Open Access
ARTICLE
Hyper-Chaos and CNN-Based Image Encryption Scheme for Wireless Communication Transmission
1 School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, 100876, China
2 School of Computer Science and Technology, Harbin Institute of Technology, Shenzhen, 518055, China
* Corresponding Author: Guosheng Xu. Email:
Computers, Materials & Continua 2025, 84(3), 4851-4868. https://doi.org/10.32604/cmc.2025.066331
Received 05 April 2025; Accepted 30 May 2025; Issue published 30 July 2025
Abstract
In wireless communication transmission, image encryption plays a key role in protecting data privacy against unauthorized access. However, conventional encryption methods often face challenges in key space security, particularly when relying on chaotic sequences, which may exhibit vulnerabilities to brute-force and predictability-based attacks. To address the limitations, this paper presents a robust and efficient encryption scheme that combines iterative hyper-chaotic systems and Convolutional Neural Networks (CNNs). Firstly, a novel two-dimensional iterative hyper-chaotic system is proposed because of its complex dynamic behavior and expanded parameter space, which can enhance the key space complexity and randomness, ensuring resistance against cryptanalysis. Secondly, an innovative CNN architecture is introduced for generating the key stream for the cryptographic system. CNN architecture exhibits excellent nonlinearity and can further optimize the key generation process. To rigorously evaluate the encryption performance, extensive simulation analyses were conducted, including visualization, statistical histogram, information entropy, correlation, differential attack, and resistance. The method has shown a high NPCR (Number of Pixel Change Rate) of 99.642% and a UACI (Unified Average Changing Intensity) value of 33.465%, exhibiting powerful resistance to differential attacks. A series of comprehensive experimental tests have illustrated that the proposed scheme exhibits superior distribution characteristics, which underscores the robustness and efficacy of the image encryption, and helps for communication security.Keywords
Cite This Article
Copyright © 2025 The Author(s). Published by Tech Science Press.This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.


Submit a Paper
Propose a Special lssue
View Full Text
Download PDF
Downloads
Citation Tools