Abstract
In this research article, we have proposed a novel image encryption scheme for the confidentiality of digital information. The modern block ciphers based on confusion and diffusion characteristic, as proposed by Claude Shannon in 1949. Firstly, we have designed a nonlinear confusion component of a block cipher and apply the action of symmetry group S8 to generate a pool of 40,320 substitution boxes with the same cryptographic strength. These nonlinear components are responsible for adding confusion in the encryption algorithm. Secondly, we have utilized a nonlinear chaotic dynamical system to add diffusion capability in our proposed encryption scheme. The suggested scheme is further examined under security performance evaluations, which shows the appropriateness of our offered scheme for digital contents.
Similar content being viewed by others
References
Ahmad M, Al Solami E, Wang X-Y, Doja MN, Beg MMS, Alzaidi AA (2018) Cryptanalysis of an image encryption algorithm based on combined chaos for BAN system and its improved scheme using SHA-512 and hyperchaos. Symmetry 10(7):266
Ahmad M, Alam MZ, Ansari S, Lambic D, AlSharari HD (2018) Cryptanalysis of an image encryption algorithm based on PWLCM and inertial delayed neural network. Journal of Intelligent & Fuzzy Systems 34(3):1323–1332
Ahmad M, Doja MN, Beg MMS (2018) Security analysis and enhancements of an image cryptosystem based on hyperchaotic system. Journal of King Saud University-CIS
Ahmad M, Doja MN, Beg MMS (2018) ABC optimization based construction of strong substitution-box. Wirel Pers Commun 101(3):1715–1729
Ahmed HA, Zolkipli MF, Ahmad M (May 2018) A novel efficient substitution-box design based on firefly algorithm and discrete chaotic map. Neural Computing and Applications 31:7201–7210. https://doi.org/10.1007/s00521-018-3557-3
Al Solami E, Ahmad M, Volos C, Doja MN, Beg MMS (2018) A new hyperchaotic system-based design for efficient bijective substitution-boxes. Entropy 20(7): 525
Alghafis A, Munir N, Khan M, Hussain I (2020) An encryption scheme based on discrete quantum map and continuous chaotic system. Int J Theor Phys 59:1227–1240
Ali KM, Khan M (2019) A new construction of confusion component of block ciphers. Multimed Tools Appl 78:32585–32604. https://doi.org/10.1007/s11042-019-07866-w.
Alzaidi AA, Ahmad M, Doja MN, Al Solami E, Beg MMS (2018) A new 1D chaotic map and beta-hill climbing for generating substitution-boxes. IEEE Access 6(01):55405–55418
Amer Awad Alzaidi, Musheer Ahmad, Hussam S. Ahmed, Eesa AlSolami (2018) Sine-cosine optimization based bijective substitution-boxes construction using enhanced dynamics of chaotic map. Complexity
Batool SI, Waseem HM (2019) A novel image encryption scheme based on Arnold scrambling and Lucas series. Multimed Tools Appl 78:27611–27637. https://doi.org/10.1007/s11042-019-07881-x
Borujeni SE, Eshghi M (2009) Chaotic image encryption design using tompkins-paige algorithm. Hindawi Publishing Corporation Mathematical Problem in Engineering 200:22
Gao H, Zhang Y, Liang S, Li D (2006) A new chaotic algorithm for image encryption. Chaos Solitons Fractals 29(2):393–399
Guarnong C, Mao Y, Chui CK (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons Fractals 21(3):749–761
Guoji Z, Qing L (2011) A novel image encryption method based on total shuffling scheme. Opt Commun 284:2775–2780
Hamza R, Yan Z, Muhammad K, Bellavista P, Titouna F (2019) A privacy-preserving cryptosystem for IoT E-healthcare. Inf Sci 527:493–510. https://doi.org/10.1016/j.ins.2019.01.070
Hamza R, Hassan A, Huang T, Ke L, Yan H (2019) An efficient cryptosystem for video surveillance in the internet of things environment. Complexity 2019:1–11
Khan M (2015) A novel image encryption scheme based on multi-parameters chaotic S-boxes. Nonlinear Dynamics 82:527–533
Khan M (2015) An image encryption by using Fourier series. J Vib Control 21:3450–3455
Khan M (2019) Khawaja Muhammad Ali, construction and optimization of substitution boxes based on two-dimensional mixed chaotic maps. Int J Theor Phys 58:3091–3117. https://doi.org/10.1007/s10773-019-04188-3
Khan M, Asghar Z (2016) A novel construction of substitution box for image encryption applications with Gingerbreadman chaotic map and S8 permutation. Springer, Neural Comput & Applic. https://doi.org/10.1007/s00521-016-2511-5
Khan M, Masood F (2019) A novel chaotic image encryption technique based on multiple discrete dynamical maps. Multimedia Tools and Applications 78:26203-26222. https://doi.org/10.1007/s11042-019-07818-4.
Khan M, Munir N (2019) A novel image encryption technique based on generalized advanced encryption standard based on field of any characteristic, Wireless Pers Commun 109:849–867. https://doi.org/10.1007/s11277-019-06594-6.
Khan M, Naqvi SIB (2018) Utilization of small S-boxes for information hiding. Cryptographic and Information Security Approaches for Images and Videos
Khan M, Shah T (2016) Construction and applications of chaotic S-boxes in image encryption. Neural Comput & Applic, Springer 27:677–685
Khan M, Waseem HM (2018) A novel image encryption scheme based on quantum dynamical spinning and rotations. PloS one 13(11):e0206460
Khan M, Waseem HM (2019) A novel digital contents privacy scheme based on Kramer's arbitrary spin. Int J Theor Phys 58:2720–2743. https://doi.org/10.1007/s10773-019-04162-z
Khanzadi H, Omam MA, Lotfifar F, Eshghi M (2010) Image encryption based on gyrator transforms using chaotic maps. In: 2010 IEEE 10th International Conference on Signal Processing (ICSP), pp 2608–2612
Lambic D, Jankovic A, Ahmad M (2018) Security analysis of the efficient Chaos pseudo-random number generator applied to video encryption. J Electron Test 34:709–715. https://doi.org/10.1007/s10836-018-5767-0
Li Y, Ge G (2019) Cryptographic and parallel hash function based on cross coupled map lattices suitable for multimedia communication security. Multimedia Tools Appl 78(13):17973–17994
Li Y, Ge G, Xia D (2016) Chaotic hash function based on the dynamic S-box with variable parameters. Nonlinear Dynamics 84(4):2387–2402
Liao X, Chen G, Yin J (2016) Content-adaptive steganalysis for color images. Security and Communication Networks 9(18):5756–5763
Liao X, Li K, Yin J (2017) Separable data hiding in encrypted image based on compressive sensing and discrete fourier transform. Multimed Tools Appl 76:20739–20753. https://doi.org/10.1007/s11042-016-3971-4
Mao Y, Chen G, Lian S (2004) A novel fast image encryption scheme based on 3D chaotic bakermaps. Int J Bifurcation Chaos 14(10):3613–3624
Munir N, Khan M (2018) A generalization of algebraic expression for nonlinear component of symmetric key algorithms of any characteristic p. In: International Conference on Applied and Engineering Mathematics. https://doi.org/10.1109/ICAEM.2018.8536308
Munir N, Khan M, Wei Z, Akgul A, Amin M, Hussain I (2020) Circuit implementation of 3D chaotic self-exciting single-disk homopolar dynamo and its application in digital image confidentiality. Wireless Netw. https://doi.org/10.1007/s11276-020-02361-9
Preishuber M, Hütter T, Katzenbeisser S, Uhl A (2018) Depreciating motivation and empirical security analysis of chaos-based image and video encryption. IEEE Transactions on Information Forensics and Security 13(9):2137–2150
Rafiq A, Khan M (2018) Construction of new S-boxes based on triangle groups and its applications in copyright protection. Multimed Tools Appl 78:15527–15544. https://doi.org/10.1007/s11042-018-6953-x.
Tong X, Yang L, Zhang M, Xu H, Wang Z (2015) An image encryption scheme based on hyperchaotic rabinovich and exponential chaos maps 17:181–196
Wang Y, Wong KW, Liao X, Chen G (2009) A new chaos-based fast image encryption algorithm. Appl Soft Comput 11:514–522
Waseem HM, Khan M (2018) Information confidentiality using quantum spinning, rotation and finite state machine. International Journal of Theoretical Physics 57:3584–3594
Waseem HM, Khan M, Shah T (2018) Image privacy scheme using quantum spinning and rotation. Journal of Electronic Imaging 27(6):063022
Wei Z, Yu P, Zhang W, Yao M (2015) Study of hidden attractors, multiple limit cycles from Hopf bifurcation and boundedness of motion in the generalized hyperchaotic Rabinovich system. Nonlinear Dynamics 82:131–141
Wei Z, Pham V-T, Kapitaniak T, Wang Z (2016) Bifurcation analysis and circuit realization for multiple-delayed Wang-Chen system with hidden chaotic attractors. Nonlinear Dynamics 85:1635–1650
Wei Z, Moroz I, Wang Z, Sprott JC, Kapitaniak T (2016) Dynamics at infinity, degenerate Hopf and zero-Hopf bifurcation for Kingni-Jafari system with hidden attractors. International Int J Bifurcat Chaos 26(7)1650125
Wei Z, Zhu B, Yang J, Perc M, Slavinec M (2019) Bifurcation analysis of two disc dynamos with viscous friction and multiple time delays. Appl Math Comput 347:265–281
Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for image encryption. Cyber journals: multidisciplinary journals in science and technology. Journal of Selected Areas in Telecommunications (JSAT) 1(2):31–38
Younas I, Khan M (2018) A new efficient digital image encryption based on inverse left almost semi group and Lorenz chaotic system. Entropy 20(12):913
Zahid AH, Arshad MJ, Ahmad M (2019) A novel construction of efficient substitution-boxes using cubic fractional transformation. Entropy 21(3):245
Zhang L, Liao X, Wang X (2005) An image encryption approach based on chaotic maps. Chaos Solitons Fractals 24(3):759–765
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Alghafis, A., Munir, N. & Khan, M. An encryption scheme based on chaotic Rabinovich-Fabrikant system and S8 confusion component. Multimed Tools Appl 80, 7967–7985 (2021). https://doi.org/10.1007/s11042-020-10142-x
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-020-10142-x