Skip to main content
Log in

Bit-level image encryption algorithm based on random-time S-Box substitution

  • Regular Article
  • Published:
The European Physical Journal Special Topics Aims and scope Submit manuscript

Abstract

To solve the shortcomings of traditional cryptography such as 3DES, AES and SM4 in encrypting multimedia information, we proposed a bit-level image encryption algorithm based on chaos and S-Box. First, we constructed a 3D discrete memristor-based chaotic map (3D-MCM), which is hyperchaotic, and has ergodicity and better randomness in a larger parameter interval, then based on it, we constructed three S-Boxes with larger key space and without weakness. Furthermore, we applied the 3D-MCM and S-Boxes to design an encryption algorithm, whose novelty is that each half-pixel is substituted with a half-pixel substitution box (HPS-Box) before S-Box substitution with random times. Experimental and security analysis results demonstrated the effectiveness of the proposed 3D-MCM and S-Box in image encryption scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

References

  1. U. Erkan, A. Toktas, F. Toktas, F. Alenezi, 2D eπ-map for image encryption[J]. Inf. Sci. 589, 770–789 (2022)

    Article  Google Scholar 

  2. M. Kaur, D. Singh, V. Kumar, Improved seven-dimensional (i7D) hyperchaotic map-based image encryption technique[J]. Soft. Comput. 26(6), 2689–2698 (2022)

    Article  Google Scholar 

  3. X. Gao, Image encryption algorithm based on 2D hyperchaotic map[J]. Opt. Laser Technol. 142(4), 107252 (2021)

    Article  Google Scholar 

  4. C. Cao, K. Sun, W. Liu, A novel bit-level image encryption algorithm based on 2D-LICM hyperchaotic map[J]. Signal Process. 143, 122–133 (2017)

    Article  Google Scholar 

  5. C. Li, Y. Yang, X. Yang et al., A tristable locally active memristor and its application in Hopfield neural network[J]. Nonlinear Dyn. 108(2), 1697–1717 (2022)

    Article  Google Scholar 

  6. G. Dou, M. Dou, R. Liu et al., Artificial synaptic behavior of the SBT-memristor[J]. Chin. Phys. B 30(7), 78401 (2021)

    Article  Google Scholar 

  7. C. Li, H. Li, W. Xie et al., A S-type bistable locally active memristor model and its analog implementation in an oscillator circuit[J]. Nonlinear Dyn. 106(1), 1041–1058 (2021)

    Article  Google Scholar 

  8. M. Guo, Y. Zhu, R. Liu et al., An associative memory circuit based on physical memristors[J]. Neurocomputing 472, 12–23 (2022)

    Article  Google Scholar 

  9. Y. Peng, S. He, K. Sun, Chaos in the discrete memristor-based system with fractional-order difference[J]. Res. Phys. 24, 104106 (2021)

    Google Scholar 

  10. C. Qin, K. Sun, S. He, Characteristic analysis of fractional-order memristor-based hypogenetic Jerk system and its DSP implementation[J]. Electronics 10(7), 841 (2021)

    Article  Google Scholar 

  11. C. Li, Z. Li, W. Feng et al., Dynamical behavior and image encryption application of a memristor-based circuit system[J]. AEÜ Int. J. Electron. Commun. 110, 152861 (2019)

    Article  Google Scholar 

  12. M. Ma, Y. Yang, Z. Qiu et al., A locally active discrete memristor model and its application in a hyperchaotic map[J]. Nonlinear Dyn. 107, 2935–2949 (2022)

    Article  Google Scholar 

  13. Y. Peng, S. He, K. Sun, A higher dimensional chaotic map with discrete memristor[J]. AEÜ Int. J. Electron. Commun. 129, 153539 (2020)

    Article  Google Scholar 

  14. Y. Lu, K. Yu, X. Lü, Image encryption with one-time password mechanism and pseudo-features[J]. Multimedia Tools Appl. 80, 15041–15055 (2021)

    Article  Google Scholar 

  15. C. Lei, C. Li, C. Li, Security measurement of a medical communication scheme based on chaos and DNA coding[J]. J. Vis. Commun. Image Represent. 83, 103424 (2022)

    Article  Google Scholar 

  16. W. Hu, R. Zhou, S. Jiang, G. Luo, Quantum image encryption algorithm based on arnold scrambling and wavelet transforms[J]. Quant. Inf. Process. 19(3), 1–29 (2020)

    Article  ADS  MathSciNet  Google Scholar 

  17. X. Gao, J. Mou et al., An effective multiple-image encryption algorithm based on 3D cube and hyperchaotic map[J]. J. King Saud Univ. Comput. Inf. Sci. 34, 1535–1551 (2022)

    Google Scholar 

  18. X. Wang, S. Gao, Image encryption algorithm based on the matrix semi-tensor product with a compound secret key produced by a boolean network[J]. Inf. Sci. 539, 195–214 (2020)

    Article  MathSciNet  MATH  Google Scholar 

  19. Z. Huang, N. Zhou, Image encryption scheme based on discrete cosine Stockwell transform and DNA-level modulus diffusion[J]. Opt. Laser Technol. 149, 107879 (2022)

    Article  Google Scholar 

  20. Y. Yang, L. Wang, S. Duan et al., Dynamical analysis and image encryption application of a novel memristive hyperchaotic system[J]. Opt. Laser Technol. 133, 106553 (2021)

    Article  Google Scholar 

  21. Y. Tian, Z. Lu, Chaotic S-Box: six-dimensional fractional Lorenz-Duffing chaotic system and O-shaped path scrambling[J]. Nonlinear Dyn. 94, 2115–2126 (2018)

    Article  Google Scholar 

  22. H. Liu, J. Liu, C. Ma, Constructing dynamic strong S-Box using 3D chaotic map and application to image encryption[J]. Multimedia Tools Appl. (2022). https://doi.org/10.1007/s11042-022-12069-x

    Article  Google Scholar 

  23. H. Liu, A. Kadir, C. Xu, Cryptanalysis and constructing S-Box based on chaotic map and backtracking[J]. Appl. Math. Comput. 376, 125153–125163 (2020)

    MathSciNet  MATH  Google Scholar 

  24. Y. Si, H. Liu, Y. Chen, Constructing keyed strong S-Box using an enhanced quadratic map[J]. Int. J. Bifurc. Chaos 31(10), 2150146 (2021)

    Article  MathSciNet  MATH  Google Scholar 

  25. Y. Peng, K. Sun, S. He, A discrete memristor model and its application in Hénon map[J]. Chaos Solitons Fract. 137, 109873 (2020)

    Article  MATH  Google Scholar 

  26. H. Wen, S. Yu, J. Lü, Encryption algorithm based on Hadoop and non-degenerate high-dimensional hyperchaotic system[J]. Acta Phys. Sin. 66(23), 230503 (2017). ((in Chinese))

    Article  Google Scholar 

  27. R. Paulo, M. Baptista, S. Isabel, Density of first Poincaré returns, periodic orbits, and Kolmogorov-Sinai entropy[J]. Commun. Nonlinear Sci. Numer. Simul. 16(2), 863–875 (2011)

    Article  ADS  MathSciNet  MATH  Google Scholar 

  28. Z. Hua, Y. Zhou, H. Huang, Cosine-transform-based chaotic system for image encryption[J]. Inf. Sci. 480, 403–419 (2019)

    Article  Google Scholar 

  29. Z. Hua, Y. Zhou, Dynamic parameter-control chaotic system[J]. IEEE Trans. Cybern. 46(12), 3330–3341 (2015)

    Article  Google Scholar 

  30. B.D. Mccullough, A review of TESTU01[J]. J. Appl. Economet. 21(5), 677–682 (2006)

    Article  Google Scholar 

  31. H. Liu, Y. Zhang, A. Kadir et al., Image encryption using complex hyper chaotic system by injecting impulse into parameters[J]. Appl. Math. Comput. 360, 83–93 (2019)

    MathSciNet  MATH  Google Scholar 

  32. K. Hosny, S. Kamal, M. Darwish, A color image encryption technique using block scrambling and chaos[J]. Multimedia Tools Appl. 81, 505–525 (2021)

    Article  Google Scholar 

  33. X. Wang, J. Yang, Spatiotemporal chaos in multiple coupled mapping lattices with multi-dynamic coupling coefficient and its application in color image encryption[J]. Chaos Solitons Fract. 147, 110970 (2021)

    Article  MathSciNet  Google Scholar 

  34. S. Batool, H. Waseem, A novel image encryption scheme based on Arnold scrambling and Lucas series[J]. Multimedia Tools Appl. 78(19), 27611–27637 (2019)

    Article  Google Scholar 

  35. B. Ramacharya, M. Patil, S. Keralkar, Fast partial image encryption with fuzzy logic and chaotic mapping[J]. Evol. Intel. (2022). https://doi.org/10.1007/s12065-021-00693-9

    Article  Google Scholar 

  36. H. Liu, A. Kadir et al., Asymmetric color image encryption scheme using 2D discrete-time map[J]. Signal Process. 113, 104–112 (2015)

    Article  Google Scholar 

  37. Y. Wang, L. Chen, K. Yu et al., Image encryption algorithm based on lattice hash function and privacy protection[J]. Multimedia Tools Appl. 81, 18251–18277 (2022). https://doi.org/10.1007/s11042-022-12714-5

    Article  Google Scholar 

  38. J. Khan, S. Kayhan, Chaos and compressive sensing based novel image encryption scheme[J]. J. Inf. Secur. Appl. 58(4), 102711 (2021)

    Google Scholar 

Download references

Acknowledgements

This research is supported by the National Natural Science Foundation of China (no: 61662073), and the Science and Technology Program of University of Jinan (no: XKY2070).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hongjun Liu.

Rights and permissions

Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wang, M., Liu, H. & Zhao, M. Bit-level image encryption algorithm based on random-time S-Box substitution. Eur. Phys. J. Spec. Top. 231, 3225–3237 (2022). https://doi.org/10.1140/epjs/s11734-022-00638-y

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1140/epjs/s11734-022-00638-y

Navigation