{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T02:18:14Z","timestamp":1771467494371,"version":"3.50.1"},"reference-count":53,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2023,4,7]],"date-time":"2023-04-07T00:00:00Z","timestamp":1680825600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cryptography"],"abstract":"<jats:p>This research paper presents a novel digital color image encryption approach that ensures high-level security while remaining simple and efficient. The proposed method utilizes a composite key r and x of 128-bits to create a small in-dimension private key (a chaotic map), which is then resized to match the color matrix dimension. The proposed method is uncomplicated and can be applied to any image without any modification. Image quality, sensitivity analysis, security analysis, correlation analysis, quality analysis, speed analysis, and attack robustness analysis are conducted to prove the efficiency and security aspects of the proposed method. The speed analysis shows that the proposed method improves the performance of image cryptography by minimizing encryption\u2013decryption time and maximizing the throughput of the process of color cryptography. The results demonstrate that the proposed method provides better throughput than existing methods. Overall, this research paper provides a new approach to digital color image encryption that is highly secure, efficient, and applicable to various images.<\/jats:p>","DOI":"10.3390\/cryptography7020020","type":"journal-article","created":{"date-parts":[[2023,4,10]],"date-time":"2023-04-10T03:19:54Z","timestamp":1681096794000},"page":"20","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Protecting Digital Images Using Keys Enhanced by 2D Chaotic Logistic Maps"],"prefix":"10.3390","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2489-4857","authenticated-orcid":false,"given":"Mua\u2019ad","family":"Abu-Faraj","sequence":"first","affiliation":[{"name":"Department of Computer Information Systems, The University of Jordan, Aqaba 77110, Jordan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0295-9691","authenticated-orcid":false,"given":"Abeer","family":"Al-Hyari","sequence":"additional","affiliation":[{"name":"Electrical Engineering Department, Al-Balqa Applied University, As Salt 19117, Jordan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9422-1522","authenticated-orcid":false,"given":"Charlie","family":"Obimbo","sequence":"additional","affiliation":[{"name":"School of Computer Science, University of Guelph, Guelph, ON N1G 2W1, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6385-1134","authenticated-orcid":false,"given":"Khaled","family":"Aldebei","sequence":"additional","affiliation":[{"name":"Department of Information Technology, The University of Jordan, Aqaba 77110, Jordan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8775-0581","authenticated-orcid":false,"given":"Ismail","family":"Altaharwa","sequence":"additional","affiliation":[{"name":"Department of Computer Information Systems, The University of Jordan, Aqaba 77110, Jordan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4734-8605","authenticated-orcid":false,"given":"Ziad","family":"Alqadi","sequence":"additional","affiliation":[{"name":"Computers and Networks Engineering Department, Al-Balqa Applied University, Amman 15008, Jordan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2879-3340","authenticated-orcid":false,"given":"Orabe","family":"Almanaseer","sequence":"additional","affiliation":[{"name":"Department of Information Technology, The University of Jordan, Aqaba 77110, Jordan"}]}],"member":"1968","published-online":{"date-parts":[[2023,4,7]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Arora, H., Soni, G.K., Kushwaha, R.K., and Prasoon, P. (2021, January 8\u201310). Digital Image Security Based on the Hybrid Model of Image Hiding and Encryption. Proceedings of the 2021 6th International Conference on Communication and Electronics Systems (ICCES), Coimbatore, India.","DOI":"10.1109\/ICCES51350.2021.9488973"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Abu-Faraj, M., Al-Hyari, A., and Alqadi, Z. (2022). A Complex Matrix Private Key to Enhance the Security Level of Image Cryptography. Symmetry, 14.","DOI":"10.3390\/sym14040664"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"173","DOI":"10.18280\/ts.390117","article-title":"Simple, Efficient, Highly Secure, and Multiple Purposed Method on Data Cryptography","volume":"39","author":"Aldebei","year":"2022","journal-title":"Trait. Signal"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Wang, S., Li, W., and Wang, F. (2017). Web-scale multidimensional visualization of big spatial data to support earth sciences\u2014A case study with visualizing climate simulation data. Informatics, 4.","DOI":"10.3390\/informatics4030017"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Fonseca, L.M.G., Namikawa, L.M., and Castejon, E.F. (2009, January 11\u201315). Digital image processing in remote sensing. Proceedings of the 2009 Tutorials of the XXII Brazilian Symposium on Computer Graphics and Image Processing, Rio de Janeiro, Brazil.","DOI":"10.1109\/SIBGRAPI-Tutorials.2009.13"},{"key":"ref_6","first-page":"590","article-title":"Analysis and implementation of kidney stones detection by applying segmentation techniques on computerized tomography scans","volume":"43","author":"Zubi","year":"2020","journal-title":"Ital. J. Appl. Math."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"1751","DOI":"10.1109\/TBME.2020.3011119","article-title":"Enhancing the X-ray differential phase contrast image quality with deep learning technique","volume":"68","author":"Ge","year":"2020","journal-title":"IEEE Trans. Biomed. Eng."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Hsiao, C.Y., and Wang, H.J. (2012, January 14\u201316). Enhancing image quality in Visual Cryptography with colors. Proceedings of the 2012 International Conference on Information Security and Intelligent Control, Yunlin, Taiwan.","DOI":"10.1109\/ISIC.2012.6449718"},{"key":"ref_9","first-page":"14","article-title":"Comparative Analysis of Color Image Encryption-Decryption Methods Based on Matrix Manipulation","volume":"8","author":"Rasras","year":"2019","journal-title":"Int. J. Comput. Sci. Mob. Comput."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Pujari, V.G., Khot, S.R., and Mane, K.T. (2014, January 22\u201324). Enhanced visual cryptography scheme for secret image retrieval using average filter. Proceedings of the 2014 IEEE Global Conference on Wireless Computing & Networking (GCWCN), Lonavala, India.","DOI":"10.1109\/GCWCN.2014.7030854"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Ibrahim, D., Ahmed, K., Abdallah, M., and Ali, A.A. (2022). A New Chaotic-Based RGB Image Encryption Technique Using a Nonlinear Rotational 16 \u00d7 16 DNA Playfair Matrix. Cryptography, 6.","DOI":"10.3390\/cryptography6020028"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"126304","DOI":"10.1109\/ACCESS.2022.3226319","article-title":"CASDC: A Cryptographically Secure Data System Based on Two Private Key Images","volume":"10","author":"Alqadi","year":"2022","journal-title":"IEEE Access"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Ioannidou, I., and Sklavos, N. (2021). On General Data Protection Regulation Vulnerabilities and Privacy Issues, for Wearable Devices and Fitness Tracking Applications. Cryptography, 5.","DOI":"10.3390\/cryptography5040029"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"69388","DOI":"10.1109\/ACCESS.2022.3187317","article-title":"Rotation Left Digits to Enhance the Security Level of Message Blocks Cryptography","volume":"10","author":"Aldebei","year":"2022","journal-title":"IEEE Access"},{"key":"ref_15","unstructured":"Stallings, W. (2006). Cryptography and Network Security, Pearson Education. [4th ed.]."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"809","DOI":"10.5267\/j.ijdns.2023.1.008","article-title":"Increasing the Security of Transmitted Text Messages Using Chaotic Key and Image Key Cryptography","volume":"7","author":"Alqadi","year":"2023","journal-title":"Int. J. Data Netw. Sci."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"1017","DOI":"10.18576\/amis\/160619","article-title":"Building a Secure Image Cryptography System using Parallel Processing and Complicated Dynamic Length Private Key","volume":"16","author":"Alqadi","year":"2022","journal-title":"Appl. Math. Inf. Sci. (AMIS)"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Khan, A., Chefranov, A., and Demirel, H. (2020). Image-Level Structure Recognition Using Image Features, Templates, and Ensemble of Classifiers. Symmetry, 12.","DOI":"10.3390\/sym12071072"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"26257","DOI":"10.1109\/ACCESS.2022.3151174","article-title":"Provably Secure and Fast Color Image Encryption Algorithm Based on S-Boxes and Hyperchaotic Map","volume":"10","author":"Abduljabbar","year":"2022","journal-title":"IEEE Access"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Chaudhary, N., Shahi, T.B., and Neupane, A. (2022). Secure Image Encryption Using Chaotic, Hybrid Chaotic and Block Cipher Approach. J. Imaging, 8.","DOI":"10.3390\/jimaging8060167"},{"key":"ref_21","first-page":"280","article-title":"Performance evaluation of symmetric encryption algorithms","volume":"8","author":"Elminaam","year":"2008","journal-title":"IJCSNS Int. J. Comput. Sci. Netw. Secur."},{"key":"ref_22","first-page":"125","article-title":"Comparison of data encryption algorithms","volume":"2","author":"Singh","year":"2011","journal-title":"Int. J. Comput. Sci. Commun."},{"key":"ref_23","first-page":"321","article-title":"A study of new trends in Blowfish algorithm","volume":"1","author":"Singh","year":"2011","journal-title":"Int. J. Eng. Res. Appl."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Labao, A., and Adorna, H. (2022). A CCA-PKE Secure-Cryptosystem Resilient to Randomness Reset and Secret-Key Leakage. Cryptography, 6.","DOI":"10.3390\/cryptography6010002"},{"key":"ref_25","first-page":"877","article-title":"A comparative survey on symmetric key encryption techniques","volume":"4","author":"Agrawal","year":"2012","journal-title":"Int. J. Comput. Sci. Eng."},{"key":"ref_26","unstructured":"Nadeem, A., and Javed, M.Y. (2005, January 4\u20136). A performance comparison of data encryption algorithms. Proceedings of the 2005 International Conference on Information and Communication Technologies, Las Vegas, NV, USA."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"7647421","DOI":"10.1155\/2020\/7647421","article-title":"An image encryption scheme using a 1D chaotic double section skew tent map","volume":"2020","author":"Elmanfaloty","year":"2020","journal-title":"Complexity"},{"key":"ref_28","first-page":"2169","article-title":"A performance comparison of encryption algorithms for digital images","volume":"3","author":"Kumar","year":"2014","journal-title":"Int. J. Eng. Res. Technol."},{"key":"ref_29","first-page":"6615708","article-title":"A robust and fast image encryption scheme based on a mixing technique","volume":"2021","author":"Tiedeu","year":"2021","journal-title":"Secur. Commun. Netw."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"403","DOI":"10.1016\/j.ins.2018.12.048","article-title":"Cosine-transform-based chaotic system for image encryption","volume":"480","author":"Hua","year":"2019","journal-title":"Inf. Sci."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.sigpro.2018.11.010","article-title":"A novel image encryption algorithm based on polynomial combination of chaotic maps and dynamic function generation","volume":"157","author":"Balafar","year":"2019","journal-title":"Signal Process."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"7841","DOI":"10.1007\/s11042-018-6496-1","article-title":"Multiple-image encryption algorithm based on DNA encoding and chaotic system","volume":"78","author":"Zhang","year":"2019","journal-title":"Multimed. Tools Appl."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.optlaseng.2015.12.004","article-title":"Multiple-image encryption with bit-plane decomposition and chaotic maps","volume":"80","author":"Tang","year":"2016","journal-title":"Opt. Lasers Eng."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Nita, S.L., Mihailescu, M.I., and Pau, V.C. (2018). Security and Cryptographic Challenges for Authentication Based on Biometrics Data. Cryptography, 2.","DOI":"10.20944\/preprints201810.0618.v1"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Naseer, Y., Shah, T., Shah, D., and Hussain, S. (2019). A Novel Algorithm of Constructing Highly Nonlinear S-p-boxes. Cryptography, 3.","DOI":"10.3390\/cryptography3010006"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Cowper, N., Shaw, H., and Thayer, D. (2020). Chaotic Quantum Key Distribution. Cryptography, 4.","DOI":"10.3390\/cryptography4030024"},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Abu Taha, M., Hamidouche, W., Sidaty, N., Viitanen, M., Vanne, J., El Assad, S., and Deforges, O. (2020). Privacy Protection in Real Time HEVC Standard Using Chaotic System. Cryptography, 4.","DOI":"10.3390\/cryptography4020018"},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"3545","DOI":"10.1109\/ACCESS.2022.3232461","article-title":"Chaotic-Map Based Encryption for 3D Point and 3D Mesh Fog Data in Edge Computing","volume":"11","author":"Raghunandan","year":"2023","journal-title":"IEEE Access"},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1049\/iet-ipr.2018.5900","article-title":"Novel image encryption algorithm based on improved logistic map","volume":"13","author":"Li","year":"2019","journal-title":"IET Image Process."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"6679288","DOI":"10.1155\/2021\/6679288","article-title":"A Novel Image Encryption Algorithm Based on the Delayed Maps and Permutation-Confusion-Diffusion Architecture","volume":"2021","author":"He","year":"2021","journal-title":"Secur. Commun. Netw."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1049\/iet-spr.2016.0584","article-title":"Image block encryption algorithm based on chaotic maps","volume":"12","author":"Liu","year":"2018","journal-title":"IET Signal Process."},{"key":"ref_42","first-page":"1301","article-title":"A chaotic image encryption algorithm based on fractional-order chaotic map and logistic map","volume":"92","author":"Wu","year":"2018","journal-title":"Nonlinear Dyn."},{"key":"ref_43","first-page":"27","article-title":"A novel image encryption algorithm based on logistic map","volume":"103","author":"Zhang","year":"2021","journal-title":"Nonlinear Dyn."},{"key":"ref_44","first-page":"909","article-title":"A Hybrid Encryption Algorithm Based On AES and RSA","volume":"4","author":"Vijayalakshmi","year":"2016","journal-title":"Int. J. Innov. Res. Comput. Commun. Eng."},{"key":"ref_45","first-page":"1","article-title":"Multiple-image encryption mechanism based on ghost imaging and public key cryptography","volume":"11","author":"Zhang","year":"2019","journal-title":"IEEE Photonics J."},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Gao, W., Yang, L., Zhang, D., and Liu, X. (2022). Quantum Identity-Based Encryption from the Learning with Errors Problem. Cryptography, 6.","DOI":"10.3390\/cryptography6010009"},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Salunke, S., Ahuja, B., Hashmi, M.F., Marriboyina, V., and Bokde, N.D. (2022). 5D Gauss Map Perspective to Image Encryption with Transfer Learning Validation. Appl. Sci., 12.","DOI":"10.3390\/app12115321"},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Alexan, W., ElBeltagy, M., and Aboshousha, A. (2022). RGB Image Encryption through Cellular Automata, S-Box and the Lorenz System. Symmetry, 14.","DOI":"10.3390\/sym14030443"},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Pourasad, Y., and Cavallaro, F. (2021). A novel image processing approach to enhancement and compression of X-ray images. Int. J. Environ. Res. Public Health, 18.","DOI":"10.3390\/ijerph18136724"},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Msekh, Z.A., and Hreshee, S.S. (2021, January 15). Implementation of a chaos-based symmetric text encryption using Arduino microcontrollers. Proceedings of the Journal of Physics: Conference Series, Quebec City, QC, Canada.","DOI":"10.1088\/1742-6596\/1963\/1\/012086"},{"key":"ref_51","unstructured":"Franzen, R. (2022, December 10). Kodak Lossless True Color Image Suite. Available online: http:\/\/r0k.us\/graphics\/kodak."},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Zhu, S., Wang, G., and Zhu, C. (2019). A Secure and Fast Image Encryption Scheme Based on Double Chaotic S-Boxes. Entropy, 21.","DOI":"10.3390\/e21080790"},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"2241","DOI":"10.1007\/s11071-016-2642-3","article-title":"Chosen-plaintext attack of an image encryption scheme based on modified Permutation\u2013Diffusion structure","volume":"84","author":"Liu","year":"2016","journal-title":"Nonlinear Dyn."}],"container-title":["Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2410-387X\/7\/2\/20\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T19:12:19Z","timestamp":1760123539000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2410-387X\/7\/2\/20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,7]]},"references-count":53,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2023,6]]}},"alternative-id":["cryptography7020020"],"URL":"https:\/\/doi.org\/10.3390\/cryptography7020020","relation":{},"ISSN":["2410-387X"],"issn-type":[{"value":"2410-387X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,4,7]]}}}