Skip to main content
Log in

A novel scheme for image encryption using substitution box and chaotic system

  • Original Paper
  • Published:
Nonlinear Dynamics Aims and scope Submit manuscript

Abstract

For the last 3 decades, the inclusion of chaos for the encryption of multimedia information is considered as a remarkable aspect of nonlinear dynamics. In this article, chaotic system along with substitution box is used for image encryption. Substitution box is constructed by the group action of the projective general linear group over a finite field. On multiple attempts, using the same security key the host image gives a different encrypted image which is the main feature of this scheme. For secure communication, this idea of chaos-based image encryption along with substitution box shows relatively improved results as depicted in simulation and security analysis. The scheme demonstrates resistance against image processing attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Hussain, I., Shah, T., Gondal, M.A.: A group theoretic approach to construct cryptographically strong substitution boxes. Neural Comput. Appl. 23, 97–104 (2013)

    Article  Google Scholar 

  2. Hussain, I., Shah, T., Mahmood, H.: A projective general linear group based algorithm for the construction of substitution box for block ciphers. Neural Comput. Appl. 22, 1085–1093 (2013)

    Article  Google Scholar 

  3. Shah, T., Qamar, A., Hussain, I.: Substitution box on maximal cyclic subgroup of units of a Galois ring. Z. Naturforschung 68a, 479–482 (2013)

    Google Scholar 

  4. Hussain, I., Shah, T., Gondal, M.A., Mahmood, H.: A novel image encryption algorithm based on chaotic maps and \(\text{ GF }(2^{8})\) exponent transformation. Nonlinear Dyn. 72, 399–406 (2013)

    Article  MathSciNet  Google Scholar 

  5. Hussain, I., Shah, T., Gondal, M.A., Mahmood, H.: A novel method for designing nonlinear component for block cipher based on TD-ERCS chaotic sequence. Nonlinear Dyn. 73, 633–637 (2013)

    Article  MathSciNet  Google Scholar 

  6. Anees, A., Siddiqui, A.M., Ahmed, J., Hussain, I.: A technique for digital steganography using chaotic maps. Nonlinear Dyn. 75, 807–816 (2014)

    Article  Google Scholar 

  7. Chen, R.J., Horng, S.J.: Novel SCAN-CA-based image security system using SCAN and 2D von Neumann cellular automata. Signal Process. Image Commun. 25(6), 413–426 (2010)

    Article  Google Scholar 

  8. Chen, T.H., Li, K.C.: Multi-image encryption by circular random grids. Inf. Sci. 189, 255–265 (2012)

    Article  MathSciNet  Google Scholar 

  9. Zhou, Y., Panetta, K., Agaian, S., Chen, C.L.P.: Image encryption using P-Fibonacci transform and decomposition. Opt. Commun. 285(5), 594–608 (2012)

    Article  Google Scholar 

  10. Zhou, Y., Panetta, K., Agaian, S., Chen, C.L.P.: (n, k, p)-Gray code for image systems. IEEE Trans. Cybern. 43(2), 515–529 (2013)

    Article  Google Scholar 

  11. Li, L., AbdEl-Latif, A.A., Niu, X.M.: Elliptic curve ElGamal based homomorphic image encryption scheme for sharing secret images. Signal Process. 92(4), 1069–1078 (2012)

    Article  Google Scholar 

  12. Ye, Guodong: A block image encryption algorithm based on wave transmission and chaotic systems. Nonlinear Dyn. 75, 417–427 (2014)

    Article  Google Scholar 

  13. Liao, X., Lai, S., Zhou, Q.: A novel image encryption algorithm based on self-adaptive wave transmission. Signal Process. 90, 2714–2722 (2010)

    Article  MATH  Google Scholar 

  14. Chen, T.H., Wu, C.S.: Compression-unimpaired batch-image encryption combining vector quantization and index compression. Inf. Sci. 180(9), 1690–1701 (2010)

    Article  Google Scholar 

  15. Jamal, S.S., Shah, T., Hussain, I.: An efficient scheme for digital watermarking using chaotic map. Nonlinear Dyn. 73, 1469–1474 (2013)

    Article  MathSciNet  Google Scholar 

  16. Hussain, I., Shah, T., Gondal, M.A., Mahmood, H.: An efficient approach for the construction of LFT S-boxes using chaotic logistic map. Nonlinear Dyn. 71, 133–140 (2013)

    Article  MathSciNet  Google Scholar 

  17. Hussain, I., Shah, T., Gondal, M.A., Mahmood, H.: Efficient method for designing chaotic S-boxes based on generalized Baker’s map and TDERC chaotic sequence. Nonlinear Dyn. 74, 271–275 (2013)

    Article  MathSciNet  Google Scholar 

  18. Li, X., Li, C., Lee, I.K.: Chaotic image encryption using pseudo-random masks and pixel mapping. Signal Process. 125, 48–63 (2016)

    Article  Google Scholar 

  19. Rhouma, R., Belghith, S.: Cryptanalysis of a new image encryption algorithm based on hyper-chaos. Phys. Lett. A 372(38), 5973–5978 (2008)

    Article  MATH  Google Scholar 

  20. Arroyo, D., Diaz, J., Rodriguez, F.B.: Cryptanalysis of a one round chaos-based substitution-permutation network. Signal Process. 93(5), 1358–1364 (2013)

    Article  Google Scholar 

  21. Zhou, Y., Bao, L., Chen, C.L.P.: A new 1D chaotic system for image encryption. Signal Process. 97, 172–182 (2014)

    Article  Google Scholar 

  22. Hua, Z., Zhou, Y., Pun, C.M., Chen, C.L.P.: 2D Sine logistic modulation map for image encryption. Inf. Sci. 297, 80–94 (2015)

    Article  Google Scholar 

  23. Wang, Y., Xie, Q., Wu, Y., Du, B.: A software for S-box performance analysis and test. In: International Conference on Electronic Commerce and Business Intelligence, pp. 125–128 (2009)

  24. Hussain, I., Shah, T.: Literature survey on nonlinear components and chaotic nonlinear components of block ciphers. Nonlinear Dyn. 74(4), 869–904 (2013)

    Article  MathSciNet  MATH  Google Scholar 

  25. Hussain, I., Shah, T., Mahmood, H., Gondal, M.A., Bhatti, U.Y.: Some analysis of S-box based on residue of prime number. Proc. Pak. Acad. Sci. 48(2), 111–115 (2011)

    MathSciNet  Google Scholar 

  26. Yi, X., Cheng, S.X., You, X.H., Lam, K.Y.: Method for obtaining cryptographically strong 8 \(\times \) 8 S-boxes. In: IEEE Global Telecommunications Conference, vol. 2, pp. 689–693 (1997)

  27. Daemen, J., Rijmen, V.: The Design of Rijndael-AES: The Advanced Encryption Standard. Springer, Berlin (2002)

    Book  MATH  Google Scholar 

  28. Li, C.: Cracking a hierarchical chaotic image encryption algorithm based on permutation. Signal Process. 118, 203–210 (2016)

    Article  Google Scholar 

  29. Zhang, Y., Li, C., Li, Q., Zhang, D., Shu, S.: Breaking a chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn. 69, 1091–1096 (2012)

    Article  MathSciNet  MATH  Google Scholar 

  30. Li, C., Zhang, L.Y., Ou, R., Wong, K.W., Shu, S.: Breaking a novel colour image encryption algorithm based on chaos. Nonlinear Dyn. 70, 2383–2388 (2012)

    Article  MathSciNet  Google Scholar 

  31. Wang, X., Liu, L., Zhang, Y.: A novel chaotic block image encryption algorithm based on dynamic random growth technique. Opt. Lasers Eng. 66, 10–18 (2015)

    Article  Google Scholar 

  32. Belazi, A., Khan, M., El-Latif, A.A.A., Belghith, S.: Efficient cryptosystem approaches: S-boxes and permutation-substitution-based encryption. Nonlinear Dyn. 88, 337–362 (2017)

    Article  Google Scholar 

  33. Zhang, L.Y., Hu, X., Liu, Y., Wong, K.W.: A chaotic image encryption scheme owning temp-value feedback. Commun. Nonlinear Sci. Numer. Simul. 19(10), 3653–3659 (2014)

    Article  MathSciNet  Google Scholar 

  34. Khan, M., Shah, T., Batool, S.I.: An efficient chaotic image encryption scheme. Neural Comput. Appl. 26, 1137–1148 (2015)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Atta Ullah.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ullah, A., Jamal, S.S. & Shah, T. A novel scheme for image encryption using substitution box and chaotic system. Nonlinear Dyn 91, 359–370 (2018). https://doi.org/10.1007/s11071-017-3874-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11071-017-3874-6

Keywords

Navigation