Secure Image Scrambling and Encryption Using M-Sequences with GUI-Based Retrieval System

Priyanka R. AsutkarStudent, Computer Science and Engineering, Shri Sai College of Engineering and Technology, Bhadrawati, Chandrapur, IndiaPallavi B. RodeStudent, Computer Science and Engineering, Shri Sai College of Engineering and Technology, Bhadrawati, Chandrapur, IndiaKomal R. YergudeStudent, Computer Science and Engineering, Shri Sai College of Engineering and Technology, Bhadrawati, Chandrapur, IndiaAvantika S. NagpureStudent, Computer Science and Engineering, Shri Sai College of Engineering and Technology, Bhadrawati, Chandrapur, IndiaJayanti A. ParasharAssistant Professor, Computer Science and Engineering, Shri Sai College of Engineering and Technology, Bhadrawati, Chandrapur, India

Vol 10 No 5 (2026): Volume 10, Issue 5, May 2026 | Pages: 56-60

International Research Journal of Innovations in Engineering and Technology

OPEN ACCESS | Research Article | Published Date: 05-05-2026

doi Logo doi.org/10.47001/IRJIET/2026.105008

Abstract

The rise in digital communication and cloud-based data sharing has elevated the importance of securing multimedia content, particularly images. This study introduces a novel image scrambling and encryption technique based on M-sequences, aiming to ensure high-level security during image storage and transmission. The proposed method utilizes linear feedback shift registers (LFSRs) to generate M-sequences, which are then applied to scramble pixel positions and intensities. Additionally, a graphical user interface (GUI) is developed to facilitate user-friendly encryption and decryption processes. Unlike traditional chaotic approaches that are vulnerable to cryptanalysis such as chosen-plaintext attacks, the proposed system embeds key generation tightly with image characteristics, significantly improving resistance against modern threats. Simulation results validate the accuracy, speed, and robustness of the system, making it a promising candidate for secure image applications in cloud environments.

Keywords

Image scrambling, M-sequences, GUI, pixel permutation, image encryption, data security, LFSR


Citation of this Article

Priyanka R. Asutkar, Pallavi B. Rode, Komal R. Yergude, Avantika S. Nagpure, & Jayanti A. Parashar. (2026). Secure Image Scrambling and Encryption Using M-Sequences with GUI-Based Retrieval System. International Research Journal of Innovations in Engineering and Technology - IRJIET, 10(5), 56-60. Article DOI https://doi.org/10.47001/IRJIET/2026.105008

References
  1. J. Fridrich,“Symmetric Ciphers Based on Two-Dimensional Chaotic Maps,” International Journal of Bifurcation and Chaos, vol. 8, no. 6, pp. 1259–1284, 1998.
  2. Y. Sheng, J. Li, X. Di, X. Li, and R. Xu, “An Image Encryption Algorithm Based on Complex Network Scrambling and Multi-Directional Diffusion,” Entropy, vol. 24, no. 9, 2022.
  3. C. Sun, E. Wang, and B. Zhao, “Image Encryption Scheme with Compressed Sensing Based on Hyperchaotic System,” Entropy, vol. 23, no. 4, 2021.
  4. R. Zhang and D. Xiao, “A Secure Image Permutation–Substitution Framework Based on Chaos,” International Journal of Distributed Sensor Networks, vol. 16, no. 5, 2020.
  5. M. Y. S. Thomas, V. N. A. Krishna, and M. B. Varghese, “Image Encryption Algorithm with Block Scrambling Based on Logistic Map,” Indian Journal of Science and Technology, 2023.
  6. Z. Wu, J. Liang, R. Deng, and R. Ye, “Image Encryption Algorithm Based on Scrambling with Reversible Matrix Transformation,” IJCTT, vol. 68, no. 5, 2020.
  7. Z. Deng and S. Zhong, “A Digital Image Encryption Algorithm Based on Chaotic Mapping,” International Journal of High Performance Computing Applications, 2019.
  8. W. Stallings, Cryptography and Network Security: Principles and Practice, 8th ed. Pearson, 2021.
  9. A.Menezes, P. van Oorschot, and S. Vanstone, Handbook of Applied Cryptography. CRC Press.
  10. N. Koblitz,A Course in Number Theory and Cryptography. Springer.
  11. B. Schneier,Applied Cryptography: Protocols, Algorithms, and Source Code in C. Wiley.
  12. X. Wang and H. Zhang, “A Novel Image Encryption Algorithm Based on DNA Encoding,” Signal Processing, 2020.
  13. K. Wong, B. Kwok, and C. Law, “A Fast Image Encryption Scheme Based on Chaotic Standard Map,” Physics Letters A, 2008.
  14. G. Alvarez and S. Li, “Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems,” International Journal of Bifurcation and Chaos, 2006.
  15. R. C. Gonzalez and R. E. Woods,Digital Image Processing, 4th ed. Pearson.
  16. S. Li, C. Li, G. Chen, and K. Wong, “On the Security Defects of an Image Encryption Scheme,” Image and Vision Computing, 2009.
  17. M. Pareek, V. Patidar, and K. Sud, “Image Encryption Using Chaotic Logistic Map,” Image and Vision Computing, 2006.
  18. A.Jolfaei and A. Mirghadri, “Image Encryption Using Chaos and Cellular Automata,” Computer Communications, 2012.
  19. H. Elkamchouchi and M. Makar, “A New Efficient Technique for Image Encryption Based on Pseudorandom Sequences,” IEEE Access, 2020.
  20. X. Tong, M. Cui, and Y. Wang, “Image Encryption with Compound Chaotic Sequence Cipher Shifting Dynamically,” Image and Vision Computing, 2013.