Advertisement

Wireless Personal Communications

, Volume 109, Issue 2, pp 849–867 | Cite as

A Novel Image Encryption Technique Based on Generalized Advanced Encryption Standard Based on Field of Any Characteristic

  • Majid KhanEmail author
  • Noor Munir
Article

Abstract

The privacy of digital contents is one of the most important issue of the digitally advanced world. The transmission of online information is increasing immensely from last one decade. As the technology evolving with the passage of time, the secrecy of digital information is one of the unavoidable problem. The secrecy of information can be achieved through different encryption algorithms. In this article, our aim is to introduce an innovative technique for an image encryption to extend the advanced encryption standard (AES) to the Galois field of any characteristic. With the new improvement, all four steps in basic algorithm with binary characteristic is modified accordingly. We have extended number of possibilities in our proposed substitution boxes which imply, we added more confusion capabilities and generalized the existing concepts. Moreover, we have applied the anticipated scheme to digital image encryption. We have utilized standard statistical to verify the robustness of our suggested technique for encrypted image.

Keywords

Ternary logic Generalization of advanced encryption standard Image encryption 

Notes

Acknowledgements

Dr. Majid Khan is thankful to the Higher Education Commission (HEC) of Pakistan for the financial support under NRPU-vide No. 5944/Federal/NRPU/R&D/HEC/2016. We express our profound sense of gratitude to the Vice Chancellor Dr. Syed Wilayat Hussain, Dean Dr. Iqbal Rasool Memon and Director, Cyber and Information Security Lab (CISL) Dr. Muhammad Amin, Institute of Space Technology, Islamabad Pakistan, for their graciously support and encouragement to make this research possible.

References

  1. 1.
    Lian, S. (2009). Quasi-commutative watermarking and encryption for secure media content distribution. Multimedia Tools and Applications, 43, 91–107.CrossRefGoogle Scholar
  2. 2.
    Announcing the Advanced Encryption Standard (AES). (2000). Federal Information Processing Standards Publication 197 November 26, 2000.Google Scholar
  3. 3.
    Muhaya, F. B. (2009). Modified AES using chaotic key generator for satellite imagery encryption. Emerging Intelligent Computing Technology and Applications, 5754, 1014–1024.CrossRefGoogle Scholar
  4. 4.
    Krishnamurthy, G. N., & Ramaswamy, V. (2008). Making AES stronger: AES with key dependent S-box. International Journal of Computer Science and Network Security, 8(9), 388–398.Google Scholar
  5. 5.
    Kawle, P., Hiwase, A., Bagde, G., Tekam, E., & Kalbande, R. (2014). Modified advanced encryption standard. International Journal of Soft Computing and Engineering, 4, 21–23.Google Scholar
  6. 6.
    Arpasi, J. P. A brief introduction to ternary logic. https://aymara.org/ternary/ternary.pdf?cv=1. Accessed 6 Aug 2018.
  7. 7.
    Khan, M., Shah, T., & Batool, S. I. (2017). A new approach for image encryption and watermarking based on substitution box over the classes of chain rings. Multimedia Tools and Applications, 76, 24027–24062.CrossRefGoogle Scholar
  8. 8.
    Khan, M., & Shah, T. (2016). Construction and applications of chaotic S-boxes in image encryption. Neural Computing and Applications, 27, 677–685.CrossRefGoogle Scholar
  9. 9.
    Khan, M., Shah, T., & Batool, S. I. (2016). A new implementations of chaotic S-boxes in CAPTCHA. Signal, Image and Video Processing, 10, 293–300.CrossRefGoogle Scholar
  10. 10.
    Khan, M., & Waseem, H. M. (2018). A novel image encryption scheme based on quantum dynamical spinning and rotations. PLoS ONE, 13(11), e0206460.CrossRefGoogle Scholar
  11. 11.
    Khan, M. (2015). A novel image encryption scheme based on multi-parameters chaotic S-boxes. Nonlinear Dynamics, 82, 527–533.MathSciNetCrossRefGoogle Scholar
  12. 12.
    Khan, M. (2015). An image encryption by using Fourier series. Journal of Vibration and Control, 21, 3450–3455.MathSciNetCrossRefGoogle Scholar
  13. 13.
    Khan, M., & Shah, T. (2015). An efficient construction of substitution box with fractional chaotic system. Signal, Image and Video Processing, 9, 1335–1338.CrossRefGoogle Scholar
  14. 14.
    Khan, M., Shah, T., Mahmood, H., & Gondal, M. A. (2014). An efficient method for the construction of block cipher with multi-chaotic systems. Nonlinear Dynamics, 71, 493–504.MathSciNetGoogle Scholar
  15. 15.
    Wang, Y., Wong, K. W., Liao, X., & Chen, G. (2009). A new chaos-based fast image encryption algorithm. Applied Soft Computing, 11, 514–522.CrossRefGoogle Scholar
  16. 16.
    Zhang, L., Liao, X., & Wang, X. (2005). An image encryption approach based on chaotic maps. Chaos, Solitons & Fractals, 24(3), 759–765.MathSciNetCrossRefGoogle Scholar
  17. 17.
    Borujeni, S. E., & Eshghi, M. (2009). Chaotic image encryption design using tompkins–paige algorithm. Hindawi Publishing Corporation Mathematical Problem in Engineering, 200, 22.zbMATHGoogle Scholar
  18. 18.
    Guarnong, C., Mao, Y., & Chui, C. K. (2004). A symmetric image encryption scheme based on 3D chaotic Cat maps. Chaos, Solitons & Fractals, 21(3), 749–761.MathSciNetCrossRefGoogle Scholar
  19. 19.
    Zhou, Q., Wo Wong, K., Liao, X., Xiang, T., & Hu, Y. (2008). Parallel image encryption algorithm based on discretized chaotic map. Chaos, Solitons & Fractals, 38(4), 1081–1092.CrossRefGoogle Scholar
  20. 20.
    Gao, H., Zhang, Y., Liang, S., & Li, D. (2006). A new chaotic algorithm for image encryption. Chaos, Solitons & Fractals, 29(2), 393–399.CrossRefGoogle Scholar
  21. 21.
    Mao, Y., Chen, G., & Lian, S. (2004). A novel fast image encryption scheme based on 3D chaotic bakermaps. International Journal of Bifurcation and Chaos, 14(10), 3613–3624.MathSciNetCrossRefGoogle Scholar
  22. 22.
    Khanzadi, H., Omam, M. A., Lotfifar, F., & Eshghi, M. (2010). Image encryption based on gyrator transforms using chaotic maps. In Signal processing (ICSP), 2010 IEEE 10th international conference on (pp. 2608–2612).Google Scholar
  23. 23.
    Khan, M., & Asghar, Z. (2016). A novel construction of substitution box for image encryption applications with Gingerbreadman chaotic map and S8 permutation. Neural Computing and Applications.  https://doi.org/10.1007/s00521-016-2511-5.CrossRefGoogle Scholar
  24. 24.
    Guoji, Z., & Qing, L. (2011). A novel image encryption method based on total shuffling scheme. Optics Communications, 284, 2775–2780.CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.Cyber and Information Security LabInstitute of Space TechnologyIslamabadPakistan
  2. 2.Department of Applied Mathematics and StatisticsInstitute of Space TechnologyIslamabadPakistan

Personalised recommendations