Next Article in Journal
Simulation of a Two-Phase Fluid Flow in a Design Solution of a Secondary Radial Settling Tank for Wastewater Treatment
Previous Article in Journal
Analysis of Loss Functions for Colorectal Polyp Segmentation Under Class Imbalance
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Proceeding Paper

Implementing Artificial Intelligence in Chaos-Based Image Encryption Algorithms †

by
Hristina Stoycheva
1,*,
Stanimir Sadinov
1,
Krasen Angelov
1,
Panagiotis Kogias
2 and
Michalis Malamatoudis
2
1
Department of Communication Technique and Technologies, Technical University of Gabrovo, 5300 Gabrovo, Bulgaria
2
Department of Physics, Democritus University of Thrace, 65404 Kavala, Greece
*
Author to whom correspondence should be addressed.
Presented at the International Conference on Electronics, Engineering Physics and Earth Science (EEPES 2025), Alexandroupolis, Greece, 18–20 June 2025.
Eng. Proc. 2025, 104(1), 20; https://doi.org/10.3390/engproc2025104020
Published: 25 August 2025

Abstract

This paper presents a modification of an image encryption algorithm combining chaos and the Fibonacci matrix by integrating artificial intelligence via a Generative Pre-Trained Transformer (GPT). The goal is to improve the robustness of the algorithm by dynamically adapting the parameters of the chaotic system and generating cryptographic keys based on image characteristics. The proposed methodology includes two main innovations: the implementation of GPT for automated generation of the initial parameters of the chaotic system, which allows for greater variability and security in encryption, and the use of GPT for dynamic determination of the Fibonacci Q-matrix, which provides additional complexity and increased resistance to attacks. The method is realized in the MATLAB (R2023a) environment through integration with OpenAI API and the MATLAB–Python interface for requesting GPT models. The efficiency and reliability of the modified algorithm are compared with those of standard chaotic encryption algorithms, and its robustness to various cryptographic attacks is also studied.

1. Introduction

The implementation of artificial intelligence in mobile smart devices has gained immense popularity in recent years. Features like photo tools, voice assistants, predictive text, as well as music and facial recognition have been staples for years. The standard user of such a device uses the AI implemented in their device mostly through applications for capturing and processing images. According to statistical studies by Canalys, approximately 1.94 trillion photos were taken in 2024, or 5.3 billion photos daily, with 94% of them being taken with a smartphone, and 14 billion images are shared daily on social media. This spectacular volume of generated digital information invariably raises the issue of ensuring its protection.
Sharing personal digital information has become an everyday occurrence for a large part of the population. However, to what extent can the integrity of the created digital content be guaranteed? Widespread platforms for sharing digital content are working increasingly hard to maintain certain levels of protection from unauthorized access. And if on these platforms digital information is shared intentionally and with the aim of reaching a wide audience, this is not the case with the transmission of sensitive information relating to medical conditions, corporate data, the location of objects of strategic importance, etc. This is precisely what has caused the increased scientific interest in the field of protected data transmission in recent years.
Artificial intelligence is rapidly entering every aspect of new technologies. Its application is wide and diverse and covers areas such as automotive manufacturing [1,2,3], industrial and power electronics [4,5,6], medicine [7,8,9,10,11,12], chemistry [13,14], communications [15,16,17,18,19,20,21], etc. One of the most current trends in the field of communications is precisely the secure transmission of data, which determines the study of various possibilities for implementing AI in image encryption algorithms.
There are many different algorithms for image encryption. They can be mainly divided into symmetric [22], asymmetric [23], chaotic [24], fractal [25], and hybrid algorithms [26]. Some of the more common image encryption algorithms are based on classical approaches, such as OTP algorithms [27,28], while others rely on eccentric approaches, such as implementing chaotic synchronization schemes [29,30,31]. Recently, innovative approaches in image encryption, such as implementing AI, have gained particular popularity.
Currently, MATLAB does not have built-in tools for working with large language models, so implementing GPT (Generative Pre-Trained Transformer) in MATLAB is not completely straightforward. However, there are several approaches to implementing GPT in MATLAB: Using OpenAI: One of the easiest ways to use GPT in MATLAB is through OpenAI API. MATLAB supports sending HTTP requests via webwrite and webread, which allows calling GPT models via OpenAI API. MATLAB–Python interface: MATLAB allows the execution of Python code, so the OpenAI library from Python (3.13) can be used. This method gives more flexibility when working with more complex queries. Local execution of a GPT model in MATLAB: This approach involves the simultaneous use of the MATLAB Deep Learning Toolbox, a pre-trained model from Hugging Face Transformers (via Python), and the MATLAB–Python interface to access a local model.
This paper proposes a modification of an image encryption algorithm based on chaos and the Fibonacci Q-matrix [32]. The modification introduces AI functionality in the form of a GPT implementation into several modules of the encryption algorithm.
The main contributions of the paper can be summarized as follows:
  • A general architecture is proposed for implementing AI functionalities in image encryption algorithms based on chaotic systems;
  • A modified version of an existing algorithm, which combines a chaotic system and a Fibonacci matrix with AI capabilities, is presented. The modification leads to improved performance compared to the classical algorithm;
  • A security analysis of the modified algorithm implemented in a MATLAB environment is conducted, demonstrating an increased level of protection.
The modified algorithm is implemented in a Matlab environment, and how the use of GPT affects the efficiency and robustness of the algorithm is investigated.

2. Mathematical Foundations

2.1. Chaotic Model

In 2024, Shukur et al. proposed a model of a third-order chaotic system with specific nonlinearity [33]:
x ˙ 1 = x 2                                                                                             x ˙ 2 = x 3                                                                                             x ˙ 3 = a x 1 b x 2 c x 3 d x 1 x 1
where the values of the system parameters are a = 1.8 ; b = 1.4 ; c = 0.43 ; a n d   d = 0.1 . The graphical interpretation of the chaotic attractor of the system (Figure 1) was simulated under the following randomly chosen initial conditions: x 0 = 0 0 1 T .

2.2. Fibonacci Q-Matrix

In mathematics, the Fibonacci sequence is a sequence in which each element is the sum of the two elements that precede it [34]. The sequence is closely related to the golden ratio and has been studied in various scientific fields for hundreds of years.
The Fibonacci Q-matrix is the matrix defined by
Q = F 2 F 1 F 1 F 0 = 1 1 1 0 ,
where Fn is a Fibonacci number. Then,
Q n = F n + 1 F n F n F n 1 ,
The Q-matrices immediately give a number of important Fibonacci identities [34], including
Q n = Q n ,
which gives
F n 1 F n + 1 F n 2 = 1 n ,
Q n + 1 Q n = Q 2 n + 1 ,  
therefore
Q n = F n + 2 F n + 1 F n + 1 F n F n + 1 F n F n F n 1 = F 2 n + 2 F 2 n + 1 F 2 n + 1 F 2 n ,
and
Q m Q n 1 = Q n + m 1 ,
which gives
Q n = F m + 1 F m F m F m 1 F n + 1 F n F n F n 1 = F m + n F m + n 1 F m + n 1 F m + n 2
The inverse matrix Q(−n) has the following form:
Q n = F n 1 F n F n F n + 1 ,

3. Modification of the Encryption Algorithm

3.1. Introducing a Modified Algorithm Based on Chaos and the Fibonacci Q-Matrix

The algorithm is based on a signal from a hyperchaotic system and the Fibonacci Q-matrix. The basic algorithm, along with a detailed presentation of the method, is provided in [32].
Encryption is carried out in two main stages: confusion and diffusion. During the confusion process, the arrangement of pixels is altered, while in the diffusion process, their values are modified. This method utilizes a novel third-order chaotic system. At first, the system’s initial state is computed based on the original image. Then, through iterations of the chaotic system, a new vector (x1, x2, and x3) is generated. This vector is sorted, and the positions of the sorted values are used to confuse the original image.
Once the confusion stage is complete, the diffusion process is applied to obtain the encrypted image. In the current algorithm, diffusion is implemented using the Fibonacci Q-matrix. The scrambled image is divided into blocks of size 2 × 2, with each block being transformed using the Fibonacci Q-matrix. To ensure a higher level of security, the confusion and diffusion stages are performed twice.

3.2. Structure of the Modified Algorithm with AI Functionalities

Algorithms of this type offer a high level of security but also have certain drawbacks, primarily consolidated in the generation of the encryption key. The use of artificial intelligence will enhance the qualities of the encoding scheme under consideration, making it more flexible and efficient when working with color images.
The modification of the algorithm includes the use of AI in determining the parameters of the chaotic system, its initial conditions, and the Fibonacci matrix, based on the properties of the encoded image. This gives these steps in the encoding process a dynamic nature. In addition to the implementation of AI, the algorithm is also modified by incorporating a third-order chaotic system, which was described and analyzed in the previous section.
Figure 2 shows a block diagram of the modified algorithm.
The considered images for encryption are color images with dimensions M × N . At the beginning of the encryption process, the initial conditions and parameter initialization are determined. This process includes validation of the image, verification of the valid number of encoding iterations, as well as ensuring the correct input of the OpenAI API key. The image dimensions are extracted, and due to the use of the Fibonacci Q-matrix, an even number of rows and columns is ensured.
The iterative encoding process begins with converting the image into a matrix of double-type numbers.
The next step is obtaining the parameters for the chaotic system, as well as the initial conditions for the state vector. The validation of the generated parameters and initial conditions is performed in the core part of the algorithm. The validation is characterized by the following:
  • No parameters have been received from the AI—In this case, the request is resent, but no more than three times. If the request fails after the third attempt, it is assumed that there is no internet access, and default values are used.
  • The parameter values are out of range—A check is performed to ensure that the values do not exceed predefined limits, which determine the chaotic nature of the system. It is desirable that the parameters acting as bifurcation points for the system do not vary widely, but their modification is crucial, as they ensure the key sensitivity condition of the algorithm.
  • Initial conditions of the state vector—Due to the characteristic sensitivity of chaotic systems to initial conditions, these are chosen within specific areas of attraction of the attractor, with the aim of ensuring the desired dynamics.
The next step in the encoding process is obtaining two arrays of values derived from solving the system with the obtained parameters and initial conditions. The method used for solving is the Dormand–Prince method. This method integrates the system of differential equations y = f t , y     w i t h   t 0 = 0.9865   ×   M   ×   N 3 , thus producing an output array, Y, with values greater than M × N or each of the variables in the state vector.
The array, Y, is used to form a new array, L, with dimensions M × N × 3 of the double type, which includes the values for x1, x2, and x3 of the chaotic system. The use of a higher-order chaotic system is not optimal, as the algorithm requires the use of three variables. Different values for these variables can be ensured through the use of AI, while a more complex system would require more time to solve.
The matrix, L, is sorted in descending order, and the result is stored in a new array, S. From this array, a permutated vector is formed using the relationship R = P ( S i ) . This vector is then transformed into a matrix, Rs, with dimensions N × M , essentially reconstructing an image from it.
Following this procedure comes the third point where AI is utilized—specifically, for generating the dynamic Fibonacci Q-matrix. The Fibonacci transformation using this matrix generally involves dividing R s into individual 2 × 2, blocks, where each block is scrambled using the Fibonacci Q-matrix. This process is iterative and is repeated M × N 4 times. As a result, the encoded matrix, C, is obtained.
In the final stage of the encoding process, a modular operation is applied between the input image and the encoding matrix, C. If this is not the final iteration, the result is passed to matrix P, and the steps are repeated from the beginning. If it is the final encoding iteration, the resulting matrix represents the final encrypted image.
The decoding process generally follows the reverse order, with the key difference being the use of the inverse Fibonacci matrix.

3.3. Implementation and Integration of AI Functionality in the Modified Algorithm

The integration of AI functionality, as previously mentioned, is implemented in two critical modules of the algorithm: the parameters of the chaotic system and the initial Fibonacci matrix. The use of AI—specifically OpenAI’s GPT—is organized into subprograms: one for generating the chaotic system parameters and another for generating the Fibonacci matrix. The structure of these subprograms is uniform, as the same approach is used in both cases, namely, an HTTP request.
The structure of the subprograms includes several stages:
Determining Image Properties—Key features such as entropy, average brightness, contrast, histogram, or even the entire image are analyzed. However, using the full image may significantly increase processing time, so it is recommended to use a fragment of the image with a size of 64x64 pixels. This also increases the algorithm’s key space, enhancing security.
Defining the Working Prompts—When working with GPT, a prompt represents the entry point to the model. Essentially, it is the instruction or message in text format sent to the model in the appropriate structure. The prompt used for generating the chaotic system parameters has the following format in MATLAB:
  • prompt = sprintf([‘Generate optimized chaotic encryption parameters (a, b, c, d) for a Shukur system based on image entropy %.2f, mean intensity %.2f, and contrast %.2f. Output only four floating point numbers separated by spaces.’], entropy_value, mean_intensity, contrast).
For generating the Fibonacci matrix, the prompt is as follows:
  • prompt = sprintf([‘Generate a 2 × 2 matrix based on Fibonacci numbers, suitable for use as a Q-matrix in dynamic system modeling. Base the values on image entropy %.2f, mean intensity %.2f, and contrast %.2f. Output only four floating point numbers (Fibonacci-based) in row-major order separated by spaces.’], entropy_value, mean_intensity, contrast).
Each prompt must necessarily end with a request for result formatting, as the final output requires numerical values. Otherwise, a parser function must be implemented to extract the values from the response.
Creating a JSON Structure—The entire request is organized into what is known as a JSON structure. This structure includes various parameters and options. It starts by adding a system message that defines the model’s role. This message is treated as a system prompt with content like the following: ‘You are an AI that provides optimized chaotic encryption parameters.’
The model type, maximum number of tokens, and temperature are selected and set. In the current implementation, the model chosen is ‘gpt-4’, with a maximum token limit of no more than 50, which is sufficient for the purpose. These two parameters mainly influence the cost, response time, and performance. The temperature is a parameter that determines the randomness of the generated response. The higher the value, the more random the response will be for the same input data. The allowable values for temperature range between 0 and 2. In the specific implementation, the temperature value is set to 1.2. To further control GPT’s output variability, several key parameters are utilized. The n parameter, which enables the generation of multiple chat completions for a single input prompt, is set to 1 in this case. Another important parameter is max_tokens, which defines the maximum number of tokens allowed in a generated completion. This is considered a good practice for managing computational costs. However, it should be noted that if this value is set excessively high, it may be ignored due to the model’s overall token limit, which includes both the input and the generated output. In this implementation, max_tokens is set to 50. Additional optional parameters, such as function, function_call, and stream, are not utilized in this setup.
Formulating the Final Request and Sending It—Before sending the request, it is checked for proper JSON formatting, and any necessary adjustments are made to ensure it is correctly structured. Once the formatting is verified, the request is closed. Various HTTP request options are then defined, such as the API key, timeout, and request method. The final request is sent to OpenAI using the webwrite function.
Extracting the Response from GPT—Despite the formatting in the main prompt, the response from GPT is returned as text. This text must be converted into a numerical array. A check is then performed to validate the correctness of the extracted data. If the returned values are not valid parameters, default values are selected. The same procedure is followed if the request cannot be executed, for example, if there is no internet access. Unlike the parameters for the chaotic system, the default values for the Fibonacci matrix can be functionally tied to the numerical expressions of the image properties.

4. Results and Analysis

To test the modified algorithm, various standard color images from freely accessible databases were used. To evaluate the quality and level of image encryption, several widely used statistical and numerical analyses were employed, namely, histograms, correlation functions, information entropy, NPCR, and UACI.

4.1. Main Results

The main test image chosen is “Lena.” The original, encrypted, and decrypted images are presented in Figure 3a–c, followed by the graphically represented histograms ((d) and (e)) and correlations ((f) and (g)) of the original and encrypted images.
The histogram of the encrypted image is stable, smooth, and evenly distributed, which demonstrates a high level of image encryption. This indicates that the resulting encrypted image does not provide any statistical information about the corresponding input image. Regarding the analysis of the correlation model, the degree of correlation between the original and encrypted images is extremely low, further confirming the high level of encryption achieved.
Table 1 presents the numerical results for information entropy, NPCR, and UACI coefficients.
The presented numerical results indicate that the values of information entropy and NPCR are close to the theoretical maximum, while the correlation coefficient is significantly lower than that of the original image.
Table 2 presents a comparison of the original algorithm based on a sixth-order hyperchaotic system and the Fibonacci Q-matrix [32] and the presented modification. The comparison was made based on the digital results obtained from encrypting the grayscale Lena image.
From the presented data, it can be concluded that the modifications introduced in the algorithm increase the information entropy and NPCR coefficients and significantly improve the correlation coefficient.

4.2. Additional Results

In addition, the modified algorithm based on chaos, GPT, and the Fibonacci Q-matrix has been tested with four additional standard test images. The obtained results are presented in Table 3 below.
The obtained results for the set of additional test images confirm the statement related to the previous point. The correlation and information entropy coefficients have values close to the theoretical maximum, which demonstrates the robustness of the algorithm against brute force attacks.

4.2.1. Differential Attacks

One of the characteristic properties of encryption algorithms that are resistant to differential attacks is their exceptional sensitivity to even slight changes in the encoded image. The ability of the encryption algorithm to withstand differential attacks can be evaluated by analyzing the algorithm’s performance using the Number of Pixels Change Rate (NPCR) and Unified Average Changing Intensity (UACI) tests. Table 4 presents the values of the NPCR and UACI coefficients for the set of test images.
The achieved high level of resistance to differential attacks is confirmed by the exceptionally high values of the NPCR and UACI coefficients.

4.2.2. Brute Force Attacks

The key space refers to the full range of potential key combinations that an encryption algorithm can employ. A sufficiently large key space—typically greater than 2 100 —is essential to prevent brute force attacks.
For the algorithm under consideration, the key space depends on the initial conditions of the chaotic system variables, x 1 ,   x 2 ,   a n d   x 3 , as well as on the system parameters, a ,   b ,   c ,   a n d   d , in combination with the values of the Q-matrix. Assuming that only the system parameters and the initial state, x 0 , are used as the shared secret key—which is common practice in chaos-based encryption algorithms—the resulting keyspace is at a minimum equal to x 0 × 2 212 . This value significantly exceeds the threshold required to resist brute force attacks, thereby ensuring a high degree of security.

4.2.3. Resistance to Noise and Data Loss

To assess the algorithm’s resistance to noise attacks, “Salt and Pepper” noise with varying density is added to the encrypted image. Subsequently, the affected images must be successfully decrypted. Additionally, it is necessary to evaluate the algorithm’s ability to decrypt an encrypted image that has missing segments of varying sizes. To quantitatively determine the quality of encryption algorithms when decrypting a corrupted image, the PSNR (Peak Signal-to-Noise Ratio) metric is used.
Table 5 presents the PSNR coefficient results for “Salt and Pepper” noise with densities of 0.002 and 0.005, as well as for image integrity violations with losses of 6% and 12%, for the entire set of test images.

4.2.4. Run-Time Performance Analysis

When estimating the computational complexity of the algorithm using O(…) notation, it becomes evident that the overall complexity primarily depends on the size of the input image. In other words, the algorithm has a complexity of O(NxM). However, a more practical insight into the computational cost and execution time can be obtained through the use of MATLAB’s Run-Time Profiler, as the algorithm is implemented and tested within the MATLAB environment.
To evaluate the execution time, the main program records the time required for sending and receiving responses from the AI model, as well as the time taken for encryption and decryption. The results for images of size 256 × 256 and 512 × 512 are summarized in Table 6.
The obtained results clearly indicate that the method used to send the request to the GPT model is not a determining factor. Instead, the execution time primarily depends on the network bandwidth, latency, endpoint load, and any possible rate limiting applied at the endpoint. Regarding the encryption process, the majority of the time required is consumed by the subroutine that solves the system of differential equations of the chaotic system. For example, this computation takes approximately 0.663 s for a 256 × 256 image and around 2.137 s for a 512 × 512 image, accounting for roughly 90% of the total encryption time. The decryption process, on the other hand, is significantly faster since the differential system does not need to be solved again. The total execution time also includes numerous auxiliary operations such as figure creation and manipulation, image visualization, file handling, and others. When the durations of these additional processes are excluded, it can be concluded that the theoretical time complexity expressed with O(…) notation is indeed confirmed.

5. Conclusions

The presented article proposes an approach for integrating artificial intelligence into an image encryption algorithm based on chaos and the Fibonacci matrix. By using the GPT model, a subroutine is implemented within the main algorithm, which, based on properties of the input image, generates unique values for the parameters of the chaotic system as well as for the Fibonacci matrix. This approach aims to achieve a higher degree of security, as well as a certain level of abstraction in generating the encryption key, since the process does not require human intervention, and the encryption key remains concealed. The obtained results demonstrate that the modification enhances the qualities of the encryption scheme. The conducted experiments reinforce the algorithm’s resistance to some known cryptographic attacks.

Author Contributions

Conceptualization, H.S., S.S. and K.A.; methodology, H.S., S.S. and K.A.; software, H.S., S.S. and K.A.; validation, H.S., P.K. and M.M.; formal analysis, H.S.; investigation, H.S., S.S. and K.A.; resources, H.S., S.S. and K.A.; data curation, H.S., P.K. and M.M.; writing—original draft preparation, H.S.; writing—review and editing, H.S., S.S. and K.A.; visualization, H.S. and K.A.; supervision, S.S., P.K. and M.M.; project administration, H.S. and S.S.; funding acquisition, H.S. and S.S. All authors have read and agreed to the published version of the manuscript.

Funding

This research was supported by the Bulgarian Ministry of Education and Science under the National Program “Young Scientists and Postdoctoral Students—2” and was funded by the University Center for Research and Technology at the Technical University of Gabrovo, project SRP 2025-14 (HИП 2025-14), “Contemporary Methods and AI Solutions for Secure Data Transmission in Broadband Communication Networks”.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Dataset available on request from the authors.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Ajitha, P.V.; Nagra, A. An overview of artificial intelligence in automobile industry—A case study on Tesla cars. Solid State Technol. 2021, 64, 503–512. [Google Scholar]
  2. Madhavaram, C.R.; Sunkara, J.R.; Kuraku, C.; Galla, E.P.; Gollangi, H.K. The future of automotive manufacturing: Integrating AI, ML, and Generative AI for next-Gen Automatic Cars. Int. Multidiscip. Res. J. Rev. 2024, 1, 010103. [Google Scholar] [CrossRef]
  3. Tyagi, A.K.; Mishra, A.K.; Kukreja, S. Role of Artificial Intelligence Enabled Internet of Things (IoT) in the Automobile Industry: Opportunities and Challenges for Society. In Proceedings of the International Conference on Cognitive Computing and Cyber Physical Systems, Bhimavaram, India, 5–7 April 2023; Springer Nature: Singapore, 2023; pp. 379–397. [Google Scholar]
  4. Liyakat, K.S.S.; Liyakat, K.K.S. ML in the electronics manufacturing industry. J. Switch. Hub 2023, 8, 9–13. [Google Scholar] [CrossRef]
  5. Agrawal, A.V.; Raju, K.M.; Sravya, G.; Chandrashekhar, A.; Ramya, J. AI-Driven Test and Measurement Automation in Electronics Manufacturing. In Proceedings of the 2024 Ninth International Conference on Science Technology Engineering and Mathematics (ICONSTEM), Chennai, India, 4–5 April 2024; pp. 1–6. [Google Scholar]
  6. Vasudevan, K. Applications of artificial intelligence in power electronics and drives systems: A comprehensive review. J. Power Electron. 2023, 1, 1–14. [Google Scholar]
  7. Zhang, P.; Kamel Boulos, M.N. Generative AI in medicine and healthcare: Promises, opportunities and challenges. Future Internet 2023, 15, 286. [Google Scholar] [CrossRef]
  8. Beam, A.L.; Drazen, J.M.; Kohane, I.S.; Leong, T.Y.; Manrai, A.K.; Rubin, E.J. Artificial intelligence in medicine. N. Engl. J. Med. 2023, 388, 1220–1221. [Google Scholar] [CrossRef]
  9. Al-Antari, M.A. Artificial intelligence for medical diagnostics—Existing and future AI technology! Diagnostics 2023, 13, 688. [Google Scholar] [CrossRef]
  10. Yip, M.; Salcudean, S.; Goldberg, K.; Althoefer, K.; Menciassi, A.; Opfermann, J.D.; Lee, I.C. Artificial intelligence meets medical robotics. Science 2023, 381, 141–146. [Google Scholar] [CrossRef]
  11. DiGiorgio, A.M.; Ehrenfeld, J.M. Artificial intelligence in medicine & ChatGPT: De-tether the physician. J. Med. Syst. 2023, 47, 32. [Google Scholar]
  12. Waisberg, E.; Ong, J.; Masalkhi, M.; Kamran, S.A.; Zaman, N.; Sarker, P.; Tavakkoli, A. GPT-4: A new era of artificial intelligence in medicine. Ir. J. Med. Sci. 2023, 192, 3197–3200. [Google Scholar] [CrossRef]
  13. Rial, R.C. AI in analytical chemistry: Advancements, challenges, and future directions. Talanta 2024, 274, 125949. [Google Scholar] [CrossRef]
  14. Han, R.; Yoon, H.; Kim, G.; Lee, H.; Lee, Y. Revolutionizing medicinal chemistry: The application of artificial intelligence (AI) in early drug discovery. Pharmaceuticals 2023, 16, 1259. [Google Scholar] [CrossRef]
  15. Qin, Z.; Liang, L.; Wang, Z.; Jin, S.; Tao, X.; Tong, W.; Li, G.Y. AI empowered wireless communications: From bits to semantics. Proc. IEEE 2024, 112, 621–652. [Google Scholar] [CrossRef]
  16. Xu, F.; Hussain, T.; Ahmed, M.; Ali, K.; Mirza, M.A.; Khan, W.U.; Han, Z. The state of ai-empowered backscatter communications: A comprehensive survey. IEEE Internet Things J. 2023, 10, 21763–21786. [Google Scholar] [CrossRef]
  17. Zuo, Y.; Guo, J.; Gao, N.; Zhu, Y.; Jin, S.; Li, X. A survey of blockchain and artificial intelligence for 6G wireless communications. IEEE Commun. Surv. Tutor. 2023, 25, 2494–2528. [Google Scholar] [CrossRef]
  18. Malthouse, E.; Copulsky, J. Artificial intelligence ecosystems for marketing communications. Int. J. Advert. 2023, 42, 128–140. [Google Scholar] [CrossRef]
  19. Ahammed, T.B.; Patgiri, R.; Nayak, S. A vision on the artificial intelligence for 6G communication. ICT Express 2023, 9, 197–210. [Google Scholar] [CrossRef]
  20. Alahi, M.E.E.; Sukkuea, A.; Tina, F.W.; Nag, A.; Kurdthongmee, W.; Suwannarat, K.; Mukhopadhyay, S.C. Integration of IoT-Enabled Technologies and Artificial Intelligence (AI) for Smart City Scenario: Recent Advancements and Future Trends. Sensors 2023, 23, 5206. [Google Scholar] [CrossRef] [PubMed]
  21. de Azambuja, A.J.G.; Plesker, C.; Schützer, K.; Anderl, R.; Schleich, B.; Almeida, V.R. Artificial Intelligence-Based Cyber Security in the Context of Industry 4.0—A Survey. Electronics 2023, 12, 1920. [Google Scholar] [CrossRef]
  22. Khompysh, A.; Dyusenbayev, D.; Maxmet, M. Development and analysis of symmetric encryption algorithm. Int. J. Electr. Comput. Eng. 2025, 15, 1900–1911. [Google Scholar] [CrossRef]
  23. Lalem, F.; Laouid, A.; Kara, M.; Al-Khalidi, M.; Eleyan, A. A Novel Digital Signature Scheme for Advanced Asymmetric Encryption Techniques. Appl. Sci. 2023, 13, 5172. [Google Scholar] [CrossRef]
  24. Zhang, B.; Liu, L. Chaos-Based Image Encryption: Review, Application, and Challenges. Mathematics 2023, 11, 2585. [Google Scholar] [CrossRef]
  25. Inam, S.; Kanwal, S.; Batool, M.; Al-Otaibi, S.; Jamjoom, M.M. A blockchain-integrated chaotic fractal encryption scheme for secure medical imaging in industrial IoT settings. Sci. Rep. 2025, 15, 7652. [Google Scholar] [CrossRef]
  26. Alanzy, M.; Alomrani, R.; Alqarni, B.; Almutairi, S. Image Steganography Using LSB and Hybrid Encryption Algorithms. Appl. Sci. 2023, 13, 11771. [Google Scholar] [CrossRef]
  27. Thorat, N.N.; Singla, A.; Dhaigude, T. Sharing Secret Colour Images with Embedded Visual Cryptography Using the Stamping Algorithm and OTP Procedure. Int. J. Recent Innov. Trends Comput. Commun. 2023, 11, 63–70. [Google Scholar] [CrossRef]
  28. Konwar, R.; Jha, D.; Agrawal, R.; Purkayastha, R.; Banerjee, I. A Two-Factor Authentication Mechanism Using a Novel OTP Generation Algorithm for Cloud Applications. In Proceedings of the 2024 14th International Conference on Cloud Computing, Data Science & Engineering (Confluence), Noida, India, 18–19 January 2024; pp. 245–250. [Google Scholar] [CrossRef]
  29. Saeed, N.A.; Saleh, H.A.; Hou, L.; Nasr, E.A. A novel chaotic oscillator with a half-line of unstable equilibria: Basins of attraction, chaos control, chaos synchronization, and encryption applications. Mod. Phys. Lett. B 2025, 39, 2450436. [Google Scholar] [CrossRef]
  30. Shi, Q.; Zhao, Y.; Ding, Q. Design and FPGA implementation of encrypted frame transmission scheme based on chaotic reverse synchronization. Nonlinear Dyn. 2025, 113, 5511–5535. [Google Scholar] [CrossRef]
  31. Yang, C.-H.; Lee, J.-D.; Tam, L.-M.; Li, S.-Y.; Cheng, S.-C. FPGA Implementation of Image Encryption by Adopting New Shimizu–Morioka System-Based Chaos Synchronization. Electronics 2025, 14, 740. [Google Scholar] [CrossRef]
  32. Hosny, K.M.; Kamal, S.T.; Darwish, M.M.; Papakostas, G.A. New Image Encryption Algorithm Using Hyperchaotic System and Fibonacci Q-Matrix. Electronics 2021, 10, 1066. [Google Scholar] [CrossRef]
  33. Shukur, A.A.; Neamah, A.A.; Pham, V.T.; Grassi, G. A novel chaotic system with one absolute term: Stability, ultimate boundedness, and image encryption. Heliyon 2025, 11, e37239. [Google Scholar] [CrossRef]
  34. Vorobiev, N.N. Fibonacci Numbers; Birkhäuser Verlag: Basel, Switzerland, 2002. [Google Scholar]
Figure 1. Three-dimensional projection of the chaotic attractor of Shukur’s model.
Figure 1. Three-dimensional projection of the chaotic attractor of Shukur’s model.
Engproc 104 00020 g001
Figure 2. Block diagram of the modified algorithm using artificial intelligence and the three-dimensional Shukur chaotic system.
Figure 2. Block diagram of the modified algorithm using artificial intelligence and the three-dimensional Shukur chaotic system.
Engproc 104 00020 g002
Figure 3. Original (a), encrypted (b), and decrypted images (c), along with their corresponding graphically represented histograms (d—original image; e—encrypted image) and correlations (f—original image; g—encrypted image).
Figure 3. Original (a), encrypted (b), and decrypted images (c), along with their corresponding graphically represented histograms (d—original image; e—encrypted image) and correlations (f—original image; g—encrypted image).
Engproc 104 00020 g003
Table 1. Numerical results.
Table 1. Numerical results.
EntropyCorrelationNPCRUACI
Input image7.32830.9864--
Encrypted image7.99950.003799.621733.4463
Table 2. Comparison of original and modified algorithms with grayscale Lena image.
Table 2. Comparison of original and modified algorithms with grayscale Lena image.
EntropyCorrelationNPCRUACI
Input image7.32830.9864--
Original method [32]7.99930.006999.617433.4226
Modified7.99950.003799.621733.4463
Table 3. Numerical results for the additional images.
Table 3. Numerical results for the additional images.
Engproc 104 00020 i001Engproc 104 00020 i002Engproc 104 00020 i003Engproc 104 00020 i004
EntropyOI3.67797.62887.84717.7563
EI7.97077.99927.99937.9994
CorrelationOI0.93650.97470.93940.9829
EI0.01720.0012−0.0014−0.0018
Table 4. Differential attack—numerical results.
Table 4. Differential attack—numerical results.
LenaMRIParrotsKoalaFlower
NPCR99.621798.773299.600599.618099.5985
UACI33.446334.904132.995733.295533.2622
Table 5. PSNR for “Salt and Pepper” noise and data cut attack.
Table 5. PSNR for “Salt and Pepper” noise and data cut attack.
LenaMRIParrotsKoalaFlower
S&P noise level 0.00222.655020.780623.661323.439122.8415
S&P noise level 0.00518.947516.752719.687319.641719.0693
Data cut—6%16.881714.953917.719917.572117.0821
Data cut—12% 11.675610.242612.480012.359211.7835
Table 6. MATLAB run-time performance results.
Table 6. MATLAB run-time performance results.
Image SizeUsing AIEncryptDecryptTotal Time
256 × 2561.615 s0.721 s0.066 s4.7415 s
512 × 5122.062 s2.395 s0.252 s7.584 s
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Stoycheva, H.; Sadinov, S.; Angelov, K.; Kogias, P.; Malamatoudis, M. Implementing Artificial Intelligence in Chaos-Based Image Encryption Algorithms. Eng. Proc. 2025, 104, 20. https://doi.org/10.3390/engproc2025104020

AMA Style

Stoycheva H, Sadinov S, Angelov K, Kogias P, Malamatoudis M. Implementing Artificial Intelligence in Chaos-Based Image Encryption Algorithms. Engineering Proceedings. 2025; 104(1):20. https://doi.org/10.3390/engproc2025104020

Chicago/Turabian Style

Stoycheva, Hristina, Stanimir Sadinov, Krasen Angelov, Panagiotis Kogias, and Michalis Malamatoudis. 2025. "Implementing Artificial Intelligence in Chaos-Based Image Encryption Algorithms" Engineering Proceedings 104, no. 1: 20. https://doi.org/10.3390/engproc2025104020

APA Style

Stoycheva, H., Sadinov, S., Angelov, K., Kogias, P., & Malamatoudis, M. (2025). Implementing Artificial Intelligence in Chaos-Based Image Encryption Algorithms. Engineering Proceedings, 104(1), 20. https://doi.org/10.3390/engproc2025104020

Article Metrics

Back to TopTop