Skip to main content
Erschienen in: Neural Computing and Applications 5/2015

01.07.2015 | Original Article

An efficient chaotic image encryption scheme

verfasst von: Majid Khan, Tariq Shah

Erschienen in: Neural Computing and Applications | Ausgabe 5/2015

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this communication, we have presented a technique to synthesize resilient nonlinear mechanisms for the construction of substitution box for image encryption that utilizes a multiplicative group of nonzero elements of Galois field of order 256. The proposed nonlinear component assists in transforming the intelligible message or plaintext into an enciphered format by the use of exponential and Tinkerbell chaotic maps. The proposed substitution box is sensitive to the initial conditions provided to the chaotic system, which are subsequently used as parameters in creating an instance. The simulation results show that the use of the proposed substitution box to image encryption scheme provides an efficient and secure way for real-time communications.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Alvarez G, Li S (2006) Some basic cryptographic requirements for chaos-based cryptosystems. Int J Bifurc Chaos Appl Sci Eng 16(8):2129–2153MATHMathSciNetCrossRef Alvarez G, Li S (2006) Some basic cryptographic requirements for chaos-based cryptosystems. Int J Bifurc Chaos Appl Sci Eng 16(8):2129–2153MATHMathSciNetCrossRef
2.
Zurück zum Zitat Jakimoski G, Kocarev L (2001) Chaos and cryptography: block encryption ciphers. IEEE Trans Circuits Syst I Fundam Theory Appl 48(2):163–169MATHMathSciNetCrossRef Jakimoski G, Kocarev L (2001) Chaos and cryptography: block encryption ciphers. IEEE Trans Circuits Syst I Fundam Theory Appl 48(2):163–169MATHMathSciNetCrossRef
3.
Zurück zum Zitat Tang G, Liao X, Chen Y (2005) A novel method for designing S-boxes based on chaotic maps. Chaos, Solitons Fractals 23:413–419MATHCrossRef Tang G, Liao X, Chen Y (2005) A novel method for designing S-boxes based on chaotic maps. Chaos, Solitons Fractals 23:413–419MATHCrossRef
4.
Zurück zum Zitat Khan M, Shah T (2014) A novel construction of substitution box with Zaslavskii chaotic map and symmetric group. J Intell Fuzzy Syst. doi:10.3233/IFS-141434 Khan M, Shah T (2014) A novel construction of substitution box with Zaslavskii chaotic map and symmetric group. J Intell Fuzzy Syst. doi:10.​3233/​IFS-141434
5.
Zurück zum Zitat Khan M, Shah T (2014) A novel image encryption technique based on Hénon chaotic map and S8 symmetric group. Neural Comput Appl 25:1717–1722CrossRef Khan M, Shah T (2014) A novel image encryption technique based on Hénon chaotic map and S8 symmetric group. Neural Comput Appl 25:1717–1722CrossRef
9.
Zurück zum Zitat Khan M, Shah T, Mahmood H, Gondal MA (2013) An efficient method for the construction of block cipher with multi-chaotic systems. Nonlinear Dyn 71(3):489–492MathSciNetCrossRef Khan M, Shah T, Mahmood H, Gondal MA (2013) An efficient method for the construction of block cipher with multi-chaotic systems. Nonlinear Dyn 71(3):489–492MathSciNetCrossRef
10.
Zurück zum Zitat Khan M, Shah T, Mahmood H, Gondal MA (2013) An efficient technique for the construction of substitution box with chaotic partial differential equation. Nonlinear Dyn 73(2013):1795–1801MathSciNetCrossRef Khan M, Shah T, Mahmood H, Gondal MA (2013) An efficient technique for the construction of substitution box with chaotic partial differential equation. Nonlinear Dyn 73(2013):1795–1801MathSciNetCrossRef
12.
Zurück zum Zitat Khan M, Shah T (2014) A construction of novel chaos base nonlinear component of block cipher. Nonlinear Dyn 76:377–382MathSciNetCrossRef Khan M, Shah T (2014) A construction of novel chaos base nonlinear component of block cipher. Nonlinear Dyn 76:377–382MathSciNetCrossRef
13.
Zurück zum Zitat Khan M, Shah T, Mahmood H et al (2012) A novel technique for the construction of strong S-boxes based on chaotic Lorenz systems. Nonlinear Dyn 70:2303–2311MathSciNetCrossRef Khan M, Shah T, Mahmood H et al (2012) A novel technique for the construction of strong S-boxes based on chaotic Lorenz systems. Nonlinear Dyn 70:2303–2311MathSciNetCrossRef
14.
Zurück zum Zitat Zhang Qiang, Guo Ling, Wei Xiaopeng (2010) Image encryption using DNA addition combining with chaotic maps. Math Comput Model 52:2028–2035MATHMathSciNetCrossRef Zhang Qiang, Guo Ling, Wei Xiaopeng (2010) Image encryption using DNA addition combining with chaotic maps. Math Comput Model 52:2028–2035MATHMathSciNetCrossRef
15.
Zurück zum Zitat Saha LM, Tehri R (2010) Applications of recent indicators of regularity and chaos to discrete maps. Int J Appl Math Mech 6(1):86–93 Saha LM, Tehri R (2010) Applications of recent indicators of regularity and chaos to discrete maps. Int J Appl Math Mech 6(1):86–93
16.
Zurück zum Zitat Prokhorow MD, Ponomarenko VI (2008) Encryption and decryption of information in chaotic communication systems governed by delay-differential equations. Chaos, Solitons Fractals 35:871–877CrossRef Prokhorow MD, Ponomarenko VI (2008) Encryption and decryption of information in chaotic communication systems governed by delay-differential equations. Chaos, Solitons Fractals 35:871–877CrossRef
17.
Zurück zum Zitat Tang Y, Wang Z, Fang J (2010) Image encryption using chaotic coupled map lattices with time-varying delays. Commun Nonlinear Sci Numer Simul 15:2456–2468MATHMathSciNetCrossRef Tang Y, Wang Z, Fang J (2010) Image encryption using chaotic coupled map lattices with time-varying delays. Commun Nonlinear Sci Numer Simul 15:2456–2468MATHMathSciNetCrossRef
18.
Zurück zum Zitat Wang Y, Xie Q, Wu Y et al (2009) A software for S-box performance analysis and test. In: 2009 international conference on electronic commerce and business intelligence. Beijing, China, p 125–128 Wang Y, Xie Q, Wu Y et al (2009) A software for S-box performance analysis and test. In: 2009 international conference on electronic commerce and business intelligence. Beijing, China, p 125–128
19.
Zurück zum Zitat Webster A, Tavares S (1986) On the design of S-boxes. In: Advances in Cryptology: Proceedings of Crypto’85, Santa Barbara, USA. Lecture notes in computer science. 218: 523–534 Webster A, Tavares S (1986) On the design of S-boxes. In: Advances in Cryptology: Proceedings of Crypto’85, Santa Barbara, USA. Lecture notes in computer science. 218: 523–534
20.
Zurück zum Zitat Adams C, Tavares S (1989) Good S-boxes are easy to find. In: Advances in Cryptology: Proceedings of Crypto’89, Santa Barbara, USA. Lecture notes in computer science. 435: 612–615 Adams C, Tavares S (1989) Good S-boxes are easy to find. In: Advances in Cryptology: Proceedings of Crypto’89, Santa Barbara, USA. Lecture notes in computer science. 435: 612–615
22.
Zurück zum Zitat Cusick TW, Stanica P (2009) Cryptographic boolean functions and applications. Elsevier, Amsterdam Cusick TW, Stanica P (2009) Cryptographic boolean functions and applications. Elsevier, Amsterdam
23.
Zurück zum Zitat Youssef AM, Tavares SE, Gong G (2006) On some probabilistic approximations for AES-like S-boxes. Discrete Math 306(16):2016–2020MATHMathSciNetCrossRef Youssef AM, Tavares SE, Gong G (2006) On some probabilistic approximations for AES-like S-boxes. Discrete Math 306(16):2016–2020MATHMathSciNetCrossRef
25.
Zurück zum Zitat Jing-mei L, Bao-dian W, Xiang-guo C et al (2005) Cryptanalysis of Rijndael S-box and improvement. Appl Math Comput 170(2):958–975MathSciNetCrossRef Jing-mei L, Bao-dian W, Xiang-guo C et al (2005) Cryptanalysis of Rijndael S-box and improvement. Appl Math Comput 170(2):958–975MathSciNetCrossRef
26.
27.
Zurück zum Zitat Faraoun Kamel (2010) Chaos-based key stream generator based on multiple maps combinations and its application to images encryption. Int Arab J Inf Technol 7:231–240 Faraoun Kamel (2010) Chaos-based key stream generator based on multiple maps combinations and its application to images encryption. Int Arab J Inf Technol 7:231–240
28.
Zurück zum Zitat Zhu C (2012) A novel image encryption scheme based on improved hyperchaotic sequences. J Opt Commun 285:29–37CrossRef Zhu C (2012) A novel image encryption scheme based on improved hyperchaotic sequences. J Opt Commun 285:29–37CrossRef
29.
Zurück zum Zitat Zhang G, Liu Q (2011) A novel image encryption method based on total shuffling scheme. J Opt Commun 284:2775–2780CrossRef Zhang G, Liu Q (2011) A novel image encryption method based on total shuffling scheme. J Opt Commun 284:2775–2780CrossRef
30.
Zurück zum Zitat Mazloom S, Eftekhari-Moghadam AM (2009) Color image encryption based on coupled nonlinear chaotic map. J Chaos Solitons Fractals 42:1745–1754MATHCrossRef Mazloom S, Eftekhari-Moghadam AM (2009) Color image encryption based on coupled nonlinear chaotic map. J Chaos Solitons Fractals 42:1745–1754MATHCrossRef
31.
Zurück zum Zitat Kwok HS, Tang WKS (2007) A fast image encryption system based on chaotic maps with finite precision representation. J Chaos Solitons Fractals 32:1518–1529MATHMathSciNetCrossRef Kwok HS, Tang WKS (2007) A fast image encryption system based on chaotic maps with finite precision representation. J Chaos Solitons Fractals 32:1518–1529MATHMathSciNetCrossRef
32.
Zurück zum Zitat Rhouma R, Belghith S (2008) Cryptanalysis of a new image encryption algorithm based on hyper-chaos. J Phys Lett A 372:5973–5978MATHCrossRef Rhouma R, Belghith S (2008) Cryptanalysis of a new image encryption algorithm based on hyper-chaos. J Phys Lett A 372:5973–5978MATHCrossRef
33.
Zurück zum Zitat Zhang Q, Guo L, Wei X (2010) Image encryption using DNA addition combining with chaotic maps. J Math Comput Model 52:2028–2035MATHMathSciNetCrossRef Zhang Q, Guo L, Wei X (2010) Image encryption using DNA addition combining with chaotic maps. J Math Comput Model 52:2028–2035MATHMathSciNetCrossRef
34.
Zurück zum Zitat Ferguson N, Schroeppel R, Whiting D (2001) A simple algebraic representation of Rijndael. In: Selected areas in cryptography SAC01, LNCS. 2259:103–111 Ferguson N, Schroeppel R, Whiting D (2001) A simple algebraic representation of Rijndael. In: Selected areas in cryptography SAC01, LNCS. 2259:103–111
35.
Zurück zum Zitat Mentens N, Batina L, Preneel B, Verbauwhede I (2005) A systematic evaluation of compact hardware implementations for the Rijndael S-box. CT RSA LNCS 3376:323–333MathSciNet Mentens N, Batina L, Preneel B, Verbauwhede I (2005) A systematic evaluation of compact hardware implementations for the Rijndael S-box. CT RSA LNCS 3376:323–333MathSciNet
36.
Zurück zum Zitat Lidl R, Niederreiter H (1994) Introduction to finite fields and their applications. Cambridge University Press, CambridgeMATHCrossRef Lidl R, Niederreiter H (1994) Introduction to finite fields and their applications. Cambridge University Press, CambridgeMATHCrossRef
37.
Zurück zum Zitat Khanzadi H, Omam MA, Lotfifar F, Eshghi M (2010) Image encryption based on gyrator transform using chaotic maps. IEEE Conference signal process 2608–2612 Khanzadi H, Omam MA, Lotfifar F, Eshghi M (2010) Image encryption based on gyrator transform using chaotic maps. IEEE Conference signal process 2608–2612
38.
Zurück zum Zitat Baigèneres T, Lu Y, Vaudenay S, Junod P, Monnerat J (2005) A classical introduction to cryptography exercise book. Springer, US Baigèneres T, Lu Y, Vaudenay S, Junod P, Monnerat J (2005) A classical introduction to cryptography exercise book. Springer, US
Metadaten
Titel
An efficient chaotic image encryption scheme
verfasst von
Majid Khan
Tariq Shah
Publikationsdatum
01.07.2015
Verlag
Springer London
Erschienen in
Neural Computing and Applications / Ausgabe 5/2015
Print ISSN: 0941-0643
Elektronische ISSN: 1433-3058
DOI
https://doi.org/10.1007/s00521-014-1800-0

Weitere Artikel der Ausgabe 5/2015

Neural Computing and Applications 5/2015 Zur Ausgabe