The recent massive shutdowns show that we need to guard against cyberspace as if it were a battlefield. Thus, one must consider the advancement of data encryption and decryption techniques. For enhancing the ACM algorithm, we propose in this study a dual-stream network with a generated sequence network based on Long Short-Term Memory (LSTM). The main purpose of the integration was to overcome the inherent drawbacks of predictability and non-periodic pixel reshuffling. Results show superior performance with the enhanced ACM generated via an LSTM, with higher entropy (5.67) and a lower correlation coefficient (0.006), compared with the original ACM, which has lower entropy (5.30) and a higher correlation coefficient (0.013). Additionally, the enhanced ACM exhibits a stronger, more substantial effect (130.52) than the original ACM (66.25), suggesting greater resistance to differential cryptanalysis. Therefore, the proposed enhancement of the ACM via LSTM-generated sequences improves security by increasing pixel unpredictability and randomness and by distorting image information.
@article{caluza2026,
author = {Las Johansen B. Caluza},
title = {{Image Cryptography Enhancement of the Arnold Cat Map Algorithm Using Long Short-Term Memory Generated Sequence}},
journal = {Journal of Innovative Image Processing},
volume = {8},
number = {1},
pages = {156-174},
year = {2026},
publisher = {Inventive Research Organization},
doi = {10.36548/jiip.2026.1.009},
url = {https://doi.org/10.36548/jiip.2026.1.009}
}
Copy Citation
- Li, Ming, Mengdie Wang, Haiju Fan, Kang An, and Guoqi Liu. "A Novel Plaintext-Related Chaotic Image Encryption Scheme with No Additional Plaintext Information." Chaos, Solitons & Fractals 158 (2022): 111989.
- Zhou, Shihua. "A Real-Time One-Time Pad DNA-Chaos Image Encryption Algorithm Based on Multiple Keys." Optics & Laser Technology 143 (2021): 107359.
- Zhu, Liya, Donghua Jiang, Jiangqun Ni, Xingyuan Wang, Xianwei Rong, Musheer Ahmad, and Yingpin Chen. "A Stable Meaningful Image Encryption Scheme Using the Newly-Designed 2D Discrete Fractional-Order Chaotic Map and Bayesian Compressive Sensing." Signal Processing 195 (2022): 108489.
- Gong, Li-Hua, Hui-Xin Luo, Rou-Qing Wu, and Nan-Run Zhou. "New 4D Chaotic System with Hidden Attractors and Self-Excited Attractors and Its Application in Image Encryption Based on RNG." Physica A: Statistical Mechanics and its Applications 591 (2022): 126793.
- Wang, Xu, Chin-Chen Chang, and Chia-Chen Lin. "Reversible Data Hiding in Encrypted Images with Block-Based Adaptive MSB Encoding." Information Sciences 567 (2021): 375-394.
- Kaspersky. 2024. Top Ten Cybersecurity Trends. Kaspersky Website. Accessed August 21, 2024. https://www.kaspersky.com/resource-center/preemptive-safety/cyber-security-trends.
- IBM. 2024. The 3 Main Types of Cryptography. https://www.ibm.com/think/topics/cryptography-types.
- Cabaj, Krzysztof, Zbigniew Kotulski, Bogdan Księżopolski, and Wojciech Mazurczyk. "Cybersecurity: Trends, Issues, And Challenges." EURASIP Journal on Information Security 2018, no. 1 (2018): 10.
- Kolivand, Hoshang, Sabah Fadhel Hamood, Shiva Asadianfam, and Mohd Shafry Rahim. "RETRACTED ARTICLE: Image Encryption Techniques: A Comprehensive Review." Multimedia Tools and Applications 83, no. 29 (2024): 73789-73789.
- [10] Guo, Zhe, Su-Hua Chen, Ling Zhou, and Li-Hua Gong. "Optical Image Encryption and Authentication Scheme with Computational Ghost Imaging." Applied Mathematical Modelling 131 (2024): 49-66.
- Wang, Xingyuan, and Yanpei Li. "Chaotic Image Encryption Algorithm Based on Hybrid Multi-Objective Particle Swarm Optimization and DNA Sequence." Optics and Lasers in Engineering 137 (2021): 106393.
- Zhang, Hangming, and Hanping Hu. "An Image Encryption Algorithm Based on a Compound-Coupled Chaotic System." Digital Signal Processing 146 (2024): 104367.
- Wen, Heping, Yiting Lin, and Zhaoyang Feng. "Cryptanalyzing a Bit-Level Image Encryption Algorithm Based on Chaotic Maps." Engineering Science and Technology, an International Journal 51 (2024): 101634.
- Umamageswari, A., and G. R. Suresh. "Security in Medical Image Communication with Arnold's Cat Map Method and Reversible Watermarking." In 2013 International Conference on Circuits, Power and Computing Technologies (ICCPCT), IEEE, 2013, 1116-1121.
- Meenakshi, P., and D. Manivannan. "An Efficient Three Layer Image Security Scheme Using 3D Arnold Cat Map and Sudoku Matrix." Indian Journal of Science and Technology 8, no. 16 (2015): 1-6.
- Marangio, L., J. Sedro, S. Galatolo, A. Di Garbo, and Michael Ghil. "Arnold Maps with Noise: Differentiability and Non-Monotonicity of the Rotation Number." arXiv preprint arXiv:1904.11744 (2019).
- Mahesh, Mahita, Dhivya Srinivasan, Mila Kankanala, and Ramachandran Amutha. "Image Cryptography Using Discrete Haar Wavelet Transform and Arnold Cat Map." In 2015 International Conference on Communications and Signal Processing (ICCSP), IEEE, 2015, 1849-1855.
- Ellapalli, Anant Shankar, and S. Varadarajan. "An Algorithm for Secure Medical Image Transmission That Utilizes Arnold’s Cat MAP and Encode-Decode." In 2024 International Conference on Integrated Circuits and Communication Systems (ICICACS), IEEE, 2024, 1-6.
- Shalaby, Mohamed A. Wahby, Marwa T. Saleh, and Hesham N. Elmahdy. "Enhanced Arnold’s Cat Map-AES Encryption Technique for Medical Images." In 2020 2nd novel intelligent and leading emerging sciences conference (NILES), IEEE, 2020, 288-295.
- VAMSI, DESAM, and PRADEEP REDDY CH. "Color Image Encryption Based on Arnold Cat Map-Elliptic Curve Key and a Hill Cipher." Journal of Theoretical and Applied Information Technology 102, no. 9 (2024).
- Chen, Junxin, Yu Zhang, Lin Qi, Chong Fu, and Lisheng Xu. "Exploiting Chaos-Based Compressed Sensing and Cryptographic Algorithm for Image Encryption and Compression." Optics & Laser Technology 99 (2018): 238-248.
- Carney, Meagan, Mark Holland, Matthew Nicol, and Phuong Tran. "Runs of Extremes of Observables on Dynamical Systems and Applications." Physica D: Nonlinear Phenomena 460 (2024): 134093.
- Nayak, Ankitha A., P. S. Venugopala, H. Sarojadevi, B. Ashwini, and Niranjan N. Chiplunkar. "A Novel Watermarking Technique for Video on Android Mobile Devices Based on JPG Quantization Value and Discrete Cosine Transform Approach." Multimedia Tools and Applications 83, no. 16 (2024): 47889-47917.
- Kumar, Kishore, Sarvesh Tanwar, and Shishir Kumar. "Deep-Learning-based Cryptanalysis Through Topic Modeling." Engineering, Technology & Applied Science Research 14, no. 1 (2024): 12524-12529.
- Banerjee, Anasua, and Debajyoty Banik. "Resnet Based Hybrid Convolution LSTM for Hyperspectral Image Classification." Multimedia Tools and Applications 83, no. 15 (2024): 45059-45070.
- Sankara, Khadija Danladi, G. Saritha, S. Anitha Elavarasi, S. Saradha, and D. Arul Kumar. "A Hybrid LSTM-GAN Model for Predictive Cyber Threat Intelligence and Anomaly Detection." In 2024 International Conference on Integrated Intelligence and Communication Systems (ICIICS), IEEE, 2024, 1-6.
- Kumar, B. Sakthi, and R. Revathi. "An Efficient Image Encryption Algorithm Using a Discrete Memory-Based Logistic Map with Deep Neural Network." Journal of Engineering and Applied Science 71, no. 1 (2024): 41.
- EITCA. 2023. What is the Significance of the Avalanche Effect in Hash Functions? August 03. https://eitca.org/cybersecurity/eitc-is-acc-advanced-classical-cryptography/hash-functions/introduction-to-hash-functions/examination-review-introduction-to-hash-functions/what-is-the-significance-of-the-avalanche-effect-in-hash-functions/#:~:text=The%20a.
- Wright, Rebecca N. 2003. "Cryptography." In Encyclopedia of Physical Science and Technology, 61-77. Elsevier ScienceDirect.
- Conrad, Eric, Seth Misenar, and Joshua Feldman. 2023. "Chapter 4 - Domain 3: Security Architecture and Engineering." In CISSP® Study Guide (Fourth Edition), 107-223. Elsevier ScienceDirect.
- Zhang, Yunzhen, Yuan Ping, Zhili Zhang, and Guangzhe Zhao. "Recent Advances in Dimensionality Reduction Modeling and Multistability Reconstitution of Memristive Circuit." Complexity 2021, no. 1 (2021): 2747174.
- Chawla, Ashima, Paul Jacob, Brian Lee, and Sheila Fallon. "Bidirectional LSTM Autoencoder For Sequence Based Anomaly Detection in Cyber Security." International Journal of Simulation–Systems, Science & Technology 20, no. 5 (2019): 1-6.
- Yamada, Kazunori D., and Kengo Kinoshita. "De Novo Profile Generation Based on Sequence Context Specificity with the Long Short-Term Memory Network." BMC bioinformatics 19, no. 1 (2018): 272.
- Wu, Lin, Michele Haynes, Andrew Smith, Tong Chen, and Xue Li. "Generating Life Course Trajectory Sequences with Recurrent Neural Networks and Application to Early Detection of Social Disadvantage." In International Conference on Advanced Data Mining and Applications, pp. 225-242. Cham: Springer International Publishing, 2017.
- Guang, Xingxing, Yanbin Gao, Pan Liu, and Guangchun Li. "IMU Data and GPS Position Information Direct Fusion Based on LSTM." Sensors 21, no. 7 (2021): 2500.
- Feng, Luoyin, Jize Du, and Chong Fu. "Digital Image Encryption Algorithm Based on Double Chaotic Map and LSTM." Computers, Materials & Continua 77, no. 2 (2023).
- He, Yi, Ying-Qian Zhang, Xin He, and Xing-Yuan Wang. "A New Image Encryption Algorithm Based on the OF-LSTMS and Chaotic Sequences." Scientific reports 11, no. 1 (2021): 6398.
- Li, Shuangyuan, Mengfan Li, Qichang Li, and Yanchang Lv. "Hyperchaotic Image Encryption System Based on Deep Learning LSTM." International Journal of Advanced Computer Science & Applications 14, no. 11 (2023)
- Liu, Gang, Guosheng Xu, Chenyu Wang, and Guoai Xu. 2025. "Hyper-Chaos and CNN-Based Image Encryption Scheme for Wireless Communication Transmission." Computers, Materials & Continua 84 (3).
- Li, Xiaowu, and Huiling Peng. "Chaotic Medical Image Encryption Method Using Attention Mechanism Fusion ResNet Model." Frontiers in Neuroscience 17 (2023): 1226154.
- Li, Shuangyuan, Mengfan Li, Qichang Li, and Yanchang Lv. "Hyperchaotic Image Encryption System Based on Deep Learning LSTM." International Journal of Advanced Computer Science & Applications 14, no. 11 (2023).
- Feng, Luoyin, Jize Du, and Chong Fu. "Digital Image Encryption Algorithm Based on Double Chaotic Map and LSTM." Computers, Materials & Continua 77, no. 2 (2023).
- He, Yi, Ying-Qian Zhang, Xin He, and Xing-Yuan Wang. "A New Image Encryption Algorithm Based on the OF-LSTMS and Chaotic Sequences." Scientific reports 11, no. 1 (2021): 6398.
- Koubaâ, Karama, and Nabil Derbel. "DNA Image Encryption Scheme Based on a Chaotic LSTM Pseudo-Random Number Generator." International Journal of Bifurcation and Chaos 33, no. 06 (2023): 2350067.