Skip to main content
Log in

An encryption scheme based on chaotic Rabinovich-Fabrikant system and S8 confusion component

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In this research article, we have proposed a novel image encryption scheme for the confidentiality of digital information. The modern block ciphers based on confusion and diffusion characteristic, as proposed by Claude Shannon in 1949. Firstly, we have designed a nonlinear confusion component of a block cipher and apply the action of symmetry group S8 to generate a pool of 40,320 substitution boxes with the same cryptographic strength. These nonlinear components are responsible for adding confusion in the encryption algorithm. Secondly, we have utilized a nonlinear chaotic dynamical system to add diffusion capability in our proposed encryption scheme. The suggested scheme is further examined under security performance evaluations, which shows the appropriateness of our offered scheme for digital contents.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Ahmad M, Al Solami E, Wang X-Y, Doja MN, Beg MMS, Alzaidi AA (2018) Cryptanalysis of an image encryption algorithm based on combined chaos for BAN system and its improved scheme using SHA-512 and hyperchaos. Symmetry 10(7):266

    Article  Google Scholar 

  2. Ahmad M, Alam MZ, Ansari S, Lambic D, AlSharari HD (2018) Cryptanalysis of an image encryption algorithm based on PWLCM and inertial delayed neural network. Journal of Intelligent & Fuzzy Systems 34(3):1323–1332

    Article  Google Scholar 

  3. Ahmad M, Doja MN, Beg MMS (2018) Security analysis and enhancements of an image cryptosystem based on hyperchaotic system. Journal of King Saud University-CIS

  4. Ahmad M, Doja MN, Beg MMS (2018) ABC optimization based construction of strong substitution-box. Wirel Pers Commun 101(3):1715–1729

    Article  Google Scholar 

  5. Ahmed HA, Zolkipli MF, Ahmad M (May 2018) A novel efficient substitution-box design based on firefly algorithm and discrete chaotic map. Neural Computing and Applications 31:7201–7210. https://doi.org/10.1007/s00521-018-3557-3

  6. Al Solami E, Ahmad M, Volos C, Doja MN, Beg MMS (2018) A new hyperchaotic system-based design for efficient bijective substitution-boxes. Entropy 20(7): 525

  7. Alghafis A, Munir N, Khan M, Hussain I (2020) An encryption scheme based on discrete quantum map and continuous chaotic system. Int J Theor Phys 59:1227–1240

    Article  MathSciNet  Google Scholar 

  8. Ali KM, Khan M (2019) A new construction of confusion component of block ciphers. Multimed Tools Appl 78:32585–32604. https://doi.org/10.1007/s11042-019-07866-w.

  9. Alzaidi AA, Ahmad M, Doja MN, Al Solami E, Beg MMS (2018) A new 1D chaotic map and beta-hill climbing for generating substitution-boxes. IEEE Access 6(01):55405–55418

    Article  Google Scholar 

  10. Amer Awad Alzaidi, Musheer Ahmad, Hussam S. Ahmed, Eesa AlSolami (2018) Sine-cosine optimization based bijective substitution-boxes construction using enhanced dynamics of chaotic map. Complexity

  11. Batool SI, Waseem HM (2019) A novel image encryption scheme based on Arnold scrambling and Lucas series. Multimed Tools Appl 78:27611–27637. https://doi.org/10.1007/s11042-019-07881-x

    Article  Google Scholar 

  12. Borujeni SE, Eshghi M (2009) Chaotic image encryption design using tompkins-paige algorithm. Hindawi Publishing Corporation Mathematical Problem in Engineering 200:22

    MATH  Google Scholar 

  13. Gao H, Zhang Y, Liang S, Li D (2006) A new chaotic algorithm for image encryption. Chaos Solitons Fractals 29(2):393–399

    Article  Google Scholar 

  14. Guarnong C, Mao Y, Chui CK (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons Fractals 21(3):749–761

    Article  MathSciNet  Google Scholar 

  15. Guoji Z, Qing L (2011) A novel image encryption method based on total shuffling scheme. Opt Commun 284:2775–2780

    Article  Google Scholar 

  16. Hamza R, Yan Z, Muhammad K, Bellavista P, Titouna F (2019) A privacy-preserving cryptosystem for IoT E-healthcare. Inf Sci 527:493–510. https://doi.org/10.1016/j.ins.2019.01.070

  17. Hamza R, Hassan A, Huang T, Ke L, Yan H (2019) An efficient cryptosystem for video surveillance in the internet of things environment. Complexity 2019:1–11

    Article  Google Scholar 

  18. Khan M (2015) A novel image encryption scheme based on multi-parameters chaotic S-boxes. Nonlinear Dynamics 82:527–533

    Article  MathSciNet  Google Scholar 

  19. Khan M (2015) An image encryption by using Fourier series. J Vib Control 21:3450–3455

    Article  MathSciNet  Google Scholar 

  20. Khan M (2019) Khawaja Muhammad Ali, construction and optimization of substitution boxes based on two-dimensional mixed chaotic maps. Int J Theor Phys 58:3091–3117. https://doi.org/10.1007/s10773-019-04188-3

    Article  Google Scholar 

  21. Khan M, Asghar Z (2016) A novel construction of substitution box for image encryption applications with Gingerbreadman chaotic map and S8 permutation. Springer, Neural Comput & Applic. https://doi.org/10.1007/s00521-016-2511-5

    Book  Google Scholar 

  22. Khan M, Masood F (2019) A novel chaotic image encryption technique based on multiple discrete dynamical maps. Multimedia Tools and Applications 78:26203-26222. https://doi.org/10.1007/s11042-019-07818-4.

  23. Khan M, Munir N (2019) A novel image encryption technique based on generalized advanced encryption standard based on field of any characteristic, Wireless Pers Commun 109:849–867. https://doi.org/10.1007/s11277-019-06594-6.

  24. Khan M, Naqvi SIB (2018) Utilization of small S-boxes for information hiding. Cryptographic and Information Security Approaches for Images and Videos

  25. Khan M, Shah T (2016) Construction and applications of chaotic S-boxes in image encryption. Neural Comput & Applic, Springer 27:677–685

    Article  Google Scholar 

  26. Khan M, Waseem HM (2018) A novel image encryption scheme based on quantum dynamical spinning and rotations. PloS one 13(11):e0206460

    Article  Google Scholar 

  27. Khan M, Waseem HM (2019) A novel digital contents privacy scheme based on Kramer's arbitrary spin. Int J Theor Phys 58:2720–2743. https://doi.org/10.1007/s10773-019-04162-z

  28. Khanzadi H, Omam MA, Lotfifar F, Eshghi M (2010) Image encryption based on gyrator transforms using chaotic maps. In: 2010 IEEE 10th International Conference on Signal Processing (ICSP), pp 2608–2612

  29. Lambic D, Jankovic A, Ahmad M (2018) Security analysis of the efficient Chaos pseudo-random number generator applied to video encryption. J Electron Test 34:709–715. https://doi.org/10.1007/s10836-018-5767-0

  30. Li Y, Ge G (2019) Cryptographic and parallel hash function based on cross coupled map lattices suitable for multimedia communication security. Multimedia Tools Appl 78(13):17973–17994

    Article  MathSciNet  Google Scholar 

  31. Li Y, Ge G, Xia D (2016) Chaotic hash function based on the dynamic S-box with variable parameters. Nonlinear Dynamics 84(4):2387–2402

    Article  Google Scholar 

  32. Liao X, Chen G, Yin J (2016) Content-adaptive steganalysis for color images. Security and Communication Networks 9(18):5756–5763

    Article  Google Scholar 

  33. Liao X, Li K, Yin J (2017) Separable data hiding in encrypted image based on compressive sensing and discrete fourier transform. Multimed Tools Appl 76:20739–20753. https://doi.org/10.1007/s11042-016-3971-4

    Article  Google Scholar 

  34. Mao Y, Chen G, Lian S (2004) A novel fast image encryption scheme based on 3D chaotic bakermaps. Int J Bifurcation Chaos 14(10):3613–3624

    Article  Google Scholar 

  35. Munir N, Khan M (2018) A generalization of algebraic expression for nonlinear component of symmetric key algorithms of any characteristic p. In: International Conference on Applied and Engineering Mathematics. https://doi.org/10.1109/ICAEM.2018.8536308

  36. Munir N, Khan M, Wei Z, Akgul A, Amin M, Hussain I (2020) Circuit implementation of 3D chaotic self-exciting single-disk homopolar dynamo and its application in digital image confidentiality. Wireless Netw. https://doi.org/10.1007/s11276-020-02361-9

  37. Preishuber M, Hütter T, Katzenbeisser S, Uhl A (2018) Depreciating motivation and empirical security analysis of chaos-based image and video encryption. IEEE Transactions on Information Forensics and Security 13(9):2137–2150

    Article  Google Scholar 

  38. Rafiq A, Khan M (2018) Construction of new S-boxes based on triangle groups and its applications in copyright protection. Multimed Tools Appl 78:15527–15544. https://doi.org/10.1007/s11042-018-6953-x.

  39. Tong X, Yang L, Zhang M, Xu H, Wang Z (2015) An image encryption scheme based on hyperchaotic rabinovich and exponential chaos maps 17:181–196

    Google Scholar 

  40. Wang Y, Wong KW, Liao X, Chen G (2009) A new chaos-based fast image encryption algorithm. Appl Soft Comput 11:514–522

    Article  Google Scholar 

  41. Waseem HM, Khan M (2018) Information confidentiality using quantum spinning, rotation and finite state machine. International Journal of Theoretical Physics 57:3584–3594

    Article  Google Scholar 

  42. Waseem HM, Khan M, Shah T (2018) Image privacy scheme using quantum spinning and rotation. Journal of Electronic Imaging 27(6):063022

    Article  Google Scholar 

  43. Wei Z, Yu P, Zhang W, Yao M (2015) Study of hidden attractors, multiple limit cycles from Hopf bifurcation and boundedness of motion in the generalized hyperchaotic Rabinovich system. Nonlinear Dynamics 82:131–141

    Article  MathSciNet  Google Scholar 

  44. Wei Z, Pham V-T, Kapitaniak T, Wang Z (2016) Bifurcation analysis and circuit realization for multiple-delayed Wang-Chen system with hidden chaotic attractors. Nonlinear Dynamics 85:1635–1650

    Article  MathSciNet  Google Scholar 

  45. Wei Z, Moroz I, Wang Z, Sprott JC, Kapitaniak T (2016) Dynamics at infinity, degenerate Hopf and zero-Hopf bifurcation for Kingni-Jafari system with hidden attractors. International Int J Bifurcat Chaos 26(7)1650125

  46. Wei Z, Zhu B, Yang J, Perc M, Slavinec M (2019) Bifurcation analysis of two disc dynamos with viscous friction and multiple time delays. Appl Math Comput 347:265–281

    MathSciNet  MATH  Google Scholar 

  47. Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for image encryption. Cyber journals: multidisciplinary journals in science and technology. Journal of Selected Areas in Telecommunications (JSAT) 1(2):31–38

    Google Scholar 

  48. Younas I, Khan M (2018) A new efficient digital image encryption based on inverse left almost semi group and Lorenz chaotic system. Entropy 20(12):913

    Article  Google Scholar 

  49. Zahid AH, Arshad MJ, Ahmad M (2019) A novel construction of efficient substitution-boxes using cubic fractional transformation. Entropy 21(3):245

    Article  MathSciNet  Google Scholar 

  50. Zhang L, Liao X, Wang X (2005) An image encryption approach based on chaotic maps. Chaos Solitons Fractals 24(3):759–765

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Majid Khan.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Alghafis, A., Munir, N. & Khan, M. An encryption scheme based on chaotic Rabinovich-Fabrikant system and S8 confusion component. Multimed Tools Appl 80, 7967–7985 (2021). https://doi.org/10.1007/s11042-020-10142-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-10142-x

Keywords

Navigation