Developing innovative methods to protect data transmitted over the Internet and stop unauthorized access to it is one of the most important challenges researchers encounter. A new approach to image data encryption has been introduced in this research, which is based on the chaotic map and Whale Optimization Algorithm (WOA). The encryption algorithm, which is entitled IEBCWOA, consists mainly of two phases: The first phase deals with shuffling the pixel positions by employing two keys for column and row permutation, respectively, generated by the Zaslavskii map, while the second phase deals with choosing the optimal substitution key by employing WOA and Zaslavskii Map. Several experiments have been carried out, and the results are compared to those of other researchers. The test findings indicated a satisfactory safety rate when compared to other existing techniques.
Ahmad, M., Alam, M. Z., Umayya, Z., Khan, S., & Ahmad, F. An image encryption approach using particle swarm optimization and chaotic map. International Journal of Information Technology, (2018), 10, 247-255. https://doi.org/10.1007/s41870-018-0099-y
Kocak, O., Erkan, U., Toktas, A., & Gao, S. PSO-based image encryption scheme using modular integrated logistic exponential map. Expert Systems with Applications, (2024), 237, 121452. https://doi.org/10.1016/j.eswa.2023.121452
Huang, W., Jiang, D., An, Y., Liu, L., & Wang X. A novel double-image encryption algorithm based on Rossler hyperchaotic system and compressive sensing. IEEE Access, (2021), 9, 41704-41716. Doi:10.1109/ACCESS.2021.3065453
Alshibani, D. R., Shati, N.M., & Ahmed, N.T. DNA Genetic Recombination based Image Encryption using Chaotic Maps. Indian Journal of Public Health Research & Development , (2019), 10, no. 6. Doi: 10.5958/0976-5506.2019.01432.3
Alshibani, D. R., & Qassir S. A. Image enciphering based on DNA Exclusive-OR operation union with chaotic maps. In 2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA), (2016), pp. 1-6. doi: 10.1109/AIC-MITCSA.2016.7759944
Allawi, S. T., & Alshibani, D. R. Color image encryption using LFSR, DNA, and 3D chaotic maps. International journal of electrical and computer engineering systems 13, (2022), 10, 885-893. https://doi.org/10.32985/ijeces.13.10.4
Li, L., Luo Y., Qiu, S., Ouyang, X., Cao, L., & Tang, S. Image encryption using chaotic map and cellular automata. Multimedia Tools and Applications 81, (2022), 28, 40755-40773. https://doi.org/10.1007/s11042-022-12621-9
Karthikeyini, S., Sagayaraj, R., Rajkumar, N., & Pillai, P.K. Security in Medical Image Management Using Ant Colony Optimization. Information Technology and Control 52, (2023), 2, 276-287. https://doi.org/10.5755/j01.itc.52.2.32532
Baagyere, E. Y., Agbedemnab, P. A.-N., Qin, Z., Daabo, M. I., & Qin, Z. A multi-layered data encryption and decryption scheme based on genetic algorithm and residual numbers. IEEE Access , (2020), 8, 100438-100447. doi: 10.1109/ACCESS.2020.2997838
Wang, J., Song, X., & Abd El-Latif, A. A. Single-objective particle swarm optimization-based chaotic image encryption scheme. Electronics 11, (2022), 16, 2628. https://doi.org/10.3390/electronics11162628
Ghazanfaripour, H., & Broumandnia, A. Designing a digital image encryption scheme using chaotic maps with prime modular. Optics & Laser Technology, (2020), 131, 106339. https://doi.org/10.1016/j.optlastec.2020.106339
Wang, S., Peng, Q., & Du, B. Chaotic color image encryption based on 4D chaotic maps and DNA sequence. Optics & Laser Technology , (2022), 148, 107753. https://doi.org/10.1016/j.optlastec.2021.107753
Ramakant Parida, R. N., Kumar Singh, B., & Pradhan, C. A Novel Approach for Image Encryption Using Zaslavskii Map and Arnold’s Cat Map. In Data Engineering and Intelligent Computing: Proceedings of ICICC 2020, (2021), 1407,269-282. Springer Singapore. https://doi.org/10.1007/978-981-16-0171-2_26
Liu, L. S. & Zhang, R. S. Multistrategy Improved Whale Optimization Algorithm and Its Application. Comput. Intel. Neurosci, 2022, Article ID 3418269. https://doi.org/10.1155/2022/3418269
Chen, X. Research on New Adaptive Whale Algorithm. IEEE Access, (2020), 8, 90165–90201. doi: 10.1109/ACCESS.2020.2993580
Alexan, W., ElBeltagy, M., & Aboshousha, A. Rgb image encryption through cellular automata, s-box and the lorenz system. Symmetry, (2022), 14, 3, 443. https://doi.org/10.3390/sym14030443
Allawi, S.T. & Alagrash, Y.H., A New Image Encryption Method Combining the DNA Coding and 4D Chaotic Maps. International Journal of Intelligent Engineering & Systems, (2025), 18,1,860-873. DOI:10.22266/ijies2025.0229.61
Mehdi, S. A., & Ali, Z. L. Image encryption algorithm based on a novel six-dimensional hyper-chaotic system. Al-Mustansiriyah journal of science, (2020), 31, 1, 54-63. https://doi.org/10.23851/mjs.v31i1.739
Maryoosh, A. A., Dhaif, Z. S., & Mustafa, R. A. Image confusion and diffusion based on multi-chaotic system and mix-column. Bulletin of Electrical Engineering and Informatics 10, (2021), 4, 2100-2109. https://doi.org/10.11591/eei.v10i4.2942
Thabit, Z. H., Mehdi, S. A., & Nema, B. M. Enhancing Color Image Security: Encryption with Dynamic Chaotic Three-Dimensional System and Robust Security Analysis. Al-Mustansiriyah Journal of Science , (2023), 34, 4, 87-95. https://doi.org/10.23851/mjs.v34i4.1411
Caffey JC, Moe R, Freund MA, Hutton J, inventors; Carbomedics Inc., assignee. Heart valve stent with alignment posts. United States patent US 6,635,085. 2003 Oct 21.
CRediT Author Statement
The authors confirm contribution to the paper as follows:
Conceptualization: Narjis Mezaal Shati, Dina Riadh Alshibani and Musaab Riyadh;
Methodology: Narjis Mezaal Shati and Dina Riadh Alshibani;
Software: Musaab Riyadh;
Data Curation: Narjis Mezaal Shati;
Writing- Original Draft Preparation: Narjis Mezaal Shati, Dina Riadh Alshibani and Musaab Riyadh;
Visualization: Musaab Riyadh;
Investigation: Narjis Mezaal Shati and Dina Riadh Alshibani;
Supervision: Narjis Mezaal Shati and Musaab Riyadh;
Validation: Narjis Mezaal Shati and Dina Riadh Alshibani;
Writing- Reviewing and Editing: Narjis Mezaal Shati, Dina Riadh Alshibani and Musaab Riyadh;
All authors reviewed the results and approved the final version of the manuscript.
Acknowledgements
The author thanks the "Department of Computer Science", "College of Science", "Mustansiriyah University (www.uomustansiriyah.edu.iq)", Baghdad-Iraq for supporting this work.
Funding
No funding was received to assist with the preparation of this manuscript.
Ethics declarations
Conflict of interest
The authors have no conflicts of interest to declare that are relevant to the content of this article.
Availability of data and materials
Data sharing is not applicable to this article as no new data were created or analysed in this study.
Author information
Contributions
All authors have equal contribution in the paper and all authors have read and agreed to the published version of the manuscript.
Corresponding author
Narjis Mezaal Shati
Department of Computer Science, College of Sciences, Mustansiriyah University, Baghdad, Iraq.
Open Access This article is licensed under a Creative Commons Attribution NoDerivs is a more restrictive license. It allows you to redistribute the material commercially or non-commercially but the user cannot make any changes whatsoever to the original, i.e. no derivatives of the original work. To view a copy of this license, visit https://creativecommons.org/licenses/by-nc-nd/4.0/
Cite this article
Narjis Mezaal Shati, Dina Riadh Alshibani and Musaab Riyadh, “Using Whale Optimization Algorithm and Chaotic Map to Encrypt Images”, Journal of Machine and Computing, pp. 1301-1308, April 2025, doi: 10.53759/7669/jmc202505102.