Abstract
In recent years, numerous image encryption schemes have been developed that demonstrate different levels of effectiveness in terms of robust security and realtime applications. While a few of them outperform in terms of robust security, others perform well for realtime applications where less processing time is required. Balancing these two aspects poses a challenge, aiming to achieve efficient encryption without compromising security. To address this challenge, the proposed research presents a robust data security approach for encrypting grayscale images, comprising five key phases. The first and second phases of the proposed encryption framework are dedicated to the generation of secret keys and the confusion stage, respectively. While the level1, level2, and level2 diffusions are performed in phases 3, 4, and 5, respectively, The proposed approach begins with secret key generation using chaotic maps for the initial pixel scrambling in the plaintext image, followed by employing the Fibonacci Transformation (FT) for an additional layer of pixel shuffling. To enhance security, Tribonacci Transformation (TT) creates level1 diffusion in the permuted image. Level2 diffusion is introduced to further strengthen the diffusion within the plaintext image, which is achieved by decomposing the diffused image into eightbit planes and implementing XOR operations with corresponding bit planes that are extracted from the key image. After that, the discrete wavelet transform (DWT) is employed to develop secondary keys. The DWT frequency subband (highfrequency subband) is substituted using the substitution box process. This creates further diffusion (level 3 diffusion) to make it difficult for an attacker to recover the plaintext image from an encrypted image. Several statistical tests, including mean square error analysis, histogram variance analysis, entropy assessment, peak signaltonoise ratio evaluation, correlation analysis, key space evaluation, and key sensitivity analysis, demonstrate the effectiveness of the proposed work. The proposed encryption framework achieves significant statistical values, with entropy, correlation, energy, and histogram variance values standing at 7.999, 0.0001, 0.0156, and 6458, respectively. These results contribute to its robustness against cyberattacks. Moreover, the processing time of the proposed encryption framework is less than one second, which makes it more suitable for realworld applications. A detailed comparative analysis with the existing methods based on chaos, DWT, Tribonacci transformation (TT), and Fibonacci transformation (FT) reveals that the proposed encryption scheme outperforms the existing ones.
Similar content being viewed by others
Introduction
With the exponential and, frequency use of wireless technology and digital devices, the exchange of digital data such as images has increased the demand for robust security^{1,2}. As images play a vital role in communication, ensuring image security has become an important concern. Numerous approaches, such as secret image sharing^{3}, image steganography^{4}, and image encryption^{5,6}, proposed in the past several years to enhance the security of image transmission through wireless channels such as the Internet. Digital images are characterized by their significant data content, which exhibits high pixel correlation and redundancy. Consequently, traditional cryptographic schemes like DES and AES are not suitable for image encryption due to their high computational complexity. To address this challenge, several categories of encryption schemes have been proposed to effectively protect the image data^{7,8,9,10,11}.
The image encryption algorithm is used to convert an image into an unreadable message known as a cipher image through the utilization of secret keys^{12}. This resulting cipher image bears a resemblance to a noisy image, rendering it virtually difficult for attackers to recover the plaintext image from the cipher image. This transformation is primarily achieved either by scrambling the pixels or by changing the intensity of the original pixel values. Specifically, the pixel scrambling technique plays a crucial role in breaking the correlation of the adjacent pixels. This phase, appropriately termed the confusion phase of image encryption, results in a cipher image with an entirely different appearance. In particular, this pixel scrambling process preserves the histogram of the original image since it does not alter the pixel intensity^{13}. Subsequently, the diffusion phase emerges as an integral step in the image encryption process, aimed at modifying the intensity values of the pixels. This modification leads to the establishment of a uniform histogram in the cipher image, thereby enhancing the system’s resilience against a spectrum of potential attacks^{14}. The detailed analysis of the grayscale images including medical images can be found in^{15}.
Image encryption plays a pivotal role in various essential functions within the corporate world^{16}. In the realm of healthcare, the digitization of health records, which encompasses patient data, medical history, and symptoms, requires robust protection due to their sensitive nature^{17}. Securing these records from unauthorized access is paramount. Likewise, in the military sector, images such as maps, building locations, and intelligence on adversaries are of the utmost importance. They play vital roles in tasks like small target identification, tracking, and missile guidance. Consequently, ensuring the security of these images is critical to national defense, as unauthorized access could pose significant threats. The media industry, characterized by roundtheclock news broadcasting, hinges on the privacy of multimedia content, be it images, audio, or video. Image encryption plays a crucial role in safeguarding this information from unwarranted intrusion. Additionally, as cloud storage becomes increasingly prevalent, thirdparty entities store client data in the cloud, including images. Protecting the privacy of these cloudstored images is imperative to maintaining data security and confidentiality, making image encryption an essential component of cloud applications^{18}.
The proposed research introduces a novel image encryption method that employs the Fibonacci transform (FT) to scramble pixels, achieved through matrix multiplication of two matrices (\(2 \times 2\) and \(2 \times 1\)). The diffusion is created using the XOR operation in the scrambled image with a randomly generated ikey image. A key innovation lies in the utilization of the Tribonaccibased transformation (TBT) to modify pixel values, which is achieved by multiplying a \(3 \times 3\) Tribonacci array with a \(3 \times 1\) vector representing three consecutive pixels. Further in the diffusion process, traditional operations such as substitution box (Sbox) and circular bitshift are applied. Moreover, the proposed method demonstrates the ability to handle different categories of images, such as binary images and images with different levels of grayscale. It is lauded for its simplicity, ease of implementation, and fast execution. Experimental results show the resilience of the proposed method. The generic flow of the proposed work is displayed in Fig. 1.
The proposed research holds significant potential for various practical applications where image security is paramount. For instance, for sensitive data storage, secure communication channels, and confidential image sharing, the integration of chaotic maps, Fibonacci, Tribonacci transformations, and Discrete Wavelet Transform (DWT) diffusion provides a robust data encryption framework. The innovative fusion of these cryptographic techniques aims to provide robust security measures to ensure the protection of critical visual information. This research’s findings could find application in sectors ranging from medical imaging and military communications to secure digital information, which contributes to the securing of sensitive visual data in an increasingly interconnected and datadriven world.
Motivation
In today’s digital age, the exchange and transmission of sensitive information, particularly through visual media like images, demands robust security measures. In the year 2020, Equifax, a leading credit reporting company, suffered a substantial data breach, leading to the compromise of private personal information, including images and credit card details, for 143 million individuals^{19}. According to a study presented in^{20}, around 52% of digital information in several countries such as Bangladesh, Nepal, Sweden, and Denmark is categorized as facing high cyber risk, while 32% is deemed to have a moderate risk, and a mere 12% is considered to be at low risk. The study shows the considerable cyber threat landscape confronting sensitive information, with an average of 630 cyberattacks directed at digital data such as images and bank credit cards. Therefore, with the increasing prevalence of cyber threats and unauthorized access, the need for effective cryptographic protocols has become paramount. As per cybersecurity reports, sensitive images often become targets for malicious activities due to their vulnerability during transmission. Image encryption, when implemented effectively, secures against unauthorized access and ensures the confidentiality and integrity of the visual data.
Considering these challenges and the evolving landscape of cyber threats, the proposed research aims to address the need for a robust ecryptographic protocol that provides a strong defense against cyberattacks while maintaining a low processing time. The proposed encryption framework combines chaotic maps, Fibonacci and Tribonacci transformations, and DWT diffusion to achieve an efficient solution for enhancing image security. By integrating these elements, the proposed approach aims to surpass existing methods in terms of security and realtime applicability, which contributes to the ongoing efforts to enhance digital data protection.
Organization of the paper
The rest of the sections of this paper are structured as follows: "Related work" section provides an overview of existing encryption schemes, accompanied by a summary table outlining vulnerabilities and potential solutions. "Preliminaries" section gives the foundational knowledge essential for developing the proposed encryption scheme, detailed in "Proposed encryption procedure" section. The experimental outcomes of the proposed encryption framework are explained in "Experimental results and analysis" section. "Uniqueness and the advantages of the proposed encryption framework" section is devoted to outlining the advantages and uniqueness of the proposed work. It reveals the advantages and shows the uniqueness of the proposed encryption framework in comparison to existing studies. Finally, "Conclusion and future work" section concludes the proposed research and provides a few future recommendations aimed at enhancing the proposed encryption framework.
Related work
In the early stages of image encryption development, the focus was primarily on applying these methods to compressed data. Among the various categories of image encryption techniques, chaoticbased approaches have garnered substantial attention^{21}. Their popularity stems from their sensitivity to initial parameters, the capacity to generate pseudorandom sequences, and the unpredictability of motion patterns. These chaotic methods involve the computation of pseudorandom sequences, which are then used to define specific permutations for tasks like pixel scrambling, bit plane permutation, and substitution matrix creation^{22,23,24}.
The chaotic behavior aligns well with the encryption requirements, improving security. Early researchers predominantly used classical chaotic maps such as Baker’s map^{25}, logistic map^{26}, and tent map^{27}. Recently, innovative hybrid chaotic image encryption methods have emerged, combining chaotic maps with optimized substitution boxes^{28,29,30,31}. Some of the recent advancements involve the adoption of highdimensional chaotic systems^{32,33,34}. These systems have gained popularity due to their ability to expand the key space and improve resilience against attacks. For instance, a 5D hyperchaotic system^{35} has been proposed to encrypt color images, involving the decomposition of plain images into subbands through complex wavelet transformations. Subsequently, secret keys derived from a 5D chaotic map are used to diffuse these subbands. Furthermore, novel visual encryption schemes featuring 6D hyperchaotic systems^{36} and image cryptosystems utilizing hyperchaotic systems in conjunction with Fibonacci Qmatrices have been introduced in recent research.
Cahos based image encryption schemes
Encryption schemes for images based on chaos utilize the inherent unpredictability and sensitivity to initial conditions present in chaotic systems to safeguard digital images. For instance, in^{37}, Nematzadeh et al proposed a new hybrid method based on the integration of DNA encoding and a Binary Search Tree (BST) algorithm. In^{38}, Yadollahi et al. proposed a twophase secure image encryption scheme using DNA and RNA. It generates the initial cipher image using DNA rules, and a chaotic function, while the final encrypted image is obtained through the use of XOR operation. In^{39}, Abbasi et al. proposed a new Chaotic Evolutionary Biomolecules Model (CEBM) for image encryption, which incorporates the concepts of DNA and RNAbased encryption methods^{40}. This model employs multiple chaotic maps for scrambling purposes, while DNA, RNA, and XOR operations are used to create the diffusion in the plaintext image^{41,42,43}. In^{28}, Benaissi et al. proposed a novel image encryption algorithm that overcomes the limitations associated with onedimensional (1D) maps and multidimensional (MD) maps. They adopted a hybrid approach, combining three modified and enhanced 1D chaotic maps, providing enhanced security. The encryption process utilizes a key image to initialize the chaotic maps. Moreover, the incorporation of ExtraParam extracted from the plaintext image adds sensitivity to bit changes during chaotic map initialization. This method comprises two core phases: confusion and diffusion, and it has proven its efficacy through rigorous testing and cryptanalysis. In^{44}, Liu et al., introduced a cluster of onedimensional quadratic chaotic maps based on topological conjugate theory. These 1D chaotic maps feature three tunable parameters, significantly expanding the parameter space compared to traditional 1D maps. The theoretical analysis validates their chaotic nature, as they are topologically conjugated with logistic chaotic maps. The paper presents an example of a 1D quadratic chaotic map and showcases several numerical simulations that confirm the ideal chaotic characteristics, aligning with the theoretical analysis. In^{45}, Shraida et al. introduced a proficient technique for encrypting color images, which integrates DNA encoding and utilizes two variations of hyperchaotic maps. The process consists of three steps: initializing conditions for generating Lorenz chaotic maps through a Secure Hash Algorithm (SHA) applied to a plain image, performing a confusion procedure using Lorenz hyperchaotic sequences to scramble the image’s color components, and combining three approaches for diffusion: DNA encoding/decoding, addition operations between components, and XOR operations with Rossler hyperchaotic sequences. This method ensures robust encryption for color images. In^{46}, Zhang et al. introduced an image encryption scheme grounded in the Sarrus rule and the theory of linear algebra. They established the Sarrus model to scramble plain images by reordering pixel positions, producing a stereoscrambled matrix. Additionally, the twodimensional matrix is converted into a threedimensional (3D) space.
Fibonacci, DWT and DNA based image encryption schemes
Fibonaccibased image encryption schemes use the distinctive properties of the Fibonacci sequence to enhance security. However, DWT integrates multiresolution analysis for encryption on different frequency components. While DNAbased encryption schemes add a biological element, transforming images into DNAlike structures and employing biological principles like encoding and decoding for enhanced cryptographic complexity. For instance, in^{47}, Biban et al. proposed an image encryption scheme that incorporates an 8D hyperchaotic system that integrates a Fibonacci QMatrix (FQmatrix). This approach enhances the security against various cyberattacks, making it suitable for realtime applications. In^{48}, Zhong et al. designed a new methodology for the development of random numbers based on chaos theory. Moreover, wavelet transformations and XOR operations are also used with a chaotic matrix to enhance security. In^{49}, Begum et al., proposed a hybrid blind digital image watermarking technique that integrates, Discrete Wavelet Transform (DWT), and Singular Value Decomposition (SVD). The encryption process starts with the use of the Arnold map to encrypt the watermark image. The remaining steps involve DCT, DWT, and SVD transformations applied to both the watermark and host image. In^{50}, Balasamy et al. introduced a new image watermarking method that employs fuzzybased Region of Interest (ROI) selection and wavelet transformation to secure embed encrypted watermarks securely. The process involves fuzzification of the source image for critical ROI selection, followed by a Discrete Wavelet Transform (DWT) to rearrange subbands using logistic mappingderived magnitude values. This pixel swapping ensures a fully encrypted image, enhancing security and resistance to decryption. However, the challenges may arise from relying on singular values for watermark robustness and using logistic mapping for subband swapping, posing susceptibility to specific attacks. More detailed explanation of ROI based techniques to secure digital images can be found in^{51,52,53}. In^{54}, Chai et al. proposed a DNAbased method, involving the conversion of a plaintext image into a DNA matrix. This method employs a Chaotic Logistic Map (CLM)^{55} for the scrambling of the pixel rows and columns. After that, the sequence generated using CLM is used to create the diffusion in the image pixels. The seed parameters for this method are obtained through the application of a hashing algorithm called SHA256 on the original image. In^{56}, Chen et al. incorporated a DNA coding and chaotic Henonmap to secure the digital images. Here, an Sbox is initially applied to create cryptographic effects for complex DNA operations^{57}. In^{58}, Ganavi et al., utilized ErrorCorrecting Codes (ECC) with modifications to encrypt and decrypt input plaintext images. This method transforms carrier digital images into frequency bands using the Discrete Wavelet Transform (DWT) and conceals the encrypted hash of the input within highfrequency bands using the LeastSignificantBit (LSB) technique. The approach successfully achieves data confidentiality and verifies data integrity through SHA256. Table 1 provides an overview of the related work, encompassing both the identified limitations and the corresponding potential solutions.
Contributions of the paper
As indicated in Table 1, most current schemes exhibit weak security vulnerabilities, high computational complexity, or infeasibility for realworld implementations. Taking into account these vulnerabilities, the novelty and contributions of the proposed research are as follows:

The application of a Fibonacci Transform (FT) for pixel scrambling is characterized by the nonlinear and complex properties of the FT. These features enable the FT to intricately scramble the pixels of an image, which enhances the level of security and the encryption process.

Implementing the TBT involves adjusting the values of the pixels by multiplying a Tribonacci array \(3 \times 3\) with a vector \(3 \times 1\) representing three consecutive pixels. This optimization reduces overall computational time without compromising the strength of the security measures which makes the proposed encryption scheme suitable for realworld applications.

The proposed encryption scheme has a highkey space, which is achieved using multiple chaotic maps. The highkey space enhances the security of the digital data against bruteforce attacks.

DWT is employed to generate secondary keys that enhance the security of the propsoed encryption framework by diversifying the encryption keys.

The nature of certain operations, such as XOR operations and DWT, allows for parallel processing that helps reduce the overall computational time.

The proposed method employs level2 diffusion by decomposing the diffused image into eightbit planes and performing XOR operations with the corresponding bit planes which are extracted from the key image. This step strengthens the diffusion within the plaintext image which makes it more resistant against cryptographic attacks.
Preliminaries
In the subsequent two subsections, we delve into the mathematical aspects of the Fibonacci Transform and the Tribonacci Transform.
Fibonacci transform
The Fibonacci series is a sequence of numbers (\(f_l =f_1, f_2, \cdots , f_n\)) in which each number is the sum of the two previous numbers. It mainly starts with \(f_1\) =0 and \(f_2\) = 1, and the next numbers are generated by adding the previous two numbers in the sequence as shown in Eq. (1).
The generalized form of Eq. (1) is given in Eq. (2).
The fibonacci and tribonacci numbers are given in Table 2 when \(l \in [7 +7]\).
The Fibonacci sequence, renowned for its remarkable properties, has been a subject of fascination for researchers. The researcher has employed matrix operations, such as determinants to derive class identities for generalized Fibonacci numbers [71]. The proposed research focuses on three key properties of generalized Fibonacci sequences, including, d’Ocagne’s identity (DOi), Catalan’s identity (CTi), and Cassini’s identity (CAi), and the mathematical formulation of such identities are given in Eqs. (3), (4), and (5), respectively.
The identities mentioned above can be represented in terms of determinants as follows:
The matrix associated with any of the mentioned identities can be employed to manipulate data in cryptography modulo n, but only if the greatest common divisor (gcd) of the determinant (det) and n is congruent to 1 modulo n.

If gcd(det, n) \(\equiv\) 1 mod n, the matrix can be used for data transformation in cryptography.
Considering the Fibonacci series definition, where \(f_1\) = 1 and \(f_2\) = 1, we can make the following observations regarding the transformation matrices:

Regardless of the value of i, CAi can take on either +1 or 1.

When the difference between i and j equals 1 or 2, DOi may assume either +1 or 1.

If j belongs to the set 1, 2, CTi can be either +1 or 1.
According to Eqs. (3), (4), and (5), it becomes evident that Cassini’s identity can be considered a particular instance of the other two identities, as follows:

DOi transforms into Cassini’s identity when p + 1 = q.

CTi becomes Cassini’s identity when p equals 1.
Tribonacci transform
Tribonacci transform is the extension of the fibonacci sequence and it is defined in Eq. (7).
where \(t_0 = t_1 = 0\), \(t_2 = 1\)
The negative \(t_{l}\), denoted as \(t_{l}\) adheres to the recurrence relation given in Eq. (8).
Equations (7) and (8) yield the Tribonacci numbers, spanning values for k such as \(\cdots , 7, 6\), \(\cdots , +6, +7, \cdots\), as displayed in Table 2.
The encoding method utilizing the Tribonacci numbers relies on the Tribonacci numbers and involves the introduction of a matrix having three rows and three columns denoted as M. The matrix M is defined as follows:
With the determinant of M equal to 1, and the inverse of H detailed in Eq. (10).
The calculation of the positive powers of M, specifically \(M^l\), for l in the set of natural numbers, is carried out as follows:
The computation of the negative powers of M, denoted as \(M^{l}\) for l belonging to the set of natural numbers, is detailed in Eq. (12).
Equations (11) and (12) can be readily derived through the application of mathematical induction. Utilizing the previously defined \(M^z\) for z within the set of integers, the following properties can be readily demonstrated:
\({\textbf {Z1: }} M^p =M^{p1} + M^{p2} + M^{p3}\)
\({\textbf {Z2: }} M^pM^q =M^{q}M^p = H^{p+q}(p,q \in (\infty +\infty ))\)
\({\textbf {Z3: }} det M^p = 1\)
Hence, based on the preceding discourse, it’s evident that a Tribonacci matrix \(M^{i}\), regardless of the specific index i, possesses the capability to convert data into an alternate domain. Moreover, it’s important to highlight that the original data can be restored, due to the invertibility of \(M^i\). Consequently, \(M^i\) can be effectively integrated into encryption schemes.
Sixdimensional hyperchaotic map
In^{59}, Grassi et al. introduced a novel fourwing hyperchaotic attractor created through the coupling of two identical Lorenz systems, as described in Eq. (13).
where the variables b, c, and d represent positive system parameters, while \(\eta _1\) and \(\eta _2\) are the coupling parameters. When specific values are assigned to these parameters, such as b = 10, c = 28, d = 8/3, and \(\eta _1\) = \(\eta _2\) = 0.05, the system given Eq. (13) produces the distinctive fourwing attractors depicted in Fig. 2. In the context of the subsequent cryptosystem, the parameters \(b, c, \eta _1\) and \(\eta _2\), and the initial conditions \(y_\rho (0)\) (where \(\rho \in [1, 6]\)) are treated as secret keys. These secret keys, in combination with the plaintext image, are utilized to generate the key streams essential for confusion in the proposed encryption technique.
Proposed encryption procedure
The suggested encryption procedure comprises five primary phases:

1.
The creation of initial secret keys at level1 via the utilization of a chaotic map.

2.
Implementing a confusion operation employing the Fibonacci series.

3.
Employing a level1 diffusion operation with the assistance of the Tribonacci series.

4.
Level2 diffusion operation using bitplane extraction method.

5.
Incorporating of Discrete Wavelet Transform (DWT) in the proposed encryption process.

6.
Implementing Sbox within DWT subbands for level3 diffusion.
The illustration of the proposed encryption approach is given in Fig. 3. Further elaboration on the encryption process is provided in the subsequent sections.
Random sequences and key image generation process
In the generation of the secret of level1, multiple henon chaotic map is used. This level1 secret key is a twodimensional random image having no meaningful information present in it and it will be used for incorporating the exclusive OR operation to modify the intensities of the original image. Algorithm 1 provides the stepbystep details of the key generation procedure. Additionally, a 256bit key size is employed for both encryption and decryption operations. Various initial conditions have been utilized as secret keys to produce random sequences and a key image.
Confusion stage
During the phase of transformation, a Fibonacci transformation is introduced to scramble the positions of the pixels. It’s important to highlight that any matrices corresponding to CAi, DOi, or CTi can be utilized as transformation matrices to scramble the pixels. Notably, it’s possible to parameterize these transformations using a single variable. It’s worth mentioning that Cassini’s identity is a specific case of the other two identities.
In our experimental setup, we specifically employed CAi during the confusion phase. The key to this confusion denoted as \(k_c\), is instrumental in determining the value of j for CAi. Subsequently, this value of i is used to scramble the pixels. To compute i, we consider the formula \(i = \text {mod}(k_c, P) + 3\), where P represents a prime number with a moderate value, and this value is made public.
For an image (I) with dimensions \(R \times C\), where R and C show the number of rows and columns of the image pixels, and \(R = C\). The pixel’s location is indicated as (a, b), and subsequent to the transformation, the new coordinates are expressed as \((a', b')\). This relationship is supported by Eq. (14).
The procedure for the confusion process is demonstrated in Algorithm 2. It is notable that, with the same key, an identical transformation can be deduced. As a result, the confusion phase exhibits invertibility.
Diffusion stage
In order to induce level2 confusion within \(I^{c}(a^{'},b^{'})\), a pair of key sets, specifically, set1 and set2, are employed. Set1 serves the purpose of conducting pixelwise scrambling, while set2 is applied to execute rowwise and columnwise scrambling procedures, resulting in the creation of a newly confused image denoted as \(I^{'c}(a^{'},b^{'})\).
The transformation in the confusion phase retains the pixel intensities without any alteration. Consequently, the intensity profile of both the original unaltered image and the \(I^c(a',b')\) image remains indistinguishable. This aspect introduces a potential security concern as an adversary might be able to make educated guesses about the original image based on the histogram profile of the scrambled image.
To address this issue, two different operations are implemented in this stage, each aimed at achieving the same objective. These operations consist of:

1.
The application of XOR between the \(I^c(a',b')\) and the \(K_{im}\). This XOR operation is a pivotal step as it significantly alters the intensity values of the pixels within the \(I^c(a',b')\) image. This XOR operation is executed at the initial stages of the diffusion process, and for the subsequent iterations in the diffusion phase, this operation is omitted.

2.
The transformation of the image, which results from the initial XOR operation, is achieved through the application of the tribonacci transform, as given in Eq. (15).
where \(\begin{bmatrix} V_1\\ V_2\\ V_3\\ V_4\\ \end{bmatrix}\) shows the set of threepixel values and \(M^l\) is the transformation matrix. The inverse of the tribonacci transform will be:
These dual operations effectively modify the intensity values of the pixels in \(I^c(a',b')\), ensuring that the pixel intensities become sufficiently scrambled. This process bolsters the security of the data by preventing any meaningful predictions about the original image based on the intensity profiles of the \(I^c(a',b')\) image.
In the transformation described above, a set of four pixels is required simultaneously. Therefore, the image’s pixels are organized into groups, each comprising four pixels. Let’s assume there are N number of groups labeled as \(N_1, N_2, \cdots , N_N\), and the pixels within each group \(N_i\) are represented as \(\{V_1, V_2, V_3\}\) (i.e., \(N_i = \{V_1, V_2, V_3\}\)). There are three possible scenarios to consider:
Case1: The image contains a total of 4L pixels.

(a) During the encryption process, each group \(N_i\) (where \(1 \le i \le L\)) is subjected to transformation using Eq. (15) to yield the transformed group \(N^{'}\) i, i.e., \(N_i = TT(N_i)\).

(b) When decrypting, the transformed group \(N^{'}\) i (for \(1 \le i \le L\)) is reversed to its original form \(N_i\), with the assistance of Eq. (15) (i.e., \(N_i = ITT(N^{'}_i))\).
Case2: The total number of pixels in the image is \(3(L  1) + 1\), which can be expressed as \(N_L = \{V_L, 1\}\).
During the encryption process:

(a) Initially, the first \((L  1)\) groups \({N_1, N_2, N_3, N_{L  1}}\) undergo transformation using Eq. (15).

(b) Subsequently, \(N_L\) is redefined as \(N_L = \{V^{'}_{L 1, 2}, V^{'}_{L 1, 3}, V_L,1\}\) and subjected to transformation, resulting in \(L^{'}_L = \{V^{''}_{L1, 2}, L^{''}_{L, 3}, L^{'}_{L,1}\} = TT(N_L)\) using Eq. (15).

(c) The resulting image with diffusion is defined as follows:
$$\begin{aligned} N_1^{'}N_2^{'} \cdots  N_{L  2}^{'} \{ V^{'}_{L  1}, 1\} \end{aligned}$$(17)
In the decryption process, the steps are as follows:

(a) Begin by inversely transforming the first \(L  2\) groups of the diffuse image, resulting in \(\{N_1, N_2, \cdot \cdot \cdot , N_{L2}\}\), where each \(N_i\) is obtained as \(N_i = ITT(N^{'}_i)\) for \(1 \le i \le L2\).

(b) Following that, calculate \(\{V^{'}_{L1,2}, V^{'}_{L1,3}, V_{L,1}\}\) by applying the inverse transformation to \(N^{'}_L\), yielding \(\{V^{'}_{L1,2}\), \(V^{'}_{L1,3}\), \(V_{L,1}\} = ITT(N^{'}_L)\).

(c) Subsequently, perform the computation for \({V_{L1, 1}, V_{L1, 2}, V_{L1, 3}}\) by applying the inverse transformation to the corresponding elements \(\big [V^{'}_{L1, 1}, V^{'}_{L1, 2}, V^{'}_{L1, 3}\big ]\).
The previous version of the diffused image can be reconstructed as \(N_1\) \(N_2\) \(\cdots \) \(V_{L2}\) \(\{V_{L1,1}, V_{L1,2}\) \(, V_{L1,3}\}\) \(\{ V_{L,1}\}\).
Case3: In the case of \(3(N  1)\) + 2 pixels, which is denoted as \(N_L = \{V_{L, 1}, V_{L, 2}\}\), during the encryption process:

(a) Initially, the first \((L  1)\) groups are transformed, resulting in \(N^{'}_1, N^{'}_1, \cdots , N^{'}_{L  1}\).

(b) The pixel \(V^{'}_{r1,3}\) from \(N^{'}_{L1}\) is combined with Gr to form \(N_L = \{V^{'}_{L1,3}, V_{L,1}, V_{L,2}\}\).

(c) \(N_L\) is then subjected to transformation using Eq. (15), resulting in \(N_L^{'} = \{V^{''}_{L1, 3}, V^{'}_{L, 3}, V^{'}_{L, 2}\}\).

(d) The diffuse image is formed as \(N^{'}_1N^{'}_2 \cdots N^{'}_{L2}NL^{'} \{ V^{'}_{L1,1}, V^{'}_{L1, 2}\}\).
For the decryption process,

(a) To begin, the first \(L  2\) groups of the diffuse image are inversely transformed, resulting in \(\{N_1, N_2, \cdots , N_{L2}\}\) (where \(N_i = ITT(N^{'}_i)\) for \(1 \le i \le L  2)\).

(b) Following that, the transformation \(ITT(N^{'}_L)\) is used to compute \(\{V^{'}_{L1, 3}, N_{L,1}, N_{L,2}\}\).

(c) Subsequently, the transformation \(ITT\big [N^{'}_{L1,1}, V^{'}_{L1,2}, V^{'}_{L1,3}\big ]\) is applied to compute \(\{V_{L1,1}\), \(V_{L1,2}\), \(V_{L1,3}\}\).
The image that existed prior can be reconstructed as \(N_1 N_2 \cdots  N_{L2}\{ V_{L1,1}\), \(V_{L1,2}\), \(V_{L1,3}\}\) \(\{ V_{L,1}\), \(V_{L,2}\}\).
Bitplane extraction
Bitplanes \((B_i)\) are the binary images that can be extracted from digital images. Mathematically, \(B_i\) can be extracted using Eq. (18).
where P(a, b) represent the plaintext image and \(B_1, B_2, \cdots , B_8\) are its binary bitplanes.
The extracted \(B_i\) can exhibit variations in the quantity of information they contain. For instance, the set of the first four bitplanes (\(B_8, B_7, B_6, B_5\)) has the maximum information, while the group of the second four bitplanes (\(B_4, B_3, B_2, B_1\)) holds the minimum information, as illustrated in Fig. 4.
The percentage content within each bitplane can be computed using Eq. (19), and the resultant numerical values are displayed in Table 3.
The diffused image is further encrypted using the bitplane extraction method. The mathematical steps are given below:
To explain the mathematics behind the encryption of diffused image, a portion of the diffused image of size \(3 \times 3\) is taken.
A \(3 \times 3\) portion of the diffused image is:
The binary representation of \(D_{img}\) will be:
To obtain the \(B_i\) from \(D_{bin}\), examine the corresponding bit of each pixel. For example, for \(B_8\), select the \(8^{Pth}\) bit from every pixel. Likewise, for \(B_7\), select the \(7^{th}\) bit from each pixel, and so forth. The resulting set of eight \(B_i\) derived from \(D_{bin}\) will be:
If the positions of the values within the \(PSI_i\) are rearranged, the resulting permuted bitplanes, denoted as \((PB_i)\), will be:
Following the permutation process, the binary values situated at position (1,1) within each \(PB_i\) are consolidated to form the binary numbers composing the pixel value situated at (1,1) in the permuted image. Similarly, for acquiring the pixel (1,2) in the permuted image, the binary numbers positioned at (1,2) within each \(PB_i\) are merged. This iterative process is repeated to deduce all the pixel values in the permuted image (\(P_{im}\)). Consequently, the resulting \(P_{im}\) corresponding to \(I_{BMI}\) is as follows:
After the conversion from binary to decimal, the updated matrix \(p'_{im}\), denoting the transformed version of \(P_{im}\), is given below.
From the matrix \(P^{'}_{im}\), it can be seen that this is entirely different from the original matrix I. Likewise, the entire procedure will be reiterated for all the rows and columns.
Discrete wavelet transform
The wavelet transform (WT), developed in the 1980s, is a mathematical tool known for efficiently analyzing transient signals with wide frequency bands. The Wavelet Transform (WT) decomposes a signal into various representations of a mother wavelet, accomplished through shifts and scaling, enabling the segmentation of a signal into constituent wavelets. These component wavelets can then undergo further processing, including decimation, which removes some of the finer details. This process isolates the highfrequency subbands(HL and HH) and lowfrequency subbands (LL and LH). The coarser details, containing the lowfrequency components, are identified using larger wavelets, such as the LLsubband. In the context of images, the lowfrequency subband typically contains the majority of the plaintext information, whereas the highfrequency subbands capture finer details, such as edges as shown in Fig. 5.
The proposed encryption technique utilizes the Haar wavelet. In this method, the Haar wavelet transform is expressed through the matrix equation \(G' = W GW^T\), where G denotes an image with dimensions \(A \times A\), W represents the Haar transform matrix of size \(A \times A\), and \(G'\) symbolizes the resultant transformed matrix of size \(A \times A\), encompassing the Haar basis function \(g_m(z)\). This function is defined within the interval \(z \in [0, 1]\), where m ranges from 0 to M1. The decomposition of this function can be comprehended as follows:
The Haar wavelet transformation is represented by a matrix equation, with \(G'\) denoting the transformed image having dimensions \(A \times A\), W representing the Haar transformation matrix of identical size, and G signifying the resultant transformed matrix also sized \(A \times A\). This matrix encompasses the Haar basis function \(g_m(z)\), defined within the interval \(z \in [0, 1]\), where m varies from 0 to \(M1\). To elucidate this function’s breakdown, the following explanation is provided:
Here r symbolizes the highest power of 2 contained within the integer n while l represents the remainder, expressed as \(l = qr  n\). Equation (21) serves to formally describe the Haar basis function.
The matrix required to perform the twodimensional discrete Haar wavelet transform (DHWT) can be derived by replacing the inverse transformation kernel, as given in Eq. (22).
where h(a, n) will be:
In 2D digital image processing, individual rows of the image undergo a dual filter procedure that involves both a lowpass filter and a highpass filter. Following this filtering, the outputs are subsequently downsampled by a factor of two, which leads to the formation of two distinctive information subbands: \(L_f\) representing the approximate information subband, and \(H_f\) representing the fine detail information subband, both in the horizontal direction. This entire operation is then replicated for every column of these newly generated images, resulting in the creation of four distinct frequency subbands.
Upon subjecting the \(LL_1\) subband to another round of 2DDWT, four additional subbands are obtained: \(LL_2\), \(LH_2\), \(HL_2\), and \(HH_2\). This iterative process can be repeated up to T times, yielding a sequence of subimages: \(LL_T\), \(LH_T\), \(HL_T\), and \(HH_T\). The value of T plays a significant role, as it determines the reduction in size of each subband by a factor of \(2^n\), where n ranges from 1 to \(N1\), with n belonging to the interval [1, N1]. Within the framework of the proposed approach, a value of K is designated as 3, meaning that with \(K=4\), each subband’s dimensions are scaled down to \(32 \times 32\) when the original image dimension is \(256 \times 256\). Figure 6 illustrates a pyramid pattern of the DWT decomposition, covering level2 (i.e. K=2) to level4 (i.e. K=4).
This is performed to reduce the computational time of the encryption process. For example, to create diffusion in an image using a substitution box (Sbox), a time of approximately 20 seconds will be taken to encrypt the image of size \(256 \times 256\)^{60}. Therefore, creating diffusion using an Sbox in a small frequency band having dimensions of \(32 \times 32\) will take very little time compared to the time taken to create diffusion using an Sbox in an image of size \(256 \times 256\). The image \(P_{im}\) is generated in the preceding step is decomposed into its four frequency subbands, and then only the LL subband undergoes further decomposition until its size becomes \(32 \times 32\) (i.e \(LL_4\)). The \(LL_4\) is subsequently subjected to Sbox substitution, as given in^{61}, to create the final encrypted image. The steps to perform the substitution in \(LL_4\) are given in Algorithm 3.
The image denoted as \(P_{im}\), which is produced in the previous stage, is subjected to decomposition into its four frequency subbands. Among these subbands, only the \(LL subband\) is further decomposed until its dimensions reach a size of \(32 \times 32\), referred to as \(LL_4\). Following this, the \(LL_4\) subband is then subjected to multiple Sbox substitutions using the Sboxes i.e. Sbox1, Sbox2, and Sbox3 given in^{61,62}, and^{63}, respectively, to produce the final encrypted image (\(E_f\)). The specific steps for performing this substitution on \(LL_4\) are given in Algorithm 3.
The test images randomly sourced from Google of different sizes and the corresponding ciphertext images, which are produced using the proposed encryption method, are shown in Fig. 7. The size of each image displayed in Fig. 7a–g is \(256 \times 256\). In contrast, the dimensions of each image given in Fig. 7h–j are \(512 \times 512\). Upon examination of the figure, it becomes evident that there is no original plaintext image information is visible in the ciphertext images. This observation shows the efficacy of the proposed encryption scheme in successfully concealing the plaintext information.
Experimental results and analysis
To assess the effectiveness of the proposed encryption scheme, various statistical security analyses, including entropy, contrast, correlation, contrast, mean square error, and histogram analysis, are conducted. In addition to these statistical analyses, a series of attacks, such as cropping attacks, brute force attack, and noise addition attacks, are carried out to evaluate the robustness of the proposed encryption.
Computational time analysis
To optimize the encryption framework for realtime applications, it is necessary to minimize the computational time. This research conducts computational analyses on images of different sizes i.e. \(256 \times 256\) and \(512 \times 512\). Additionally, apart from assessing the computational time for encrypting images, the analysis extends to the key generation process, and decryption process. Although the key generation process is distinct from encryption, it plays a crucial role as the generated keys are utilized within the proposed encryption framework. The computational time for the propsoed encryption and decryption processes, and generating keys is measured using the builtin MATLAB command “tic toc.” Table 4 presents the statistical values calculated using the MATLAB builtin command known as ”tic toc”. Table 4 reveals that the proposed encryption framework can encrypt images of sizes \(256 \times 256\) and \(512 \times 512\) in less than one second. This indicates the suitability of the proposed encryption framework for realtime applications. Moreover, it is evident that the execution times for encryption and decryption processes are approximately equal. This consistency arises because the decryption process involves the same number of mathematical steps as encryption, but in reverse order, along with the inversion of each step.
Histogram Analysis
In image processing, a histogram represents the distribution of the pixel values within an image. In the case of a robust encryption scheme, the histogram of the ciphertext image should exhibit characteristics such as flatness,
In the context of a resilient encryption scheme, it is desirable that the histogram of the enciphered image shows features that include uniformity, even distribution, and a notable dissimilarity from the histogram of the original image.
Figure 8 displays different histograms, illustrating that the pixel distribution within the histogram of plaintext images is relatively uniform. Furthermore, the consistency in pixel distribution signifies the encryption scheme’s capability to withstand potential histogrambased attacks.
Histogram variance analysis
Variance is used to assess the uniformity of the pixel distribution in an image. This metric is often deemed more reliable because it provides statistical values rather than relying on histogram visualizations. This metric is typically considered more reliable because it offers statistical values instead of relying on histogram visualizations. Mathematically, this metric can be calculated using Eq. (24).
In the equation, P represents the pixel stream, where P = { \(p_1\), \(p_2\), \(p_3\) \(\cdots , p_{256}\), and \(p_i\) denotes the pixel value at the \(L^{th}\) position. The term E(P) is computed as E(P) = \(\frac{1}{256}\) \(\sum _{L=1}^{256}\) \(p_i\). In the context of robust encryption, low variance values are desirable.
Table 5 presents a range of variance values for the enciphered images produced by both the proposed and the encryption schemes presented in the past recent years. These variance values highlight the superior performance of the proposed scheme in comparison to the existing ones.
Maximum Deviation
The performance of a cryptographic algorithm can be evaluated by measuring the deviation between the pixel values of the original and enciphered images^{69}. If the deviation in pixel intensities between the original and enciphered images is maximized, it indicates a higher level of security for the encryption technique. Mathematically, the maximum deviation can be expressed as
Here, N stands for the number of gray levels, and \(A_L\) represents the amplitude of the histogram at the \(L^{th}\) index. A higher value of \(M_A\) indicates a more significant difference between the ciphertext and the original image. Table 6 presents the results of \(M_A\) for the proposed scheme and the existing algorithms. The comparison reveals that the proposed encryption technique outperforms the existing schemes. However, images with high texture can yield a higher maximum deviation. Table 6 indicates a slightly higher value of the Maximum Absolute (MA) deviation compared to the proposed work. This discrepancy is attributed to the high texture present in the plaintext image employed by the authors of the existing work.
Entropy
Entropy is used to assess the level of robustness in both plaintext and ciphertext images. A higher level of randomness within an image corresponds to a higher entropy value, as illustrated in Eq. (26).
The entropy can be calculated using Eq. (27).
where \(\rho k_i\) represents the probability of occurrence for variable \(i\).
The ideal entropy value is dependent on the number of bits used to represent the image. For example, in a binary image, the ideal entropy value can be 2. In the case of eightbit images used in the proposed work, the ideal entropy value is 8.
All images utilized in the experimental results and analysis are 8bit images. Therefore, the ideal value for each encrypted image should approach or be approximately equal to 8. Table 7 indicates that the entropy values associated with the proposed encryption scheme exhibit a significant proximity to the value of 8. Furthermore, the existing encryption scheme also attains entropy values near eight, though these values remain slightly lower than those achieved by the proposed encryption scheme.
Correlation
The correlation among the pixel values of an image reflects the degree of the intensity relationship between them. It also quantifies how similar or dissimilar pixel values are. Greater differences between pixel values indicate lower correlation^{70}. This correlation relationship can be expressed mathematically as follows:
The mathematical formula for determining the correlation among image pixels can be expressed as:
where E represents the expected value operator, and \(\sigma\) signifies the standard deviation.
In a plaintext image, there is typically a high correlation between pixel values because the image content is readily visible. Conversely, in a ciphertext image where pixel content is concealed, there should be a lower correlation among the pixels. Thus, it is essential that the correlation values between pixels in ciphertext images are minimized to prevent the visualization of any content in the encrypted image^{71}.
Table 8 presents a comparative analysis of correlation values across different encryption schemes, including the proposed encryption technique. The data presented in Table 8 indicates that the correlation values produced by the proposed scheme are less than those observed in the existing schemes.
In addition to the statistical analysis of correlation, a visual assessment can be conducted using scatter plots. Figure 9(a), and 9(e) show the plaintext and ciphertext images, respectively. Whereas, Fig. 9b–d,f–h illustrate scatter diagrams for both plaintext and ciphertext images. Upon examination of these scatter diagrams, it can be seen that in Fig. 9b–d, the blue dots are closely grouped together, indicating a high pixel correlation. Conversely, in Fig. 9f–h, the blue dots are dispersed, signifying a substantial reduction in pixel correlation. This demonstrates the effectiveness of the proposed encryption scheme in mitigating pixel correlations within the images.
Noise and clipping attack analysis
To make the decryption fail, attackers commonly tamper with encrypted images by incorporating noise. An effective encryption scheme must demonstrate noise resilience to effectively mitigate noise attacks. In assessing the influence of the noise attack, 0.02 means 2% of the pixels are affected by the salt and pepper noise introduced into the encrypted image. The modified encrypted image, now impacted by salt and pepper noise, is decrypted using the proposed decryption algorithm. Figure 10a–d displays the plaintext image, the encrypted image, a noisy version of the plaintext image, and a clipped version of the encrypted image, respectively. The decryption outcomes are depicted in Fig. 10e,f, where it can be seen that although the exact pixel values are not restored, the content of the plaintext can be clearly visualized.
In contrast, attackers also attempt to compromise decryption integrity by clipping parts of the encrypted images. To evaluate the resistance of the proposed encryption framework against clipping attacks, \(\frac{1}{16}\), or approximately 16.6% of the ciphertext image, is ciphered from the encrypted images. These clipped versions are then decrypted to recover the plaintext images. The decryption results from these noisy and clipped encrypted images are illustrated in Fig. 10e,f, respectively, which demonstrate that most of the content of the plaintext image remains visible in the decrypted images. Moreover, Fig. 10g,h are recovered images from noisy and cllpied encrypted images, respectively, using the encryption techniques presented in^{72}. The comparison utilizes the same plaintext image, specifically a chest Xray image, which is also used in the study presented in^{72}. This comparison reveals that our proposed encryption framework is more capable of reconstructing plaintext information from both noisy and clipped versions of the encrypted images. Apart from the visual results, statistical analyses are also conducted for both noise and clipping attack analysis. The statistics are detailed in Table 9, which illustrates that the proposed method shows a slight improvement over the encryption scheme introduced in^{72}.
Uniqueness and the advantages of the proposed encryption framework
In this section, various features and advantages of the proposed encryption framework are provided in the domain of secure data protection, as given below:

Innovative techniques: The proposed encryption framework distinguishes itself from existing encryption schemes through the strategic integration of innovative techniques. These methods are carefully chosen to concurrently enhance both security and computational efficiency.

Key components: The incorporation of chaotic maps, FT, TT, and Discrete Wavelet Transform (DWT) diffusion represents a unique amalgamation. This combination contributes significantly to fortifying the robustness against cyberattacks.

Dynamic pixel scrambling: The incorporation of chaotic maps and FT ensures the dynamic behavior of initial pixel scrambling.

Multilayered security architecture: The introduction of TT for level1 diffusion, along with a level2 diffusion in which XOR operations are involved results in a multilayered security architecture.

Secondary key generation: The utilization of DWT for secondary key generation and highfrequency subband substitution further enhances the encryption process.

Statistical validation: Impressive statistical values of security parameters consistently demonstrate the effectiveness of the proposed encryption framework compared to existing stateoftheart methods.

Realworld applicability: The proposed encryption framework is suitable for realworld applications where less processing time is a critical requirement.
Conclusion and future work
The proposed work presents a new image encryption technique that relies on several key components, including the Fibonacci transformation, chaotic maps, the DWT, bitplane extraction, and Tribonacci transformations. To secure the image, a \(2 \times 2\) Fibonacci matrix is employed for scrambling, while a \(3 \times 3\) Tribonacci matrix is utilized in the diffusion phase to modify pixel values. Chaotic maps are employed to generate key sequences, which are used to introduce confusion to the image pixels. The process begins with comprehensive pixel scrambling, encompassing both row and columnwise transformations. Therefore, the diffusion phase is initiated, which is started with the application of the TT to achieve level1 diffusion in the scrambled image. The diffused image undergoes a level2 diffusion through the incorporation of the bitplane extraction technique. This involves extracting bit planes from the level1 diffused image and a 2dimensional key image. For a more extensive level3 diffusion, the DWT is utilized to decompose the diffused image into four frequency subbands. Among these, only the \(LL_1\) is substituted using the Sbox to reduce computational time during encryption. Several statistical analyses are conducted to evaluate the proposed encryption technique, demonstrating its superior performance in terms of both security and computational complexity compared to existing methods.
Future work may explore the application of this encryption technique in various domains, such as securing multimedia data in cloud storage or realtime image transmission. Additionally, we could focus on optimizing the computational efficiency of the color image encryption process, which will make it even more suitable for realtime applications. Investigating the potential integration of additional advanced encryption algorithms with traditional encryption techniques can enhance overall security.
Data availability
The datasets used and/or analysed during the current study available from the corresponding author on reasonable request.
References
Aslan, Ö., Aktuğ, S. S., OzkanOkay, M., Yilmaz, A. A. & Akin, E. A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions. Electronics 12, 1333 (2023).
de Azambuja, A. J. G. et al. Artificial intelligencebased cyber security in the context of industry 4.0: A survey. Electronics 12, 1920 (2023).
Rawat, A. S., Deshmukh, M. & Singh, M. A novel multi secret image sharing scheme for different dimension secrets. Multimedia Tools Appl. 1–37 (2023).
AbdElAtty, B. A robust medical image steganography approach based on particle swarm optimization algorithm and quantum walks. Neural Comput. Appl. 35, 773–785 (2023).
Rezaei, B., Ghanbari, H. & Enayatifar, R. An image encryption approach using tuned Henon chaotic map and evolutionary algorithm. Nonlinear Dyn. 111, 9629–9647 (2023).
Kocak, O., Erkan, U., Toktas, A. & Gao, S. Psobased image encryption scheme using modular integrated logistic exponential map. Expert Syst. Appl. 237, 121452 (2024).
Ahmad, M., Alam, M. Z., Umayya, Z., Khan, S. & Ahmad, F. An image encryption approach using particle swarm optimization and chaotic map. Int. J. Inf. Technol. 10, 247–255 (2018).
Singh, K. N., Singh, O. P., Baranwal, N. & Singh, A. K. An efficient chaosbased image encryption algorithm using realtime object detection for smart city applications. Sustain. Energy Technol. Assess. 53, 102566 (2022).
Zahid, A. H., AlSolami, E. & Ahmad, M. A novel modular approach based substitutionbox design for image encryption. IEEE Access 8, 150326–150340 (2020).
Arab, A., Rostami, M. J. & Ghavami, B. An image encryption method based on chaos system and AES algorithm. J. Supercomput. 75, 6663–6682 (2019).
AbdElAtty, B., Iliyasu, A. M., Alanezi, A. & Abd Ellatif, A. A. Optical image encryption based on quantum walks. Opt. Lasers Eng. 138, 106403 (2021).
Younes, M. A. B. A survey of the most current image encryption and decryption techniques. Int. J. Adv. Res. Comput. Sci. 10, 9 (2019).
Long, M., Zhao, Y., Zhang, X. & Peng, F. A separable reversible data hiding scheme for encrypted images based on Tromino scrambling and adaptive pixel value ordering. Signal Process. 176, 107703 (2020).
Wang, J., Geng, Y.C., Han, L. & Liu, J.Q. Quantum image encryption algorithm based on quantum key image. Int. J. Theor. Phys. 58, 308–322 (2019).
Suganyadevi, S., Seethalakshmi, V. & Balasamy, K. A review on deep learning in medical image analysis. Int. J. Multimed. Inf. Retr. 11, 19–38 (2022).
Singh, K. N., Baranwal, N., Singh, O. P. & Singh, A. K. Sielnet: 3D chaoticmapbased secure image encryption using customized residual dense spatial network. IEEE Trans. Consum. Electron. (2022).
Kamal, S. T., Hosny, K. M., Elgindy, T. M., Darwish, M. M. & Fouda, M. M. A new image encryption algorithm for grey and color medical images. IEEE Access 9, 37855–37865 (2021).
Aruna, M., Arulkumar, V., Deepa, M. & Latha, G. C. P. Medical healthcare system with hybrid block based predictive models for quality preserving in medical images using machine learning techniques. In 2022 International Conference on Advanced Computing Technologies and Applications (ICACTA), 1–10 (IEEE, 2022).
Thakur, M. Cyber security threats and countermeasures in digital age. Journal of Applied Science and Education (JASE) 1–20 (2024).
Sayduzzaman, M., Sazzad, S., Rahman, M., Rahman, T. & Uddin, M. K. Managing escalating cyber threats: Perspectives and policy insights for bangladesh.
Kumari, M. & Gupta, S. Performance comparison between chaos and quantumchaos based image encryption techniques. Multimed. Tools Appl. 80, 33213–33255 (2021).
Zhang, L. & Zhang, X. Multipleimage encryption algorithm based on bit planes and chaos. Multimed. Tools Appl. 79, 20753–20771 (2020).
Hua, Z., Yi, S. & Zhou, Y. Medical image encryption using highspeed scrambling and pixel adaptive diffusion. Signal Process. 144, 134–144 (2018).
Alghamdi, Y., Munir, A. & Ahmad, J. A lightweight image encryption algorithm based on chaotic map and random substitution. Entropy 24, 1344 (2022).
Wu, W. & Wang, Q. Quantum image encryption based on baker map and 2d logistic map. Int. J. Theor. Phys. 61, 64 (2022).
Xiang, H. & Liu, L. An improved digital logistic map and its application in image encryption. Multimed. Tools Appl. 79, 30329–30355 (2020).
Zhu, C. & Sun, K. Cryptanalyzing and improving a novel color image encryption algorithm using RTenhanced chaotic tent maps. IEEE Access 6, 18759–18770 (2018).
Benaissi, S., Chikouche, N. & Hamza, R. A novel image encryption algorithm based on hybrid chaotic maps using a key image. Optik 272, 170316 (2023).
Shafique, A. & Shahid, J. Novel image encryption cryptosystem based on binary bit planes extraction and multiple chaotic maps. Eur. Phys. J. Plus 133, 331 (2018).
Zhu, S., Deng, X., Zhang, W. & Zhu, C. Secure image encryption scheme based on a new robust chaotic map and strong sbox. Math. Comput. Simul. 207, 322–346 (2023).
Shafique, A. et al. Detecting the security level of various cryptosystems using machine learning models. IEEE Access 9, 9383–9393 (2020).
Sun, X., Shao, Z., Shang, Y., Liang, M. & Yang, F. Multipleimage encryption based on cascaded gyrator transforms and highdimensional chaotic system. Multimed. Tools Appl. 80, 15825–15848 (2021).
Xie, Y., Yu, J., Guo, S., Ding, Q. & Wang, E. Image encryption scheme with compressed sensing based on new threedimensional chaotic system. Entropy 21, 819 (2019).
Liu, J., Tang, S., Lian, J., Ma, Y. & Zhang, X. A novel fourth order chaotic system and its algorithm for medical image encryption. Multidimens. Syst. Signal Process. 30, 1637–1657 (2019).
Mehdi, S. A., Jabbar, K. K. & Abbood, F. H. Image encryption based on the novel 5D hyperchaotic system via improved AES algorithm. Int. J. Civil Eng. Technol. 9, 1841–1855 (2018).
Zhang, Q. & Han, J. A novel color image encryption algorithm based on image hashing, 6D hyperchaotic and DNA coding. Multimed. Tools Appl. 80, 13841–13864 (2021).
Nematzadeh, H., Enayatifar, R., Yadollahi, M., Lee, M. & Jeong, G. Binary search tree image encryption with DNA. Optik 202, 163505 (2020).
Yadollahi, M., Enayatifar, R., Nematzadeh, H., Lee, M. & Choi, J.Y. A novel image security technique based on nucleic acid concepts. J. Inf. Secur. Appl. 53, 102505 (2020).
Abbasi, A. A., Mazinani, M. & Hosseini, R. Evolutionarybased image encryption using biomolecules and noncoupled map lattice. Optics Laser Technol. 140, 106974 (2021).
Mhammad, D., Aoun, M., Nadeem, M. A. & Younus, M. U. A novel encryption scheme for secure communication based on RNA. (2023).
Wang, X. & Liu, L. Application of chaotic Josephus scrambling and RNA computing in image encryption. Multimed. Tools Appl. 80, 23337–23358 (2021).
Mansoor, S. et al. Adaptive color image encryption scheme based on multiple distinct chaotic maps and DNA computing. Mathematics 10, 2004 (2022).
Wang, T., Ge, B., Xia, C. & Dai, G. Multiimage encryption algorithm based on cascaded modulation chaotic system and blockscramblingdiffusion. Entropy 24, 1053 (2022).
Liu, L. & Wang, J. A cluster of 1D quadratic chaotic map and its applications in image encryption. Math. Comput. Simul. 204, 89–114 (2023).
Shraida, G. et al. An efficient colorimage encryption method using DNA sequence and chaos cipher. Comput. Mater. Contin 75, 2641–2654 (2023).
Zhang, X., Liu, M. & Tian, J. Multipleimage encryption algorithm based on Sarrus rule and 3D Fibonacci matrix. Phys. Scr. 98, 055208 (2023).
Biban, G., Chugh, R. & Panwar, A. Image encryption based on 8d hyperchaotic system using Fibonacci qmatrix. Chaos Solitons Fract. 170, 113396 (2023).
Zhong, H. & Li, G. Multiimage encryption algorithm based on wavelet transform and 3D shuffling scrambling. Multimed. Tools Appl. 81, 24757–24776 (2022).
Begum, M., Ferdush, J. & Uddin, M. S. A hybrid robust watermarking system based on discrete cosine transform, discrete wavelet transform, and singular value decomposition. J. King Saud Univ.Comput. Inf. Sci. 34, 5856–5867 (2022).
Balasamy, K. & Suganyadevi, S. A fuzzy based ROI selection for encryption and watermarking in medical image using DWT and SVD. Multimed. Tools Appl. 80, 7167–7186 (2021).
Shamia, D., Balasamy, K. & Suganyadevi, S. A secure framework for medical image by integrating watermarking and encryption through fuzzy based ROI selection. J. Intell. Fuzzy Syst. 44, 7449–7457 (2023).
Balasamy, K., Krishnaraj, N. & Vijayalakshmi, K. Improving the security of medical image through neurofuzzy based ROI selection for reliable transmission. Multimed. Tools Appl. 81, 14321–14337 (2022).
Balasamy, K., Krishnaraj, N. & Vijayalakshmi, K. An adaptive neurofuzzy based region selection and authenticating medical image through watermarking for secure communication. Wireless Pers. Commun. 122, 2817–2837 (2022).
Chai, X., Chen, Y. & Broyde, L. A novel chaosbased image encryption algorithm using DNA sequence operations. Opt. Lasers Eng. 88, 197–213 (2017).
Ye, G.D., Wu, H.S., Huang, X.L. & Tan, S.Y. Asymmetric image encryption algorithm based on a new threedimensional improved logistic chaotic map. Chin. Phys. B 32, 030504 (2023).
Chen, J., Chen, L. & Zhou, Y. Cryptanalysis of a DNAbased image encryption scheme. Inf. Sci. 520, 130–141 (2020).
Wen, H. & Lin, Y. Cryptanalyzing an image cipher using multiple chaos and DNA operations. J. King Saud Univ.Comput. Inf. Sci. 101612 (2023).
Ganavi, M. & Prabhudeva, S. Twolayer security of images using elliptic curve cryptography with discrete wavelet transform. Int. J. Comput. Netw. Inf. Secur. 13, 31 (2023).
Grassi, G., Severance, F. L. & Miller, D. A. Multiwing hyperchaotic attractors from coupled Lorenz systems. Chaos Solitons Fract. 41, 284–291 (2009).
Shafique, A. A new algorithm for the construction of substitution box by using chaotic map. Eur. Phys. J. Plus 135, 194 (2020).
Shafique, A. et al. Chaos and cellular automatabased substitution box and its application in cryptography. Mathematics 11, 2322 (2023).
Liu, H., Liu, J. & Ma, C. Constructing dynamic strong sbox using 3D chaotic map and application to image encryption. Multimed. Tools Appl. 82, 23899–23914 (2023).
Si, Y., Liu, H. & Zhao, M. Constructing keyed strong sbox with higher nonlinearity based on 2D hyper chaotic map and algebraic operation. Integration 88, 269–277 (2023).
Rehman, M. U., Shafique, A., Khan, K. H. & Hazzazi, M. M. Efficient and secure image encryption using key substitution process with discrete wavelet transform. J. King Saud Univ.Comput. Inf. Sci. 101613 (2023).
Huang, X., Dong, Y., Ye, G. & Shi, Y. Meaningful image encryption algorithm based on compressive sensing and integer wavelet transform. Front. Comp. Sci. 17, 173804 (2023).
Li, C. & Yang, X. An image encryption algorithm based on discrete fractional wavelet transform and quantum chaos. Optik 260, 169042 (2022).
Kiran, Parameshachari, B. & Panduranga, H. Medical image encryption using scan technique and chaotic tent map system. In Recent Advances in Artificial Intelligence and Data Engineering: Select Proceedings of AIDE 2020, 181–193 (Springer, 2022).
Alexan, W., Alexan, N. & Gabr, M. Multiplelayer image encryption utilizing fractionalorder chen hyperchaotic map and cryptographically secure prngs. Fract. Fract. 7, 287 (2023).
Ahmad, J. & Ahmed, F. Efficiency analysis and security evaluation of image encryption schemes. Computing 23, 25 (2010).
Singh, A., Agarwal, P. & Chand, M. Image encryption and analysis using dynamic aes. In 2019 5th international conference on optimization and applications (ICOA), 1–6 (IEEE, 2019).
Khan, J. S. & Kayhan, S. K. Chaos and compressive sensing based novel image encryption scheme. J. Inf. Secur. Appl. 58, 102711 (2021).
Singh, K. N., Singh, O., Singh, A. K. & Agrawal, A. K. EiMOL: A secure medical image encryption algorithm based on optimization and the Lorenz system. ACM Trans. Multimed. Comput. Commun. Appl. 19, 1–19 (2023).
Acknowledgements
The authors extend their appreciation to the Deanship of Research and Graduate Studies at King Khalid University for funding this work through the Large Research Project under grant number RGP2/552/44.
Author information
Authors and Affiliations
Contributions
M.M.H. formal analysis and project administration, M.U.R. Conceptualization, editing and supervision, A.S. methodology, software, and writing, A.A. validation Z.B. review, A.B.U. visualisation. All authors reviewed the manuscript.
Corresponding author
Ethics declarations
Competing interests
The authors declare no competing interests.
Additional information
Publisher's note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.
About this article
Cite this article
Hazzazi, M.M., Rehman, M.U., Shafique, A. et al. Enhancing image security via chaotic maps, Fibonacci, Tribonacci transformations, and DWT diffusion: a robust data encryption approach. Sci Rep 14, 12277 (2024). https://doi.org/10.1038/s41598024622603
Received:
Accepted:
Published:
DOI: https://doi.org/10.1038/s41598024622603
Comments
By submitting a comment you agree to abide by our Terms and Community Guidelines. If you find something abusive or that does not comply with our terms or guidelines please flag it as inappropriate.