Abstract
For the last 3 decades, the inclusion of chaos for the encryption of multimedia information is considered as a remarkable aspect of nonlinear dynamics. In this article, chaotic system along with substitution box is used for image encryption. Substitution box is constructed by the group action of the projective general linear group over a finite field. On multiple attempts, using the same security key the host image gives a different encrypted image which is the main feature of this scheme. For secure communication, this idea of chaos-based image encryption along with substitution box shows relatively improved results as depicted in simulation and security analysis. The scheme demonstrates resistance against image processing attacks.
Similar content being viewed by others
References
Hussain, I., Shah, T., Gondal, M.A.: A group theoretic approach to construct cryptographically strong substitution boxes. Neural Comput. Appl. 23, 97–104 (2013)
Hussain, I., Shah, T., Mahmood, H.: A projective general linear group based algorithm for the construction of substitution box for block ciphers. Neural Comput. Appl. 22, 1085–1093 (2013)
Shah, T., Qamar, A., Hussain, I.: Substitution box on maximal cyclic subgroup of units of a Galois ring. Z. Naturforschung 68a, 479–482 (2013)
Hussain, I., Shah, T., Gondal, M.A., Mahmood, H.: A novel image encryption algorithm based on chaotic maps and \(\text{ GF }(2^{8})\) exponent transformation. Nonlinear Dyn. 72, 399–406 (2013)
Hussain, I., Shah, T., Gondal, M.A., Mahmood, H.: A novel method for designing nonlinear component for block cipher based on TD-ERCS chaotic sequence. Nonlinear Dyn. 73, 633–637 (2013)
Anees, A., Siddiqui, A.M., Ahmed, J., Hussain, I.: A technique for digital steganography using chaotic maps. Nonlinear Dyn. 75, 807–816 (2014)
Chen, R.J., Horng, S.J.: Novel SCAN-CA-based image security system using SCAN and 2D von Neumann cellular automata. Signal Process. Image Commun. 25(6), 413–426 (2010)
Chen, T.H., Li, K.C.: Multi-image encryption by circular random grids. Inf. Sci. 189, 255–265 (2012)
Zhou, Y., Panetta, K., Agaian, S., Chen, C.L.P.: Image encryption using P-Fibonacci transform and decomposition. Opt. Commun. 285(5), 594–608 (2012)
Zhou, Y., Panetta, K., Agaian, S., Chen, C.L.P.: (n, k, p)-Gray code for image systems. IEEE Trans. Cybern. 43(2), 515–529 (2013)
Li, L., AbdEl-Latif, A.A., Niu, X.M.: Elliptic curve ElGamal based homomorphic image encryption scheme for sharing secret images. Signal Process. 92(4), 1069–1078 (2012)
Ye, Guodong: A block image encryption algorithm based on wave transmission and chaotic systems. Nonlinear Dyn. 75, 417–427 (2014)
Liao, X., Lai, S., Zhou, Q.: A novel image encryption algorithm based on self-adaptive wave transmission. Signal Process. 90, 2714–2722 (2010)
Chen, T.H., Wu, C.S.: Compression-unimpaired batch-image encryption combining vector quantization and index compression. Inf. Sci. 180(9), 1690–1701 (2010)
Jamal, S.S., Shah, T., Hussain, I.: An efficient scheme for digital watermarking using chaotic map. Nonlinear Dyn. 73, 1469–1474 (2013)
Hussain, I., Shah, T., Gondal, M.A., Mahmood, H.: An efficient approach for the construction of LFT S-boxes using chaotic logistic map. Nonlinear Dyn. 71, 133–140 (2013)
Hussain, I., Shah, T., Gondal, M.A., Mahmood, H.: Efficient method for designing chaotic S-boxes based on generalized Baker’s map and TDERC chaotic sequence. Nonlinear Dyn. 74, 271–275 (2013)
Li, X., Li, C., Lee, I.K.: Chaotic image encryption using pseudo-random masks and pixel mapping. Signal Process. 125, 48–63 (2016)
Rhouma, R., Belghith, S.: Cryptanalysis of a new image encryption algorithm based on hyper-chaos. Phys. Lett. A 372(38), 5973–5978 (2008)
Arroyo, D., Diaz, J., Rodriguez, F.B.: Cryptanalysis of a one round chaos-based substitution-permutation network. Signal Process. 93(5), 1358–1364 (2013)
Zhou, Y., Bao, L., Chen, C.L.P.: A new 1D chaotic system for image encryption. Signal Process. 97, 172–182 (2014)
Hua, Z., Zhou, Y., Pun, C.M., Chen, C.L.P.: 2D Sine logistic modulation map for image encryption. Inf. Sci. 297, 80–94 (2015)
Wang, Y., Xie, Q., Wu, Y., Du, B.: A software for S-box performance analysis and test. In: International Conference on Electronic Commerce and Business Intelligence, pp. 125–128 (2009)
Hussain, I., Shah, T.: Literature survey on nonlinear components and chaotic nonlinear components of block ciphers. Nonlinear Dyn. 74(4), 869–904 (2013)
Hussain, I., Shah, T., Mahmood, H., Gondal, M.A., Bhatti, U.Y.: Some analysis of S-box based on residue of prime number. Proc. Pak. Acad. Sci. 48(2), 111–115 (2011)
Yi, X., Cheng, S.X., You, X.H., Lam, K.Y.: Method for obtaining cryptographically strong 8 \(\times \) 8 S-boxes. In: IEEE Global Telecommunications Conference, vol. 2, pp. 689–693 (1997)
Daemen, J., Rijmen, V.: The Design of Rijndael-AES: The Advanced Encryption Standard. Springer, Berlin (2002)
Li, C.: Cracking a hierarchical chaotic image encryption algorithm based on permutation. Signal Process. 118, 203–210 (2016)
Zhang, Y., Li, C., Li, Q., Zhang, D., Shu, S.: Breaking a chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn. 69, 1091–1096 (2012)
Li, C., Zhang, L.Y., Ou, R., Wong, K.W., Shu, S.: Breaking a novel colour image encryption algorithm based on chaos. Nonlinear Dyn. 70, 2383–2388 (2012)
Wang, X., Liu, L., Zhang, Y.: A novel chaotic block image encryption algorithm based on dynamic random growth technique. Opt. Lasers Eng. 66, 10–18 (2015)
Belazi, A., Khan, M., El-Latif, A.A.A., Belghith, S.: Efficient cryptosystem approaches: S-boxes and permutation-substitution-based encryption. Nonlinear Dyn. 88, 337–362 (2017)
Zhang, L.Y., Hu, X., Liu, Y., Wong, K.W.: A chaotic image encryption scheme owning temp-value feedback. Commun. Nonlinear Sci. Numer. Simul. 19(10), 3653–3659 (2014)
Khan, M., Shah, T., Batool, S.I.: An efficient chaotic image encryption scheme. Neural Comput. Appl. 26, 1137–1148 (2015)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Ullah, A., Jamal, S.S. & Shah, T. A novel scheme for image encryption using substitution box and chaotic system. Nonlinear Dyn 91, 359–370 (2018). https://doi.org/10.1007/s11071-017-3874-6
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11071-017-3874-6