An Enhanced Secure and Fast Image Encryption Algorithm Based on Chaos Systems and DNA Coding
Received: 2 December 2025 | Revised: 4 January 2026, 21 January 2026, and 11 February 2026 | Accepted: 13 February 2026 | Online: 8 April 2026
Corresponding author: Walid El-Shafai
Abstract
This study presents an enhanced color image encryption algorithm that integrates multiple techniques to ensure high levels of security, efficiency, and robustness. The encryption process begins with circular shift and rotation operations to permute the pixel positions and disrupt spatial relationships within the image. This is followed by the application of two one-dimensional chaotic maps, specifically, the Tent Map and the Hénon Map, which generate pseudo-random sequences that are subsequently combined with the original image through sequential XOR operations, thereby inducing significant confusion in the pixel values. To further strengthen security, a final layer of DNA-based encryption introduces an additional level of complexity and enhances resistance against both statistical and differential attacks. The performance and reliability of the proposed algorithm were rigorously evaluated across multiple test images using a comprehensive set of security metrics, including histogram uniformity, correlation coefficients, entropy, Peak Signal-to-Noise Ratio (PSNR), and Mean Squared Error (MSE). The proposed algorithm demonstrates high sensitivity to minor changes in either the encryption key or the input image, as evidenced by elevated values in the Unified Average Changing Intensity (UACI) and Number of Pixels Change Rate (NPCR) metrics. Comparative analysis against several state-of-the-art encryption schemes highlights the superiority of the proposed method in terms of both security strength and computational performance. These findings validate the proposed approach as a promising solution for secure image transmission in modern digital communication systems.
Keywords:
image encryption, chaotic maps, tent map, Hénon map, DNA cryptography, circular shift and pixel permutation, XOR operationDownloads
References
Q. Chen, H. Li, S. B. Ariffin, and N. A. B. Mustapa, "A Comprehensive Study on the Homomorphic Encryption for Secure Image Data Processing," Engineering, Technology & Applied Science Research, vol. 15, no. 2, pp. 21783–21790, Apr. 2025.
W. Ali, C. Zhu, R. Latif, M. Asim, and M. U. Tariq, "Image Encryption Scheme Based on Orbital Shift Pixels Shuffling with ILM Chaotic System," Entropy, vol. 25, no. 5, May 2023.
A. K. Panigrahy et al., "A Faster and Robust Artificial Neural Network Based Image Encryption Technique With Improved SSIM," IEEE Access, vol. 12, pp. 10818–10833, 2024.
F. ElAzzaby, K. H. Sabour, N. ELakkad, W. El-Shafai, A. Torki, and S. R. Rajkumar, "Color image encryption using a Zigzag Transformation and sine–cosine maps," Scientific African, vol. 22, Nov. 2023, Art. no. e01955.
M. Es-Sabry, N. El Akkad, M. Merras, A. Saaidi, and K. Satori, "A new image encryption algorithm using random numbers generation of two matrices and bit-shift operators," Soft Computing, vol. 24, no. 5, pp. 3829–3848, Mar. 2020.
S. Deb, B. Biswas, and B. Bhuyan, "Secure image encryption scheme using high efficiency word-oriented feedback shift register over finite field," Multimedia Tools and Applications, vol. 78, no. 24, pp. 34901–34925, Dec. 2019.
W. El-Shafai and E. E. D. Hemdan, "Robust and efficient multi-level security framework for color medical images in telehealthcare services," Journal of Ambient Intelligence and Humanized Computing, vol. 14, no. 4, pp. 3675–3690, Apr. 2023.
C. Zhang, J. Chen, and D. Chen, "Cryptanalysis of an Image Encryption Algorithm Based on a 2D Hyperchaotic Map," Entropy, vol. 24, no. 11, Oct. 2022.
A. Mokhnache and L. Ziet, "Cryptanalysis of a Pixel Permutation Based Image Encryption Technique Using Chaotic Map," Traitement du Signal, vol. 37, no. 1, pp. 95–100, Feb. 2020.
A. Arora and R. K. Sharma, "Cryptanalysis and enhancement of image encryption scheme based on word-oriented feed back shift register," Multimedia Tools and Applications, vol. 81, no. 12, pp. 16679–16705, May 2022.
W. Alexan, D. El-Damak, and M. Gabr, "Image Encryption Based on Fourier-DNA Coding for Hyperchaotic Chen System, Chen-Based Binary Quantization S-Box, and Variable-Base Modulo Operation," IEEE Access, vol. 12, pp. 21092–21113, 2024.
W. Alexan, M. Gabr, E. Mamdouh, R. Elias, and A. Aboshousha, "Color Image Cryptosystem Based on Sine Chaotic Map, 4D Chen Hyperchaotic Map of Fractional-Order and Hybrid DNA Coding," IEEE Access, vol. 11, pp. 54928–54956, 2023.
M. Gabr et al., "Application of DNA Coding, the Lorenz Differential Equations and a Variation of the Logistic Map in a Multi-Stage Cryptosystem," Symmetry, vol. 14, no. 12, Dec. 2022.
J. Wu, X. Liao, and B. Yang, "Image encryption using 2D Hénon-Sine map and DNA approach," Signal Processing, vol. 153, pp. 11–23, Dec. 2018.
M. Es-Sabry et al., "Securing Images Using High Dimensional Chaotic Maps and DNA Encoding Techniques," IEEE Access, vol. 11, pp. 100856–100878, 2023.
F. Elazzaby, N. Elakkad, and K. Sabour, "The Coupling of a Multiplicative Group and the Theory of Chaos in the Encryptions of Images," The International Arab Journal of Information Technology, vol. 21, no. 1, Jan. 2024.
L. Wang, W. Song, J. Di, X. Zhang, and C. Zou, "Image Encryption Method Based on Three-Dimensional Chaotic Systems and V-Shaped Scrambling," Entropy, vol. 27, no. 1, Jan. 2025.
S. Zhu, X. Deng, W. Zhang, and C. Zhu, "Image Encryption Scheme Based on Newly Designed Chaotic Map and Parallel DNA Coding," Mathematics, vol. 11, no. 1, Jan. 2023.
Downloads
How to Cite
License
Copyright (c) 2026 Safae Amine, Fatima Koulouh, Mohammed Es-Sabry, Nabil El Akkad, Walid El-Shafai, Ahmad Taher Azar, Selma Abdelrahman Hussein

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.
