Abstract
Increased demand of multimedia data over heterogeneous networks has led to the requirement for increased compression and suitable security. Both of these demands require heavy computation, and are contradictory to each other, as encryption may severely affect the compression efficiency. On the other hand, handheld devices have limited energy and computational resources, making compression friendly encryption a challenging issue. One of the solutions is to encrypt a subset of data based on perceptual importance. But, that too may not be compression efficient, format compliant and secure. To address the security issue in such applications the substitution box (S-box), which is one of the most important and the only non-linear operation of the block ciphers is redesigned using chaotic equations. These equations have the characteristics that easily meet the requirements of the block ciphers. In this research work, the S-box based on the chaotic equation was designed and tested for security strength and then used for selective encryption of the multimedia (image) data. To increase the security and generate a key dependant S-box, Mackey Glass equation is used due to its inherent properties like sensitivity, pseudo random characteristics, non-uniform behaviour, ergodicity, and high confusion and diffusion. The security of the proposed S-box was tested in terms of non-linearity, Bit Independence and Strict Avalanche Criteria etc. This S-box is then used to selectively encrypt a subset of image data during the process of compression, giving an encryption-compression strategy. The subset of image data was selected such that the statistical and structural dependencies were not violated due to encryption. This resulted in compression efficient and format friendly encryption. In this regard the quantization table is selected for encryption along with a subset of bits that have already encoded and their statistical dependencies are exploited for compression. This approach not only reduced the computational burden due to the selective nature of encryption but also kept the security at the required level due to introduction of key dependent S-Box. The results of encrypted images were compared with that of the AES in terms of compression ratio, correlation and Peak Signal to Noise Ratio (PSNR), giving better results for the proposed algorithm.
Similar content being viewed by others
References
Abdmouleh MK, Khalfallah A, Bouhlel MS (2017) A novel selective encryption scheme for medical images transmission based-on jpeg compression algorithm. Procedia Comput Sci 11(2):369–376. Knowledge-Based and Intelligent Information and Engineering Systems: Proceedings of the 21st International Conference, KES-20176-8 September 2017, Marseille, France. http://www.sciencedirect.com/science/article/pii/S1877050917313650
Abomhara M, Zakaria O, Khalifa OO, Zaidan A, Zaidan B (2010) Enhancing selective encryption for h. 264/avcusing advanced encryption standard. Int J Comput Electric Eng 2(2):223
Abomhara M, Zakaria O, Khalifa OO, Zaidan AA, Zaidan BB (2010) Enhancing selective encryption for h. 264 / avc using advanced encryption standard, vol 2, pp 1793–8201
Adams C, Tavares S (1990) Good S-boxes are easy to find. In: Brassard G (ed) Advances in cryptology — CRYPTO’ 89 proceedings. Springer, New York, pp 612–615
Ahmad M, AlSharari H (2016) Rotation-k affine-power-affine-like multiple substitution-boxes for secure communication
Ahmad M, Mittal N, Garg P, Khan MM (2016) Efficient cryptographic substitution box design using travelling salesman problem and chaos. Recent Trends in Engineering and Material Sciences, vol 8, pp 465–468. http://www.sciencedirect.com/science/article/pii/S2213020916301318
Ahmad M, Mittal N, Garg P, Mahtab M (2016) Efficient cryptographic substitution box design using travelling salesman problem and chaos. Perspect Sci 8:07
Altaleb A, Saeed MS, Hussain I, Aslam M (2017) An algorithm for the construction of substitution box for block ciphers based on projective general linear group, vol 7
Asghar MN, Ghanbari M, Fleury M, Reed MJ (2014) Confidentiality of a selectively encrypted h.264 coded video bit-stream. J Vis Commun Image Represent 25(2):487–498. http://www.sciencedirect.com/science/article/pii/S1047320313002290
Asghar M, Ghanbari M, Fleury M, Reed M (2014) Sufficient encryption based on entropy coding syntax elements of h.264/svc. Multimed Tools Appl 74:07
Ashtiyani M, Birgani PM, Madahi SSK (2012) Speech signal encryption using chaotic symmetric cryptography. J Basic Appl Sci Res 1668–1674
Asim M, Jeoti V (2008) Jeoti, v.: Efficient and simple method for designing chaotic s-boxes. ETRI J 30(1):170–172
Atkinson KE, Han W, Stewart D (2009) Neumerical solutions of ordinary differential equations. Wiley, New York
Berezansky L, Braverman E (2006) Mackey-glass equation with variable coefficients. Comput Math Appl 51(1):1–16. http://www.sciencedirect.com/science/article/pii/S0898122105004414
Biham S (1993) Differential cryptanalysis of the full16-round des. J Cryptol Springer New York 4:79–88. https://link.springer.com/article/10.1007/BF00630563
Chen G, Chen Y, Liao X (2007) An extended method for obtaining s-boxes based on three-dimensional chaotic baker maps. Chaos Solitons Fract 31 (3):571–579. http://www.sciencedirect.com/science/article/pii/S0960077905009604
Chen G, Chen Y, Liao X (2007) An extended method for obtaining S-boxes based on three-dimensional chaotic Baker maps. Chaos Solitons Fract 31:571–579
Daemen J, Rijmen V (1998) Aes proposal: Rijndael
Dawson M, Tavares S (1991) An expanded set of design criteria for substitution boxes and their use in strengthening des-like cryptosystems. In: [1991] IEEE pacific rim conference on communications, computers and signal processing conference proceedings, vol 1, pp 191–195
Dawson M, Tavares S (1995) An expanded set of s-box design criteria based on information theory and its relation to differential-like attacks. 547:352–367
Detombe J, Tavares S (1993) Constructing large cryptographically strong s-boxes. In: Seberry J., Zheng Y. (eds) Advances in cryptology — AUSCRYPT ’92. Springer, Berlin, pp 165–181
Garg S, Upadhyay D (2013) S-box design approaches: Critical analysis and future directions. Int J Adv Res Comput Sci Electron Eng 2(4):426–430
Glass L, Mackey M (2010) Mackey-Glass equation. Scholarpedia 5(3):6908. revision #186443
Heys H, Tavares S (1994) The design of substitution-permutation networks resistant to differential and linear cryptanalysis. 148–155
Hristina M, Danilo G (2011) A new approach into constructing s-box for lightweight block ciphers. In: 8th conference on informatics and information technology with international participation (CIIT 2011), Bitola, pp 14–18
Hussain I, Shah T, Gondal MA, Khan WA (2011) Construction of cryptographically strong 8x8 s-boxes. World Appl Sci J
Hussain I, Shah T, Mahmood H, Gondal MA (2013) A projective general linear group based algorithm for the construction of substitution box for block ciphers. Neural Comput Appl 22(6):1085–1093. https://doi.org/10.1007/s00521-012-0870-0
Igorevich RR, Yong H, Min D, Choi E (2010) A study on multimedia security systems in video encryption. In: INC2010: 6th international conference on networked computing, pp 1–5
Ivanov G, Nikolov N, Nikova S (2016) Cryptographically strong s-boxes generated by modified immune algorithm. In: Pasalic E, Knudsen LR (eds) Cryptography and information security in the Balkans. Springer International Publishing, Cham, pp 31–42
Jacob G, Murugan A, Viola I (2015) Towards the generation of a dynamic key-dependent s-box to enhance security. Cryptology ePrint archive, 2015
Jakimoski G, Kocarev L, Kocarev L (2001) Chaos and cryptography:, Block encryption ciphers based on chaotic maps. IEEE Trans Circ Syst I 48:163–169. Circuits and Systems I: Fundamental Theory and Applications, IEEE Transactions on, vol. 48, pp. 163–169
Jakobovic D, Picek S, Martins MSR, Wagner M (2019) A characterisation of s-box fitness landscapes in cryptography. arXiv:1902.04724
Jang W, Lee S-Y (2020) Partial image encryption using format-preserving encryption in image processing systems for internet of things environment. Int J Distrib Sens Netw 16(3):1550147720914779. https://doi.org/10.1177/1550147720914779
Jiang J, Liu Y, Su Z, Zhang G, Xing S (2010) An improved selective encryption for h.264 video based on intra prediction mode scrambling. J Multimed 5(5):464–472
Kazlauskas K, Smaliukas R, Vaicekauskas G (2016) A novel method to design s-boxes based on key-dependent permutation schemes and its quality analysis. Int J Adv Comput Sci Appl 7:04
Kazmi S, Ikram N (2009) Random walk algorithm based design technique for s-box. Int J Cryptol Res 1:65–72
Kobayashi H, Kiya H (2018) Bitstream-based jpeg image encryption with file-size preserving. In: 2018 IEEE 7th Global Conference on Consumer Electronics (GCCE), pp 384–387
Kohli R, Sharma D, Baliyan MK (2012) S-box design analysis and parameter variation in aes algorithm. Int J Comput Appl 2:60
Kreyszig E (2011) Advanced engineering mathematics. Wiley, New York
Kumar A (2019) Design of secure image fusion technique using cloud for privacy-preserving and copyright protection. Int J Cloud Appl Comput (IJCAC) 9(3):22–36
Lanlege DI, Kehinde R, Sobanke DA, Abdulganiyu A, Garba UM (2018) Comparison of euler and range-kutta methods in solving ordinary differ ential equations of order two and four. Leonardo J Sci 32:10–37
Laskari EC, Meletiou GC, Vrahatis MN (2006). In: 2006 international conference on computational intelligence and security, vol 2, pp 1299–1302
Lei BY, Lo KT, Lei H (2010) A new h.264 video encryption scheme based on chaotic cipher, in. In: 2010 International Conference on Communications, Circuits and Systems (ICCCAS), pp 373–377
Lei BY, Lo KT, Lei H (2010) A new h.264 video encryption scheme based on chaotic cipher. In: 2010 International Conference on Communications, Circuits and Systems (ICCCAS), pp 373–377
Li Y, Ge G (2019) Cryptographic and parallel hash function based on cross coupled map lattices suitable for multimedia communication security. Multimed Tools Appl 78(13):17973–17994
Li Y, Ge G, Xia D (2016) Chaotic hash function based on the dynamic s-box with variable parameters. Nonlinear Dyna 84(4):2387–2402
Li Y, Li X, Liu X (2017) A fast and efficient hash function based on generalized chaotic mapping with variable parameters. Neural Comput Appl 28(6):1405–1415
Li Y, Xiao D, Deng S, Zhou G (2013) Improvement and performance analysis of a novel hash function based on chaotic neural network. Neural Comput Appl 22(2):391–402
Li Z, Zhao M, Jiang H, Xu Q (2019) Keyword guessing on multi-user searchable encryption. Int J High Perform Comput Netw 14(1):60–68
Maram B, Gnanasekar J (2016) Evaluation of key dependent s-box based data security algorithm using hamming distance and balanced output. TEM J 5:67–75
Meyer J, Gadegast F (1995) Security mechanisms for multimedia data with the example mpeg-1 video
Özkaynak F, Özer AB (2010) A method for designing strong s-boxes based on chaotic lorenz system. Phys Lett A 374:3733–3738. http://www.sciencedirect.com/science/article/pii/S0375960110008443
Peng J, Jin S, Liu Y, Yang Z, You M, Pei Y (2008) A novel scheme for image encryption based on piecewise linear chaotic map. 1012–1016
Peng J, Jin S, Liu Y, Yang Z, You M, Pei Y (2008) A novel scheme for image encryption based on piecewise linear chaotic map. In: 2008 IEEE conference on cybernetics and intelligent systems, pp 1012–1016
Peng J, Zhang D, Liao X (2011) A method for designing dynamical s-boxes based on hyperchaotic lorenz system. 304–309
Peng J, Zhang D, Liao X (2011) A method for designing dynamical s-boxes based on hyperchaotic lorenz system. In: IEEE 10th International Conference on Cognitive Informatics and Cognitive Computing (ICCI-CC’11), pp 304–309
Pérez C (2015) A new algorithm to construct s-boxes with high diffusion. Int J Soft Comput Math Control 4
Perrin L (2019) Partitions in the s-box of streebog and kuznyechik. In: IACR transactions on symmetric cryptology, vol 2019, pp 302–329. https://tosc.iacr.org/index.php/ToSC/article/view/7405
Philip M, Das A (2011) Survey: Image encryption using chaotic cryptography schemes. In: IJCA special issue on computational science - new dimensions and perspectives. full text available, pp 1–4
Polla G (2013) Comparing accuracy of differential equation results between runge-kutta fehlberg methods and adams-moulton methods. Appl Math Sci 7:5115–5127
Premkamal PK, Pasupuleti SK, Alphonse P (2020) Efficient escrow-free cp-abe with constant size ciphertext and secret key for big data storage in cloud. Int J Cloud Appl Comput (IJCAC) 10(1):28–45
Qiao L, Nahrstedt K (1997) A new algorithm for mpeg video encryption. In: Proceedings of the first international conference on imaging science, systems, and technology (CISST’97, pp 21–29
Qiao L, Nahrstedt K (2001) A new algorithm for mpeg video encryption
Rakhimov R, Yong H, Min D, Choi E (2010) A study on multimedia security systems in video encryption. 1–5
Ramamoorthy V, Silaghi MC, Matsui T, Hirayama K, Yokoo M (2011) The design of cryptographic s-boxes using csps. In: Lee J. (ed) Principles and practice of constraint programming – CP 2011. Springer, Berlin, pp 54–68
Sakalli M, Aslan B, Buluş E, Mesut A, Büyüksaraçoglu F, Karaahmetoğlu O (2010) On the algebraic expression of the aes s-box like s-boxes. 87:213–227
Saleh M, Tahir N, Hashim H (2016) Moving objects encryption of high efficiency video coding (hevc) using aes algorithm. 8:31–36
Schneier B, Kelsey J, Whiting D, Wagner D, Hall C, Ferguson N (1999) New results on the twofish encryption algorithm. In: Rome, Italy: Second AES candidate conference, April 1999
Shahid Z, Chaumont M, Puech W (2011) Fast protection of h.264/avc by selective encryption of cavlc and cabac for i and p frames. IEEE Trans Circ Syst Vid Technol 21:565–576
Shahid Z, Chaumont M, Puech W (2011) Fast protection of h.264/avc by selective encryption of cavlc and cabac for i and p frames. IEEE Trans Circ Syst Vid Technol 21(5):565–576
Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28(4):656–715
Sharma M, Kowar MK (2010) Image encryption techniques using chaotic schemes: A review. Int J Eng Sci Technol 2(6):2359–2363
Shi C, Bhargava B (1998) A fast mpeg video encryption algorithm. In: Proceedings of the Sixth ACM international conference on multimedia, ser. MULTIMEDIA ’98. ACM, New York, pp 81–88. https://doi.org/10.1145/290747.290758
Shi C, Bhargava B (1998) A fast mpeg video encryption algorithm. In: ACM multimedia
Shi C, Bhargava B (1998) An efficient mpeg video encryption algorithm. In: Proceedings seventeenth IEEE symposium on reliable distributed systems (Cat. No.98CB36281), pp 381–386
Shi C, Bhargava B (1998) An efficient mpeg video encryption algorithm. In: Proceedings seventeenth IEEE symposium on reliable distributed systems (Cat. No.98CB36281), pp 381–386
Shu-Jiang X, Ying-Long W, Ji-Zhi W, Min T (2008) A novel image encryption scheme based on chaotic maps
Sohn H, AnzaKu ET, De Neve W, Ro YM, Plataniotis KN (2009) Privacy protection in video surveillance systems using scalable video coding. In: 2009 Sixth IEEE international conference on advanced video and signal based surveillance, pp 424–429
Sohn H, AnzaKu ET, Neve WD, Ro YM, Plataniotis KN (2009) Privacy protection in video surveillance systems using scalable video coding. In: 2009 Sixth IEEE international conference on advanced video and signal based surveillance, pp 424–429
Tokita T, Sorimachi T, Matsui M (1994) Linear cryptanalysis of loki and s2des. In: Advances in Cryptology - ASIACRYPT ’94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28 - December 1, 1994, Proceedings, ser. Lecture Notes in Computer Science, vol 917. Springer, pp 293–303
Spanos GA, Maples TB (1996) Security for real-time mpeg compressed video in distributed multimedia applications. In: Conference proceedings of the 1996. IEEE fifteenth annual international phoenix conference on computers and communications, pp 72–78
Spanos GA, Maples TB (1996) Security for real-time mpeg compressed video in distributed multimedia applications. In: Conference Proceedings of the 1996 IEEE fifteenth annual international phoenix conference on computers and communications, pp 72–78
Stallings W (2002) The advanced encryption standard. Cryptologia 26(3):165–188. https://doi.org/10.1080/0161-110291890876
Tang G, Liao X (2005) A method for designing dynamical s-boxes based on discretized chaotic map. Chaos Solitons Fractals 23:1901–1909
Tang G, Liao X, Yong C (2005) A novel method for designing s-boxes based on chaotic maps. Chaos, Solitons Fractals 11. https://dl.acm.org/citation.cfm?id=1857623
Thomas N, Lefol D, Bull D, Redmill D (2007) A novel secure h.264 transcoder using selective encryption. In: Proceedings / ICIP, vol 4, pp IV–85
Thomas NM, Lefol D, Bull DR, Redmill D (2007) A novel secure h.264 transcoder using selective encryption. In: IEEE international conference on image processing, vol 4, pp IV–85–IV–88
Wang Y, Wong K-W, Li C, Li Y (2012) A novel method to design s-box based on chaotic map and genetic algorithm. Phys Lett A 376:827–833
Wang Y, Wong K, Liao X, Chen G (2011) A new chaos-based fast image encryption algorithm. Appl Soft Comput 11(1):514–522. https://dl.acm.org/citation.cfm?id=1857623
Wang Y, Wong K-W, Liao X, Xiang T (2009) A block cipher with dynamic s-boxes based on tent map. Commun Nonlinear Sci Numer Simul 14 (7):3089–3099. http://www.sciencedirect.com/science/article/pii/S1007570408004218
Wang Y, Wong K-W, Liao X, Xiang T, Chen G (2009) A chaos-based image encryption algorithm with variable control parameters. Chaos Solitons Fract 41(4):1773–1783. http://www.sciencedirect.com/science/article/pii/S0960077908003263
Yu Z, Gao C-Z, Jing Z, Gupta BB, Cai Q (2018) A practical public key encryption scheme based on learning parity with noise. IEEE Access 6:31918–31923
Yu C, Li J, Li X, Ren X, Gupta BB (2018) Four-image encryption scheme based on quaternion fresnel transform, chaos and computer generated hologram. Multimed Tools Appl 77(4):4585–4608
Yu C, Li X, Xu S, Li J (2020) Computer generated hologram-based image cryptosystem with multiple chaotic systems. Wirel Netw 1–15
Zahid AH, Arshad MJ (2019) An innovative design of substitution-boxes using cubic polynomial mapping. Symmetry 11:437
Zahid AH, Arshad MJ, Ahmad M (2019) A novel construction of efficient substitution-boxes using cubic fractional transformation. Entropy 21:245
Zhang Y, Zhai Z, Liu W, Nie X, Cao S, Dai W (2009) Digital image encryption algorithm based on chaos and improved des. In: 2009 IEEE international conference on systems, man and cybernetics, pp 474–479
Zhao M, Tong X (2010) A multiple chaotic encryption scheme for image. In: 2010 6th international conference on Wireless Communications Networking and Mobile Computing (WiCOM), pp 1–4
Zheng Q, Wang X, Khan MK, Zhang W, Gupta BB, Guo W (2017) A lightweight authenticated encryption scheme based on chaotic scml for railway cloud service. IEEE Access 6:711–722
Zhu C (2012) A novel image encryption scheme based on improved hyperchaotic sequences. Opt Commun 285(1):29–37. http://www.sciencedirect.com/science/article/pii/S0030401811009540
Zou Y, Huang T, Gao W, Huo L (2006) H.264 video encryption scheme adaptive to drm. IEEE Trans Consum Electron 52(4):1289–1297
Zou Y, Huang T, Gao W, Huo L (2006) H.264 video encryption scheme adaptive to drm. IEEE Trans Consum Electron 52:1289–1297
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Khan, N.A., Altaf, M. & Khan, F.A. Selective encryption of JPEG images with chaotic based novel S-box. Multimed Tools Appl 80, 9639–9656 (2021). https://doi.org/10.1007/s11042-020-10110-5
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-020-10110-5