Image Encryption Scheme Based on Orbital Shift Pixels Shuffling with ILM Chaotic System

Image encryption techniques protect private images from unauthorized access while they are being transmitted. Previously used confusion and diffusion processes are risky and time-consuming. Therefore, finding a solution to this problem has become necessary. In this paper, we propose a new image encryption scheme that combines the Intertwining Logistic Map (ILM) and Orbital Shift Pixels Shuffling Method (OSPSM). The proposed encryption scheme applies a technique for confusion inspired by the rotation of planets around their orbits. We linked the technique of changing the positions of planets around their orbits with the shuffling technique of pixels and combined it with chaotic sequences to disrupt the pixel positions of the plain image. First, randomly selected pixels from the outermost orbit are rotated to shift the pixels in that orbit, causing all pixels in that orbit to change their original position. This process is repeated for each orbit until all pixels have been shifted. This way, all pixels are randomly scrambled on their orbits. Later on, the scrambled pixels are converted into a 1D long vector. The cyclic shuffling is applied using the key generated by the ILM to a 1D long vector and reshaped into a 2D matrix. Then, the scrambled pixels are converted into a 1D long vector to apply cyclic shuffle using the key generated by the ILM. After that, the 1D long vector is converted into a 2D matrix. For the diffusion process, using ILM generates a mask image, which is then XORed with the transformed 2D matrix. Finally, a highly secure and unrecognizable ciphertext image is obtained. Experimental results, simulation analysis, security evaluation, and comparison with existing image encryption schemes show that it has a strong advantage in defending against common attacks, and the operating speed of this encryption scheme also performs excellently in practical image encryption applications.


Introduction
With the development of network and communication technology, multimedia has emerged as an essential tool for both personal and professional communication. Digital cameras are now widespread, and by providing access to everyone, the generation of digital images becomes easy. These images are present in almost every aspect of human life, such as family images, party images, social interaction images, biological images, medical images, satellite images, military images, and commercial images. Among these images, some are very sensitive and confidential. Apart from that, the transmission of these images over open-access networks, such as the Internet, is risky [1] since hackers seek such are formed directly by the chaos system. To create the large permutation required at the permutation stage, it takes some time to effectively implement this technique for encrypting high-quality images in real-life scenarios. A color image encryption technique is proposed by Zhang et al. [45]. They use a 2D chaotic cat map with another logistic map technique. In this proposed method, they changed the position of an image pixel by switching places with other pixels in a matched plane. Their method was speedier than the conventional method of shifting pixels inside a single plane in terms of cryptography. In [25], authors introduced the block cipher-based image encryption method. They used some other modes of operation, such as the counter mode and cipher block chaining, as well as chaotic sequences. An image encryption system has been proposed using the ideas of pixel swapping, masking, and permutation [25,27,34]. Some of them used methods that used eight and sixteen sequences for swapping, masking, and pixel permutation, respectively. The authors of this research broke the link between image pixels by randomly swapping them, taking advantage of permutation, and switching sequences. Finally, they performed the XOR operation using the masking sequence. In [35], the random scan pair and 2D standard map were used for pixel shuffle. In [25], the permutation and diffusion were performed at the block level as opposed to the pixel level to preserve time complexity. As a result of the full blocks switching rather than the pixels switching, the cipher's security was breached. To improve the diffusion with reduced time complexity, we proposed a bit-level scrambling technique to achieve diffusion, which involves permuting the pixels of the image in a non-linear manner. This process effectively destroys any intra-correlations among the pixels of the image, which helps to enhance the security of the encryption. Furthermore, the key generation method presented in this work using ILM is not solely dependent on the image itself but also on certain secret parameters. This highlights the importance of maintaining the confidentiality of these secret parameters to ensure the robustness and effectiveness of our proposed scheme.
The main contribution of this paper includes the following stages to secure the image encryption process.

1.
Inspired by the orbits and planets, we have designed a new encryption scheme. In the scheme, scrambling of the pixels has been linked to the movement of the planets in their orbits. This design makes the new cipher more secure and very uncorrected.

2.
Multi level-round scrambling approaches are used to increase the cipher's unpredictability and decrease the correlation between the pixels. The intertwining logistic map is used for key generation and masking of the scrambled temporary ciphertext image. 3.
The purposed encryption technique is a secured encryption scheme that takes a very short execution time as compared to existing schemes and passes all the security tests.

4.
Machine experimentation provided very promising results which preponderate those of many of the published works.
The remaining content of this paper is organized as follows: Section 2 introduces the Preliminaries part. The core idea of the proposed technique is described in Section 3. In Section 4, we present some simulation results and security analysis. Finally, in Section 5, the proposed scheme is summarized and concluded.

Preliminaries
In this section, we discuss the preliminaries which are added to our proposed method in an intertwining logistic map.

The ILM Chaotic System
The chaos theory studies systems that are highly dynamic and sensitive to two main components: the system parameters and the initial values of the system or map. In our proposed methodology, we use the intertwining logistic map (ILM) [27].
According to the given equation, when 0 < µ ≤ 3.999, |k 1 | > 33.500, |k 2 | > 37.970, and |k 3 | > 35.700, system (1) is chaotic. With these parameters and certain initial values, the above-mentioned equations show that ILM generates three chaotic streams of (x, y, z). Figure 1 shows the bifurcation diagrams of the intertwining logistic map for k 1 = 31.8809, k 2 = 31.891, and k 3 = 35.318. From Figure 1, it can be seen that the ILM is more chaotic and lacks any open spaces compared to a logistic map. Therefore, the intertwining logistic map is more suitable for image encryption than a logistic map.
According to the given equation, when 0 < μ ≤ 3.999, |k1| > 33.500, |k2| > 37.970, and |k3| > 35.700, system (1) is chaotic. With these parameters and certain initial values, the above-mentioned equations show that ILM generates three chaotic streams of (x, y, z). Figure 1 shows the bifurcation diagrams of the intertwining logistic map for 1 = 31.8809, 2 = 31.891, and 3 = 35.318. From Figure 1, it can be seen that the ILM is more chaotic and lacks any open spaces compared to a logistic map. Therefore, the intertwining logistic map is more suitable for image encryption than a logistic map.

Proposed Methodology
The proposed encryption method applies the OSPSM technique to confuse image pixels. This method draws inspiration from the rotational motion of planets along their orbits. We linked the technique of changing the positions of planets around their orbits with the shuffling technique of pixels and combined it with chaotic sequences to disrupt the pixel positions of the image. The encryption scheme consists of three main steps. The first step is the orbital shift shuffling. In this step, the pixels of a standard image are extracted into a 2D matrix. The orbital shift shuffling technique is then applied to the matrix to shuffle the pixel positions randomly. For instance, to apply OSPSM, the pixel values of plain images are stored in a 2D array that represents the image height and image width. According to the key, pixels from the orbits are randomly selected, and a rotational shift of these pixels is initiated, causing all pixels on the orbits to change their original positions due to the shifting of the selected pixels. This process continues until the pixels of the innermost orbit have completed shifting. Pixel shifting is the process of changing a pixel's original position based on a secret key generated by ILM. Through this method, the positions of all pixels in the orbit are randomly shuffled. The second step is the cyclic scrambling of a 1D vector. After the orbital shift, the pixel matrix is converted into a 1D long vector. The key generated by ILM is then used to cyclically shuffle the elements of the vector. Finally, the scrambled 1D long vector is converted back into a 2D matrix. The third step is the pixel value transformation based on chaotic mask images. In this step, the diffusion operation is carried out on the scrambled 2D matrix, which involves two steps. The first step is to generate a mask image using ILM. Next, perform the XOR operation between the generated mask image and the scrambled 2D image matrix. Finally, the ciphertext image is obtained.

Proposed Methodology
The proposed encryption method applies the OSPSM technique to confuse image pixels. This method draws inspiration from the rotational motion of planets along their orbits. We linked the technique of changing the positions of planets around their orbits with the shuffling technique of pixels and combined it with chaotic sequences to disrupt the pixel positions of the image. The encryption scheme consists of three main steps. The first step is the orbital shift shuffling. In this step, the pixels of a standard image are extracted into a 2D matrix. The orbital shift shuffling technique is then applied to the matrix to shuffle the pixel positions randomly. For instance, to apply OSPSM, the pixel values of plain images are stored in a 2D array that represents the image height and image width. According to the key, pixels from the orbits are randomly selected, and a rotational shift of these pixels is initiated, causing all pixels on the orbits to change their original positions due to the shifting of the selected pixels. This process continues until the pixels of the innermost orbit have completed shifting. Pixel shifting is the process of changing a pixel's original position based on a secret key generated by ILM. Through this method, the positions of all pixels in the orbit are randomly shuffled. The second step is the cyclic scrambling of a 1D vector. After the orbital shift, the pixel matrix is converted into a 1D long vector. The key generated by ILM is then used to cyclically shuffle the elements of the vector. Finally, the scrambled 1D long vector is converted back into a 2D matrix. The third step is the pixel value transformation based on chaotic mask images. In this step, the diffusion operation is carried out on the scrambled 2D matrix, which involves two steps. The first step is to generate a mask image using ILM. Next, perform the XOR operation between the generated mask image and the scrambled 2D image matrix. Finally, the ciphertext image is obtained.

Key Generation Method
The proposed method uses an intertwining logistic map. The input for encryption is a 256 × 256 grayscale image. The starting keys for the intertwining logistic map are determined as follows: (2) where "I" represents the plain image and (i,j) are the indices of the input plain image, the variables x 0 , y 0 , z 0 , µ , k 1 , k 2 , and k 3 in Equations (2)- (8) are the variables of the ILM before embedding the plain text sensitivity. The variables x 0 , y 0 , z 0 , µ, k 1 , k 2 , and k 3 are the variables of the ILM plain text sensitivity after embedding.

Scrambling Methods
OSPSM (Orbital Shift Pixels Shuffling Method) is a newly proposed scrambling method for digital images. It operates by scanning the pixel values in an orbital form. First, it shuffles all the pixel values of the outermost orbit, starting from the position of the randomly selected pixel (r, c), and then goes to the second outer orbit pixels to shuffle the elements of the second outer orbit starting from the randomly selected pixel position (r', c'), and so on, until it completes all the orbits of the original image according to the size of the image. We elaborated OSPSM with an example shown in Figure 2, considering a matrix size of 4 × 4 as shown in Figure 2a. In Figure 2b, the pixels of orbits are shuffled by applying OSPSM, starting from the second to last element of the outermost orbit and shuffling all the pixels of the outermost orbit according to the key values. Then, the inner orbit pixels are shuffled, and after the completion of the orbit pixels shuffling, all the pixel values are stored in a long vector form shown in Figure 2c. Later on, the vector is randomly permutated by applying cyclic shuffling techniques using the key value k ∈ −2 256 , 2 256 shown in Figure 2d, then reshaped into a 2D matrix shown in Figure 2e. The image that has been scrambled can then be obtained.  Figure 3 shows the general schematic diagram of OSPSM transformation. Similarly, we generalize the OSPSM transformation of an example of a 4 × 4 matrix to the size of the m × m matrix. When we read the image of size m × m, the turning point of the transformation appears in a round shape which is just like an orbit's shape transformation in the middle of the image. If m is even, m/2 orbits, and for odd, (m − 1)/2 orbits will be constructed.
Step by step procedure of this diagram is shown below to understand the general permutation method of the proposed scheme.  Figure 3 shows the general schematic diagram of OSPSM transformation. Similarly, we generalize the OSPSM transformation of an example of a 4 × 4 matrix to the size of the m × m matrix. When we read the image of size m × m, the turning point of the transformation appears in a round shape which is just like an orbit's shape transformation in the middle of the image. If m is even, m/2 orbits, and for odd, (m − 1)/2 orbits will be constructed.
Step by step procedure of this diagram is shown below to understand the general permutation method of the proposed scheme.
After performing the OSPSM on the plain image, we converted the scrambled image into one long vector in the dimension 1 × m × m, which is shown in Figure 4. The circular permutation is applied to the long vector, which is shown in Figure 5.  After performing the OSPSM on the plain image, we converted the scrambled image into one long vector in the dimension 1× × , which is shown in Figure 4. The circular permutation is applied to the long vector, which is shown in Figure 5.

Encryption Scheme
Many scrambling and encryption methods use basic operations called permutation transformations. The chaos-based image cryptosystem has two iterative stages. Typically, the permutation stage provides the confusion effect, while the pixel value diffusion stage produces the diffusion effect. The relationship between the key and the ciphertext is maintained as complicated as possible by confusion. The image's pixels are permuted during the confusion stage without having their values altered. At the diffusion step, the pixel values are altered consecutively, making a minor change to one image pixel results in a significant change to the entire image. In the confusion stage, the permutation of pixels is introduced to decorrelate the relationship between neighboring pixels.
We proposed an image encryption technique based on OSPSM and ILM. Firstly, the initial keys of the chaotic map are generated using pixels of the plain image to make the scheme plain text sensitive. Secondly, the intertwining logistic map is generated using keys obtained in the first step, and the first sequences of the map are utilized as a key value for permutations. The positions of the pixels are shuffled over the entire image without any changing of the value of pixels, which means that the pixels of the plain image go to pixel-level scrambled using OSPSM. After applying OSPSM, the scrambled image is converted into a long vector. Thirdly, we have applied a cyclic shift operation on the vector  After performing the OSPSM on the plain image, we converted the scrambled image into one long vector in the dimension 1× × , which is shown in Figure 4. The circular permutation is applied to the long vector, which is shown in Figure 5.

Encryption Scheme
Many scrambling and encryption methods use basic operations called permutation transformations. The chaos-based image cryptosystem has two iterative stages. Typically, the permutation stage provides the confusion effect, while the pixel value diffusion stage produces the diffusion effect. The relationship between the key and the ciphertext is maintained as complicated as possible by confusion. The image's pixels are permuted during the confusion stage without having their values altered. At the diffusion step, the pixel values are altered consecutively, making a minor change to one image pixel results in a significant change to the entire image. In the confusion stage, the permutation of pixels is introduced to decorrelate the relationship between neighboring pixels.
We proposed an image encryption technique based on OSPSM and ILM. Firstly, the initial keys of the chaotic map are generated using pixels of the plain image to make the scheme plain text sensitive. Secondly, the intertwining logistic map is generated using keys obtained in the first step, and the first sequences of the map are utilized as a key value for permutations. The positions of the pixels are shuffled over the entire image without any changing of the value of pixels, which means that the pixels of the plain image go to pixel-level scrambled using OSPSM. After applying OSPSM, the scrambled image is converted into a long vector. Thirdly, we have applied a cyclic shift operation on the vector  After performing the OSPSM on the plain image, we converted the scrambled image into one long vector in the dimension 1× × , which is shown in Figure 4. The circular permutation is applied to the long vector, which is shown in Figure 5.

Encryption Scheme
Many scrambling and encryption methods use basic operations called permutation transformations. The chaos-based image cryptosystem has two iterative stages. Typically, the permutation stage provides the confusion effect, while the pixel value diffusion stage produces the diffusion effect. The relationship between the key and the ciphertext is maintained as complicated as possible by confusion. The image's pixels are permuted during the confusion stage without having their values altered. At the diffusion step, the pixel values are altered consecutively, making a minor change to one image pixel results in a significant change to the entire image. In the confusion stage, the permutation of pixels is introduced to decorrelate the relationship between neighboring pixels.
We proposed an image encryption technique based on OSPSM and ILM. Firstly, the initial keys of the chaotic map are generated using pixels of the plain image to make the scheme plain text sensitive. Secondly, the intertwining logistic map is generated using keys obtained in the first step, and the first sequences of the map are utilized as a key value for permutations. The positions of the pixels are shuffled over the entire image without any changing of the value of pixels, which means that the pixels of the plain image go to pixel-level scrambled using OSPSM. After applying OSPSM, the scrambled image is converted into a long vector. Thirdly, we have applied a cyclic shift operation on the vector

Encryption Scheme
Many scrambling and encryption methods use basic operations called permutation transformations. The chaos-based image cryptosystem has two iterative stages. Typically, the permutation stage provides the confusion effect, while the pixel value diffusion stage produces the diffusion effect. The relationship between the key and the ciphertext is maintained as complicated as possible by confusion. The image's pixels are permuted during the confusion stage without having their values altered. At the diffusion step, the pixel values are altered consecutively, making a minor change to one image pixel results in a significant change to the entire image. In the confusion stage, the permutation of pixels is introduced to decorrelate the relationship between neighboring pixels.
We proposed an image encryption technique based on OSPSM and ILM. Firstly, the initial keys of the chaotic map are generated using pixels of the plain image to make the scheme plain text sensitive. Secondly, the intertwining logistic map is generated using keys obtained in the first step, and the first sequences of the map are utilized as a key value for permutations. The positions of the pixels are shuffled over the entire image without any changing of the value of pixels, which means that the pixels of the plain image go to pixel-level scrambled using OSPSM. After applying OSPSM, the scrambled image is converted into a long vector. Thirdly, we have applied a cyclic shift operation on the vector obtained in the second step to obtain more distortion among the pixels. In the last step, a masked image is generated by intertwining logistic map. The generated mask image is then XORed with the scrambled two-dimensional image matrix. The XORing operation is used to modify the values of the image pixels to make our strategy resistant to histogram attacks. This cipher image is more secure as compared to the other proposed methods. The block diagram of our proposed encryption scheme is shown in Figure 6, which will help to understand the proposed method easily. obtained in the second step to obtain more distortion among the pixels. In the last step, a masked image is generated by intertwining logistic map. The generated mask image is then XORed with the scrambled two-dimensional image matrix. The XORing operation is used to modify the values of the image pixels to make our strategy resistant to histogram attacks. This cipher image is more secure as compared to the other proposed methods. The block diagram of our proposed encryption scheme is shown in Figure 6, which will help to understand the proposed method easily. The following is a description of the necessary actions in our suggested plan.
Step 1: Take the original image as * and generate keys of the chaotic map by using the pixels of the original image, the method is discussed in Section 3.
Step 2: Through the intertwining logistic map, the sequences { }, { }, and { } are generated × times. These sequences of real numbers are converted into integer numbers as follows: where = 1, 2, … , , and 1 , 2 , 3 are the sequences of integer numbers. Original image pixels are scrambled with OSPSM and the key obtained by permutation is from the sequence 1 . Then we obtained the scrambled image as .
Step 3: After performing with the OSPSM on the plain image, the scrambled image is converted into one long vector in one dimension 1× × . The circular permutation The following is a description of the necessary actions in our suggested plan.
Step 1: Take the original image as I m * m and generate keys of the chaotic map by using the pixels of the original image, the method is discussed in Section 3.
Step 2: Through the intertwining logistic map, the sequences {x}, {y}, and {z} are generated m × m times. These sequences of real numbers are converted into integer numbers as follows: S 2 i = round mod |y i | × 10 16 , 65, 535 + 1, where i = 1, 2, . . . , mm, and S 1 i , S 2 i , S 3 i are the sequences of integer numbers. Original image pixels are scrambled with OSPSM and the key obtained by permutation is from the sequence S 1 i . Then we obtained the scrambled image as I s .
Step 3: After performing with the OSPSM on the plain image, the scrambled image is converted into one long vector I sv in one dimension 1 × m × m. The circular permutation is applied to this vector. The vector is permutated using the key value k from S 2 i and then reshaped into a two-dimensional (2D) matrix I svm .
Step 4: In this step, the diffusion operation is performed. For diffusion, a mask image is constructed by converting S 3 i into matrix M, having the dimension of the image. After obtaining the mask image M, the XORing operation takes place between the image pixels and corresponding matrix values as: Finally, we obtained the cipher image.
In the field of cryptography, there are two methods for encryption, one is a private key and the second one is a public key. Our approach in this work is the private key method. Therefore, the decryption procedure has been carried out in the opposite order of the encryption algorithm.

Simulation Results and Security Analysis
In cryptography, different types of attacks can occur, such as differential attacks, noise and entropy attacks, selected plaintext/ciphertext attacks, and brute force attacks. An image encryption method should have enough strength to prevent such kinds of attacks. In this method, four grayscale images (Lena, a moon, an airplane, and a clock) with a size of 256 × 256 are used to show the effectiveness of the proposed method.
In this work, the hardware and software settings that are used during the implementation of our proposed scheme are Intel ® core™ i3-55500U CPU@ 2.10 GHz, 16 GB RAM, 512 GB SSD. Window 10Pro, MATLAB R2021b.

Validation of Encryption
We examined our proposed method with some images to verify its better performance. The encryption and decryption effects are shown in Figure 7. Figure 7a,e,i,m are the plain images with a size of 256 × 256. Figure 7b,f,j,n are pixels shuffling images. Figure 7c,g,k,o are the encrypted images. Figure 7d,h,l,p show the decrypted images. is applied to this vector. The vector is permutated using the key value from 2 and then reshaped into a two-dimensional (2D) matrix .
Step 4: In this step, the diffusion operation is performed. For diffusion, a mask image is constructed by converting 3 into matrix , having the dimension of the image. After obtaining the mask image , the XORing operation takes place between the image pixels and corresponding matrix values as: Finally, we obtained the cipher image.
In the field of cryptography, there are two methods for encryption, one is a private key and the second one is a public key. Our approach in this work is the private key method. Therefore, the decryption procedure has been carried out in the opposite order of the encryption algorithm.

Simulation Results and Security Analysis
In cryptography, different types of attacks can occur, such as differential attacks, noise and entropy attacks, selected plaintext/ciphertext attacks, and brute force attacks. An image encryption method should have enough strength to prevent such kinds of attacks. In this method, four grayscale images (Lena, a moon, an airplane, and a clock) with a size of 256 × 256 are used to show the effectiveness of the proposed method.
In this work, the hardware and software settings that are used during the implementation of our proposed scheme are Intel ® core™ i3-55500U CPU@ 2.10 GHz, 16 GB RAM, 512 GB SSD. Window 10Pro, MATLAB R2021b.

Validation of Encryption
We examined our proposed method with some images to verify its better performance. The encryption and decryption effects are shown in Figure 7. Figure 7a,e,i,m are the plain images with a size of 256 × 256. Figure 7b,f,j,n are pixels shuffling images. Figure  7c,g,k,o are the encrypted images. Figure 7d,h,l,p show the decrypted images.

Key Space Analysis
Key space is an essential consideration for developing certain cipher images. If the key space is small, a possible adversary's brute force attack can successfully break it. It should therefore be sufficiently large to prevent any such attack from succeeding on time. Sometimes, an adversary generates every key conceivable and tries to recover the original image. In this method, the encryption key consists of the listed initial values ( , , ) and parameters ( µ, 1 , 2 , 3 ). The key value for a circular shift is taken from 2 which is 2 256 . Moreover, if the computation precision is 10 −15 , this then contributes (10 15 ) 7 = 10 105 to the key space. Therefore, the overall key space comes out as 2 256 × 10 105 = 1.16 × 10 182 . Thus, it can be said that the proposed work is superior to some of the earlier ones in terms of the key space. Table 1 shows the key space of our proposed scheme and compares it to other existing methods.

Key Space Analysis
Key space is an essential consideration for developing certain cipher images. If the key space is small, a possible adversary's brute force attack can successfully break it. It should therefore be sufficiently large to prevent any such attack from succeeding on time. Sometimes, an adversary generates every key conceivable and tries to recover the original image. In this method, the encryption key consists of the listed initial values (x, y, z) and parameters (µ, k 1 , k 2 , k 3 ). The key value for a circular shift is taken from S 2 which is 2 256 . Moreover, if the computation precision is 10 −15 , this then contributes 10 15 7 = 10 105 to the key space. Therefore, the overall key space comes out as 2 256 × 10 105 = 1.16 × 10 182 . Thus, it can be said that the proposed work is superior to some of the earlier ones in terms of the key space. Table 1 shows the key space of our proposed scheme and compares it to other existing methods. Table 1. Display of a comparison of the key space of our proposed scheme with other existing schemes.

Key Sensitivity Analysis
The key should be sensitive and have a big key size for a strong barrier to all techniques of brute force assaults to provide secure encryption. The original secret key was changed slightly for the testing of the sensitivity of the key. Our proposed method key contains external parameters, as shown in Table 2, which also shows the keys used in the proposed method by using the original keys. Consequently, we obtain the plain image after encryption and decryption using the original key parameters without any modifications, as shown in Figure 8.

Key Sensitivity Analysis
The key should be sensitive and have a big key size for a strong barrier to all techniques of brute force assaults to provide secure encryption. The original secret key was changed slightly for the testing of the sensitivity of the key. Our proposed method key contains external parameters, as shown in Table 2, which also shows the keys used in the proposed method by using the original keys. Consequently, we obtain the plain image after encryption and decryption using the original key parameters without any modifications, as shown in Figure 8.  To test the key sensitivity, we made slight changes to the initial key and evaluated the effects. Specifically, it is not possible to obtain the plain image with a slight change in the key, as shown in Figure 9. Table 3 presents the change rates between two encrypted images assembled using the initial key, 1 (as shown in Table 2) and (where n = 1, 2, ..., 7), with slight variations in the initial keys ( , , , µ, 1 , 2 , 3 ). The resulting NPCR (number of pixel changing rate, NPCR) for each pair of encrypted images is greater than 99.59%, indicating a high sensitivity to key changes.  To test the key sensitivity, we made slight changes to the initial key and evaluated the effects. Specifically, it is not possible to obtain the plain image with a slight change in the key, as shown in Figure 9. Table 3 presents the change rates between two encrypted images assembled using the initial key, Key 1 (as shown in Table 2) and Key n (where n = 1, 2, . . . , 7), with slight variations in the initial keys (x o , y o , z o , µ, k 1 , k 2 , k 3 ). The resulting NPCR (number of pixel changing rate, NPCR) for each pair of encrypted images is greater than 99.59%, indicating a high sensitivity to key changes.

Key Sensitivity Analysis
The key should be sensitive and have a big key size for a strong barrier to all techniques of brute force assaults to provide secure encryption. The original secret key was changed slightly for the testing of the sensitivity of the key. Our proposed method key contains external parameters, as shown in Table 2, which also shows the keys used in the proposed method by using the original keys. Consequently, we obtain the plain image after encryption and decryption using the original key parameters without any modifications, as shown in Figure 8.  To test the key sensitivity, we made slight changes to the initial key and evaluated the effects. Specifically, it is not possible to obtain the plain image with a slight change in the key, as shown in Figure 9. Table 3 presents the change rates between two encrypted images assembled using the initial key, 1 (as shown in Table 2) and (where n = 1, 2, ..., 7), with slight variations in the initial keys ( , , , µ, 1 , 2 , 3 ). The resulting NPCR (number of pixel changing rate, NPCR) for each pair of encrypted images is greater than 99.59%, indicating a high sensitivity to key changes.  Table 3. Display of the rates of change between encrypted images resulting from the use of slightly Therefore, we can conclude that the suggested encryption technique is highly sensitive to irregular keys since we have demonstrated in Figures 8 and 9 that it is only possible to obtain the plain image after encryption and decryption using the original key parameters without any modifications. Thus, the key sensitivity of this algorithm achieves the expected effect.

Histogram Analysis
A graphic representation of data regarding the distribution of pixel values is an image's histogram. The histogram of an ideal encrypted image should be equally distributed and completely different from a plain image to prevent competitors from deriving any pertinent information from the streaming histogram of an encrypted image. We conducted a statistical analysis, and the findings are presented below to demonstrate that our suggested approach is difficult to hack. Figure 10a,c,e,g demonstrates the histograms of the original images (Lena, moon, plane, and clock) with their cipher image histogram in Figure 10b,d,f,h. The size of the original images is 256 × 256.  Therefore, we can conclude that the suggested encryption technique is highly sensitive to irregular keys since we have demonstrated in Figures 8 and 9 that it is only possible to obtain the plain image after encryption and decryption using the original key parameters without any modifications. Thus, the key sensitivity of this algorithm achieves the expected effect.

Histogram Analysis
A graphic representation of data regarding the distribution of pixel values is an image's histogram. The histogram of an ideal encrypted image should be equally distributed and completely different from a plain image to prevent competitors from deriving any pertinent information from the streaming histogram of an encrypted image. We conducted a statistical analysis, and the findings are presented below to demonstrate that our suggested approach is difficult to hack. Figure 10a,c,e,g demonstrates the histograms of the original images (Lena, moon, plane, and clock) with their cipher image histogram in Figure 10b,d,f,h. The size of the original images is 256 × 256.

Correlation Analysis
The most crucial quality of data that belongs to the category of digital images is good correlation. Each pixel is highly correlated with the pixels around it. Therefore, it could be situated horizontally, vertically, or diagonally. Figures 11-13 display scatter plots that indicate the connection between 4000 randomly chosen pixels in different directions, such as horizontal, vertical, and diagonal of both the original plain image and the created cipher image. For the correlation testing, a grayscale moon image with a size of 256 × 256 is used.

Correlation Analysis
The most crucial quality of data that belongs to the category of digital images is good correlation. Each pixel is highly correlated with the pixels around it. Therefore, it could be situated horizontally, vertically, or diagonally. Figures 11-13 display scatter plots that indicate the connection between 4000 randomly chosen pixels in different directions, such as horizontal, vertical, and diagonal of both the original plain image and the created cipher image. For the correlation testing, a grayscale moon image with a size of 256 × 256 is used.

Correlation Analysis
The most crucial quality of data that belongs to the category of digital images is good correlation. Each pixel is highly correlated with the pixels around it. Therefore, it could be situated horizontally, vertically, or diagonally. Figures 11-13 display scatter plots that indicate the connection between 4000 randomly chosen pixels in different directions, such as horizontal, vertical, and diagonal of both the original plain image and the created cipher image. For the correlation testing, a grayscale moon image with a size of 256 × 256 is used.

Information Entropy
Entropy, commonly referred to as Shannon's entropy, is one of the common measures used to assess the strength of a symmetric cryptosystem. Equation (12) is used to determine the entropy value.
where N denotes the gray level of the image, mi denotes the symbol's source, and last P(mi) denotes the symbol's probability. The entropy values of some standard test images, such as Lena, a moon, a plane, a clock, etc., are demonstrated in Table 4. The ideal entropy value is 8.0. Table 5 proves that the entropy values of the encrypted images of the proposed method are nearest to the ideal value as compared to the existing methods.

Information Entropy
Entropy, commonly referred to as Shannon's entropy, is one of the common measures used to assess the strength of a symmetric cryptosystem. Equation (12) is used to determine the entropy value.
where N denotes the gray level of the image, mi denotes the symbol's source, and last P(mi) denotes the symbol's probability. The entropy values of some standard test images, such as Lena, a moon, a plane, a clock, etc., are demonstrated in Table 4. The ideal entropy value is 8.0. Table 5 proves that the entropy values of the encrypted images of the proposed method are nearest to the ideal value as compared to the existing methods.

Information Entropy
Entropy, commonly referred to as Shannon's entropy, is one of the common measures used to assess the strength of a symmetric cryptosystem. Equation (12) is used to determine the entropy value.
where N denotes the gray level of the image, m i denotes the symbol's source, and last P(m i ) denotes the symbol's probability. The entropy values of some standard test images, such as Lena, a moon, a plane, a clock, etc., are demonstrated in Table 4. The ideal entropy value is 8.0. Table 5 proves that the entropy values of the encrypted images of the proposed method are nearest to the ideal value as compared to the existing methods.

NPCR and UACI
NPCR rate and UACI are two important measures of image encryption that we use. These values are used to assess how to resist the image encryption method by differential attacks. The algorithm's sensitivity to changes in the plain image is evaluated using NPCR.
The values of NPCR and UACI are determined using the equations below.
as we know that The averaged changing intensity of two separate decrypted images of an object is tested using UACI, which can be calculated by Equation (15).
In the above equation, C1 and C2 are two unique cipher images made using two unique keys. Table 6, demenostarte the NPCR and UACI values represent the superior performance of our proposed method. Table 7 demenostarte the comparsion values of NPCR and UACI with existing methods

Analysis of Noise
In a real-life situation, the transmission of images may suffer from contamination due to some kind of noise, and occasionally, some part of the image during transmission is also lost. The anti-noise ability is very important for an image encryption algorithm. A good encryption scheme is assumed to defeat noise attacks as well. In the experiment, we introduced the salt and pepper noise with noise densities of 0.1 and 0.3 to the encryption image of Lena and a baboon. Figure 14 shows the encrypted and decrypted images of Lena and 5.1.13, polluted by salt and pepper noise, with a noise density of 0.1 to Lena's image and 0.3 density to resolution chart image. The proposed image encryption scheme has shown to be resistant to noise effects, as the recovered images remain recognizable even in the presence of noise interference.

Analysis of Data Loss
This paper analyzes a specific ratio of the cipher image's pixel value set to zero to test how the encryption method proposed in this research would affect data loss. After that, we tried to decrypt the modified cipher image. The results of the data loss attack are shown in Figure 15. As can be seen that our system is still able to generate an identifiable decrypted image even with a loss of more than 40% of pixels. As a result, this proposed algorithm is robust to data loss.

Analysis of Data Loss
This paper analyzes a specific ratio of the cipher image's pixel value set to zero to test how the encryption method proposed in this research would affect data loss. After that, we tried to decrypt the modified cipher image. The results of the data loss attack are shown in Figure 15. As can be seen that our system is still able to generate an identifiable decrypted image even with a loss of more than 40% of pixels. As a result, this proposed algorithm is robust to data loss.

Analysis of Data Loss
This paper analyzes a specific ratio of the cipher image's pixel value set to zero to test how the encryption method proposed in this research would affect data loss. After that, we tried to decrypt the modified cipher image. The results of the data loss attack are shown in Figure 15. As can be seen that our system is still able to generate an identifiable decrypted image even with a loss of more than 40% of pixels. As a result, this proposed algorithm is robust to data loss.

Time Complexity Analysis
The technique of measuring and analyzing the time necessary to carry out encryption operations on an image using a particular encryption method is known as computational time analysis in image encryption. Computational time analysis is used to evaluate the effectiveness and speed of the encryption algorithm as well as to identify any possible issues or potential areas for development. We calculated the encryption time for some images to calculate the performance of the proposed approach. On average, the encryption process takes 0.01568 s to finish. Some of them are listed below in the Tables 8 and 9.

Conclusions
In this study, a new image encryption method has been introduced that is both secure and efficient without compromising on either aspect. We propose a new image encryption method that combines Intertwining Logistic Mapping (ILM) and Orbital Shift Pixel Scrambling Method (OSPSM). The proposed encryption method applies the OSPSM strategy to confuse image pixels. This method draws inspiration from the rotational motion of planets along their orbits, combined with chaotic sequences to disrupt the pixel positions of the image. The diffusion operation is carried out on the scrambled 2D matrix, generating a mask image using ILM. Then, the XOR operation is performed on the generated mask

Time Complexity Analysis
The technique of measuring and analyzing the time necessary to carry out encryption operations on an image using a particular encryption method is known as computational time analysis in image encryption. Computational time analysis is used to evaluate the effectiveness and speed of the encryption algorithm as well as to identify any possible issues or potential areas for development. We calculated the encryption time for some images to calculate the performance of the proposed approach. On average, the encryption process takes 0.01568 s to finish. Some of them are listed below in the Tables 8 and 9.

Conclusions
In this study, a new image encryption method has been introduced that is both secure and efficient without compromising on either aspect. We propose a new image encryption method that combines Intertwining Logistic Mapping (ILM) and Orbital Shift Pixel Scrambling Method (OSPSM). The proposed encryption method applies the OSPSM strategy to confuse image pixels. This method draws inspiration from the rotational motion of planets along their orbits, combined with chaotic sequences to disrupt the pixel positions of the image. The diffusion operation is carried out on the scrambled 2D matrix, generating a mask image using ILM. Then, the XOR operation is performed on the generated mask image and the scrambled 2D image matrix so the final ciphertext image is obtained. This process effectively destroys any intra-correlations among the pixels of the image, which helps to enhance the security of the encryption. Furthermore, the key generation method presented in this work using ILM is not solely dependent on the image itself but also on certain secret parameters. This highlights the importance of maintaining the confidentiality of these secret parameters to ensure the robustness and effectiveness of our proposed scheme.