International Journal of Advanced Technology and Engineering Exploration ISSN (Print): 2394-5443    ISSN (Online): 2394-7454 Volume-13 Issue-135 February-2026
  1. 4037
    Citations
  2. 2.7
    CiteScore
Color image encryption using elliptic curve cryptography and large dynamic S-boxes

Hamid El Bourakkadi1,  Hassan Tabti2,  Abdelhakim Chemlal1,  Abdellah Abid1,  Abdellatif Jarjar1 and Abdelhamid Benazzi1

MATSI Laboratory,ESTO, Mohammed First University,Oujda,Morocco1
LSIA Laboratory,FST, Sidi Mohamed Ben Abdellah University,Fez,Morocco2
Corresponding Author : Hamid El Bourakkadi

Recieved : 10-Jun-2025; Revised : 17-Feb-2026; Accepted : 19-Feb-2026

Abstract

Image ciphering is commonly used to transform digital images into an unintelligible form to prevent unauthorized access during transmission over open networks. However, traditional cryptographic systems, which typically rely on fixed or limited key sizes, are unsuitable for time-critical applications because images contain high redundancy and large volumes of data. This paper presents an image encryption algorithm that integrates elliptic curve cryptography (ECC), chaotic maps, and large dynamic substitution boxes (S-boxes). The proposed scheme addresses key challenges in image security, particularly the limited key space and execution-time inefficiencies associated with conventional approaches. The integration of a pseudo-random number generator (PRNG) derived from elliptic curve (EC) with chaotic maps enables the generation of novel S-boxes, resulting in enhanced performance and improved robustness against various cryptographic attacks. Experimental results demonstrate significant improvements in security metrics, including entropy, number of pixels change rate (NPCR), and unified average changing intensity (UACI).

Keywords

Image encryption, Elliptic curve cryptography (ECC), Chaotic maps, Dynamic S-box generation, Pseudo-random number generator (PRNG).

Cite this article

El Bourakkadi H, Tabti H, Chemlal A, Abid A, Jarjar A, Benazzi A. Color image encryption using elliptic curve cryptography and large dynamic S-boxes. International Journal of Advanced Technology and Engineering Exploration. 2026;13(135):209-224. DOI : 10.19101/IJATEE.2025.121220770

References

[1] Tabti H, El BH, Chemlal A, Jarjar A, Najah S, Zenkouar K. Novel cryptosystem integrating the vigenere cipher and one feistel round for color image encryption. International Journal of Electrical & Computer Engineering. 2024; 14(5):5701-14.

[2] Naim M, Pacha AA. A novel image encryption algorithm based on advanced hill cipher and 6d hyperchaotic system. International Journal of Network Security. 2023; 25(5):829-40.

[3] Du S, Ye G. IWT and RSA based asymmetric image encryption algorithm. Alexandria Engineering Journal. 2023; 66:979-91.

[4] Lu Z. Encryption management of accounting data based on DES algorithm of wireless sensor network. Wireless Communications and Mobile Computing. 2022; 2022(1):1-14.

[5] Hafsa A, Sghaier A, Malek J, Machhout M. Image encryption method based on improved ECC and modified AES algorithm. Multimedia Tools and Applications. 2021; 80(13):19769-801.

[6] Shannon CE. Communication theory of secrecy systems. The Bell System Technical Journal. 1949; 28(4):656-715.

[7] Song W, Fu C, Zheng Y, Zhang Y, Chen J, Wang P. Batch image encryption using cross image permutation and diffusion. Journal of Information Security and Applications. 2024; 80:103686.

[8] Qobbi Y, Abid A, Jarjar M, El KS, Jarjar A, Benazzi A. An image encryption algorithm based on substitution and diffusion chaotic boxes. In the international conference on artificial intelligence and smart environment 2022 (pp. 184-90). Cham: Springer International Publishing.

[9] Fan W, Li T, Wu J, Wu J. Chaotic color image encryption based on eight-base DNA-level permutation and diffusion. Entropy. 2023; 25(9):1-27.

[10] ST J, Sarvagya M. IDHG-ECC-integrated diffie hellman galois–elliptic-curve cryptography for enhancing EHR data security. Journal of Information Security and Application. 2025; 90(C):104024.

[11] Alexan W, Elkandoz M, Mashaly M, Azab E, Aboshousha A. Color image encryption through chaos and kaa map. IEEE Access. 2023; 11:11541-54.

[12] Zhou Y, Li C, Li W, Li H, Feng W, Qian K. Image encryption algorithm with circle index table scrambling and partition diffusion. Nonlinear Dynamics. 2021; 103(2):2043-61.

[13] Wei D, Jiang M, Deng Y. A secure image encryption algorithm based on hyper-chaotic and bit-level permutation. Expert Systems with Applications. 2023; 213:119074.

[14] Zhao M, Li L, Yuan Z. An image encryption approach based on a novel two-dimensional chaotic system. Nonlinear Dynamics. 2024; 112(22):20483-509.

[15] Gao S, Iu HH, Wang M, Jiang D, Abd EAA, Wu R, et al. Design, hardware implementation, and application in video encryption of the 2-D memristive cubic map. IEEE Internet of Things Journal. 2024; 11(12):21807-15.

[16] Gao S, Wu R, Wang X, Liu J, Li Q, Tang X. EFR-CSTP: encryption for face recognition based on the chaos and semi-tensor product theory. Information Sciences. 2023; 621:766-81.

[17] Alali AS, Ali R, Jamil MK, Ali J, Gulraiz. Dynamic S-box construction using mordell elliptic curves over galois field and its applications in image encryption. Mathematics. 2024; 12(4):1-15.

[18] Kanwal S, Inam S, Al-otaibi S, Akbar J, Siddiqui N, Ashiq M. An efficient image encryption algorithm using 3D-cyclic Chebyshev map and elliptic curve. Scientific Reports. 2024; 14(1):1-15.

[19] Hadi HH, Neamah AA. An image encryption method based on modified elliptic curve diffie-hellman key exchange protocol and hill cipher. Open Engineering. 2024; 14(1):1-15.

[20] Singh LD, Lahoty A, Devi C, Dey D, Saikai P, Devi KS, et al. Image encryption using dynamic S-boxes generated using elliptic curve points and chaotic system. Journal of Information Security and Applications. 2024; 83:103793.

[21] Caldarola F, D’atri G, Zanardo E. Neural fairness blockchain protocol using an elliptic curves lottery. Mathematics. 2022; 10(17):1-20.

[22] Lahraoui Y, Jebrane J, Amal Y, Lazaar S, Cheng-chi L. IECC-SAIN: innovative ECC-Based approach for secure authentication in IoT networks. Computer Modeling in Engineering & Sciences. 2025; 144(1):615-41.

[23] Sasikumar K, Nagarajan S. Comprehensive review and analysis of cryptography techniques in cloud computing. IEEE Access. 2024; 12:52325-51.

[24] Ullah S, Zheng J, Din N, Hussain MT, Ullah F, Yousaf M. Elliptic curve cryptography; applications, challenges, recent advances, and future trends: a comprehensive survey. Computer Science Review. 2023; 47:100530.

[25] Mousavi SK, Ghaffari A, Besharat S, Afshari H. Security of internet of things based on cryptographic algorithms: a survey. Wireless Networks. 2021; 27(2):1515-55.

[26] Bilal M, Murtaza G, Demir B, Bustamante MD, Hayat U. An efficient algorithm to generate dynamic substitution-boxes and its applications in image encryption. Alexandria Engineering Journal. 2025; 116:214-31.

[27] Kumar S, Sharma D. A chaotic based image encryption scheme using elliptic curve cryptography and genetic algorithm. Artificial Intelligence Review. 2024; 57(4):1-31.

[28] Ayoup AM, Khalaf AA, El-shafai W, Abd EFE, Alraddady F, Eldin SM. Cancellable multi-biometric template generation based on Arnold cat map and aliasing. Computers, Materials, & Continua. 2022; 72(2):1-17.

[29] Ullah S, Liu X, Waheed A, Zhang S. S-box using fractional-order 4D hyperchaotic system and its application to RSA cryptosystem-based color image encryption. Computer Standards & Interfaces. 2025; 93:103980.

[30] Sanam N, Mumtaz S, Khalid S. LA-ring based non-linear components: application to image security. Integration. 2025; 100:102279.

[31] Aqeel M, Jaffar A, Faheem M, Ashraf MW, Iqbal N, Yousaf S, et al. A randomized non‐overlapping encryption scheme for enhanced image security in internet of things (IoT) applications. Engineering Reports. 2025; 7(1):1-23.

[32] Obaid MJ, Neamah AA, Shukur AA, Pham VT, Grassi G. A reliable color image encryption scheme based on a novel dual-wing hyperchaotic map. Expert Systems with Applications. 2025; 289:128237.

[33] Khalid I, Shah T, Eldin SM, Shah D, Asif M, Saddique I. An integrated image encryption scheme based on elliptic curve. IEEE Access. 2022; 11:5483-501.

[34] Murtaza G, Hayat U. Efficient image encryption algorithm based on ECC and dynamic S-box. Journal of Information Security and Applications. 2025; 90:104004.

[35] Ningthoukhongjam TR, Heisnam SD, Khumanthem MS. Medical image encryption through chaotic asymmetric cryptosystem. IEEE Access. 2024; 12:73879-88.

[36] Kumar PR, Goel S. A secure and efficient encryption system based on adaptive and machine learning for securing data in fog computing. Scientific Reports. 2025; 15(1):1-16.

[37] Kattass M. Improved vigenere using affine functions surrounded by two genetic crossovers for image encryption. Indonesian Journal of Electrical Engineering and Computer Science. 2024; 34(3):1787-99.