A Comparative Analysis of Image Encryption Techniques Based on Linear Feedback Shift Registers and Chaotic Systems
Abstract
Purpose: This study aims to conduct a comparative analysis of image encryption techniques, focusing on the performance and security of systems based on Linear Feedback Shift Registers (LFSRs) against those based on chaotic maps. The research addresses a gap in the literature by systematically evaluating higher-order and combined LFSR designs, and demonstrating their viability as a lightweight and secure alternative for image encryption.
Methods: We implemented and tested several image encryption algorithms, including novel LFSR-based ciphers and established chaos-based systems using logistic, tent, and Henon maps. We evaluated their performance using a suite of security metrics, including statistical analysis (histograms and correlation), and differential attack analysis (NPCR and UACI). The efficiency of each cipher was also assessed through execution time measurements.
Results: The experimental results demonstrate that all tested ciphers, including the novel SCLFSR24, achieved robust security, with NPCR values exceeding 99% and UACI values greater than 40%. This is associated with high sensitivity to pixel changes and strong resistance to differential attacks. The LFSR-based ciphers generated similarly random keystreams and secure encrypted images, performing comparably to the well-known chaos-based methods.
Conclusion: The findings suggest that LFSR-based ciphers offer a compelling and practical alternative for image security. Their lightweight design and strong security performance, comparable to chaotic systems, are particularly well-suited for real-time applications in fields such as healthcare and multimedia communication.
Keywords
References
Similar Articles
- Julia H. Whitaker, PROACTIVE CYBER THREAT HUNTING AND PREDICTIVE INTELLIGENCE IN CLOUD-ENABLED CRITICAL INFRASTRUCTURE: AN INTEGRATED FRAMEWORK FOR RESILIENT DIGITAL ECOSYSTEMS , International Journal of Cyber Threat Intelligence and Secure Networking: Vol. 3 No. 02 (2026): Volume 03 Issue 02
- Muhammad Hasnain, Algorithmic Abuse: How Social Platforms Amplify Revenge Porn, digital grooming and Sexual Coercion , International Journal of Cyber Threat Intelligence and Secure Networking: Vol. 3 No. 04 (2026): Volume 03 Issue 04
- Dr. Mateo Alvarez-Ruiz, From Reactive to Predictive Security: Integrating Threat Intelligence with SIEM for Proactive Threat Hunting , International Journal of Cyber Threat Intelligence and Secure Networking: Vol. 3 No. 01 (2026): Volume 03 Issue 01
- Dr. Jakob R. Neumann, Prof. Leila F. Mahmoud, Securing the Virtual Meeting Space: An Analysis of Cybersecurity Risks and Mitigation Strategies for Video Conferencing Platforms , International Journal of Cyber Threat Intelligence and Secure Networking: Vol. 2 No. 09 (2025): Volume 02 Issue 09
- Dr. Alistair C. Finch, From Reactive to Predictive: A Framework for Integrating Threat Intelligence with SIEM for Proactive Threat Hunting , International Journal of Cyber Threat Intelligence and Secure Networking: Vol. 2 No. 10 (2025): Volume 02 Issue 10
- Elena M. Kovacs, Predictive Intelligence Across Physical and Financial Systems: A Comparative Research Framework for Packed-Bed Thermal Energy Storage and AI-Driven Forecasting , International Journal of Cyber Threat Intelligence and Secure Networking: Vol. 3 No. 03 (2026): Volume 03 Issue 03
- Dr. Ahmed Saeed Al-Mansoori, Detection of Malicious Query Attack Weaknesses within Online Software Systems Using Byte-Level Pattern Matching , International Journal of Cyber Threat Intelligence and Secure Networking: Vol. 3 No. 04 (2026): Volume 03 Issue 04
- Dr. Arben Kola, Dr. Elira Hoxha, Dr. Gentian Leka, Study of Threat Evaluation and Forecasting Framework for Communication Infrastructure Using Neural Intelligence Techniques , International Journal of Cyber Threat Intelligence and Secure Networking: Vol. 3 No. 04 (2026): Volume 03 Issue 04
- Dr. Elena Petrova, Research on Unusual Transmission Pattern Recognition in Telecommunication Infrastructure Using Fuzzy Equation Approach , International Journal of Cyber Threat Intelligence and Secure Networking: Vol. 3 No. 04 (2026): Volume 03 Issue 04
- Igor Litovsky, Applying Graph Theory to Detect Collusive Fraud Rings in Distributed Reward Systems , International Journal of Cyber Threat Intelligence and Secure Networking: Vol. 3 No. 05 (2026): Volume 03 Issue 05
You may also start an advanced similarity search for this article.