Cover
Vol. 22 No. 1 (2026)

Published: June 15, 2026

Pages: 183-198

Original Article

Securing Image Transmission Over AWGN Channels Using OFDM Techniques and Hybrid Chaotic Based Cryptography

Abstract

The security of communications in various transmitted information’s forms such as video, audio, image, and even text and preserving them from attackers has become of great importance in the age of the Internet and cellular networks. Perhaps one of the most important media used to transmit information is digital images. They are distinguished from video and audio by their lack of complexity, and at the same time they are distinguished from text by the possibility of containing more information. Due to the necessity of transmitting huge amounts of information via digital images through additive white Gaussian noise (AWGN) channels for various applications. This transmission of images over unsecured channels is vulnerable to many attacks that must be protected by information security tools. In this research, a hybrid chaos-based system was developed to encrypt and secure images and send them via an orthogonal frequency division multiplexing (OFDM) channel, which leads to transferring large amounts of transmitted information in a short time, with very little interference between the data, and maintaining the transfer rate. Two chaotic techniques, Rossler and Modified Chau system, are used together to create a secret encryption key. This combination of chaotic systems provides highly random sensitive keys with amplitude of 10252 that are difficult to predict by the attacker and which makes restoring the original image very difficult in the event of a very small change in the chaotic parameters. Many tests were conducted to determine the strength of the proposed system, including statistical and differential analysis and entropy to verify the strength of the image security approach, in addition to applying some types of attacks to the encrypted image, such as noise and cropping different parts of the image. It is clear that the proposed scheme has strong immunity to these attacks. This was proven by the comparative experimental results. The entropy ratio was very excellent compared to the rest of the results obtained in the rest of the research. This was also the case with the values of (NPCR), (UACI), (NPCR), and Mean Square Error (MSE) was also very good as compared with other researches in the literature. The proposed security approach for OFDM gave a low link and a low bit error rate. And a higher signal-to-noise ratio (PSNR).

References

  1. M. Haque, S. Ahmad, A. Abboud, M. Hossain, K. Kumar, S. Haque, D. Sonal, M. Rahman, and S. Marisennayya, “6g wireless communication networks: Challenges and potential solution,” International Journal of Business Data Communications and Networking (IJBDCN), vol. 19, no. 1, pp. 1–27, 2024.
  2. Z. Tang, X. Zhang, X. Li, and S. Zhang, “Robust image hashing with ring partition and invariant vector distance,” IEEE Transactions on Information Forensics and Security, vol. 11, no. 1, pp. 200–214, 2015.
  3. A. Abboud, A. Albu-Rghaif, and A. Jassim, “Balancing compression and encryption of satellite imagery,” International Journal of Electrical and Computer Engineering, vol. 8, no. 5, pp. 3568–3586, 2018.
  4. A. Abboud and S. Jassim, “Incremental fusion of partial biometric information,” in Proceedings of Mobile Multimedia/Image Processing, Security, and Applications, vol. 8406, pp. 169–177, 2012.
  5. A. Abboud and S. Jassim, “Biometric templates selection and update using quality measures,” in Proceedings of Mobile Multimedia/Image Processing, Security, and Applications, vol. 8406, pp. 74–82, 2012.
  6. C. Singar, J. Bharti, and R. Pateriya, “Image encryption based on cell shuffling and scanning techniques,” in Proceedings of 2017 International Conference on Recent Innovations in Signal Processing and Embedded Systems (RISE), pp. 257–263, 2017.
  7. A. Abboud and S. Jassim, “Image quality guided approach for adaptive modelling of biometric intra-class variations,” in Proceedings of Mobile Multimedia/Image Processing, Security, and Applications, vol. 7708, pp. 189–198, 2010.
  8. M. Salim, A. Abboud, and R. Yildirim, “A visual cryptography-based watermarking approach for the detection and localization of image forgery,” Electronics, vol. 11, no. 1, p. 136, 2022.
  9. Y. Wu, J. Noonan, and S. Agaian, “A wheel-switch chaotic system for image encryption,” in Proceedings of 2011 International Conference on System Science and Engineering, pp. 23–27, 2011.
  10. M. Mishra and S. Pandit, “Image encryption technique based on chaotic system and hash function,” in Proceedings of IEEE International Conference on Computer Communication and Systems (ICCCS14), pp. 63–67, 2014.
  11. Q. Zhang,W. Li, and Q. Ding, “Discrete design of lorenz chaotic system based on euler method and image encryption,” in Proceedings of Third International Conference on Robot, Vision and Signal Processing (RVSP), pp. 176– 179, 2015.
  12. P. Chaturvedi and D. Jain, “A hybrid rsa and rc6 based secure image cryptography to minimize entropy and enhance correlation,” in Proceedings of 2016 2nd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT), pp. 32– 37, 2016.
  13. H. Farsi and J. Farid, “Video transmission using new adaptive modulation and coding scheme in ofdm based cognitive radio,” Journal of Communications, vol. 1, no. 4, pp. 239–249, 2013.
  14. S. Yousif, A. Abboud, and H. Radhi, “Robust image encryption with scanning technology, the el-gamal algorithm and chaos theory,” IEEE Access, vol. 8, pp. 155184–155209, 2020.
  15. G. Hu, W. Kou, and J. Peng, “A novel image encryption algorithm based on cellular neural networks hyper chaotic system,” in Proceedings of IEEE 4th International Conference on Computer and Communications (ICCC), pp. 1878–1882, 2018.
  16. S. Yousif, A. Abboud, and R. Alhumaima, “A new image encryption based on bit replacing, chaos and dna coding techniques,” Multimedia Tools and Applications, vol. 81, no. 19, pp. 27453–27493, 2022.
  17. X. Qian, Q. Yang, Q. Li, Q. Liu, Y. Wu, and W. Wang, “A novel color image encryption algorithm based on three-dimensional chaotic maps and reconstruction techniques,” IEEE Access, vol. 9, pp. 61334–61345, 2021.
  18. B. Y. Irani, P. Ayubi, F. A. Jabalkandi, M. Y. Valandar, and M. J. Barani, “Digital image scrambling based on a new one-dimensional coupled sine map,” Nonlinear Dynamics, 2024.
  19. J. Nkapkop, J. Effa, A. Toma, F. Cociota, and M. Borda, “Chaos-based image encryption using the rsa keys management for an efficient web communication,” in Proceedings of 12th IEEE International Symposium on Electronics and Telecommunications (ISETC), pp. 59–62, 2016.
  20. L. Chen, G. Song, and X. Meng, “Study of sierpinski gasket used in gray image scrambling,” in Proceedings of IEEE 3rd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), pp. 2298– 2302, 2018.
  21. H. Wu, Y. Shao, K. Mikolajczyk, and D. G¨und¨uz, “Channel-adaptive wireless image transmission with ofdm,” IEEE Wireless Communications Letters, vol. 11, no. 11, pp. 2400–2404, 2022.
  22. K. Dharavathu and A. Mosa, “Secure image transmission through crypto-ofdm system using rubik’s cube algorithm over an awgn channel,” vol. 33, p. e4369, 2020.
  23. S. Eldin, “Optimized ofdm transmission of encrypted image over fading channel,” Sensing and Imaging, vol. 15, pp. 1–14, 2014.
  24. C. Zhu, “A novel image encryption scheme based on improved hyperchaotic sequences,” Optics Communications, vol. 285, no. 1, pp. 29–37, 2012.
  25. P. Andono, “Improved pixel and bit confusion-diffusion based on mixed chaos and hash operation for image encryption,” IEEE Access, vol. 10, pp. 115143–115156, 2022.
  26. N. Sharkawy, Y. Afify,W. Gad, and N. Badr, “Gray-scale image encryption using dna operations,” IEEE Access, vol. 10, pp. 63004–63019, 2022.
  27. Y. Hamza and M. Omer, “An efficient method of image encryption using rossler chaotic system,” Academic Journal of Nawroz University, vol. 10, no. 2, pp. 11–22, 2021.
  28. A. U. Rehman, D. Xiao, A. Kulsoom, M. Hashmi, and S. Abbas, “Block mode image encryption technique using two-fold operations based on chaos, md5 and dna rules,” Multimedia Tools and Applications, vol. 78, pp. 9355–9382, 2019.
  29. W. Alexan, M. Elkandoz, M. Mashaly, E. Azab, and A. Aboshousha, “Color image encryption through chaos and kaa map,” IEEE Access, vol. 11, pp. 11541–11554, 2023.
  30. M. Khan and F. Masood, “A novel chaotic image encryption technique based on multiple discrete dynamical maps,” Multimedia Tools and Applications, vol. 78, pp. 26203–26222, 2019.
  31. W. Alexan, M. ElBeltagy, and A. Aboshousha, “Rgb image encryption through cellular automata, s-box and the lorenz system,” Symmetry, vol. 14, no. 3, p. 443, 2022.
  32. S. Zhu, X. Deng, W. Zhang, and C. Zhu, “Image encryption scheme based on newly designed chaotic map and parallel dna coding,” Mathematics, vol. 11, no. 1, p. 231, 2023.
  33. T. Ali and R. Ali, “A novel color image encryption scheme based on a new dynamic compound chaotic map and s-box,” Multimedia Tools and Applications, vol. 81, no. 15, pp. 20585–20609, 2022.
  34. M. Sahari and I. Boukemara, “A pseudo-random numbers generator based on a novel 3d chaotic map with an application to color image encryption,” Nonlinear Dynamics, vol. 94, pp. 723–744, 2018.
  35. I. Younas and M. Khan, “A new efficient digital image encryption based on inverse left almost semi group and lorenz chaotic system,” Entropy, vol. 20, no. 12, p. 913, 2018.
  36. X. Chai, K. Yang, and Z. Gan, “A new chaos-based image encryption algorithm with dynamic key selection mechanisms,” Multimedia Tools and Applications, vol. 76, pp. 9907–9927, 2017.
  37. Y. Liu, G. Cen, B. Xu, and X. Wang, “Color image encryption based on deep learning and block embedding,” Security and Communication Networks, vol. 2022, pp. 1– 14, 2022.
  38. I. Q. Abduljaleel, S. A. Abdul-Ghani, and H. Z. Naji, “An image of encryption algorithm using graph theory and speech signal key generation,” in ICMAICT, 2020.
  39. Z. Abduljabbar, I. Abduljaleel, J. Ma, M. A. Sibahee, V. Nyangaresi, D. Honi, A. Abdulsada, and X. Jiao, “Provably secure and fast color image encryption algorithm based on s-boxes and hyperchaotic map,” IEEE Access, vol. 10, pp. 26257–26270, 2022.
  40. A. Qayyum, J. Ahmad, W. Boulila, S. Rubaiee, F. Masood, F. Khan, and W. Buchanan, “Chaos-based confusion and diffusion of image pixels using dynamic substitution,” IEEE Access, vol. 8, pp. 140876–140895, 2020.
  41. X. Hu, L. Wei, W. Chen, Q. Chen, and Y. Guo, “Color image encryption algorithm based on dynamic chaos and matrix convolution,” IEEE Access, vol. 8, pp. 12452– 12466, 2020.
  42. C. Zhu, “A novel image encryption scheme based on improved hyperchaotic sequences,” Optics Communications, vol. 285, no. 1, pp. 29–37, 2012.
  43. S. Zhou, P. He, and N. Kasabov, “A dynamic dna color image encryption method based on sha-512,” Entropy, vol. 22, no. 10, p. 1091, 2020.
  44. L. Kansal, G. Gaba, N. Chilamkurti, and B. Kim, “Efficient and robust image communication techniques for 5g applications in smart cities,” Energies, vol. 14, no. 13, p. 3986, 2021.
  45. Z. Tang, Y. Yang, S. Xu, C. Yu, and X. Zhang, “Image encryption with double spiral scans and chaotic maps,” Security and Communication Networks, vol. 2019, pp. 1– 15, 2019.
  46. I. Eldokany, E. El-Rabaie, S. Elhalafawy, M. Z. Eldin, M. Shahieen, N. Soliman, M. El-Bendary, M. El-Naby, F. Al-Kamali, I. Elashry, and F. A. El-Samie, “Efficient transmission of encrypted images with ofdm in the presence of carrier frequency offset,” Wireless Personal Communications, vol. 84, pp. 475–521, 2015.