Open Access
ARTICLE
Multilevel Military Image Encryption Based on Tri-Independent Keying Approach
1 College of Computer Engineering, University of Technology, Baghdad, 10001, Iraq
2 College of Artificial Intelligence Engineering, University of Technology, Baghdad, 10001, Iraq
* Corresponding Author: Amjad J. Humaidi. Email:
Computers, Materials & Continua 2026, 87(1), 64 https://doi.org/10.32604/cmc.2025.074752
Received 17 October 2025; Accepted 03 December 2025; Issue published 10 February 2026
Abstract
Military image encryption plays a vital role in ensuring the secure transmission of sensitive visual information from unauthorized access. This paper proposes a new Tri-independent keying method for encrypting military images. The proposed encryption method is based on multilevel security stages of pixel-level scrambling, bit-level manipulation, and block-level shuffling operations. For having a vast key space, the input password is hashed by the Secure Hash Algorithm 256-bit (SHA-256) for generating independently deterministic keys used in the multilevel stages. A piecewise pixel-level scrambling function is introduced to perform a dual flipping process controlled with an adaptive key for obscuring the spatial relationships between the adjacent pixels. A dynamic masking scheme is presented for conducting a bit-level manipulation based on distinct keys that change over image regions, providing completely different encryption results on identical regions. To handle the global correlation between large-scale patterns, a chaotic index-map system is employed for shuffling image regions randomly across the image domain based on a logistic map seeded with a private key. Experimental results on a dataset of military images show the effectiveness of the proposed encryption method in producing excellent quantitative and qualitative results. The proposed method obtains uniform histogram distributions, high entropy values around the ideal (≈8 bits), Number of Pixel Change Rate (NPCR) values above 99.5%, and low Peak Signal-to-Noise Ratio (PSNR) over all encrypted images. This validates the robustness of the proposed method against cryptanalytic attacks, verifying its ability to serve as a practical basis for secure image transmission in defense systems.Keywords
Cite This Article
Copyright © 2026 The Author(s). Published by Tech Science Press.This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.


Submit a Paper
Propose a Special lssue
View Full Text
Download PDF
Downloads
Citation Tools