].display_name | Computer science |
| keywords[5].id | https://openalex.org/keywords/computer-vision |
| keywords[5].score | 0.3817400634288788 |
| keywords[5].display_name | Computer vision |
| keywords[6].id | https://openalex.org/keywords/computer-security |
| keywords[6].score | 0.2968056797981262 |
| keywords[6].display_name | Computer security |
| keywords[7].id | https://openalex.org/keywords/artificial-intelligence |
| keywords[7].score | 0.2939301133155823 |
| keywords[7].display_name | Artificial intelligence |
| keywords[8].id | https://openalex.org/keywords/mathematics |
| keywords[8].score | 0.20910006761550903 |
| keywords[8].display_name | Mathematics |
| language | en |
| locations[0].id | doi:10.21203/rs.3.rs-3399892/v3 |
| locations[0].is_oa | True |
| locations[0].source | |
| locations[0].license | cc-by |
| locations[0].pdf_url | |
| locations[0].version | acceptedVersion |
| locations[0].raw_type | posted-content |
| locations[0].license_id | https://openalex.org/licenses/cc-by |
| locations[0].is_accepted | True |
| locations[0].is_published | False |
| locations[0].raw_source_name | |
| locations[0].landing_page_url | https://doi.org/10.21203/rs.3.rs-3399892/v3 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5079669364 |
| authorships[0].author.orcid | |
| authorships[0].author.display_name | P. Mathivanan |
| authorships[0].countries | IN |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I81556334 |
| authorships[0].affiliations[0].raw_affiliation_string | Amrita Vishwa Vidyapeetham - Chennai Campus |
| authorships[0].institutions[0].id | https://openalex.org/I81556334 |
| authorships[0].institutions[0].ror | https://ror.org/03am10p12 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I81556334 |
| authorships[0].institutions[0].country_code | IN |
| authorships[0].institutions[0].display_name | Amrita Vishwa Vidyapeetham |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | P. Mathivanan |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | Amrita Vishwa Vidyapeetham - Chennai Campus |
| authorships[1].author.id | https://openalex.org/A5024644141 |
| authorships[1].author.orcid | https://orcid.org/0000-0003-1974-2162 |
| authorships[1].author.display_name | K Ashwini |
| authorships[1].countries | IN |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I81556334 |
| authorships[1].affiliations[0].raw_affiliation_string | Amrita Vishwa Vidyapeetham - Chennai Campus |
| authorships[1].institutions[0].id | https://openalex.org/I81556334 |
| authorships[1].institutions[0].ror | https://ror.org/03am10p12 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I81556334 |
| authorships[1].institutions[0].country_code | IN |
| authorships[1].institutions[0].display_name | Amrita Vishwa Vidyapeetham |
| authorships[1].author_position | last |
| authorships[1].raw_author_name | K Ashwini |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | Amrita Vishwa Vidyapeetham - Chennai Campus |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://doi.org/10.21203/rs.3.rs-3399892/v3 |
| open_access.oa_status | gold |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Dynamic Multi-Layered Image Encryption scheme using User Driven Chaotic Sequences |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-25T14:43:58.451035 |
| primary_topic.id | https://openalex.org/T11017 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9933000206947327 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1707 |
| primary_topic.subfield.display_name | Computer Vision and Pattern Recognition |
| primary_topic.display_name | Chaos-based Image/Signal Encryption |
| related_works | https://openalex.org/W2100090372, https://openalex.org/W4361205702, https://openalex.org/W2004708907, https://openalex.org/W1975289146, https://openalex.org/W2385965183, https://openalex.org/W4289281780, https://openalex.org/W2376048186, https://openalex.org/W2375981391, https://openalex.org/W45120566, https://openalex.org/W2361408597 |
| cited_by_count | 0 |
| locations_count | 1 |
| best_oa_location.id | doi:10.21203/rs.3.rs-3399892/v3 |
| best_oa_location.is_oa | True |
| best_oa_location.source | |
| best_oa_location.license | cc-by |
| best_oa_location.pdf_url | |
| best_oa_location.version | acceptedVersion |
| best_oa_location.raw_type | posted-content |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | False |
| best_oa_location.raw_source_name | |
| best_oa_location.landing_page_url | https://doi.org/10.21203/rs.3.rs-3399892/v3 |
| primary_location.id | doi:10.21203/rs.3.rs-3399892/v3 |
| primary_location.is_oa | True |
| primary_location.source | |
| primary_location.license | cc-by |
| primary_location.pdf_url | |
| primary_location.version | acceptedVersion |
| primary_location.raw_type | posted-content |
| primary_location.license_id | https://openalex.org/licenses/cc-by |
| primary_location.is_accepted | True |
| primary_location.is_published | False |
| primary_location.raw_source_name | |
| primary_location.landing_page_url | https://doi.org/10.21203/rs.3.rs-3399892/v3 |
| publication_date | 2025-01-21 |
| publication_year | 2025 |
| referenced_works_count | 0 |
| abstract_inverted_index.- | 39, 45 |
| abstract_inverted_index.1 | 103, 131 |
| abstract_inverted_index.2 | 105 |
| abstract_inverted_index.a | 4, 55, 144, 187, 224 |
| abstract_inverted_index.1, | 175 |
| abstract_inverted_index.2, | 134, 165 |
| abstract_inverted_index.4D | 57, 169 |
| abstract_inverted_index.an | 67, 195 |
| abstract_inverted_index.as | 115 |
| abstract_inverted_index.in | 20, 107, 215, 238 |
| abstract_inverted_index.of | 12, 34, 51, 66, 79, 110, 231, 240 |
| abstract_inverted_index.to | 16, 143, 179 |
| abstract_inverted_index.× | 94, 96 |
| abstract_inverted_index.The | 1, 60, 82, 126, 221 |
| abstract_inverted_index.aid | 106 |
| abstract_inverted_index.and | 43, 48, 75, 104, 123, 132, 141, 157, 181, 199, 218, 234, 242 |
| abstract_inverted_index.are | 24, 85 |
| abstract_inverted_index.for | 46 |
| abstract_inverted_index.had | 186 |
| abstract_inverted_index.its | 72 |
| abstract_inverted_index.key | 30, 189 |
| abstract_inverted_index.new | 225 |
| abstract_inverted_index.the | 9, 18, 32, 49, 64, 108, 167, 184 |
| abstract_inverted_index.two | 29 |
| abstract_inverted_index.via | 101 |
| abstract_inverted_index.Both | 147 |
| abstract_inverted_index.NPCR | 156 |
| abstract_inverted_index.Sin, | 40 |
| abstract_inverted_index.This | 26 |
| abstract_inverted_index.UACI | 158, 180 |
| abstract_inverted_index.both | 121 |
| abstract_inverted_index.each | 78, 91 |
| abstract_inverted_index.four | 35, 89 |
| abstract_inverted_index.into | 71, 88 |
| abstract_inverted_index.keys | 118 |
| abstract_inverted_index.map, | 170 |
| abstract_inverted_index.map. | 59 |
| abstract_inverted_index.maps | 38 |
| abstract_inverted_index.red, | 73 |
| abstract_inverted_index.size | 80 |
| abstract_inverted_index.than | 173 |
| abstract_inverted_index.that | 7, 119, 228 |
| abstract_inverted_index.were | 135 |
| abstract_inverted_index.with | 63, 155, 166, 177, 206 |
| abstract_inverted_index.(N/4) | 95 |
| abstract_inverted_index.NPCR. | 182 |
| abstract_inverted_index.N×N. | 81 |
| abstract_inverted_index.blue, | 74 |
| abstract_inverted_index.color | 69 |
| abstract_inverted_index.green | 76 |
| abstract_inverted_index.guide | 120 |
| abstract_inverted_index.ideal | 161 |
| abstract_inverted_index.image | 22, 52, 70, 83, 112 |
| abstract_inverted_index.large | 188 |
| abstract_inverted_index.novel | 5, 56 |
| abstract_inverted_index.paper | 2 |
| abstract_inverted_index.pixel | 210 |
| abstract_inverted_index.sized | 92 |
| abstract_inverted_index.takes | 229 |
| abstract_inverted_index.terms | 239 |
| abstract_inverted_index.using | 54, 138 |
| abstract_inverted_index.which | 21 |
| abstract_inverted_index.(4×4) | 93 |
| abstract_inverted_index.(N/4). | 97 |
| abstract_inverted_index.Scheme | 130, 133, 164, 174 |
| abstract_inverted_index.bands, | 113 |
| abstract_inverted_index.begins | 62 |
| abstract_inverted_index.better | 172 |
| abstract_inverted_index.blocks | 23, 53 |
| abstract_inverted_index.making | 191 |
| abstract_inverted_index.regard | 178 |
| abstract_inverted_index.space, | 190 |
| abstract_inverted_index.unique | 10 |
| abstract_inverted_index.users' | 13 |
| abstract_inverted_index.values | 159, 204 |
| abstract_inverted_index.within | 194 |
| abstract_inverted_index.Chaotic | 98 |
| abstract_inverted_index.Entropy | 198 |
| abstract_inverted_index.N×N×3 | 68 |
| abstract_inverted_index.against | 150 |
| abstract_inverted_index.arrays, | 90 |
| abstract_inverted_index.chaotic | 37, 58 |
| abstract_inverted_index.employs | 28 |
| abstract_inverted_index.further | 86 |
| abstract_inverted_index.methods | 148, 237 |
| abstract_inverted_index.process | 61 |
| abstract_inverted_index.schemes | 102 |
| abstract_inverted_index.serving | 114 |
| abstract_inverted_index.systems | 185 |
| abstract_inverted_index.various | 111 |
| abstract_inverted_index.whereas | 209 |
| abstract_inverted_index.yielded | 203 |
| abstract_inverted_index.Gaussian | 44 |
| abstract_inverted_index.Notably, | 163 |
| abstract_inverted_index.analyses | 212 |
| abstract_inverted_index.analysis | 152, 201 |
| abstract_inverted_index.approach | 6, 227 |
| abstract_inverted_index.attacks, | 154 |
| abstract_inverted_index.compared | 142 |
| abstract_inverted_index.diagonal | 219 |
| abstract_inverted_index.presents | 223 |
| abstract_inverted_index.proposed | 127, 168 |
| abstract_inverted_index.research | 222 |
| abstract_inverted_index.security | 241 |
| abstract_inverted_index.sequence | 19 |
| abstract_inverted_index.standard | 145, 236 |
| abstract_inverted_index.systems, | 129 |
| abstract_inverted_index.Logistic, | 42 |
| abstract_inverted_index.advantage | 230 |
| abstract_inverted_index.approach. | 146 |
| abstract_inverted_index.confirmed | 213 |
| abstract_inverted_index.confusion | 122 |
| abstract_inverted_index.determine | 17 |
| abstract_inverted_index.diffusion | 124 |
| abstract_inverted_index.evaluated | 137 |
| abstract_inverted_index.extensive | 139 |
| abstract_inverted_index.generated | 100 |
| abstract_inverted_index.leverages | 8 |
| abstract_inverted_index.performed | 171 |
| abstract_inverted_index.sequences | 99 |
| abstract_inverted_index.usernames | 15 |
| abstract_inverted_index.vertical, | 217 |
| abstract_inverted_index.Chebyshev, | 41 |
| abstract_inverted_index.attributes | 233 |
| abstract_inverted_index.components | 84 |
| abstract_inverted_index.consistent | 205 |
| abstract_inverted_index.decryption | 192 |
| abstract_inverted_index.encrypted. | 25 |
| abstract_inverted_index.encryption | 50, 109, 117, 128, 226 |
| abstract_inverted_index.especially | 176 |
| abstract_inverted_index.impossible | 193 |
| abstract_inverted_index.individual | 36 |
| abstract_inverted_index.introduces | 3 |
| abstract_inverted_index.processes. | 125 |
| abstract_inverted_index.rigorously | 136 |
| abstract_inverted_index.standards. | 162 |
| abstract_inverted_index.subdivided | 87 |
| abstract_inverted_index.timeframe. | 197 |
| abstract_inverted_index.approaching | 160 |
| abstract_inverted_index.components, | 77 |
| abstract_inverted_index.correlation | 200 |
| abstract_inverted_index.directions. | 220 |
| abstract_inverted_index.encryption, | 47 |
| abstract_inverted_index.established | 207 |
| abstract_inverted_index.fundamental | 116 |
| abstract_inverted_index.homogeneity | 214 |
| abstract_inverted_index.horizontal, | 216 |
| abstract_inverted_index.methodology | 27 |
| abstract_inverted_index.outperforms | 235 |
| abstract_inverted_index.statistical | 151 |
| abstract_inverted_index.strategies: | 31 |
| abstract_inverted_index.techniques, | 208 |
| abstract_inverted_index.utilization | 33 |
| abstract_inverted_index.Furthermore, | 183 |
| abstract_inverted_index.astronomical | 196 |
| abstract_inverted_index.differential | 153 |
| abstract_inverted_index.distribution | 211 |
| abstract_inverted_index.outperformed | 149 |
| abstract_inverted_index.performance. | 243 |
| abstract_inverted_index.segmentation | 65 |
| abstract_inverted_index.authenticated | 14 |
| abstract_inverted_index.user-specific | 232 |
| abstract_inverted_index.characteristics | 11 |
| abstract_inverted_index.<title>Abstract</title> | 0 |
| abstract_inverted_index.<italic>validation</italic> | 202 |
| abstract_inverted_index.<italic>simulations</italic> | 140 |
| cited_by_percentile_year | |
| countries_distinct_count | 1 |
| institutions_distinct_count | 2 |
| citation_normalized_percentile.value | 0.01448887 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |