Skip to main content
Log in

Selective encryption of JPEG images with chaotic based novel S-box

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Increased demand of multimedia data over heterogeneous networks has led to the requirement for increased compression and suitable security. Both of these demands require heavy computation, and are contradictory to each other, as encryption may severely affect the compression efficiency. On the other hand, handheld devices have limited energy and computational resources, making compression friendly encryption a challenging issue. One of the solutions is to encrypt a subset of data based on perceptual importance. But, that too may not be compression efficient, format compliant and secure. To address the security issue in such applications the substitution box (S-box), which is one of the most important and the only non-linear operation of the block ciphers is redesigned using chaotic equations. These equations have the characteristics that easily meet the requirements of the block ciphers. In this research work, the S-box based on the chaotic equation was designed and tested for security strength and then used for selective encryption of the multimedia (image) data. To increase the security and generate a key dependant S-box, Mackey Glass equation is used due to its inherent properties like sensitivity, pseudo random characteristics, non-uniform behaviour, ergodicity, and high confusion and diffusion. The security of the proposed S-box was tested in terms of non-linearity, Bit Independence and Strict Avalanche Criteria etc. This S-box is then used to selectively encrypt a subset of image data during the process of compression, giving an encryption-compression strategy. The subset of image data was selected such that the statistical and structural dependencies were not violated due to encryption. This resulted in compression efficient and format friendly encryption. In this regard the quantization table is selected for encryption along with a subset of bits that have already encoded and their statistical dependencies are exploited for compression. This approach not only reduced the computational burden due to the selective nature of encryption but also kept the security at the required level due to introduction of key dependent S-Box. The results of encrypted images were compared with that of the AES in terms of compression ratio, correlation and Peak Signal to Noise Ratio (PSNR), giving better results for the proposed algorithm.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Abdmouleh MK, Khalfallah A, Bouhlel MS (2017) A novel selective encryption scheme for medical images transmission based-on jpeg compression algorithm. Procedia Comput Sci 11(2):369–376. Knowledge-Based and Intelligent Information and Engineering Systems: Proceedings of the 21st International Conference, KES-20176-8 September 2017, Marseille, France. http://www.sciencedirect.com/science/article/pii/S1877050917313650

    Google Scholar 

  2. Abomhara M, Zakaria O, Khalifa OO, Zaidan A, Zaidan B (2010) Enhancing selective encryption for h. 264/avcusing advanced encryption standard. Int J Comput Electric Eng 2(2):223

    Google Scholar 

  3. Abomhara M, Zakaria O, Khalifa OO, Zaidan AA, Zaidan BB (2010) Enhancing selective encryption for h. 264 / avc using advanced encryption standard, vol 2, pp 1793–8201

  4. Adams C, Tavares S (1990) Good S-boxes are easy to find. In: Brassard G (ed) Advances in cryptology — CRYPTO’ 89 proceedings. Springer, New York, pp 612–615

  5. Ahmad M, AlSharari H (2016) Rotation-k affine-power-affine-like multiple substitution-boxes for secure communication

  6. Ahmad M, Mittal N, Garg P, Khan MM (2016) Efficient cryptographic substitution box design using travelling salesman problem and chaos. Recent Trends in Engineering and Material Sciences, vol 8, pp 465–468. http://www.sciencedirect.com/science/article/pii/S2213020916301318

  7. Ahmad M, Mittal N, Garg P, Mahtab M (2016) Efficient cryptographic substitution box design using travelling salesman problem and chaos. Perspect Sci 8:07

    Google Scholar 

  8. Altaleb A, Saeed MS, Hussain I, Aslam M (2017) An algorithm for the construction of substitution box for block ciphers based on projective general linear group, vol 7

  9. Asghar MN, Ghanbari M, Fleury M, Reed MJ (2014) Confidentiality of a selectively encrypted h.264 coded video bit-stream. J Vis Commun Image Represent 25(2):487–498. http://www.sciencedirect.com/science/article/pii/S1047320313002290

    Google Scholar 

  10. Asghar M, Ghanbari M, Fleury M, Reed M (2014) Sufficient encryption based on entropy coding syntax elements of h.264/svc. Multimed Tools Appl 74:07

    Google Scholar 

  11. Ashtiyani M, Birgani PM, Madahi SSK (2012) Speech signal encryption using chaotic symmetric cryptography. J Basic Appl Sci Res 1668–1674

  12. Asim M, Jeoti V (2008) Jeoti, v.: Efficient and simple method for designing chaotic s-boxes. ETRI J 30(1):170–172

    Google Scholar 

  13. Atkinson KE, Han W, Stewart D (2009) Neumerical solutions of ordinary differential equations. Wiley, New York

    Google Scholar 

  14. Berezansky L, Braverman E (2006) Mackey-glass equation with variable coefficients. Comput Math Appl 51(1):1–16. http://www.sciencedirect.com/science/article/pii/S0898122105004414

    MathSciNet  MATH  Google Scholar 

  15. Biham S (1993) Differential cryptanalysis of the full16-round des. J Cryptol Springer New York 4:79–88. https://link.springer.com/article/10.1007/BF00630563

    Google Scholar 

  16. Chen G, Chen Y, Liao X (2007) An extended method for obtaining s-boxes based on three-dimensional chaotic baker maps. Chaos Solitons Fract 31 (3):571–579. http://www.sciencedirect.com/science/article/pii/S0960077905009604

    MathSciNet  MATH  Google Scholar 

  17. Chen G, Chen Y, Liao X (2007) An extended method for obtaining S-boxes based on three-dimensional chaotic Baker maps. Chaos Solitons Fract 31:571–579

    MathSciNet  MATH  Google Scholar 

  18. Daemen J, Rijmen V (1998) Aes proposal: Rijndael

  19. Dawson M, Tavares S (1991) An expanded set of design criteria for substitution boxes and their use in strengthening des-like cryptosystems. In: [1991] IEEE pacific rim conference on communications, computers and signal processing conference proceedings, vol 1, pp 191–195

  20. Dawson M, Tavares S (1995) An expanded set of s-box design criteria based on information theory and its relation to differential-like attacks. 547:352–367

  21. Detombe J, Tavares S (1993) Constructing large cryptographically strong s-boxes. In: Seberry J., Zheng Y. (eds) Advances in cryptology — AUSCRYPT ’92. Springer, Berlin, pp 165–181

  22. Garg S, Upadhyay D (2013) S-box design approaches: Critical analysis and future directions. Int J Adv Res Comput Sci Electron Eng 2(4):426–430

    Google Scholar 

  23. Glass L, Mackey M (2010) Mackey-Glass equation. Scholarpedia 5(3):6908. revision #186443

    Google Scholar 

  24. Heys H, Tavares S (1994) The design of substitution-permutation networks resistant to differential and linear cryptanalysis. 148–155

  25. Hristina M, Danilo G (2011) A new approach into constructing s-box for lightweight block ciphers. In: 8th conference on informatics and information technology with international participation (CIIT 2011), Bitola, pp 14–18

  26. Hussain I, Shah T, Gondal MA, Khan WA (2011) Construction of cryptographically strong 8x8 s-boxes. World Appl Sci J

  27. Hussain I, Shah T, Mahmood H, Gondal MA (2013) A projective general linear group based algorithm for the construction of substitution box for block ciphers. Neural Comput Appl 22(6):1085–1093. https://doi.org/10.1007/s00521-012-0870-0

    Google Scholar 

  28. Igorevich RR, Yong H, Min D, Choi E (2010) A study on multimedia security systems in video encryption. In: INC2010: 6th international conference on networked computing, pp 1–5

  29. Ivanov G, Nikolov N, Nikova S (2016) Cryptographically strong s-boxes generated by modified immune algorithm. In: Pasalic E, Knudsen LR (eds) Cryptography and information security in the Balkans. Springer International Publishing, Cham, pp 31–42

  30. Jacob G, Murugan A, Viola I (2015) Towards the generation of a dynamic key-dependent s-box to enhance security. Cryptology ePrint archive, 2015

  31. Jakimoski G, Kocarev L, Kocarev L (2001) Chaos and cryptography:, Block encryption ciphers based on chaotic maps. IEEE Trans Circ Syst I 48:163–169. Circuits and Systems I: Fundamental Theory and Applications, IEEE Transactions on, vol. 48, pp. 163–169

    MathSciNet  MATH  Google Scholar 

  32. Jakobovic D, Picek S, Martins MSR, Wagner M (2019) A characterisation of s-box fitness landscapes in cryptography. arXiv:1902.04724

  33. Jang W, Lee S-Y (2020) Partial image encryption using format-preserving encryption in image processing systems for internet of things environment. Int J Distrib Sens Netw 16(3):1550147720914779. https://doi.org/10.1177/1550147720914779

    Article  Google Scholar 

  34. Jiang J, Liu Y, Su Z, Zhang G, Xing S (2010) An improved selective encryption for h.264 video based on intra prediction mode scrambling. J Multimed 5(5):464–472

    Google Scholar 

  35. Kazlauskas K, Smaliukas R, Vaicekauskas G (2016) A novel method to design s-boxes based on key-dependent permutation schemes and its quality analysis. Int J Adv Comput Sci Appl 7:04

    Google Scholar 

  36. Kazmi S, Ikram N (2009) Random walk algorithm based design technique for s-box. Int J Cryptol Res 1:65–72

    Google Scholar 

  37. Kobayashi H, Kiya H (2018) Bitstream-based jpeg image encryption with file-size preserving. In: 2018 IEEE 7th Global Conference on Consumer Electronics (GCCE), pp 384–387

  38. Kohli R, Sharma D, Baliyan MK (2012) S-box design analysis and parameter variation in aes algorithm. Int J Comput Appl 2:60

    Google Scholar 

  39. Kreyszig E (2011) Advanced engineering mathematics. Wiley, New York

    MATH  Google Scholar 

  40. Kumar A (2019) Design of secure image fusion technique using cloud for privacy-preserving and copyright protection. Int J Cloud Appl Comput (IJCAC) 9(3):22–36

    Google Scholar 

  41. Lanlege DI, Kehinde R, Sobanke DA, Abdulganiyu A, Garba UM (2018) Comparison of euler and range-kutta methods in solving ordinary differ ential equations of order two and four. Leonardo J Sci 32:10–37

    Google Scholar 

  42. Laskari EC, Meletiou GC, Vrahatis MN (2006). In: 2006 international conference on computational intelligence and security, vol 2, pp 1299–1302

  43. Lei BY, Lo KT, Lei H (2010) A new h.264 video encryption scheme based on chaotic cipher, in. In: 2010 International Conference on Communications, Circuits and Systems (ICCCAS), pp 373–377

  44. Lei BY, Lo KT, Lei H (2010) A new h.264 video encryption scheme based on chaotic cipher. In: 2010 International Conference on Communications, Circuits and Systems (ICCCAS), pp 373–377

  45. Li Y, Ge G (2019) Cryptographic and parallel hash function based on cross coupled map lattices suitable for multimedia communication security. Multimed Tools Appl 78(13):17973–17994

    MathSciNet  Google Scholar 

  46. Li Y, Ge G, Xia D (2016) Chaotic hash function based on the dynamic s-box with variable parameters. Nonlinear Dyna 84(4):2387–2402

    MATH  Google Scholar 

  47. Li Y, Li X, Liu X (2017) A fast and efficient hash function based on generalized chaotic mapping with variable parameters. Neural Comput Appl 28(6):1405–1415

    Google Scholar 

  48. Li Y, Xiao D, Deng S, Zhou G (2013) Improvement and performance analysis of a novel hash function based on chaotic neural network. Neural Comput Appl 22(2):391–402

    Google Scholar 

  49. Li Z, Zhao M, Jiang H, Xu Q (2019) Keyword guessing on multi-user searchable encryption. Int J High Perform Comput Netw 14(1):60–68

    Google Scholar 

  50. Maram B, Gnanasekar J (2016) Evaluation of key dependent s-box based data security algorithm using hamming distance and balanced output. TEM J 5:67–75

    Google Scholar 

  51. Meyer J, Gadegast F (1995) Security mechanisms for multimedia data with the example mpeg-1 video

  52. Özkaynak F, Özer AB (2010) A method for designing strong s-boxes based on chaotic lorenz system. Phys Lett A 374:3733–3738. http://www.sciencedirect.com/science/article/pii/S0375960110008443

    MATH  Google Scholar 

  53. Peng J, Jin S, Liu Y, Yang Z, You M, Pei Y (2008) A novel scheme for image encryption based on piecewise linear chaotic map. 1012–1016

  54. Peng J, Jin S, Liu Y, Yang Z, You M, Pei Y (2008) A novel scheme for image encryption based on piecewise linear chaotic map. In: 2008 IEEE conference on cybernetics and intelligent systems, pp 1012–1016

  55. Peng J, Zhang D, Liao X (2011) A method for designing dynamical s-boxes based on hyperchaotic lorenz system. 304–309

  56. Peng J, Zhang D, Liao X (2011) A method for designing dynamical s-boxes based on hyperchaotic lorenz system. In: IEEE 10th International Conference on Cognitive Informatics and Cognitive Computing (ICCI-CC’11), pp 304–309

  57. Pérez C (2015) A new algorithm to construct s-boxes with high diffusion. Int J Soft Comput Math Control 4

  58. Perrin L (2019) Partitions in the s-box of streebog and kuznyechik. In: IACR transactions on symmetric cryptology, vol 2019, pp 302–329. https://tosc.iacr.org/index.php/ToSC/article/view/7405

  59. Philip M, Das A (2011) Survey: Image encryption using chaotic cryptography schemes. In: IJCA special issue on computational science - new dimensions and perspectives. full text available, pp 1–4

  60. Polla G (2013) Comparing accuracy of differential equation results between runge-kutta fehlberg methods and adams-moulton methods. Appl Math Sci 7:5115–5127

    MathSciNet  Google Scholar 

  61. Premkamal PK, Pasupuleti SK, Alphonse P (2020) Efficient escrow-free cp-abe with constant size ciphertext and secret key for big data storage in cloud. Int J Cloud Appl Comput (IJCAC) 10(1):28–45

    Google Scholar 

  62. Qiao L, Nahrstedt K (1997) A new algorithm for mpeg video encryption. In: Proceedings of the first international conference on imaging science, systems, and technology (CISST’97, pp 21–29

  63. Qiao L, Nahrstedt K (2001) A new algorithm for mpeg video encryption

  64. Rakhimov R, Yong H, Min D, Choi E (2010) A study on multimedia security systems in video encryption. 1–5

  65. Ramamoorthy V, Silaghi MC, Matsui T, Hirayama K, Yokoo M (2011) The design of cryptographic s-boxes using csps. In: Lee J. (ed) Principles and practice of constraint programming – CP 2011. Springer, Berlin, pp 54–68

  66. Sakalli M, Aslan B, Buluş E, Mesut A, Büyüksaraçoglu F, Karaahmetoğlu O (2010) On the algebraic expression of the aes s-box like s-boxes. 87:213–227

  67. Saleh M, Tahir N, Hashim H (2016) Moving objects encryption of high efficiency video coding (hevc) using aes algorithm. 8:31–36

  68. Schneier B, Kelsey J, Whiting D, Wagner D, Hall C, Ferguson N (1999) New results on the twofish encryption algorithm. In: Rome, Italy: Second AES candidate conference, April 1999

  69. Shahid Z, Chaumont M, Puech W (2011) Fast protection of h.264/avc by selective encryption of cavlc and cabac for i and p frames. IEEE Trans Circ Syst Vid Technol 21:565–576

    Google Scholar 

  70. Shahid Z, Chaumont M, Puech W (2011) Fast protection of h.264/avc by selective encryption of cavlc and cabac for i and p frames. IEEE Trans Circ Syst Vid Technol 21(5):565–576

    Google Scholar 

  71. Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28(4):656–715

    MathSciNet  MATH  Google Scholar 

  72. Sharma M, Kowar MK (2010) Image encryption techniques using chaotic schemes: A review. Int J Eng Sci Technol 2(6):2359–2363

    Google Scholar 

  73. Shi C, Bhargava B (1998) A fast mpeg video encryption algorithm. In: Proceedings of the Sixth ACM international conference on multimedia, ser. MULTIMEDIA ’98. ACM, New York, pp 81–88. https://doi.org/10.1145/290747.290758

  74. Shi C, Bhargava B (1998) A fast mpeg video encryption algorithm. In: ACM multimedia

  75. Shi C, Bhargava B (1998) An efficient mpeg video encryption algorithm. In: Proceedings seventeenth IEEE symposium on reliable distributed systems (Cat. No.98CB36281), pp 381–386

  76. Shi C, Bhargava B (1998) An efficient mpeg video encryption algorithm. In: Proceedings seventeenth IEEE symposium on reliable distributed systems (Cat. No.98CB36281), pp 381–386

  77. Shu-Jiang X, Ying-Long W, Ji-Zhi W, Min T (2008) A novel image encryption scheme based on chaotic maps

  78. Sohn H, AnzaKu ET, De Neve W, Ro YM, Plataniotis KN (2009) Privacy protection in video surveillance systems using scalable video coding. In: 2009 Sixth IEEE international conference on advanced video and signal based surveillance, pp 424–429

  79. Sohn H, AnzaKu ET, Neve WD, Ro YM, Plataniotis KN (2009) Privacy protection in video surveillance systems using scalable video coding. In: 2009 Sixth IEEE international conference on advanced video and signal based surveillance, pp 424–429

  80. Tokita T, Sorimachi T, Matsui M (1994) Linear cryptanalysis of loki and s2des. In: Advances in Cryptology - ASIACRYPT ’94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28 - December 1, 1994, Proceedings, ser. Lecture Notes in Computer Science, vol 917. Springer, pp 293–303

  81. Spanos GA, Maples TB (1996) Security for real-time mpeg compressed video in distributed multimedia applications. In: Conference proceedings of the 1996. IEEE fifteenth annual international phoenix conference on computers and communications, pp 72–78

  82. Spanos GA, Maples TB (1996) Security for real-time mpeg compressed video in distributed multimedia applications. In: Conference Proceedings of the 1996 IEEE fifteenth annual international phoenix conference on computers and communications, pp 72–78

  83. Stallings W (2002) The advanced encryption standard. Cryptologia 26(3):165–188. https://doi.org/10.1080/0161-110291890876

    Google Scholar 

  84. Tang G, Liao X (2005) A method for designing dynamical s-boxes based on discretized chaotic map. Chaos Solitons Fractals 23:1901–1909

    MathSciNet  MATH  Google Scholar 

  85. Tang G, Liao X, Yong C (2005) A novel method for designing s-boxes based on chaotic maps. Chaos, Solitons Fractals 11. https://dl.acm.org/citation.cfm?id=1857623

  86. Thomas N, Lefol D, Bull D, Redmill D (2007) A novel secure h.264 transcoder using selective encryption. In: Proceedings / ICIP, vol 4, pp IV–85

  87. Thomas NM, Lefol D, Bull DR, Redmill D (2007) A novel secure h.264 transcoder using selective encryption. In: IEEE international conference on image processing, vol 4, pp IV–85–IV–88

  88. Wang Y, Wong K-W, Li C, Li Y (2012) A novel method to design s-box based on chaotic map and genetic algorithm. Phys Lett A 376:827–833

    MATH  Google Scholar 

  89. Wang Y, Wong K, Liao X, Chen G (2011) A new chaos-based fast image encryption algorithm. Appl Soft Comput 11(1):514–522. https://dl.acm.org/citation.cfm?id=1857623

    Google Scholar 

  90. Wang Y, Wong K-W, Liao X, Xiang T (2009) A block cipher with dynamic s-boxes based on tent map. Commun Nonlinear Sci Numer Simul 14 (7):3089–3099. http://www.sciencedirect.com/science/article/pii/S1007570408004218

    MathSciNet  MATH  Google Scholar 

  91. Wang Y, Wong K-W, Liao X, Xiang T, Chen G (2009) A chaos-based image encryption algorithm with variable control parameters. Chaos Solitons Fract 41(4):1773–1783. http://www.sciencedirect.com/science/article/pii/S0960077908003263

    MATH  Google Scholar 

  92. Yu Z, Gao C-Z, Jing Z, Gupta BB, Cai Q (2018) A practical public key encryption scheme based on learning parity with noise. IEEE Access 6:31918–31923

    Google Scholar 

  93. Yu C, Li J, Li X, Ren X, Gupta BB (2018) Four-image encryption scheme based on quaternion fresnel transform, chaos and computer generated hologram. Multimed Tools Appl 77(4):4585–4608

    Google Scholar 

  94. Yu C, Li X, Xu S, Li J (2020) Computer generated hologram-based image cryptosystem with multiple chaotic systems. Wirel Netw 1–15

  95. Zahid AH, Arshad MJ (2019) An innovative design of substitution-boxes using cubic polynomial mapping. Symmetry 11:437

    MATH  Google Scholar 

  96. Zahid AH, Arshad MJ, Ahmad M (2019) A novel construction of efficient substitution-boxes using cubic fractional transformation. Entropy 21:245

    MathSciNet  Google Scholar 

  97. Zhang Y, Zhai Z, Liu W, Nie X, Cao S, Dai W (2009) Digital image encryption algorithm based on chaos and improved des. In: 2009 IEEE international conference on systems, man and cybernetics, pp 474–479

  98. Zhao M, Tong X (2010) A multiple chaotic encryption scheme for image. In: 2010 6th international conference on Wireless Communications Networking and Mobile Computing (WiCOM), pp 1–4

  99. Zheng Q, Wang X, Khan MK, Zhang W, Gupta BB, Guo W (2017) A lightweight authenticated encryption scheme based on chaotic scml for railway cloud service. IEEE Access 6:711–722

    Google Scholar 

  100. Zhu C (2012) A novel image encryption scheme based on improved hyperchaotic sequences. Opt Commun 285(1):29–37. http://www.sciencedirect.com/science/article/pii/S0030401811009540

    Google Scholar 

  101. Zou Y, Huang T, Gao W, Huo L (2006) H.264 video encryption scheme adaptive to drm. IEEE Trans Consum Electron 52(4):1289–1297

    Google Scholar 

  102. Zou Y, Huang T, Gao W, Huo L (2006) H.264 video encryption scheme adaptive to drm. IEEE Trans Consum Electron 52:1289–1297

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Muhammad Altaf.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Khan, N.A., Altaf, M. & Khan, F.A. Selective encryption of JPEG images with chaotic based novel S-box. Multimed Tools Appl 80, 9639–9656 (2021). https://doi.org/10.1007/s11042-020-10110-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-10110-5

Keywords

Navigation