Skip to main content
Log in

New color image encryption technique based on three-dimensional logistic map and Grey wolf optimization based generated substitution boxes

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In this paper, highly nonlinear substitution boxes (S-boxes) are generated by utilizing a chaotic map accompanied by the Grey wolf optimization technique. To check their applicability in the encryption scheme, an encryption scheme utilizing a three dimensional (3D) logistic map and the proposed S-boxes for confusion is proposed. The performance analyses of suggested S-boxes are performed and compared with existing techniques. Moreover, security analysis of projected encryption scheme is also performed and tabulated. The results show the strength of the proposed S-boxes in the design of encryption schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Ahmad J, Hwang SO (2015) Chaos-based diffusion for highly autocorrelated data in encryption algorithms. Nonlinear Dyn 82(4):1839–1850

  2. A. Alghafis, . F. Firdousi, S. I. Batool and M. Amin, "An efficient image encryption scheme based on chaotic and deoxyribonucleic acid sequencing," Mathematics and Computers in Simulation (MATCOM), Elsevier,, vol. 177, no. C, pp. 441–466, 2020.

    Article  MATH  Google Scholar 

  3. Alhadawi HS, Majid MA, Lambic D, Ahmad M (2020) "A novel method of S-box design based on discrete chaotic maps and cuckoo search algorithm," Multime Tools Appl, pp. 1573–7721

  4. Belazi A, Khan M, Abd El-Latif AA, Belghith S (2017) Efficient cryptosystem approaches: S-boxes and permutation–substitution-based encryption. Nonlinear Dyn 87(1):337–361

  5. Buchman J (2004) Introduction to cryptography, vol. 335. Springer, New York

  6. Gan Z, Chai X, Zhang M, Lu Y (2018) A double color image encryption scheme based on three-dimensional brownian motion. Multimed Tools Appl 77(21):27919–27953

  7. He Y, Zhang Y-Q, Wang X-Y (2020) A new image encryption algorithm based on two-dimensional spatiotemporal chaotic system. Neural Comput Appl 32(1):247–260

  8. Kam JDG (1979) Structured design of SubstitutionPermutation encryption network. I EEE Transactions on Computers 28:747–753

    Article  Google Scholar 

  9. Khan M, Shah T (2015) An efficient chaotic image encryption scheme. Neural Comput Applic 26:1137–1148

    Article  Google Scholar 

  10. Khan M, Masood F, Alghafis A, Naqvi SIB (2019) "A novel image encryption technique using hybrid method of discrete dynamical chaotic maps and Brownian motion," Plos One

  11. Khan MF, Ahmed A, Saleem K (2019) "A Novel Cryptographic Substitution Box Design Using Gaussian Distribution," IEEE Access, vol. 7

  12. Khan S, Han L, Lu H, Lu H, Butt KK, Bachira G, Khan NU (2019) A new hybrid image encryption algorithm based on 2D-CA, FSM-DNA rule generator, and FSBI. IEEE Access 7:81333–81350

    Article  Google Scholar 

  13. Kocarev L, Jakimoski G (2001) Logistic map as a block encryption algorithm. Phys Lett A 289(4–5):199–206

    Article  MATH  Google Scholar 

  14. Kohli M, Sankalap A (2018) Chaotic grey wolf optimization algorithm for constrained optimization problems. J Comput Des Eng 5(4):458–472

  15. Liu G (2017) Designing S-box based on 4D-4wing hyperchaotic system. 3D Research 8(1):1–9

  16. Liu L, Zhang Y, Wang X (2018) A novel method for constructing the S-box based on spatiotemporal chaotic dynamics. Appl Sci 8(12):2650

  17. Majid K, Asghar Z (2018) A novel construction of substitution box for image encryption applications with Gingerbreadman chaotic map and S8 permutation. Neural Comput Appl 29(4):993–999

  18. Mirjalili S, Mirjalili SM, Lewis A (2014) Grey Wolf Optimizer. Adv Eng Softw 69:46–61

    Article  Google Scholar 

  19. Mitsuru and Matsui (1993) "Linear Cryptanalysis method for DES Cipher," in advance in cryptology, japan

  20. Norouzi B, Mirzakuchaki S (2017) An image encryption algorithm based on DNA sequence operations and cellular neural network. Multimed Tools Appl 76:13681–13701

    Article  Google Scholar 

  21. Özkaynak F (2017) From biometric data to cryptographic primitives: A new method for generation of substitution boxes. In: Proceedings of the 2017 International Conference on Biomedical Engineering and Bioinformatics, pp 27–33

  22. Özkaynak F (2019) Chaos based substitution boxes as a cryptographic primitives: Challenges and opportunities. Chaotic Modeling and Simulation 1:49–57

  23. Pak C, Huang L (2017) A new color image encryption using combination of the 1D chaotic map. Signal Process 138:129–137

    Article  Google Scholar 

  24. Shannon CE (1949) Cimmunication theory of secrecy system. Bell system technical journal 28(4):656–715

    Article  MATH  Google Scholar 

  25. Tanyildizi E, Özkaynak F (2019) "A New Chaotic S-Box Generation Method," IEEE, vol. 7

  26. Wang Y, Wo KW, Li C, Li Y (2012) A novel method to design S-box based on chaotic map and genetic algorithm. Physics letter A 376(6–7):827–833

    Article  MATH  Google Scholar 

  27. Wang M, Chen H, Li H, Cai Z, Zhao X, Tong C, Li J, Xu X (2017) Grey wolf optimization evolving kernel extreme learning machine: Application to bankruptcy prediction. Eng Appl Artif Intell 63:54–68

    Article  Google Scholar 

  28. Webster A, Tavares S (1986) "On the design of S-boxes in Advances in Cryptology-CRYPTO′ 85 Proceedings," Lecture notes in computer science, pp. 523–534

  29. Younas I, Khan M (2018) "A New Efficient Digital Image Encryption Based on Inverse Left Almost Semi Group and Lorenz Chaotic System," Entropy, vol. 20, no. 913

  30. Zolkipti MF Ahmad AM Ahmed HA (2018) "A novel efficient substitution-box design based on firefly algorithm and discrete chaotic map," springer, p. 10

Download references

Acknowledgments

The author Sajjad Shaukat Jamal extends his gratitude to Deanship of Scientific Research at King Khalid University for funding this work through research groups program under grant number. R. G. P. 2/109/43.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hamza Khan.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Informed consent

Informed consent was obtained from all individual participants included in the study.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Khan, H., Hazzazi, M.M., Jamal, S.S. et al. New color image encryption technique based on three-dimensional logistic map and Grey wolf optimization based generated substitution boxes. Multimed Tools Appl 82, 6943–6964 (2023). https://doi.org/10.1007/s11042-022-13612-6

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-022-13612-6

Keywords

Navigation