Claim Missing Document
Check
Articles

Found 2 Documents
Search

Application of multi-chaotic map cascade in video encryption to overcome statistical and differential attacks and performance evaluation Cahaya Jatmoko; Heru Lestiawan; Fauzi Adi Rafrastara; Lalang Erawan; Candra Irawan; Mohamed Doheir
Journal of Soft Computing Exploration Vol. 7 No. 1 (2026): March 2026
Publisher : SHM Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52465/joscex.v7i1.6

Abstract

The rapid proliferation of digital video across domains such as healthcare, surveillance, and communications has increased the demand for secure and efficient video encryption techniques. However, video data presents unique challenges, including large data volume and high spatial–temporal correlation, which limit the effectiveness and efficiency of conventional encryption approaches, particularly in real-time scenarios. In this context, the objective of this study is to evaluate the feasibility of a chaos-based video encryption in achieving both strong cryptographic security and acceptable computational performance. To accomplish this, the proposed scheme is tested through two controlled experiments. The evaluation focuses on cryptographic strength using the Number of Pixel Change Rate (NPCR) to measure sensitivity to minor input changes, the Unified Average Changing Intensity (UACI) to quantify average pixel intensity variation, and Shannon entropy to assess the randomness of the encrypted frames. In parallel, computational performance is analyzed through encryption time and throughput. The procedure involves frame extraction from video, followed by preprocessing to reduce pixel correlation, and subsequent application of the chaos-based encryption algorithm on a per-frame basis. The results from both experiments show NPCR values exceeding 99.5% and encrypted frame entropy of approximately 7.74 bits/pixel, indicating strong resistance to differential attacks and near-optimal randomness. However, the observed throughput of 0.07–0.09 frames per second highlights a limitation in meeting real-time processing requirements. These findings suggest that while the proposed scheme is cryptographically robust and suitable for offline or batch-processing applications.
Image encryption scheme based on fractional-order hyper-chaotic lorenz system with two-stage confusion-diffusion for enhanced pixel randomness Daurat Sinaga; Cahaya Jatmoko; Erna Zuni Astuti; Feri Agustina; Suprayogi Suprayogi
Journal of Soft Computing Exploration Vol. 7 No. 1 (2026): March 2026
Publisher : SHM Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52465/joscex.v7i1.7

Abstract

This study proposes a novel grayscale image encryption framework integrating a fractional-order 4D hyperchaotic Lorenz system with DNA encoding operations and SHA-256 plaintext-dependent key generation to address the security vulnerabilities in digital data transmission. The encryption pipeline employs a robust two-stage confusion-diffusion architecture designed to maximize pixel randomness and resistance against differential attacks. Stage 1 implements DNA-based confusion-diffusion with chaotic rule selection, while Stage 2 executes a four-round pixel-level permutation and XOR diffusion drixven by fractional-order Grünwald-Letnikov sequences (α = 0.95, d = 5). This multi-layered approach ensures that any infinitesimal change in the plaintext or the secret key results in a completely different cipher image. Hyperchaos is verified through the Lyapunov exponent spectrum (λ1 = +0.973, λ2 = +0.531), confirming two positive exponents and complex dynamical behavior. Experiments on five standard 512 × 512 grayscale images yield near-maximum information entropy (7.9993–7.9994 bits) and negligible pixel correlation (below 0.023). Statistical evaluations show an average NPCR of 99.5992% and UACI of 33.4216%, closely matching theoretical ideals. Key sensitivity analysis demonstrates that a perturbation of only ±10⁻¹⁴ in the initial conditions renders decryption unsuccessful, ensuring high security. In conclusion, the proposed scheme achieves perfect lossless recovery (PSNR = ∞ dB) and successfully passes all NIST SP 800-22 tests, providing a highly secure and reliable solution for protecting sensitive medical or military digital imagery.