×

Advance image encryption technique utilizing compression, dynamical system and S-boxes. (English) Zbl 1515.94086

Summary: Chaos theory is initially developed in the 1970s and has been utilized in the field of cryptography for the last three decades. In present work, an implementation of image encryption technique using chaotic system, compression and S-boxes is discussed. In this encryption scheme, compression is used to hide the original size of (plain text) image and also reduce the time complexity of the scheme. In addition to this, a particular S-box is selected for the encryption process with the help of an improved range chaotic map. The proposed scheme is discussed in detail, along with its standard security analysis and experimental results. This improved chaotic map and S-boxes provide large key space and high level of security. The size of cipher text generated by this scheme is different from plain text and is easy to implement for practical application of secure transmission of confidential data.

MSC:

94A60 Cryptography
37D45 Strange attractors, chaotic dynamics of systems with hyperbolic behavior
PDFBibTeX XMLCite
Full Text: DOI

References:

[1] Behnia, S.; Akhshani, A.; Mahmodi, H.; Akhavan, A., A novel algorithm for image encryption based on mixture of chaotic maps, Chaos Solitons Fractals, 35, 2, 408-419 (2008) · Zbl 1134.94356
[2] Belazi, A.; Khan, M.; El-Latif, A. A.A.; Belghith, S., Efficient cryptosystem approaches: S-boxes and permutation-substitution-based encryption, Nonlinear Dynam., 87, 1, 337-361 (2017)
[3] Chen, T. H.; Li, K. C., Multi-image encryption by circular random grids, Inform. Sci., 189, 255-265 (2012)
[4] Chen, G.; Mao, Y.; Chui, C. K., A symmetric image encryption scheme based on 3D chaotic cat maps, Chaos Solitons Fractals, 21, 3, 749-761 (2004) · Zbl 1049.94009
[5] El-Latif, A. A.A.; Li, L.; Wang, N.; Han, Q.; Niu, X., A new approach to chaotic image encryption based on quantum chaotic system, exploiting color spaces, Signal Process., 93, 11, 2986-3000 (2013)
[6] Hussain, I.; Shah, T., Literature survey on nonlinear components and chaotic nonlinear components of block ciphers, Nonlinear Dynam., 74, 4, 869-904 (2013) · Zbl 1284.94002
[7] Hussain, I.; Shah, T.; Gondal, M. A.; Mahmood, H., An efficient approach for the construction of LFT S-boxes using chaotic logistic map, Nonlinear Dynam., 71, 1-2, 133-140 (2013)
[8] Jamal, S. S.; Shah, T.; Hussain, I., An efficient scheme for digital watermarking using chaotic map, Nonlinear Dynam., 73, 3, 1469-1474 (2013)
[9] Javeed, A.; Shah, T., Cryptosystem techniques based on the improved Chebyshev map: an application in image encryption, Multimedia Tools Appl., 78, 22, 31467-31484 (2019)
[10] Khan, M.; Shah, T., A construction of novel chaos base nonlinear component of block cipher, Nonlinear Dynam., 76, 1, 377-382 (2014) · Zbl 1319.94072
[11] Khan, M.; Shah, T., An efficient chaotic image encryption scheme, Neural Comput. Appl., 26, 5, 1137-1148 (2015)
[12] Khan, M.; Shah, T.; Mahmood, H.; Gondal, M. A., An efficient method for the construction of block cipher with multi-chaotic systems, Nonlinear Dynam., 71, 3, 489-492 (2013)
[13] Kodituwakku, S. R.; Amarasinghe, U. S., Comparison of lossless data compression algorithms for text data, Indian J. Comput. Sci. Eng., 1, 4, 416-425 (2010)
[14] Liao, X.; Lai, S.; Zhou, Q., A novel image encryption algorithm based on self-adaptive wave transmission, Signal Process., 90, 9, 2714-2722 (2010) · Zbl 1194.94108
[15] Shyu, S. J., Image encryption by multiple random grids, Pattern Recognit., 42, 7, 1582-1596 (2009) · Zbl 1183.68272
[16] Tran, M. T.; Bui, D. K.; Duong, A. D., Gray s-box for advanced encryption standard, (2008 International Conference on Computational Intelligence and Security, Vol. 1 (2008), IEEE), 253-258
[17] Ullah, A.; Jamal, S. S.; Shah, T., A novel scheme for image encryption using substitution box and chaotic system, Nonlinear Dynam., 91, 1, 359-370 (2018)
[18] Volos, C. K.; Kyprianidis, I. M.; Stouboulos, I. N., Image encryption process based on chaotic synchronization phenomena, Signal Process., 93, 5, 1328-1340 (2013)
[19] Wu, Y.; Noonan, J. P.; Agaian, S., NPCR and UACI randomness tests for image encryption, Cyber J.: Multidiscip. J. Sci. Technol. J. Sel. Areas Telecommun. (JSAT), 1, 2, 31-38 (2011)
[20] Zhang, L. Y.; Hu, X.; Liu, Y.; Wong, K. W.; Gan, J., A chaotic image encryption scheme owning temp-value feedback, Commun. Nonlinear Sci. Numer. Simul., 19, 10, 3653-3659 (2014) · Zbl 1470.94100
[21] Zhang, X.; Wang, X., Chaos-based partial encryption of SPIHT coded color images, Signal Process., 93, 9, 2422-2431 (2013)
[22] Zhou, Y.; Bao, L.; Chen, C. P., A new 1D chaotic system for image encryption, Signal Process., 97, 172-182 (2014)
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.