Chaotic Lightweight Cryptosystem for Image Encryption

supreme security for


Introduction
Data are very much sensitive, and its security is essential for today's life. Data distribution over the physical medium and Internet has been increasing day by day which makes data security to become a concerning issue. Data security should avoid eavesdropping and provide confidentiality by encrypting the multimedia element.
ere exist several image encryption algorithms [1][2][3]. e conventional encryption algorithms such as Rivest-Shamir-Adleman (RSA), advanced encryption standard (AES), and data encryption standard (DES) are complex to implement. Hence, lightweight image encryption is required that provides enhanced security with low computational complexity. We have described the background and contributions of this work in the following sections.

Background.
e lightweight encryption algorithms are based on the structure of the multimedia element on which they are stored [4]. e conventional encryption algorithm has high computational complexity and hence is not suitable for encryption. Asymmetric encryption algorithms require higher computational complexity compared to symmetric encryption algorithms, where a vector of a real number represents the image. Hence, the vector is very long as the sampling coefficients of the image are very large [5]. A digital image is a two-dimensional (2D) vector that contains pixels whose values are between 0 and 255. An image can be represented by any geometric shapes (circles/curves/lines) using these numbers [6]. So, it is very important to secure digital images. e lightweight encryption algorithm provides enhanced security among various sharing devices such as the Internet of ings-(IoT-) based applications where data security and privacy are prime concerns. Besides, information technology is rapidly developing. Hence, cloud computing spread severely in all sectors including industry, railway, commerce, and administration, where security is the most essential. erefore, security architecture is needed in these sectors, so that unauthorized users cannot access the cloud [7][8][9]. For the last two decades, the applications of surveillance systems have been considerably increased. ese systems are spread over all the places (public or private). e authenticated users identify or track the object which they want. Surveillance encryption algorithm encrypts the message or video frame to provide security [10]. ese IoT-based controlled applications and other applications need data security that should be provided by a lightweight image encryption method. e lightweight image encryption algorithm can be used in the cloud, surveillance systems, railway, dedicated network, Internet of ings (IoT), and medical applications.

Contributions.
For protecting content from unauthorized access and distribution, an efficient image encryption technique is very important. Data privacy along with data security is a concerning issue for today's Internet world. e lightweight image encryption method gives a promising framework by providing low computational complexity. e main contributions of this research are as follows: (i) To design a lightweight image encryption method that requires less time, less value for key transformation, and ensures lower correlation coefficients between adjacent pixels of the encrypted image (ii) To design a highly sensitive key for encrypting and decrypting images (iii) To compare our method with the existing state-of-the-art methods from various perspectives e rest of the study is organized as follows: Section 2 describes the related literature with the problem statement. Some theories are described in Section 3. We described our proposed framework along with detailed steps of image encryption and decryption in Section 4. e experimental results are described in Section 5. Finally, we concluded our study along with future work in Section 6.

Literature Review and Problem Statement
is section describes the related literature of lightweight image encryption and addresses some issues that must be improved.

Literature Study.
Several studies [6][7][8] have already been performed based on lightweight image encryption. In the scheme [11], a rotation matrix based on bit-level permutation and block-diffusion was proposed. At first, the host image is divided by 8 × 8 nonoverlapping blocks with a random matrix, and then, each block is transformed into an 8 × 8 × 8 three-dimensional (3D) cube-shaped binary matrix. en, the 3D matrix is multiplied with the random matrix, and the permutation is carried out. After that, the system performs block diffusion for coping with any further statistical change of the image. e experiments show satisfactory security performance along with better robustness under several attacks. In another scheme [12], a technique based on heterogeneous bit permutation and correlated chaos was proposed for color image encryption. Here, for reducing the computational cost and improving the permutation efficiency, the heterogeneous bit permutation is used before the expanded XOR operation on three channels (red (R), green (G), and black (B)) of the color image. en, pseudorandom sequences are generated by a one-dimensional (1D) chaotic map during the encryption process. e experiment gave secure and effective results. Besides, a novel algorithm based on bit permutation and DNA encoding was proposed by Zhang et al. [13]. At first, the hash value is calculated for an input DNA sequence, and the image is scrambled by using the chaotic sequence. e bit permutation of the image is implemented by the butterfly network, and the DNA matrix of the image is generated. For improving the security of the system, an algebraic operation with the DNA sequence is performed. Finally, the operation of the DNA sequence enhances the confusion and diffusion matrices. e experiments show that the algorithm has a large key space, strong sensitivity, and high robustness under various attacks. A lightweight chaotic image encryption algorithm for a 32 bit microcontroller was proposed for designing a real-time embedded system [14]. e performance of the algorithm is suitable for real-time applications, and its safety is observed via different studies such as randomness analysis, sensitivity analysis, encryption quality analysis, differential analysis, statistical analysis, visual analysis, and attack analysis. Besides, for railway cloud service, a lightweight authenticated encryption scheme based on a novel discrete chaotic S-box coupled map lattice (SCML) was proposed in the scheme [15]. SCML minimizes the dynamic degradation of the chaotic system, and the encryption process protects the data from unauthorized access. Also, it maintains the data integrity in one pass. e proposed scheme is secure and robust under various attacks. Besides, privacy for surveillance video is also essential. e entire video is encrypted by the region of interest (ROI) scheme. A lightweight encryption method based on layered cellular automata (LCA) for satellite applications was proposed in the scheme [16]. Here, the ROI's are encrypted individually and stored at the camera memory and used by the individual depends on the user's needs. Any user can see this surveillance video online without ROI in real-time, and the results show that the method is robust and secure. For mobile cloud storage, another privacy-preserving lightweight image encryption (PLIE) method was proposed in the scheme [17], where data privacy is very important. Here, the image metadata is saved in the mobile cloud by using a lightweight encryption method. User's privacy is maintained by the process SDS (split, distribute, and scramble) in mobile. en, the data are stored in the mobile cloud. In this case, the encryption time is reduced by 50% than the AES method. Image encryption requires a large volume of data that needs an efficient algorithm. In 2018 [18], a secure and time-efficient image encryption method was proposed based on permutation, diffusion, and multiple one-dimensional (1D) chaotic maps. Here, chaotic maps such as beta, logistic sine, logistic tent, tent-sine, and PWLCM (piece-wise linear chaotic map) are used for ensuring the security of the system. e system ensures large key space and higher information entropy that indicate improved security. e method is robust against chosen plaintext attack (CPA) and known plaintext attack (KPA). But, the system is not designed for color images. Existing cryptosystems perform permutation at the pixel level. But the pixel level permutation methods do not ensure enough security for the system. Hence, a new 3D puzzle for bit permutation along with a chaotic system for encryption was proposed in the scheme [19]. e method is secure and robust against statistical and differential attacks for diffusion and confusion.
In another scheme [20], the method first divides the color image into three channels (R, G, and B) and transposes the channels to the bit-plane. en, the Arnold cat map (ACM) scrambles the bit-plane matrix and alternate logistic map confuse and diffuse the R, G, and B channels of the scrambled image. e system is highly secure and robust against bruteforce attacks. A quantum image encryption method was proposed based on the logistic map using intrabit and interbit permutation in the scheme [21]. At first, the image is represented by the quantum model, and then, the permutation operations (intra and inter) are performed on the bit planes. e encrypted image is finally achieved by the chaotic diffusion process. e method is robust against the brute-force attacks and uniformly bit distributed and secure. For transferring the text files between embedded IoTdevices, a secured and efficient, lightweight symmetric encryption method was proposed in [22]. Here, a novel tiny symmetric encryption algorithm (NTSA) is used for transferring large files with enhanced security among IoT devices. In this case, during each round of encryption, an additional key of confusion is introduced dynamically. e method is robust and secured than existing methods. Fast data sharing among various devices is increasing day by day. But it creates challenges for data security. In this regard, a Huffman coding-based lightweight encryption method for data transmission was proposed in the scheme [23]. Here, a HEliOS (Huffman compression-based encryption method using lightweight dynamic order statistic tree) method is used to transmit the digital data. e digital data is first compressed as "secret" or small-sized, so that an attacker does not decode it. e method is fast and secure for data transmission for smart devices. Another work has been developed based on permutation [24]. But, the computational complexity is not observed in this method. In 2019, Patro and Acharya [25] proposed bit-level image encryption based on 1D chaotic maps. e method can be applied to real-time applications. But, the method is not designed for color images. Another image encryption method [26] is proposed based on permutation, diffusion, chaotic, and hyperchaotic maps. For increasing privacy and security, a new encryption/decryption method [27] was proposed by integrating multiple chaotic maps. A new map is generated from this combined multiple chaotic maps, which is robust against various attacks. For good image encryption, the lowest value is selected as a correlation factor. e best correlation value of the selected chaotic map is used for image encryption and decryption. e proposed method provides satisfactory results in terms of robustness compared to existing methods. Also, the method is secure, has lower computational complexity, and provides better information entropy. e conventional image encryption algorithms ensure high security, but they are complex to calculate and slow in speed for real-time applications. For overcoming these issues, a novel image encryption algorithm with high speed was designed based on the Bülban chaotic map [28]. is chaotic map is generated by using only a limited number of rows and columns. A substitution-permutation system is designed to increase the security of the system. is procedure removes the correlation between adjacent pixels. For preventing the leakage of information, the pixel values are masked. e system is highly secure and fast by the experimental results for real-time applications. But the method is not suitable for real-time applications with high resolution of images. Zheng et al. proposed an image encryption method based on a multichaotic system and DNA coding [29]. Here, the two chaotic maps such as N2D-LSCM (two-dimensional logistic-sine coupling map) and NHenon (new Henon map) are combined. e generated two pseudorandom sequences by N2D-LSCM are used for scrambling the sequence and DNA coding matrix, respectively. eir proposed system is highly secure and robust against common image processing attacks. But the method is not suitable for color images and functioning efficiently. e traditional chaotic algorithms require more cost. Hence, in the scheme [30], a lightweight image encryption algorithm was designed based on the message passing (MP) algorithm and chaotic map. e proposed algorithm is cost-effective in terms of time and space. e adjacent pixels are interconnected to each other without any extra space cost by the MP algorithm, and the encrypted image is produced. e pseudorandom sequences are generated by the two-dimensional (2D) logistic map. e edge pixels are affected by the external message that is produced from these pseudorandom sequences. e experimental results ensure that the method is robust against various attacks, secure, cost-effective, reduces correlation coefficients between adjacent pixels of the encrypted image, and ensures a good information entropy value of 7.996749.
A secure encryption algorithm protects the images from unauthorized access. ere exist various image encryption algorithms such as symmetric and asymmetric key cryptographies. A session key-based fast, secure, and lightweight image encryption method was designed by Gupta et al. [31]. e session key is generated by the genetic algorithm. e system security is ensured by the crossover and mutation operators of the genetic algorithm. e method is suitable for both grayscale and color images and outperforms better than existing methods. But the method is not designed for the devices based on the Internet of ings (IoT). ere exists a variation of lightweight image encryption algorithms in cost-effectiveness (time and memory space) and security. For developing these issues, a secure lightweight image encryption algorithm was designed for smart cities and IoTenabled devices [32]. e enhanced security is achieved by increasing the block sizes, key, and number of rounds. e method is not functioning well for IoT-based devices that Advances in Multimedia consume more power and memory. For resisting KPA and differential attacks, the sensitivity of high key and high plaintext is essential. An improved algorithm was designed by Lin and Wu [33] for analyzing the existing cryptographic methods based on chaotic maps and resisting the CPA. Here, the plaintext image is dependent on image encryption. In this case, an enhanced CIES-UBPRPD (chaotic map-based image encryption system using both plaintexts related permutation and diffusion) is designed to get a higher plaintext sensitivity than the original CIES-UBPRPD method. e method is secure and robust, but it requires more time to execute than the original CIES-UBPRPD method. In 2020, an image encryption method [34] was proposed based on compressive sensing and random numbers insertion. In this case, three encryption methods are required for ensuring the security of the system. e method requires less time to encrypt the image and is robust against rotation, noise, and cropping attacks. Also, the reconstructed image is good in quality. But the pixel values of the encrypted image are not equally distributed by the histogram analysis, which may lead to a statistical attack. Huang et al. [35] proposed an encryption method based on a chaotic system and 2D linear canonical transform (LCT). e method is robust and secure than the previous methods. But the method is not implemented for color images. A fourdimensional (4D) chaotic system is designed based on coexisting hidden chaotic attractors [36]. e method is secure and implemented on hardware. But the key sensitivity, correlation analysis, histogram analysis, key space, and time complexity are not observed. Ye et al. [37] proposed an encryption method based on quaternion discrete fractional Hartley transform and improved pixel adaptive diffusion. e transmission load is reduced, and encryption capacity is increased. But the method is not tested for color images. In 2020, an image encryption method [38] is proposed based on permutation, diffusion, and 1D chaotic maps. e method is robust against KPA and CPA. e method evaluates the performance of various 1D chaotic maps for encrypting images. Experimental results show that 1D chaotic maps such as logistic-sine map (LSM), Kent map (KM), logistic map (LM), logistic tent map (LTM), tent map (TM), tent-sine map (TSM), and beta map (BM) ensure better security and are robust against histogram attack except for DM (dyadic map) and SPLM (sinus-power logistic map). Patro et al. [39] proposed a multiple-image encryption method based on cross-coupled chaotic maps. But the system is not tested for color images. In 2020, another image encryption method [40] is proposed based on permutation, diffusion, and PWLCM. But the method is not simulated for color images. Patro et al. [41] proposed a secure, lossless, and noise-resistive image encryption method based on chaos, hyperchaos, and DNA sequence operation. e method is robust against KPA, CPA, differential, statistical, and noise attacks. Also, the method is more secured than previous methods. But the method is not designed for color images. Medical images are transmitted through the Internet and accessed by the general public. Hence, the security of medical images is very important. For addressing this issue, a medical image encryption method [42] is proposed based on a logistic map, DNA (deoxyribonucleic acid) sequence, and IWT (integer wavelet transform). e method ensures better security than the existing methods and is robust against brute-force attacks. But the system is not designed for color images. Another medical image security system is proposed based on Chua's diode and strange attractor [43].
is system is implemented on a three-layer hardware-softwarebased interface. But the method does not use any chaotic map for encrypting images. It needs a large storage for storing the medical image. For addressing this issue, in 2020, Lakshmi et al. [44] proposed a medical image encryption method in a cloud platform based on HNN (Hopfield neural network). e method ensures improved security than the existing methods. Also, the method is robust against CPA. But, the conventional chaotic maps are not used in this method. In 2021, an efficient medical image encryption method is proposed based on IWT, DNA computing, and chaos [45]. e method is robust against KPA and CPA. But, it is not implemented for color images.

Problem Statement.
From the discussions of Section 2.1, we can conclude (i) Some encryption algorithms are slow, while some require more time to execute (ii) Some algorithms are not suitable for IoTdevices and real-time applications (iii) Some are less robust against plaintext and differential attacks (iv) Also, some algorithms are limited by image type and complex to calculate (v) Besides, most of the existing lightweight image encryption algorithms have low plaintext sensitivity and are not functioning well for images with high resolution We are motivated by the above limitations in developing an optimized framework for lightweight image encryption by combining Arnold and logistic maps.

Theoretical Background
e chaotic map is an evolution function that displays the chaotic behavior in terms of continuous-time or discretetime parameters [46]. ere exist some chaotic maps such as Arnold cat map, basin chaotic map, circle map, Chen-Lee system, complex cubic map, exponential map, Gauss map, Henon map, and logistic map. ese maps are used in a dynamic system. is section keeps an eye on the theoretical background of our used two chaotic maps.

Arnold's Chaotic Map.
Arnold's chaotic map is a chaotic map mathematically generated from a revolving surface, discovered by Vladimir Arnold [47]. is surface (or torus) is created by rotating a circle in 3D space. is chaotic map is the transformation Υ: T 2 ⟶ T 2 , where T 2 is the torus. In matrix notation, this can be written by the following equation: 4 Advances in Multimedia where x and y are the row and columns of the matrix, respectively.

Logistic Chaotic Map.
e logistic map is one of the chaotic maps and a polynomial function of degree 2 [48]. In this case, the chaotic behavior is generated from the nonlinear system. In mathematics, this map can be written by the following nonlinear equation: where x n is the ratio between the existing population and maximum population and 0 < x n < 1. r is the parameter whose value is between 0 and 4.

Research Method
is section discusses the proposed framework and the detailed steps of image encryption and decryption algorithms.

Proposed Framework.
At first, the Arnold map is applied to the plain (or host) image. en, the parameters for the logistic map are selected. After then, the cipher (or encrypted) image is generated. e image decryption is performed in a reverse way. e above-discussed framework is shown in Figure 1(a). e flowchart for finding the best parameter for the logistic map is illustrated in Figure 1(b). At first, the parameter is initialized, and the estimation function is calculated. If the termination occurs, then the method will be stopped. Otherwise, the mutation occurs, and a looping condition is generated for calculating the estimated function.

Detailed Steps of Image Encryption and Decryption.
e image encryption and decryption phases of the proposed method are simple. e detailed algorithms for image encryption and decryption are shown in Algorithms 1 and 2, respectively. e genetic algorithm is used to find the optimum initial value for the logistic map, which is shown in step 2 in Algorithm 1. For the Arnold method, there is one parameter, and for logistic, there are two parameters: L P , which is the initial value and r, which is the control variable. AEncrypt and LEncrypt are the processes related to the Arnold and logistic encryptions, respectively. LDecrypt and ADecrypt are related to the decryption for logistic and Arnold maps, respectively. Suppose our image is 3 × 3 in dimensional and the image has the following pixel values. e pixel values are shown in Figure 2(a). We have encrypted the pixels of this figure by our proposed method. e total steps are described as follows:

Select Arnold Parameter.
is step is completely independent of image type and size. In this step, the user generates an Arnold parameter (A P ) for shuffling the image. Let the selected value for (A P ) is 10.

Select Best Parameter for Logistic
Map. In this step, the optimization algorithm is used to find the best initial value for the logistic map. e range for the initial value is between 0 and 1. Depending on this initial value, the chaotic series is generated. For a chaotic map, there exist two values: one initial value, L P , and another chaotic control variable, r. At first, the user randomly chooses r from the range (0-4).
en, the best L P is chosen by the genetic algorithm. For 0.1, we get the entropy of 3.1699 for Figure 2, and this is the best entropy.

Get Entropy and Coefficient Values.
en, we have encrypted the pixels of Figure 2(a) by Arnold parameter 10 and got the horizontal coefficient of 0.3298. After then, the logistic parameter 0.1 is used for encrypting the image, and the encrypted pixel values are generated.
is is shown in Figure 2(b). In this case, the values of entropy and horizontal coefficient are 3.1699 and −0.1558, respectively.
Hence, by combining Arnold with a logistic map, the image information entropy is not increased. But this combination decreases the correlation coefficient between adjacent pixels, which is one of the important parameters for an ideal image encryption system. erefore, we can select the best parameter for information entropy.

Experimental Results
e experiment has been performed in MATLAB R2016, an environment with a computer of core i7, 2.90 GHz processor, and 16 GB RAM. We have used four groups of images for conducting our experiment. e image groups are miscellaneous, medical, underwater, and texture images. Miscellaneous (lena and baboon) images are taken from the USC-SIPI (the University of Southern California-Signal and Image Processing Institute) image database [49].
e chest X-ray and ECG signals belonging to medical images are taken from the Chest X-ray Images (pneumonia) database [50] and ECG heartbeat categorization dataset [51], respectively. Underwater-like fish species and marine animal images are taken from the fish species image dataset [52] and the brackish dataset [53], respectively. Also, the texture (straw and grass) images are taken from the USC-SIPI image database [49].
We have chosen two images from each group. Each image is divided into three different sizes such as 128 × 128, 256 × 256, and 512 × 512 pixels. We have applied Arnold, logistic, Arnold + logistic, and (half Arnold + half Advances in Multimedia logistic) maps to our host image "Lena" of size 512 × 512, which is shown in Figure 3. Here, for each map, the original image size is 79 kB. We have seen that the size of the encrypted image for the Arnold map, which is 253 kB, is lower than the other chaotic maps. e encryption and decryption times in second (s) are increased for all the methods except logistic map and half Arnold + half logistic, which are 0.8147 s and 0.8638 s and 4.6695 s and 4.5395 s, respectively. erefore, we can say that the logistic map requires less time to encrypt and decrypt the host image than other chaotic maps.
However, this section discusses various analyses such as entropy analysis, histogram analysis, correlation analysis, key sensitivity analysis, key space analysis, and computational complexity analysis. At the end of this section, our proposed method is compared with existing lightweight image encryption methods. We have compared our results with existing state-of-the-art methods by complexity Input: original image, I Output: encrypted image, I C , and key, K Step 1: select Arnold parameter: user generated a random value A P for Arnold encryption.
Step 2: select r as random value for the logistic map Select best parameter (initial value) for the logistic map, which is L p for i � 0: 0.1: 1  Advances in Multimedia analysis, statistical analysis, and correlation coefficients analysis of the encrypted image.

Entropy Analysis.
Information entropy measures the uncertainty or randomness of an encryption system. It is the significant criterion of a standard encryption algorithm. Usually, a higher information entropy value produces a better encryption algorithm. In our proposed method, we have combined Arnold and logistic chaotic maps. e optimization technique is used for getting the best initial value for a chaotic map. Based on our method, Table 1  (ii) General (miscellaneous) images get the least entropy than other images

Histogram Analysis.
A perfect image encryption technique divides the encrypted image into equal frequency. erefore, the attacker gets only a little information from the encrypted image. e image histogram represents an image by the total number of pixels for each tonal value. e histograms of several general original and encrypted images are shown in Figures 4 and 5, respectively. From the original histogram, we get an idea about the frequency of pixels. But there is approximately equal distribution of pixels for encrypted images. Hence, the attacker cannot get any information from the histograms of the encrypted images.

Correlation Analysis.
e correlation identifies the relationship between adjacent pixels of the image. For an original image, there is a relationship between adjacent pixels. From Figures 6(a)-6(d), we have seen that the pixels are so much close to each other. is criterion defines the tightly correlated image. But for Figures 7(a)-7(d), there exists no relationship between pixels. erefore, the pixels

Advances in Multimedia
are not so much close to each other. Rather, they are equally distributed into the whole places of the image. Table 2 provides the correlation coefficients between adjacent pixels for different groups of images. We have measured the correlation coefficients between adjacent pixels in horizontal, vertical, diagonal, and antidiagonal directions. e correlation coefficients of encrypted images are decreased for each image of three different sizes. Hence, there exists less relation between adjacent pixels of the encrypted image.
erefore, it is difficult for an attacker to guess about the neighborhood pixel values of the encrypted image. Also, less correlation indicates that the proposed method is robust against statistical attack [54]. ese criteria indicate an efficient image encryption method.

Key Sensitivity Analysis.
A good image encryption system is very much sensitive to the key. A little bit of change in the input key has a larger impact on the encryption system. In Figure 8, we have encrypted an image with the key, K. To check the image's sensitivity, we have also encrypted the image with two other keys: K1 and K2. e generated images are shown in Figures 8(b) and 8(c), respectively. e difference between these two images is shown in Figure 8(d), which is close to a black image that means a significant difference occurs. On the other hand, we have encrypted the host image of Figure 8(a) by the original key, K, which is shown in Figure 8(e). e encrypted image of Figure 8(e) is decrypted with two other keys: K 1 and K 2 , which are seen in Figures 8(f ) and 8(g), respectively. ese generated two images are completely different from the encrypted image. e difference between these two generated images is shown in Figure 8(h). is image is also a black image that means a significant difference occurs. erefore, the proposed method is very much sensitive for both encryption and decryption keys. Hence, our proposal is an ideal image encryption method.

Key Space Analysis.
For resisting the brute force attacks, the key space of an image should be large enough. But, we have to remember about the speed. ere is a relationship between speed and key size. We have mainly two keys: one for the Arnold map and another for the logistic map. e parameter for the Arnold map is chosen randomly for the user-defined domain, µ, and the parameter for the logistic map is chosen from 0-1. e value is increased by 0.1, and then, the series of the logistic map is mapped by a userdefined another domain λ. is domain is completely secret, and only the sender knows about it. Even the receiver does not know about this domain. From the logistic map, we have generated the logistic series with the size of m × m. is size is the same as to image size. So, there exist m × m × 8 bits only for the logistic map. Hence, there are 2 m×m×8 ways only for the logistic map, which is very large from the cryptographic perspective. us, it is not possible for the attacker to find the key easily. erefore, our system is robust against brute-force attacks and indicates an efficient image encryption method.

Computational Complexity Analysis.
We have analyzed for computational complexity in terms of time for different groups of images. When the image size is increased, the image encryption and decryption times in second (s) have been increased. But the growth rate for image encryption time is greater than the image decryption time. For selecting the best initial value, we must run an optimization algorithm. e encryption and decryption times are independent of the image type. But these times are dependent on the image size. is analysis is given in Table 3. From this table, we have observed that there exists a little bit of difference between encryption and decryption time. It takes time to find out the best parameter for the chaotic map in encryption, which is dependent on the image. On the other hand, the value of the parameter for the chaotic map was already known in the decryption phase. Hence, it requires more time to encrypt the images than to decrypt.

Comparison with Existing State-of-the-Art Methods.
We have compared our proposed method with existing lightweight image encryption methods. e computational complexity of our proposed method is compared with existing methods, which is given in Table 4. We have seen that our method requires less time in total in second (s) to execute than existing methods [20,30]. Method [14] is a hardware-based encryption system. So, it is fast. On the other hand, the encryption time for the image of size 256 × 256 for method [31] is also less than our method, as method [31] applies the genetic algorithm on the key. But we have used this optimization algorithm on the image, which is more applicable. Method [33] uses a more advanced personal computer (PC) than us that is configured with Intel Core i7, 3.2 GHz processor, and 32 GB RAM. Hence, it takes less time to execute. e statistical parameters indicate the system's security, which are given in Table 5. We have seen that NPCR, UACI, and entropy values are not satisfied with the previous methods. It is because of using the plain chaotic map to encrypt the image in our method. e values of correlation coefficients between adjacent pixels of the encrypted image are given in Table 6. From this table, we can say that for using the Arnold map, our correlation values getting lower than most of the existing methods except methods [20,24] and [33] because methods [20,33] use color images where the values are more changed. Method [24] uses bit-level permutation along with a chaotic map for   Advances in Multimedia 13 image encryption. erefore, these methods exhibit fewer correlation coefficients between adjacent pixels of the encrypted image. erefore, from the above discussions, we can say that the overall performance of our proposed method is good enough because fewer values are required to be transformed as the key, which is one of the important properties of the lightweight cryptosystem.

Conclusions and Future Works
Usual multimedia encryption algorithms require more time and memory space. For this reason, the lightweight image encryption algorithm gains wide acceptance, as it requires less memory and less time along with high security. With this view, here, we have proposed an optimized framework by combining two chaotic encrypting methods such as Arnold and logistic maps. We have performed experimental analysis and obtained satisfactory results. Our proposal is very much sensitive to the secret key. e attacker does not get any information from the encrypted image. Also, the proposed method is robust against brute force attacks and requires less time to execute than the existing methods. It also requires less value to transform the key, which ensures an efficient lightweight image encryption method. Besides, the method provides lower correlation coefficients between adjacent pixels of the encrypted image than other methods, indicating an efficient image encryption system. But the statistical parameter values are less than the existing methods because of using the plain chaotic map. e more the values of statistical parameters are, the more the system will be secured. Arnold's chaotic map has a disadvantage like a periodicity. Besides, the logistic chaotic map has the characteristic of simplicity but not ergodicity, as well as it has a short chaotic range of 3.57-4.0. In the future, we will try to increase the values of statistical parameters by combining improved Arnold chaotic map and logistic-sine map or logistic-tent map or tent-sine map or piece-wise linear chaotic map for increasing the security level of the system. By observing histogram images, it is found that the grayscale pixel values are not properly uniformed. So, there may be a chance of a statistical attack. Subsequently, we will analyze our proposal for different attacks such as statistical, noise, and occlusion attacks to test the robustness. We will perform histogram variance analysis and chi-square test analysis to measure the grayscale uniformity quantitatively. For this, we will compare our proposal for robustness with existing state-of-the-art methods to prove our method a better one. After that, we will analyze the time complexity of our proposal step-by-step. Also, the proposed method can be implemented for color images in the future.

Data Availability
e data used to support the findings of this study are included within the article.

Conflicts of Interest
e authors declare that they have no conflicts of interest.