HCCIE: hexaflake fractals, chaotic maps, and cellular automata based image encryption technique for IoT Article Swipe
YOU?
·
· 2025
· Open Access
·
· DOI: https://doi.org/10.1007/s43926-025-00230-5
The exponential growth of digital information in the twenty first century necessitates secure handling, especially when dealing with sensitive visual data. Conventional encryption methods such as the Data Encryption Standard (DES), Advanced Encryption Standard (AES), and Rivest-Shamir-Adleman (RSA) are prevalent but inefficient for image-related applications due to their limitations for resource-constrained devices. Most conventional schemes exhibit high pixel correlation, increased computational complexity, limited robustness, and significant memory requirement. To address these issues, research has been conducted to develop a novel encryption technique “HCCIE", which utilizes hexaflake fractal (HF), chaotic maps, and Cellular Automata (CA). This paper proposes a novel fractal-based seed generation method for image shuffling. Subsequently, the paper focuses on a Modular Masked XOR (MMX) scheme to generate the pseudo-random mask to facilitate the image masking. Here, image shuffling enhances pixel randomization while MMX strengthens both confusion and diffusion properties for secure color image transfer. Experimental results confirm the strong security characteristics and robustness of the proposed scheme against various types of noise and data loss attacks. The scheme demonstrates improved performance, with a 19.91% enhancement in Mean Squared Error (MSE) and a 10.29% improvement in Peak Signal-to-Noise Ratio (PSNR), thereby making it well-suited for real-time applications. It also exhibits computational efficiency, achieving an average execution time of 1.4 s on an IoT device (Raspberry Pi 3 Model B v1.2). Furthermore, the proposed scheme successfully passed all evaluations in the National Institute of Standards and Technology (NIST) statistical test suite, confirming its cryptographic reliability.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.1007/s43926-025-00230-5
- OA Status
- gold
- References
- 60
- OpenAlex ID
- https://openalex.org/W4415977089
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4415977089Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.1007/s43926-025-00230-5Digital Object Identifier
- Title
-
HCCIE: hexaflake fractals, chaotic maps, and cellular automata based image encryption technique for IoTWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2025Year of publication
- Publication date
-
2025-11-07Full publication date if available
- Authors
-
R. Kumar, Umashankar Rawat, Satyabrata Roy, Dhruv Pradeep ChhajedList of authors in order
- Landing page
-
https://doi.org/10.1007/s43926-025-00230-5Publisher landing page
- Open access
-
YesWhether a free full text is available
- OA status
-
goldOpen access status per OpenAlex
- OA URL
-
https://doi.org/10.1007/s43926-025-00230-5Direct OA link when available
- Cited by
-
0Total citation count in OpenAlex
- References (count)
-
60Number of works referenced by this work
Full payload
| id | https://openalex.org/W4415977089 |
|---|---|
| doi | https://doi.org/10.1007/s43926-025-00230-5 |
| ids.doi | https://doi.org/10.1007/s43926-025-00230-5 |
| ids.openalex | https://openalex.org/W4415977089 |
| fwci | |
| type | article |
| title | HCCIE: hexaflake fractals, chaotic maps, and cellular automata based image encryption technique for IoT |
| biblio.issue | 1 |
| biblio.volume | 5 |
| biblio.last_page | |
| biblio.first_page | |
| is_xpac | False |
| apc_list.value | 990 |
| apc_list.currency | EUR |
| apc_list.value_usd | 1067 |
| apc_paid.value | 990 |
| apc_paid.currency | EUR |
| apc_paid.value_usd | 1067 |
| language | en |
| locations[0].id | doi:10.1007/s43926-025-00230-5 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4210230675 |
| locations[0].source.issn | 2730-7239 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | 2730-7239 |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | True |
| locations[0].source.display_name | Discover Internet of Things |
| locations[0].source.host_organization | https://openalex.org/P4310319965 |
| locations[0].source.host_organization_name | Springer Nature |
| locations[0].source.host_organization_lineage | https://openalex.org/P4310319965 |
| locations[0].source.host_organization_lineage_names | Springer Nature |
| locations[0].license | |
| locations[0].pdf_url | |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | Discover Internet of Things |
| locations[0].landing_page_url | https://doi.org/10.1007/s43926-025-00230-5 |
| locations[1].id | pmh:oai:doaj.org/article:cfec4ca2f81f46edab4fe41b499aaa1e |
| locations[1].is_oa | False |
| locations[1].source.id | https://openalex.org/S4306401280 |
| locations[1].source.issn | |
| locations[1].source.type | repository |
| locations[1].source.is_oa | False |
| locations[1].source.issn_l | |
| locations[1].source.is_core | False |
| locations[1].source.is_in_doaj | False |
| locations[1].source.display_name | DOAJ (DOAJ: Directory of Open Access Journals) |
| locations[1].source.host_organization | |
| locations[1].source.host_organization_name | |
| locations[1].license | |
| locations[1].pdf_url | |
| locations[1].version | submittedVersion |
| locations[1].raw_type | article |
| locations[1].license_id | |
| locations[1].is_accepted | False |
| locations[1].is_published | False |
| locations[1].raw_source_name | Discover Internet of Things, Vol 5, Iss 1, Pp 1-39 (2025) |
| locations[1].landing_page_url | https://doaj.org/article/cfec4ca2f81f46edab4fe41b499aaa1e |
| indexed_in | crossref, doaj |
| authorships[0].author.id | https://openalex.org/A5061380373 |
| authorships[0].author.orcid | https://orcid.org/0009-0001-7609-0159 |
| authorships[0].author.display_name | R. Kumar |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Ravinder Kumar |
| authorships[0].is_corresponding | False |
| authorships[1].author.id | https://openalex.org/A5081724514 |
| authorships[1].author.orcid | https://orcid.org/0000-0002-1293-1836 |
| authorships[1].author.display_name | Umashankar Rawat |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Umashankar Rawat |
| authorships[1].is_corresponding | False |
| authorships[2].author.id | https://openalex.org/A5007067931 |
| authorships[2].author.orcid | https://orcid.org/0000-0002-1856-5144 |
| authorships[2].author.display_name | Satyabrata Roy |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Satyabrata Roy |
| authorships[2].is_corresponding | False |
| authorships[3].author.id | https://openalex.org/A5120287084 |
| authorships[3].author.orcid | |
| authorships[3].author.display_name | Dhruv Pradeep Chhajed |
| authorships[3].author_position | last |
| authorships[3].raw_author_name | Dhruv Pradeep Chhajed |
| authorships[3].is_corresponding | False |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://doi.org/10.1007/s43926-025-00230-5 |
| open_access.oa_status | gold |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-11-07T00:00:00 |
| display_name | HCCIE: hexaflake fractals, chaotic maps, and cellular automata based image encryption technique for IoT |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-07T23:23:33.682996 |
| primary_topic | |
| cited_by_count | 0 |
| locations_count | 2 |
| best_oa_location.id | doi:10.1007/s43926-025-00230-5 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4210230675 |
| best_oa_location.source.issn | 2730-7239 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | 2730-7239 |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | True |
| best_oa_location.source.display_name | Discover Internet of Things |
| best_oa_location.source.host_organization | https://openalex.org/P4310319965 |
| best_oa_location.source.host_organization_name | Springer Nature |
| best_oa_location.source.host_organization_lineage | https://openalex.org/P4310319965 |
| best_oa_location.source.host_organization_lineage_names | Springer Nature |
| best_oa_location.license | |
| best_oa_location.pdf_url | |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | Discover Internet of Things |
| best_oa_location.landing_page_url | https://doi.org/10.1007/s43926-025-00230-5 |
| primary_location.id | doi:10.1007/s43926-025-00230-5 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4210230675 |
| primary_location.source.issn | 2730-7239 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | 2730-7239 |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | True |
| primary_location.source.display_name | Discover Internet of Things |
| primary_location.source.host_organization | https://openalex.org/P4310319965 |
| primary_location.source.host_organization_name | Springer Nature |
| primary_location.source.host_organization_lineage | https://openalex.org/P4310319965 |
| primary_location.source.host_organization_lineage_names | Springer Nature |
| primary_location.license | |
| primary_location.pdf_url | |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | Discover Internet of Things |
| primary_location.landing_page_url | https://doi.org/10.1007/s43926-025-00230-5 |
| publication_date | 2025-11-07 |
| publication_year | 2025 |
| referenced_works | https://openalex.org/W2909459674, https://openalex.org/W4282830073, https://openalex.org/W3126432696, https://openalex.org/W3090445200, https://openalex.org/W4404856442, https://openalex.org/W4396641770, https://openalex.org/W2010620862, https://openalex.org/W2790843571, https://openalex.org/W2901308606, https://openalex.org/W2625153752, https://openalex.org/W2165385715, https://openalex.org/W3138774212, https://openalex.org/W4396852837, https://openalex.org/W2759157796, https://openalex.org/W4400975332, https://openalex.org/W2800913513, https://openalex.org/W2988438468, https://openalex.org/W2918149988, https://openalex.org/W2940705568, https://openalex.org/W4410613984, https://openalex.org/W4409870708, https://openalex.org/W2078938486, https://openalex.org/W2021684685, https://openalex.org/W1977135383, https://openalex.org/W2993769169, https://openalex.org/W3005341457, https://openalex.org/W3006939600, https://openalex.org/W3189143477, https://openalex.org/W3156256135, https://openalex.org/W2069436097, https://openalex.org/W3035687072, https://openalex.org/W4312123693, https://openalex.org/W4406024520, https://openalex.org/W4312305379, https://openalex.org/W4282826758, https://openalex.org/W4408699641, https://openalex.org/W4378976249, https://openalex.org/W4210392020, https://openalex.org/W4310553589, https://openalex.org/W4384564889, https://openalex.org/W4386799518, https://openalex.org/W4390221460, https://openalex.org/W4310689655, https://openalex.org/W2075917111, https://openalex.org/W2544923933, https://openalex.org/W2074882608, https://openalex.org/W3152912136, https://openalex.org/W2898362616, https://openalex.org/W4283399457, https://openalex.org/W2743944601, https://openalex.org/W4388994446, https://openalex.org/W4392380075, https://openalex.org/W4390635856, https://openalex.org/W2883984100, https://openalex.org/W2903365764, https://openalex.org/W2910387327, https://openalex.org/W2010065947, https://openalex.org/W2026829213, https://openalex.org/W4408360809, https://openalex.org/W2133665775 |
| referenced_works_count | 60 |
| abstract_inverted_index.3 | 218 |
| abstract_inverted_index.B | 220 |
| abstract_inverted_index.a | 79, 98, 112, 175, 184 |
| abstract_inverted_index.s | 211 |
| abstract_inverted_index.It | 199 |
| abstract_inverted_index.Pi | 217 |
| abstract_inverted_index.To | 69 |
| abstract_inverted_index.an | 205, 213 |
| abstract_inverted_index.as | 26 |
| abstract_inverted_index.in | 7, 178, 187, 230 |
| abstract_inverted_index.it | 194 |
| abstract_inverted_index.of | 4, 156, 163, 209, 234 |
| abstract_inverted_index.on | 111, 212 |
| abstract_inverted_index.to | 47, 77, 118, 123 |
| abstract_inverted_index.1.4 | 210 |
| abstract_inverted_index.IoT | 214 |
| abstract_inverted_index.MMX | 135 |
| abstract_inverted_index.The | 1, 169 |
| abstract_inverted_index.XOR | 115 |
| abstract_inverted_index.all | 228 |
| abstract_inverted_index.and | 36, 65, 91, 139, 154, 165, 183, 236 |
| abstract_inverted_index.are | 39 |
| abstract_inverted_index.but | 41 |
| abstract_inverted_index.due | 46 |
| abstract_inverted_index.for | 43, 50, 104, 142, 196 |
| abstract_inverted_index.has | 74 |
| abstract_inverted_index.its | 243 |
| abstract_inverted_index.the | 8, 27, 108, 120, 125, 150, 157, 223, 231 |
| abstract_inverted_index.Data | 28 |
| abstract_inverted_index.Mean | 179 |
| abstract_inverted_index.Most | 53 |
| abstract_inverted_index.Peak | 188 |
| abstract_inverted_index.This | 95 |
| abstract_inverted_index.also | 200 |
| abstract_inverted_index.been | 75 |
| abstract_inverted_index.both | 137 |
| abstract_inverted_index.data | 166 |
| abstract_inverted_index.high | 57 |
| abstract_inverted_index.loss | 167 |
| abstract_inverted_index.mask | 122 |
| abstract_inverted_index.seed | 101 |
| abstract_inverted_index.such | 25 |
| abstract_inverted_index.test | 240 |
| abstract_inverted_index.time | 208 |
| abstract_inverted_index.when | 16 |
| abstract_inverted_index.with | 18, 174 |
| abstract_inverted_index.(CA). | 94 |
| abstract_inverted_index.(HF), | 88 |
| abstract_inverted_index.(MMX) | 116 |
| abstract_inverted_index.(MSE) | 182 |
| abstract_inverted_index.(RSA) | 38 |
| abstract_inverted_index.Error | 181 |
| abstract_inverted_index.Here, | 128 |
| abstract_inverted_index.Model | 219 |
| abstract_inverted_index.Ratio | 190 |
| abstract_inverted_index.color | 144 |
| abstract_inverted_index.data. | 21 |
| abstract_inverted_index.first | 10 |
| abstract_inverted_index.image | 105, 126, 129, 145 |
| abstract_inverted_index.maps, | 90 |
| abstract_inverted_index.noise | 164 |
| abstract_inverted_index.novel | 80, 99 |
| abstract_inverted_index.paper | 96, 109 |
| abstract_inverted_index.pixel | 58, 132 |
| abstract_inverted_index.their | 48 |
| abstract_inverted_index.these | 71 |
| abstract_inverted_index.types | 162 |
| abstract_inverted_index.which | 84 |
| abstract_inverted_index.while | 134 |
| abstract_inverted_index.(AES), | 35 |
| abstract_inverted_index.(DES), | 31 |
| abstract_inverted_index.(NIST) | 238 |
| abstract_inverted_index.10.29% | 185 |
| abstract_inverted_index.19.91% | 176 |
| abstract_inverted_index.Masked | 114 |
| abstract_inverted_index.device | 215 |
| abstract_inverted_index.growth | 3 |
| abstract_inverted_index.making | 193 |
| abstract_inverted_index.memory | 67 |
| abstract_inverted_index.method | 103 |
| abstract_inverted_index.passed | 227 |
| abstract_inverted_index.scheme | 117, 159, 170, 225 |
| abstract_inverted_index.secure | 13, 143 |
| abstract_inverted_index.strong | 151 |
| abstract_inverted_index.suite, | 241 |
| abstract_inverted_index.twenty | 9 |
| abstract_inverted_index.v1.2). | 221 |
| abstract_inverted_index.visual | 20 |
| abstract_inverted_index.(PSNR), | 191 |
| abstract_inverted_index.Modular | 113 |
| abstract_inverted_index.Squared | 180 |
| abstract_inverted_index.address | 70 |
| abstract_inverted_index.against | 160 |
| abstract_inverted_index.average | 206 |
| abstract_inverted_index.century | 11 |
| abstract_inverted_index.chaotic | 89 |
| abstract_inverted_index.confirm | 149 |
| abstract_inverted_index.dealing | 17 |
| abstract_inverted_index.develop | 78 |
| abstract_inverted_index.digital | 5 |
| abstract_inverted_index.exhibit | 56 |
| abstract_inverted_index.focuses | 110 |
| abstract_inverted_index.fractal | 87 |
| abstract_inverted_index.issues, | 72 |
| abstract_inverted_index.limited | 63 |
| abstract_inverted_index.methods | 24 |
| abstract_inverted_index.results | 148 |
| abstract_inverted_index.schemes | 55 |
| abstract_inverted_index.thereby | 192 |
| abstract_inverted_index.various | 161 |
| abstract_inverted_index.Abstract | 0 |
| abstract_inverted_index.Advanced | 32 |
| abstract_inverted_index.Automata | 93 |
| abstract_inverted_index.Cellular | 92 |
| abstract_inverted_index.National | 232 |
| abstract_inverted_index.Standard | 30, 34 |
| abstract_inverted_index.attacks. | 168 |
| abstract_inverted_index.devices. | 52 |
| abstract_inverted_index.enhances | 131 |
| abstract_inverted_index.exhibits | 201 |
| abstract_inverted_index.generate | 119 |
| abstract_inverted_index.improved | 172 |
| abstract_inverted_index.masking. | 127 |
| abstract_inverted_index.proposed | 158, 224 |
| abstract_inverted_index.proposes | 97 |
| abstract_inverted_index.research | 73 |
| abstract_inverted_index.security | 152 |
| abstract_inverted_index.utilizes | 85 |
| abstract_inverted_index.Institute | 233 |
| abstract_inverted_index.Standards | 235 |
| abstract_inverted_index.achieving | 204 |
| abstract_inverted_index.conducted | 76 |
| abstract_inverted_index.confusion | 138 |
| abstract_inverted_index.diffusion | 140 |
| abstract_inverted_index.execution | 207 |
| abstract_inverted_index.handling, | 14 |
| abstract_inverted_index.hexaflake | 86 |
| abstract_inverted_index.increased | 60 |
| abstract_inverted_index.prevalent | 40 |
| abstract_inverted_index.real-time | 197 |
| abstract_inverted_index.sensitive | 19 |
| abstract_inverted_index.shuffling | 130 |
| abstract_inverted_index.technique | 82 |
| abstract_inverted_index.transfer. | 146 |
| abstract_inverted_index.(Raspberry | 216 |
| abstract_inverted_index.Encryption | 29, 33 |
| abstract_inverted_index.Technology | 237 |
| abstract_inverted_index.confirming | 242 |
| abstract_inverted_index.encryption | 23, 81 |
| abstract_inverted_index.especially | 15 |
| abstract_inverted_index.facilitate | 124 |
| abstract_inverted_index.generation | 102 |
| abstract_inverted_index.properties | 141 |
| abstract_inverted_index.robustness | 155 |
| abstract_inverted_index.shuffling. | 106 |
| abstract_inverted_index.“HCCIE", | 83 |
| abstract_inverted_index.complexity, | 62 |
| abstract_inverted_index.efficiency, | 203 |
| abstract_inverted_index.enhancement | 177 |
| abstract_inverted_index.evaluations | 229 |
| abstract_inverted_index.exponential | 2 |
| abstract_inverted_index.improvement | 186 |
| abstract_inverted_index.inefficient | 42 |
| abstract_inverted_index.information | 6 |
| abstract_inverted_index.limitations | 49 |
| abstract_inverted_index.robustness, | 64 |
| abstract_inverted_index.significant | 66 |
| abstract_inverted_index.statistical | 239 |
| abstract_inverted_index.strengthens | 136 |
| abstract_inverted_index.well-suited | 195 |
| abstract_inverted_index.Conventional | 22 |
| abstract_inverted_index.Experimental | 147 |
| abstract_inverted_index.Furthermore, | 222 |
| abstract_inverted_index.applications | 45 |
| abstract_inverted_index.conventional | 54 |
| abstract_inverted_index.correlation, | 59 |
| abstract_inverted_index.demonstrates | 171 |
| abstract_inverted_index.necessitates | 12 |
| abstract_inverted_index.performance, | 173 |
| abstract_inverted_index.reliability. | 245 |
| abstract_inverted_index.requirement. | 68 |
| abstract_inverted_index.successfully | 226 |
| abstract_inverted_index.Subsequently, | 107 |
| abstract_inverted_index.applications. | 198 |
| abstract_inverted_index.computational | 61, 202 |
| abstract_inverted_index.cryptographic | 244 |
| abstract_inverted_index.fractal-based | 100 |
| abstract_inverted_index.image-related | 44 |
| abstract_inverted_index.pseudo-random | 121 |
| abstract_inverted_index.randomization | 133 |
| abstract_inverted_index.Signal-to-Noise | 189 |
| abstract_inverted_index.characteristics | 153 |
| abstract_inverted_index.resource-constrained | 51 |
| abstract_inverted_index.Rivest-Shamir-Adleman | 37 |
| cited_by_percentile_year | |
| countries_distinct_count | 0 |
| institutions_distinct_count | 4 |
| citation_normalized_percentile |