Multimedia Tools and Applications

, Volume 78, Issue 22, pp 31467–31484 | Cite as

Cryptosystem techniques based on the improved Chebyshev map: an application in image encryption

  • Attaullah
  • Adnan JaveedEmail author
  • Tariq Shah


The use of nonlinear (chaotic) transformations in cryptography to create confusion during encryption process has become a common practice. In this paper, a pair of proficient cryptosystem techniques are proposed in the form of substitution and permutation constructed on the one-dimensional chaotic map (Improved Chebyshev map). Initially, an efficient and simple method for the construction of S-box using one-dimensional chaotic system is presented. The main advantage of the suggested scheme is to generate strong S-boxes depending upon keys used by chaotic map. Then, an efficient encryption scheme based on substitution box and the chaotic map (substitution and permutation system) is presented. Experimental consequences validate the efficiency of anticipated algorithms. A great potential and higher performance for noticeable dominance regarding cryptographic applications can be seen for the presented cryptosystems in comparison with the algorithms already developed in literature.


Chaotic map Substitution box (S-box) Encryption Substitution 


Compliance with ethical standards

Conflict of interests

The authors declare that they have no conflict of interest.


  1. 1.
    Arroyo D, Diaz J, Rodriguez FB (2013) Cryptanalysis of a one round chaos-based substitution permutation network. Signal Process 93(5):1358–1364Google Scholar
  2. 2.
    Attaullah, Jamal SS, Shah T (2017) A novel construction of substitution box using a combination of chaotic maps with improved chaotic range. Nonlinear Dyn. Google Scholar
  3. 3.
    Attaullah, Jamal SS, Shah T (2017) A novel scheme for image encryption using substitution box and chaotic system. Nonlinear Dyn. MathSciNetGoogle Scholar
  4. 4.
    Behnia S, Akhshani A, Mahmodi H, Akhavan A (2008) A novel algorithm for image encryption based on mixture of chaotic maps. Chaos, Solitons Fractals 35:408–419MathSciNetzbMATHGoogle Scholar
  5. 5.
    Belazi A, Khan, M. Abd El-Latif, A. A. Belghith, S. (2016) Efficient cryptosystem approaches: S-boxes and permutation–substitution-based encryption. Nonlinear Dyn.:1–25Google Scholar
  6. 6.
    Chen G, Chen Y, Liao X (2007) An extended method for obtaining S-boxes based on 3-dimensional chaotic baker maps. Chaos, Solitons Fractals 31(3):571–579MathSciNetzbMATHGoogle Scholar
  7. 7.
    El-Latif A, Li L, Wang N, Niu X (2011) Image encryption scheme of pixel bit based on combination of chaotic systems. In: 2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), p 369–373Google Scholar
  8. 8.
    Feistel H (1973) Cryptography and computer privacy. Sci Am 228:15–23Google Scholar
  9. 9.
    Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurcat Chaos 8(6):1259–1284MathSciNetzbMATHGoogle Scholar
  10. 10.
    Hao B (1993) Starting with parabolas: an introduction to chaotic dynamics. Shanghai Scientific and Technological Education Publishing House, ShanghaiGoogle Scholar
  11. 11.
    Hua Z, Zhou Y, Pun C-M, Philip Chen CL (2015) 2D sine logistic modulation map for image encryption. Inf Sci 297:80–94Google Scholar
  12. 12.
    Hussain I, Shah T, Gondal MA (2012) A novel approach for designing substitution-boxes based on nonlinear chaotic algorithm. Nonlinear Dyn 70(3):1791–1794MathSciNetGoogle Scholar
  13. 13.
    Hussain I, Shah T, Mahmood H, Gondal MA (2012) Construction of S 8 Liu J S-boxes and their applications. Comput Math Appl 64(8):2450–2458MathSciNetzbMATHGoogle Scholar
  14. 14.
    Hussain I, Shah T, Gondal MA, Mahmood H (2013) An efficient approach for the construction of LFT S-boxes using chaotic logistic map. Nonlinear Dyn 71:133–140MathSciNetGoogle Scholar
  15. 15.
    Jakimoski G, Kocarev L (2001) Chaos and cryptography: block encryption ciphers. IEEE Trans Circuits Syst I Fundam Theory Appl 48(2):163–169zbMATHGoogle Scholar
  16. 16.
    Khan M, Shah T (2014) A novel image encryption technique based on Hénon chaotic map and S8 symmetric group. Neural Comput Applic 25(7):1717–1722Google Scholar
  17. 17.
    Khan M, Shah T, Mahmood H, Gondal MA, Hussain I (2012) A novel technique for the construction of strong S-boxes based on chaotic Lorenz systems. Nonlinear Dyn 70(3):2303–2311MathSciNetGoogle Scholar
  18. 18.
    Khan M., Shah T.,·Gondal M.A. An efficient technique for the construction of substitution box with chaotic partial differential equation, Nonlinear Dyn (2013) 73:1795–1801.MathSciNetGoogle Scholar
  19. 19.
    Khan M, Shah T, Mahmood H, Gondal MA (2013) An efficient method for the construction of block cipher with multi chaotic systems. Nonlinear Dyn 71(3):489–492MathSciNetGoogle Scholar
  20. 20.
    Liao X, Lai S, Zhou Q (2010) A novel image encryption algorithm based on self-adaptive wave transmission. Signal Process 90:2714–2722zbMATHGoogle Scholar
  21. 21.
    Liao X, Li K, Yin J (2016) Separable data hiding in encrypted image based on compressive sensing and discrete fourier transform. Multimed Tools Appl. Google Scholar
  22. 22.
    Liao X, Yin J, Guo S, Li X, Kumar A (2017) Medical JPEG image steganography based on preserving inter-block dependencies. Comput Electr Eng. Google Scholar
  23. 23.
    Liu Y, Zhang LY, Wang J, Zhang Y, Wong K-W (2016) Chosen-plaintext attack of an image encryption scheme based on modified permutation-diffusion structure. Nonlinear Dyn 84(4):2241–2250zbMATHGoogle Scholar
  24. 24.
    Norouzi B, Mirzakuchaki S, Seyedzadeh SM, Mosavi MR (2014) A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion. Multimed Tools Appl 71(3):1469–1497Google Scholar
  25. 25.
    Özkaynak F, Özer AB (2010) A method for designing strong S-boxes based on chaotic Lorenz system. Phys Lett A 374(36):3733–3738zbMATHGoogle Scholar
  26. 26.
    Özkaynak F, Yavuz S (2014) Analysis and improvement of a novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system. Nonlinear Dyn. 78(2):1311–1320zbMATHGoogle Scholar
  27. 27.
    Parker AT, Short KM (2001) Reconstructing the keystream from a chaotic encryption scheme. IEEE Trans Circuits Syst I 48(5):104–112MathSciNetzbMATHGoogle Scholar
  28. 28.
    Saberi Kamarposhti M, Mohammad D, Rahim M, Yaghobi M (2014) Using 3-cell chaotic map for image encryption based on biological operations. Nonlinear Dyn 75(3):407–416Google Scholar
  29. 29.
    Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28:656–715MathSciNetzbMATHGoogle Scholar
  30. 30.
    Shi XY, Xiao HuYou XC, Lam KY (2002) A method for obtaining cryptographically strong 8x8 S-boxes. Int Conf Infor Network Appl 2(3):14–20Google Scholar
  31. 31.
    Stoyanov B, Kordov K (2014) Novel Image encryption scheme based on Chebyshev polynomial and duffing map. Sci World J 2014, Article ID 283639, 11. Scholar
  32. 32.
    Stoyanov B, Kordov K (2015) Image encryption using Chebyshev map and rotation equation. Entropy 17(4):2117–2139. MathSciNetGoogle Scholar
  33. 33.
    Tang G, Liao X, Chen Y (2005) A novel method for designing S-boxes based on chaotic maps. Chaos, Solitons Fractals 23(2):413–419zbMATHGoogle Scholar
  34. 34.
    Wang XY, Yang L, Liu R, Kadir A (2010) A chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn 62(3):615–621MathSciNetzbMATHGoogle Scholar
  35. 35.
    Wang X, Teng L, Qin X (2012) A novel colour image encryption algorithm based on chaos. Signal Process 92(4):1101–1108MathSciNetGoogle Scholar
  36. 36.
    Wang X, Liu L, Zhang Y (2015) A novel chaotic block image encryption algorithm based on dynamic random growth technique. Opt Lasers Eng 66:10–18Google Scholar
  37. 37.
    Xu L, Li Z, Li J, Hua W (2016) A novel bit-level image encryption algorithm based on chaotic maps. Opt Lasers Eng 78:17–25Google Scholar
  38. 38.
    Zhang Y, Li C, Li Q, Zhang D, Shu S (2012) Breaking a chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn 69(3):1091–1096MathSciNetzbMATHGoogle Scholar
  39. 39.
    Zhang W, Yu H, Zhao Y, Zhu Z (2016) Image encryption based on three-dimensional bit matrix permutation. Signal Process 118:36–50Google Scholar
  40. 40.
    Zhou CS, Lai CH (1999) Extracting messages masked by chaotic signals of time-delay systems. Phys Rev E 60:320–323Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.Department of MathematicsQuaid-i-Azam UniversityIslamabadPakistan

Personalised recommendations