Abstract
The aim of this research is to create a novel cryptographic technique by incorporating Aboodh and its inverse transform into the S-Box method. The evaluation outcomes suggest that this method is suitable for secure cryptographic applications and offers insights into the construction of an image cryptosystem based on its complex behavior. Real-life data were analyzed using various statistical and performance criteria after applying the proposed methodology. The results of this investigation enhance the dependability of the cryptosystems.
Similar content being viewed by others
References
Özkaynak F, Çelik V, Özer AB (2017) A new s-box construction method based on the fractional-order chaotic chen system. Signal Image Video Process 11:659–664
Jakimoski G, Kocarev L (2001) Chaos and cryptography: block encryption ciphers based on chaotic maps. IEEE Trans Circ Syst I Fundam Theory Appl 48(2):163–169
Özkaynak F (2019) Construction of robust substitution boxes based on chaotic systems. Neural Comput Appl 31(8):3317–3326
Wang Y, Zhang Z, Zhang LY, Feng J, Gao J, Lei P (2020) A genetic algorithm for constructing bijective substitution boxes with high nonlinearity. Inf Sci 523:152–166
Yousaf MA, Alolaiyan H, Ahmad M, Dilbar M, Razaq A (2020) Comparison of pre and post-action of a finite abelian group over certain nonlinear schemes. IEEE Access 8:39781–39792
Zhang T, Chen CP, Chen L, Xu X, Hu B (2018) Design of highly nonlinear substitution boxes based on i-ching operators. IEEE Trans Cybern 48(12):3349–3358
Gautam A, Gaba GS, Miglani R, Pasricha R (2015) Application of chaotic functions for construction of strong substitution boxes. Indian J Sci Technol 8(28):1–5
Hussain I, Azam NA, Shah T (2014) Stego optical encryption based on chaotic s-box transformation. Opt Laser Technol 61:50–56
Siddiqui N, Naseer A, Ehatisham-ul-Haq M (2021) A novel scheme of substitution-box design based on modified pascal’s triangle and elliptic curve. Wireless Pers Commun 116(4):3015–3030
Haider MI, Ali A, Shah D, Shah T (2021) Block cipher’s nonlinear component design by elliptic curves: an image encryption application. Multimed Tools Appl 80:4693–4718
Sattar KA, Haider T, Hayat U, Bustamante MD (2023) An efficient and secure cryptographic algorithm using elliptic curves and max-plus algebra-based wavelet transform. Appl Sci 13(14):8385
Francis N, Monoth T (2023) Security enhanced random grid visual cryptography scheme using master share and embedding method. Int J Inf Technol 15(7):3949–3955
Yasmin N, Gupta R (2023) Modified lightweight cryptography scheme and its applications in iot environment. Int J Inf Technol 15(8):4403–4414
Imam R, Anwer F, Nadeem M (2022) An effective and enhanced rsa based public key encryption scheme (xrsa). Int J Inf Technol 14(5):2645–2656
Mbarndouka Taamté J, Folifack Signing VR, Kountchou Noube M, Bertrand B (2022) Saïdou: An efficient environmental monitoring data encryption algorithm based on dna coding and hyperchaotic system. Int J Inf Technol 14(3):1367–1380
Mohan KR, Rasappan S, Kumaravel SK (2022) Secured information sharing using laplace transform and hyperbolic tangent function. In: AIP Conference Proceedings, vol. 2516 . AIP Publishing
Deshmukh M, Rawat AS (2023) Secure key sharing scheme using hamiltonian path. Int J Inf Technol 15(8):4141–4147
Murugesan R, Kumarave SK, Rasappan S, Mohan KR (2023) Role of a aboodh transform and hyperbolic cosine function in secured communication. Southeast Europe J Soft Comput 12(2):39–43
Mohan KR, Nagaram NB, Murugesan R, Rasappan S (2023) A cryptographic technique using conformal mapping. Recent trends in computational intelligence and its application. CRC Press, Boca Raton, pp 519–523
Wang X, Feng L, Zhao H (2019) Fast image encryption algorithm based on parallel computing system. Inf Sci 486:340–358
Gan Z-h, Chai X-l, Han D-j, Chen Y-r (2019) A chaotic image encryption algorithm based on 3-d bit-plane permutation. Neural Comput Appl 31:7111–7130
Murillo-Escobar MA, Cruz-Hernández C, Abundiz-Pérez F, López-Gutiérrez RM, Del Campo OA (2015) A rgb image encryption algorithm based on total plain image characteristics and chaos. Signal Process 109:119–131
Kang Y, Huang L, He Y, Xiong X, Cai S, Zhang H (2020) On a symmetric image encryption algorithm based on the peculiarity of plaintext dna coding. Symmetry 12(9):1393
El-Latif AAA, Abd-El-Atty B, Belazi A, Iliyasu AM (2021) Efficient chaos-based substitution-box and its application to image encryption. Electronics 10(12):1392
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
We declare that we have no Conflict of interest regarding the manuscript. All the figures and tables contained in the manuscript are our original work, and any external figures or images have been included with the necessary permission for republication, which is attached to the manuscript
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Rasappan, S., Murugesan, R., Kumaravel , S.K. et al. Enhancing security with Aboodh transformation and S-box fusion in image encryption. Int. j. inf. tecnol. (2024). https://doi.org/10.1007/s41870-024-01885-z
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s41870-024-01885-z