Skip to main content
Log in

A New Image Encryption Scheme Based on Dynamic S-Boxes and Chaotic Maps

  • 3DR Express
  • Published:
3D Research

Abstract

Substitution box is a unique and nonlinear core component of block ciphers. A better designing technique of substitution box can boost up the quality of ciphertexts. In this paper, a new encryption method based on dynamic substitution boxes is proposed via using two chaotic maps. To break the correlation in an original image, pixels values of the original plaintext image are permuted row- and column-wise through random sequences. The aforementioned random sequences are generated by 2-D Burgers chaotic map. For the generation of dynamic substitution boxes, Logistic chaotic map is employed. In the process of diffusion, the permuted image is divided into blocks and each block is substituted via different dynamic substitution boxes. In contrast to conventional encryption schemes, the proposed scheme does not undergo the fixed block cipher and hence the security level can be enhanced. Extensive security analysis including histogram test is applied on the proposed image encryption technique. All experimental results reveal that the proposed scheme has a high level of security and robustness for transmission of digital images on insecure communication channels.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Zeghid, M., Machhout, M., Khriji, L., Baganne, A., & Tourki, R. (2007). A modified aes based algorithm for image encryption. International Journal of Computer Science and Engineering, 1(1), 70–75.

    Google Scholar 

  2. Wang, Y., Wong, K.-W., Liao, X., & Xiang, T. (2009). A block cipher with dynamic s-boxes based on tent map. Communications in Nonlinear Science and Numerical Simulation, 14(7), 3089–3099.

    Article  MathSciNet  MATH  Google Scholar 

  3. Chen, R.-J., & Horng, S.-J. (2010). Novel scan-ca-based image security system using scan and 2-d von neumann cellular automata. Signal Processing: Image Communication, 25(6), 413–426.

    Google Scholar 

  4. Chen, T.-H., & Li, K.-C. (2012). Multi-image encryption by circular random grids. Information Sciences, 189, 255–265.

    Article  MathSciNet  Google Scholar 

  5. Li, L., El-Latif, A. A. A., & Niu, X. (2012). Elliptic curve elgamal based homomorphic image encryption scheme for sharing secret images. Signal Processing, 92(4), 1069–1078.

    Article  Google Scholar 

  6. Huang, C., Liao, C.-W., Hsu, S., & Jeng, Y. (2013). Implementation of gray image encryption with pixel shuffling and gray-level encryption by single chaotic system. Telecommunication Systems, 52(2), 563–571.

    Google Scholar 

  7. Liao, X., Lai, S., & Zhou, Q. (2010). A novel image encryption algorithm based on self-adaptive wave transmission. Signal Processing, 90(9), 2714–2722.

    Article  MATH  Google Scholar 

  8. Chen, T.-H., & Wu, C.-S. (2010). Compression-unimpaired batch-image encryption combining vector quantization and index compression. Information Sciences, 180(9), 1690–1701.

    Article  Google Scholar 

  9. Bhatnagar, G., Wu, Q. J., & Raman, B. (2013). Discrete fractional wavelet transform and its application to multiple encryption. Information Sciences, 223, 297–316.

    Article  MathSciNet  MATH  Google Scholar 

  10. Zhou, Y., Agaian, S., Joyner, V. M., & Panetta, K. (2008). Two fibonacci p-code based image scrambling algorithms. In A. Izatt (Ed.), Electronic imaging (p. 681215). Quebec: International Society for Optics and Photonics.

    Google Scholar 

  11. Seyedzadeh, S. M., & Mirzakuchaki, S. (2012). A fast color image encryption algorithm based on coupled two-dimensional piecewise chaotic map. Signal Processing, 92(5), 1202–1215.

    Article  Google Scholar 

  12. Khan, J. Ahmad, J. and Hwang, S. O. (2015) An efficient image encryption scheme based on: Henon map, skew tent map and s-box. In Modeling, Simulation, and Applied Optimization (ICMSAO), 2015 6th International Conference on. IEEE, pp. 1–6.

  13. Jakimoski, G., Kocarev, L., et al. (2001). Chaos and cryptography: Block encryption ciphers based on chaotic maps. IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications, 48(2), 163–169.

    Article  MathSciNet  MATH  Google Scholar 

  14. Tang, G., & Liao, X. (2005). A method for designing dynamical S-boxes based on discretized chaotic map. Chaos, Solitons & Fractals, 23(5), 1901–1909.

    Article  MathSciNet  MATH  Google Scholar 

  15. Yin, R., Yuan, J., Wang, J., Shan, X., & Wang, X. (2009). Designing key-dependent chaotic S-box with larger key space. Chaos, Solitons & Fractals, 42(4), 2582–2589.

    Article  MATH  Google Scholar 

  16. Özkaynak, F., & Özer, A. B. (2010). A method for designing strong S-boxes based on chaotic lorenz system. Physics Letters A, 374(36), 3733–3738.

    Article  MATH  Google Scholar 

  17. Wang, Y., Wong, K.-W., Li, C., & Li, Y. (2012). A novel method to design S-box based on chaotic map and genetic algorithm. Physics Letters A, 376(6), 827–833.

    Article  MATH  Google Scholar 

  18. Ahmad, J., & Hwang, S. O. (2015). Chaos-based diffusion for highly autocorrelated data in encryption algorithms. Nonlinear Dynamics, 82(4), 1–15.

    Article  MathSciNet  Google Scholar 

  19. Ahmad, J., Hwang, S. O., & Ali, A. (2015). An experimental comparison of chaotic and non-chaotic image encryption schemes. Wireless Personal Communications, 84(2), 1–18.

    Article  Google Scholar 

  20. ELabbasy, E., Agiza, H., El-Metwally, H., & Elsadany, A. (2007). Bifurcation analysis, chaos and control in the burgers mapping. International Journal of Nonlinear Science, 4(3), 171–185.

    MathSciNet  Google Scholar 

  21. Zaibi, G., Kachouri, A., Peyrard, F., Fournier-Prunaret, D. (2009). ‘On dynamic chaotic S-box. In Information Infrastructure Symposium. GIIS’09. Global IEEE, pp. 1–5.

  22. Ahmad, J., & Ahmed, F. (2012). Efficiency analysis and security evaluation of image encryption schemes. International Journal of Video & Image Processing and Network Security, 12(4), 18–31.

    Google Scholar 

  23. Bin Younas, M. and Ahmad, J. (2014). Comparative analysis of chaotic and non-chaotic image encryption schemes. In Emerging Technologies (ICET), 2014 International Conference on. IEEE, pp. 81–86.

  24. Wang, X., & Wang, Q. (2014). A novel image encryption algorithm based on dynamic s-boxes constructed by chaos. Nonlinear Dynamics, 75(3), 567–576.

    Article  Google Scholar 

  25. Behnia, S., Akhshani, A., Ahadpour, S., Mahmodi, H., & Akhavan, A. (2007). A fast chaotic encryption scheme based on piecewise nonlinear chaotic maps. Physics Letters A, 366(4), 391–396.

    Article  MATH  Google Scholar 

  26. Wang, Y., Wong, K.-W., Liao, X., & Chen, G. (2011). A new chaos-based fast image encryption algorithm. Applied Soft Computing, 11(1), 514–522.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jawad Ahmad.

Electronic supplementary material

Below is the link to the electronic supplementary material.

Supplementary material 1 (CLS 47KB)

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Rehman, A.U., Khan, J.S., Ahmad, J. et al. A New Image Encryption Scheme Based on Dynamic S-Boxes and Chaotic Maps. 3D Res 7, 7 (2016). https://doi.org/10.1007/s13319-016-0084-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s13319-016-0084-9

Keywords

Navigation