Abstract
One of the most critical aspects of this technologically progressive era is the propagation of information through an unsecured communication channel. The information is electronically transported as binary bits. One of the most important issues in the existing world is the secrecy of these digital contents. In this paper, we used Chebyshev’s polynomial-based, chaotic maps to propose a new technique for encrypting images. The proposed encryption brings confusion as well as diffusion to the system presented, which is one of the utmost essential aspects of the encryption method. The confusion process is performed in two stages, XORing the original image with the Chebyshev polynomial generated matrices and scrambling, the chaotic scrambling matrix is also generated by the Chebyshev polynomial generated matrix, which increases the sensitivity of the cryptosystem to the key which initialize the parameters for Chebyshev polynomial. We checked our planned scheme against various performance analyses and contrasted them with established outcomes. The scheme is accomplished by offering excellent privacy to digital images.
Similar content being viewed by others
References
Alghafis A, Firdousi F, Batool SI, Amin M (2020) An efficient image encryption scheme based on chaotic and deoxyribonucleic acid sequencing. Mathematics and Computers in Simulation (MATCOM), Elsevier 177, no. C: 441–466
Ali KM, Khan M (2019) A new construction of confusion component of block ciphers. Multimed Tools Appl 78:32585–32604
Alvarez G, Li S (2006) Some basic cryptographic requirements for Chaos-based systems. International Journal of Bifurcation and Chaos 16(8):2129–2151
Atty BA-E, Abd El-Latif AA, Venegas-Andraca SE (2019) An encryption protocol for NEQR images based on one-particle quantum walks on a circle. Quantum Information Processing, vol. 18
Bssssrahim AH, Pacha AA, Said NH (2021) A new image encryption scheme based on a hyperchaotic system & multi specific S-boxes. Information Security Journal: A Global Perspective. A new image encryption scheme based on a hyperchaotic system & multi specific S-boxes
Chatterjee S, Roy S, Das AK, Chattopadhyay S, Kumar N, Vasilakos AV (2018) Secure biometric-based authentication scheme using Chebyshev chaotic map for multi-server environment. IEEE Transactions on Dependable and Secure Computing, 15 (15): 824–839
El-Latif AAA, Atty BA, Mazurczyk W, Fung C, SEV (2020) Secure data encryption based on quantum walks for 5G internet of things scenario. IEEE Transactions on Network and Service Management
Farah MAB, Guesmi R, Kachouri A, Samet M (2020) A new design of cryptosystem based on S-box and chaotic permutation. Multimed Tools Appl 243:19129–19150
Gan Z, Chai X, Zhang M, Lu Y (2018) A double color image encryption scheme based on three-dimensional brownian motion. Multimed Tools Appl 77:27919–27953
Geisel T, Fairén V (1984) Statistical properties of chaos in Chebyshev maps. Phys Lett A 105(6):263–266
Guesmi R, Farah MAB, Kachouri A, Samet M (2015) Chaos-based designing of a highly nonlinear S-box using Boolean functions, in IEEE SSD international multi-conference on systems, Signals and Devices
He Y, Zhang YQ, Wang XY (2020) A new image encryption algorithm based on two-dimensional spatiotemporal chaotic system. Neural Comput & Applic 32:247–260
Jarin I, Fattah SA, Shahnaz C (2018) Natural and medical image encryption using self-adaptive permutation and DNA encoding, in IEEE international WIE conference on electrical and computer engineering (WIECON-ECE)
Kang X, Luo X, Zhang X, Jiang J (2019) Homogenized Chebyshev-Arnold map and its application to color image encryption IEEE Access 7, 7,114459–114471
Kaur M, Kumar V (2020) A comprehensive review on image encryption techniques. Archives of Computational Methods in Engineering 27:15–43
Khan M (2015) A novel image encryption scheme based on multiple chaotic S-boxes. Nonlinear Dynamics 82(1):527–533
Khan M, Asghar Z (2018) A novel construction of substitution box for image encryption applications with Gingerbreadman chaotic map and S8 permutation. Neural Comput & Applic 29:993–999
Khan M, Shah T (2014) A construction of novel chaos base nonlinear component of block cipher. Nonlinear Dynamics 76:377–382
Khan M, Shah T (2015) An efficient chaotic image encryption scheme. Neural Comput & Applic 26:1137–1148
Khan M, Shah T, Batool SI (2017) A new approach for image encryption and watermarking based on substitution box over the classes of chain rings. Multimed Tools Appl, 76, 24027–24062
Khan S, Han L, Lu H, Lu H, Butt KK, Bachira G, Khan NU (2019) A new hybrid image encryption algorithm based on 2D-CA, FSM-DNA rule generator, and FSBI. IEEE Access 7:81333–81350
Kocarev L, Makraduli J, Amato P (2015) Public-key encryption based on Chebyshev polynomials. Circuits Syst Signal Process 24:497–517
Lai H, Orgun MA, Xiao J, Pieprzyk J, Xue L, Yang Y (2014) Provably secure three-party key agreement protocol using Chebyshev chaotic maps in the standard model. Nonlinear Dynamics 77(4):1427–1439
Lei Z, Li L, Xianwei G (2011) Design and realization of image encryption system. International Congress on Image and Signal Processing 4:741–744
Tang WKS, Liu Y (2011) Formation of high-dimensional chaotic maps and their uses in cryptography, springer, Berlin, Heidelberg, 354: 99–136
Norouzi B, Mirzakuchaki S (2017) An image encryption algorithm based on DNA sequence operations and cellular neural network. Multimed Tools Appl 76:13681–13701
Said L, Hazzazi MM, Khan M, Jamal SS (2021) A novel image encryption based on rossler map diffusion and particle swarm optimization generated highly non-linear substitution boxes. Chin J Phys 72:558–574
Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28(4):656–715
Younas I, Khan M (2018) A new efficient digital image encryption based on inverse left almost semi group and Lorenz chaotic system. Entropy. 20(913)
Zhong YR, Liu HY, Sun XY (2018) Image encryption using 2d sine-piecewise linear chaotic map, in Proceeding s of 2018 International Conference on Wavelet Analysis and Pattern Recognition. Chengdu, China
Acknowledgments
One of the author Dr. Sajjad Shaukat Jamal extends his gratitude to the Deanship of Scientific Research at King Khalid University for funding this work through research groups program under grant number R. G. P. 1/399/42.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Khan, L.S., Khan, M., Jamal, S.S. et al. An Efficient Digital Confidentiality Scheme Based on Commutative Chaotic Polynomial. Multimed Tools Appl 81, 33591–33611 (2022). https://doi.org/10.1007/s11042-022-13078-6
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-022-13078-6