New Pseudo-Random Image Encryption Through Spatio-Temporal Method Assignments
PDF
PDF

How to Cite

Faiq, GMIRA. 2025. “New Pseudo-Random Image Encryption Through Spatio-Temporal Method Assignments”. Journal of Innovative Image Processing 7 (4): 1134-52. https://doi.org/10.36548/jiip.2025.4.003.

Keywords

  • Image Encryption
  • Pseudo-Randomness
  • Cryptographic Diversity
  • Spatio-Temporal Cryptography
  • Security Analysis
  • Image Segmentation
  • Markov Chain
  • NPCR
  • UACI
  • Information Entropy

Abstract

This paper proposes an image encryption method using a spatio-temporal cryptographic diversification strategy. The implemented method, called Pseudo-Random Image Encryption System (PRIES), is based on three conceptual components: What (choice of methods), Where (spatial segmentation) and How (temporal assignment). The What component uses a cryptographic repository of image encryption methods (CRIEM) to pseudo-randomly provide, at each encryption cycle, a sequence of several different methods. The Where component employs a radial segmentation strategy inspired by the wavelet domain, segmenting the image into various angular segments to break spatial correlations. Finally, the How component implements a Markov model to pseudo-randomly assign the selected sequences, defined in the What component, to the angular segments defined in the Where component. On the operational level, experimental data demonstrate high robustness and cryptographic performance: an entropy close to 7.999, a pixel change rate (NPCR) greater than 99.6%, a uniqueness of pixel change index (UACI) approaching 33.46% and a very reduced processing time.

References

Fei, Chenyang, Xiaomei Zhang, Dayu Wang, Haomin Hu, Rong Huang, and Zejie Wang. "EPRNG: Effective Pseudo-Random Number Generator on the Internet of Vehicles Using Deep Convolution Generative Adversarial Network." Information 16, no. 1 (2025): 21.

Mahalakshmi, K., and Sivakumar Nagarajan. "Comprehensive Review and Analysis of Image Encryption Techniques." IEEE Access (2025).

[Shawkat, Shihab A., Najiba Tagougui, and Monji Kherallah. "Optimization-based pseudo random key generation for fast encryption scheme." Bulletin of Electrical Engineering and Informatics 12, no. 2 (2023): 1007-1018.

Peng, Qi, Kun Zhang, Bing Zheng, Hao Ning, Yu Zhou, and Xin Xie. "Color image encryption method based on four-dimensional multi-scroll multi-wing hyperchaotic system and DNA mutation mechanism." Journal of King Saud University Computer and Information Sciences 37, no. 5 (2025): 110.

Zhang, Guidong, Yanhao Zhao, Yanpei Zheng, Yulin Shen, and Jun Huang. "A Fast Image Encryption Scheme Based on a Four-Dimensional Variable-Parameter Hyperchaotic Map and Cyclic Shift Strategy." Mathematics 13, no. 9 (2025): 1497.

Hua, Nan, Han-Yang Liu, Xiao-Yun Xiong, Jin-Long Wang, and Jun-Qing Liang. "A Dynamic Image Encryption Scheme Based on Quantum Walk and Chaos‐Induced DNA." Quantum Engineering 2023, no. 1 (2023): 3431107.

Álvarez, Rafael, Francisco Martínez, and Antonio Zamora. "Improving the statistical qualities of pseudo random number generators." Symmetry 14, no. 2 (2022): 269.

Ahmad, Jawad. "Secure Image Encryption U sing Dynamic Block Segmentation and Adaptive Pixel Modification with Chaotic Masking." In 2024 International Conference on Engineering and Emerging Technologies (ICEET), IEEE, 2024, 1-6.

Zhang, Xiaoqiang, Yupeng Song, and Ke Huang. "Image Encryption Algorithm Based on Dynamic Rhombus Transformation and Digital Tube Model." Entropy 27, no. 8 (2025): 874.

Ma, Tengyu, Jun Ye, Zheng Xu, and Jinghua Zhao. "Image Encryption Algorithm based on Pseudo-random Sequence." Procedia Computer Science 243 (2024): 1231-1238.

Wang, Yu, Liquan Chen, Kunliang Yu, and Tong Fu. "A secure spatio-temporal chaotic pseudorandom generator for image encryption." IEEE Transactions on Circuits and Systems for Video Technology 34, no. 9 (2024): 8509-8521.

Fan, Haiju, Heng Lu, Chenjiu Zhang, Ming Li, and Yanfang Liu. "Cryptanalysis of an image encryption algorithm based on random walk and hyperchaotic systems." Entropy 24, no. 1 (2021): 40.

Gupta, Keshav, Gurjit Singh Walia, and Kapil Sharma. "Novel approach for multimodal feature fusion to generate cancelable biometric." The Visual Computer 37, no. 6 (2021): 1401-1413.

Marty, Tom, Leo Boisvert, Tristan Francois, Pierre Tessier, Louis Gautier, Louis-Martin Rousseau, and Quentin Cappart. "Learning and fine-tuning a generic value-selection heuristic inside a constraint programming solver." Constraints 29, no. 3 (2024): 234-260.

Merlin Johnsy, M., S. Beulah, and M. K. Jeyakumar. "Protected Image Using Fragmentation Approach for Confidential Data Transfer." In International Conference on Innovations in Data Analytics, Singapore: Springer Nature Singapore, 2024, 433-445.

Zhang, Leihong, Yang Wang, and Dawei Zhang. "Research on multiple-image encryption mechanism based on Radon transform and ghost imaging." Optics communications 504 (2022): 127494.

Zhou, Yuzhen, and Erxi Zhu. "A new image encryption based on hybrid heterogeneous time-delay chaotic systems." AIMS Mathematics 9, no. 3 (2024): 5582-5608.

Melosik, Michał, Mariusz Galan, Mariusz Naumowicz, Piotr Tylczyński, and Scott Koziol. "Cryptographically Secure PseudoRandom Bit Generator for Wearable Technology." Entropy 25, no. 7 (2023): 976.

Nagarajan, D., M. Lathamaheswari, Said Broumi, J. Kavikumar, and Florentin Smarandache. "Long-run behavior of interval neutrosophic Markov chain." In Optimization Theory Based on Neutrosophic and Plithogenic Sets, Academic Press, 2020, 151-168.

Irfan, Muhammad, and Muhammad Asif Khan. "Cryptographically Secure Pseudo-Random Number Generation (CS-PRNG) Design using Robust Chaotic Tent Map (RCTM)." arXiv preprint arXiv:2408.05580 (2024).

Dinh-Tuan, Hai, Sandro Rodriguez Garzon, and Jianeng Fu. "Secure and Trustful Cross-Domain Communication with Decentralized Identifiers in 5G and Beyond." In 2024 27th Conference on Innovation in Clouds, Internet and Networks (ICIN), IEEE, 2024, 32-36.

Dinu, Alexandru, and Madalin Frunzete. "Image Encryption Using Chaotic Maps: Development, Application, and Analysis." Mathematics 13, no. 16 (2025): 2588.

Patel, Sakshi, and Rajesh Kumar Muthu. "Image encryption decryption using chaotic logistic mapping and dna encoding." arXiv preprint arXiv:2003.06616 (2020).

Sharma, Sangeeta, Ankush Kumar, Nishant singh Hada, Gaurav Choudhary, and Syed Mohd Kashif. "Image encryption algorithm based on timeout, pixel transposition and modified fisher-yates shuffling." In International Conference on Advancements in Smart Computing and Information Security, Cham: Springer Nature Switzerland, 2022, 24-43.

Luong, Tran Thi. "Improving block cipher resilience with dynamically generated XOR matrices using the Fisher-Yates shuffle method." Cryptography and Communications (2025): 1-24.

Dhakal, Madhav, and Subarna Shakya. "Enhancing Image Data Security: DNA Cryptography and XOR-Based Feistel Encryption." Journal of Innovative Image Processing 7, no. 1 (2025): 1-27.

Huo, Dongming, Zhilong Zhu, Lisheng Wei, Chao Han, and Xin Zhou. "A visually secure image encryption scheme based on 2D compressive sensing and integer wavelet transform embedding." Optics Communications 492 (2021): 126976.

Zhou, Ziqi, Xuemei Xu, Zhaohui Jiang, and Kehui Sun. "Multiple-Image Encryption Scheme Based on an N-Dimensional Chaotic Modular Model and Overlapping Block Permutation–Diffusion Using Newly Defined Operation." Mathematics 11, no. 15 (2023): 3373.

Av, Nandini, and Nilita Anil Kumar. "Image Encryption Using Genetic Algorithm and Bit-Slice Rotation." In 2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT), IEEE, 2020, 1-6.