Secure Multi-Spectral Image Encryption using Chaos and Gravitational Diffusion

Venkata Ganesh J.*, Joseph K.**, Yadidya K.***, Leeladhar Manikanta L.****, Sudhakar Putheti*****
*-***** Department of Computer Science and Engineering, Vasireddy Venkatadri Institute of Technology, Guntur, Andhra Pradesh India.
Periodicity:April - June'2025
DOI : https://doi.org/10.26634/jit.14.2.21944

Abstract

This study introduces an advanced encryption technique for multi-spectral images that combines chaotic systems and a gravitational model to enhance security. The method tackles challenges like high dimensionality and inter-band correlations through a multi-layered approach. By using bit-plane decomposition, it achieves precise data manipulation, while a hybrid chaotic system combining 2D Logistic-Tent-Modulated Map and 1D Sine-Cosine-Sawtooth Map ensures high-quality randomness for pixel and spectral band scrambling. Additionally, a gravitational model-based diffusion process dynamically modifies pixel intensities, further strengthening encryption, dynamic image-dependent key generation ensures unique encryption keys for every image, enhancing resistance to brute-force attacks. The decryption process is fully reversible, ensuring accurate image reconstruction. Experimental results highlight the method's high sensitivity to initial conditions, strong defence against statistical and differential attacks, and efficient handling of multi-spectral data. This makes it a secure and scalable solution for applications like remote sensing, medical imaging, and defence.

Keywords

Chaos Theory, Gravitational Model, Chaotic Maps, Image Scrambling, Diffusion Mechanism, Cryptographic Security.

How to Cite this Article?

Ganesh, J. V., Joseph, K., Yadidya, K., Manikanta, L. L., and Putheti, S. (2025). Secure Multi-Spectral Image Encryption using Chaos and Gravitational Diffusion. i-manager’s Journal on Information Technology, 14(2), 21-32. https://doi.org/10.26634/jit.14.2.21944

References

[1]. Abraham, L., & Daniel, N. (2013). Secure image encryption algorithms: A review. International Journal of Scientific & Technology Research, 2(4), 186-189.
[6]. Baalaji, K. D. P. D. K. (2025). Image encryption and decryption algorithm using XOR operator. International Journal of Innovative Research in Science Engineering and Technology, 14 (4), 8895-8907.
[12]. Gonzalez, R. C. (2009). Digital Image Processing. Pearson Education India.
[27]. Stallings, W. (2005). Cryptography and Network Security: Principles and Practices. Prentice Hall.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 15 15 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.