Abstract
Substitution box is a unique and nonlinear core component of block ciphers. A better designing technique of substitution box can boost up the quality of ciphertexts. In this paper, a new encryption method based on dynamic substitution boxes is proposed via using two chaotic maps. To break the correlation in an original image, pixels values of the original plaintext image are permuted row- and column-wise through random sequences. The aforementioned random sequences are generated by 2-D Burgers chaotic map. For the generation of dynamic substitution boxes, Logistic chaotic map is employed. In the process of diffusion, the permuted image is divided into blocks and each block is substituted via different dynamic substitution boxes. In contrast to conventional encryption schemes, the proposed scheme does not undergo the fixed block cipher and hence the security level can be enhanced. Extensive security analysis including histogram test is applied on the proposed image encryption technique. All experimental results reveal that the proposed scheme has a high level of security and robustness for transmission of digital images on insecure communication channels.
Similar content being viewed by others
References
Zeghid, M., Machhout, M., Khriji, L., Baganne, A., & Tourki, R. (2007). A modified aes based algorithm for image encryption. International Journal of Computer Science and Engineering, 1(1), 70–75.
Wang, Y., Wong, K.-W., Liao, X., & Xiang, T. (2009). A block cipher with dynamic s-boxes based on tent map. Communications in Nonlinear Science and Numerical Simulation, 14(7), 3089–3099.
Chen, R.-J., & Horng, S.-J. (2010). Novel scan-ca-based image security system using scan and 2-d von neumann cellular automata. Signal Processing: Image Communication, 25(6), 413–426.
Chen, T.-H., & Li, K.-C. (2012). Multi-image encryption by circular random grids. Information Sciences, 189, 255–265.
Li, L., El-Latif, A. A. A., & Niu, X. (2012). Elliptic curve elgamal based homomorphic image encryption scheme for sharing secret images. Signal Processing, 92(4), 1069–1078.
Huang, C., Liao, C.-W., Hsu, S., & Jeng, Y. (2013). Implementation of gray image encryption with pixel shuffling and gray-level encryption by single chaotic system. Telecommunication Systems, 52(2), 563–571.
Liao, X., Lai, S., & Zhou, Q. (2010). A novel image encryption algorithm based on self-adaptive wave transmission. Signal Processing, 90(9), 2714–2722.
Chen, T.-H., & Wu, C.-S. (2010). Compression-unimpaired batch-image encryption combining vector quantization and index compression. Information Sciences, 180(9), 1690–1701.
Bhatnagar, G., Wu, Q. J., & Raman, B. (2013). Discrete fractional wavelet transform and its application to multiple encryption. Information Sciences, 223, 297–316.
Zhou, Y., Agaian, S., Joyner, V. M., & Panetta, K. (2008). Two fibonacci p-code based image scrambling algorithms. In A. Izatt (Ed.), Electronic imaging (p. 681215). Quebec: International Society for Optics and Photonics.
Seyedzadeh, S. M., & Mirzakuchaki, S. (2012). A fast color image encryption algorithm based on coupled two-dimensional piecewise chaotic map. Signal Processing, 92(5), 1202–1215.
Khan, J. Ahmad, J. and Hwang, S. O. (2015) An efficient image encryption scheme based on: Henon map, skew tent map and s-box. In Modeling, Simulation, and Applied Optimization (ICMSAO), 2015 6th International Conference on. IEEE, pp. 1–6.
Jakimoski, G., Kocarev, L., et al. (2001). Chaos and cryptography: Block encryption ciphers based on chaotic maps. IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications, 48(2), 163–169.
Tang, G., & Liao, X. (2005). A method for designing dynamical S-boxes based on discretized chaotic map. Chaos, Solitons & Fractals, 23(5), 1901–1909.
Yin, R., Yuan, J., Wang, J., Shan, X., & Wang, X. (2009). Designing key-dependent chaotic S-box with larger key space. Chaos, Solitons & Fractals, 42(4), 2582–2589.
Özkaynak, F., & Özer, A. B. (2010). A method for designing strong S-boxes based on chaotic lorenz system. Physics Letters A, 374(36), 3733–3738.
Wang, Y., Wong, K.-W., Li, C., & Li, Y. (2012). A novel method to design S-box based on chaotic map and genetic algorithm. Physics Letters A, 376(6), 827–833.
Ahmad, J., & Hwang, S. O. (2015). Chaos-based diffusion for highly autocorrelated data in encryption algorithms. Nonlinear Dynamics, 82(4), 1–15.
Ahmad, J., Hwang, S. O., & Ali, A. (2015). An experimental comparison of chaotic and non-chaotic image encryption schemes. Wireless Personal Communications, 84(2), 1–18.
ELabbasy, E., Agiza, H., El-Metwally, H., & Elsadany, A. (2007). Bifurcation analysis, chaos and control in the burgers mapping. International Journal of Nonlinear Science, 4(3), 171–185.
Zaibi, G., Kachouri, A., Peyrard, F., Fournier-Prunaret, D. (2009). ‘On dynamic chaotic S-box. In Information Infrastructure Symposium. GIIS’09. Global IEEE, pp. 1–5.
Ahmad, J., & Ahmed, F. (2012). Efficiency analysis and security evaluation of image encryption schemes. International Journal of Video & Image Processing and Network Security, 12(4), 18–31.
Bin Younas, M. and Ahmad, J. (2014). Comparative analysis of chaotic and non-chaotic image encryption schemes. In Emerging Technologies (ICET), 2014 International Conference on. IEEE, pp. 81–86.
Wang, X., & Wang, Q. (2014). A novel image encryption algorithm based on dynamic s-boxes constructed by chaos. Nonlinear Dynamics, 75(3), 567–576.
Behnia, S., Akhshani, A., Ahadpour, S., Mahmodi, H., & Akhavan, A. (2007). A fast chaotic encryption scheme based on piecewise nonlinear chaotic maps. Physics Letters A, 366(4), 391–396.
Wang, Y., Wong, K.-W., Liao, X., & Chen, G. (2011). A new chaos-based fast image encryption algorithm. Applied Soft Computing, 11(1), 514–522.
Author information
Authors and Affiliations
Corresponding author
Electronic supplementary material
Below is the link to the electronic supplementary material.
Rights and permissions
About this article
Cite this article
Rehman, A.U., Khan, J.S., Ahmad, J. et al. A New Image Encryption Scheme Based on Dynamic S-Boxes and Chaotic Maps. 3D Res 7, 7 (2016). https://doi.org/10.1007/s13319-016-0084-9
Received:
Revised:
Accepted:
Published:
DOI: https://doi.org/10.1007/s13319-016-0084-9