Skip to main content
Log in

Enhancing security with Aboodh transformation and S-box fusion in image encryption

  • Original Research
  • Published:
International Journal of Information Technology Aims and scope Submit manuscript

Abstract

The aim of this research is to create a novel cryptographic technique by incorporating Aboodh and its inverse transform into the S-Box method. The evaluation outcomes suggest that this method is suitable for secure cryptographic applications and offers insights into the construction of an image cryptosystem based on its complex behavior. Real-life data were analyzed using various statistical and performance criteria after applying the proposed methodology. The results of this investigation enhance the dependability of the cryptosystems.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Algorithm 1
Fig. 1
Algorithm 2
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Özkaynak F, Çelik V, Özer AB (2017) A new s-box construction method based on the fractional-order chaotic chen system. Signal Image Video Process 11:659–664

    Article  Google Scholar 

  2. Jakimoski G, Kocarev L (2001) Chaos and cryptography: block encryption ciphers based on chaotic maps. IEEE Trans Circ Syst I Fundam Theory Appl 48(2):163–169

    MathSciNet  Google Scholar 

  3. Özkaynak F (2019) Construction of robust substitution boxes based on chaotic systems. Neural Comput Appl 31(8):3317–3326

    Article  Google Scholar 

  4. Wang Y, Zhang Z, Zhang LY, Feng J, Gao J, Lei P (2020) A genetic algorithm for constructing bijective substitution boxes with high nonlinearity. Inf Sci 523:152–166

    Article  MathSciNet  Google Scholar 

  5. Yousaf MA, Alolaiyan H, Ahmad M, Dilbar M, Razaq A (2020) Comparison of pre and post-action of a finite abelian group over certain nonlinear schemes. IEEE Access 8:39781–39792

    Article  Google Scholar 

  6. Zhang T, Chen CP, Chen L, Xu X, Hu B (2018) Design of highly nonlinear substitution boxes based on i-ching operators. IEEE Trans Cybern 48(12):3349–3358

    Article  Google Scholar 

  7. Gautam A, Gaba GS, Miglani R, Pasricha R (2015) Application of chaotic functions for construction of strong substitution boxes. Indian J Sci Technol 8(28):1–5

    Article  Google Scholar 

  8. Hussain I, Azam NA, Shah T (2014) Stego optical encryption based on chaotic s-box transformation. Opt Laser Technol 61:50–56

    Article  Google Scholar 

  9. Siddiqui N, Naseer A, Ehatisham-ul-Haq M (2021) A novel scheme of substitution-box design based on modified pascal’s triangle and elliptic curve. Wireless Pers Commun 116(4):3015–3030

    Article  Google Scholar 

  10. Haider MI, Ali A, Shah D, Shah T (2021) Block cipher’s nonlinear component design by elliptic curves: an image encryption application. Multimed Tools Appl 80:4693–4718

    Article  Google Scholar 

  11. Sattar KA, Haider T, Hayat U, Bustamante MD (2023) An efficient and secure cryptographic algorithm using elliptic curves and max-plus algebra-based wavelet transform. Appl Sci 13(14):8385

    Article  Google Scholar 

  12. Francis N, Monoth T (2023) Security enhanced random grid visual cryptography scheme using master share and embedding method. Int J Inf Technol 15(7):3949–3955

    Google Scholar 

  13. Yasmin N, Gupta R (2023) Modified lightweight cryptography scheme and its applications in iot environment. Int J Inf Technol 15(8):4403–4414

    Google Scholar 

  14. Imam R, Anwer F, Nadeem M (2022) An effective and enhanced rsa based public key encryption scheme (xrsa). Int J Inf Technol 14(5):2645–2656

    Google Scholar 

  15. Mbarndouka Taamté J, Folifack Signing VR, Kountchou Noube M, Bertrand B (2022) Saïdou: An efficient environmental monitoring data encryption algorithm based on dna coding and hyperchaotic system. Int J Inf Technol 14(3):1367–1380

    Google Scholar 

  16. Mohan KR, Rasappan S, Kumaravel SK (2022) Secured information sharing using laplace transform and hyperbolic tangent function. In: AIP Conference Proceedings, vol. 2516 . AIP Publishing

  17. Deshmukh M, Rawat AS (2023) Secure key sharing scheme using hamiltonian path. Int J Inf Technol 15(8):4141–4147

    Google Scholar 

  18. Murugesan R, Kumarave SK, Rasappan S, Mohan KR (2023) Role of a aboodh transform and hyperbolic cosine function in secured communication. Southeast Europe J Soft Comput 12(2):39–43

    Google Scholar 

  19. Mohan KR, Nagaram NB, Murugesan R, Rasappan S (2023) A cryptographic technique using conformal mapping. Recent trends in computational intelligence and its application. CRC Press, Boca Raton, pp 519–523

    Chapter  Google Scholar 

  20. Wang X, Feng L, Zhao H (2019) Fast image encryption algorithm based on parallel computing system. Inf Sci 486:340–358

    Article  Google Scholar 

  21. Gan Z-h, Chai X-l, Han D-j, Chen Y-r (2019) A chaotic image encryption algorithm based on 3-d bit-plane permutation. Neural Comput Appl 31:7111–7130

    Article  Google Scholar 

  22. Murillo-Escobar MA, Cruz-Hernández C, Abundiz-Pérez F, López-Gutiérrez RM, Del Campo OA (2015) A rgb image encryption algorithm based on total plain image characteristics and chaos. Signal Process 109:119–131

    Article  Google Scholar 

  23. Kang Y, Huang L, He Y, Xiong X, Cai S, Zhang H (2020) On a symmetric image encryption algorithm based on the peculiarity of plaintext dna coding. Symmetry 12(9):1393

    Article  Google Scholar 

  24. El-Latif AAA, Abd-El-Atty B, Belazi A, Iliyasu AM (2021) Efficient chaos-based substitution-box and its application to image encryption. Electronics 10(12):1392

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Regan Murugesan.

Ethics declarations

Conflict of interest

We declare that we have no Conflict of interest regarding the manuscript. All the figures and tables contained in the manuscript are our original work, and any external figures or images have been included with the necessary permission for republication, which is attached to the manuscript

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Rasappan, S., Murugesan, R., Kumaravel , S.K. et al. Enhancing security with Aboodh transformation and S-box fusion in image encryption. Int. j. inf. tecnol. (2024). https://doi.org/10.1007/s41870-024-01885-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s41870-024-01885-z

Keywords

Navigation