Informatica logo


Login Register

  1. Home
  2. Issues
  3. Volume 28, Issue 4 (2017)
  4. An Improved Image Encryption Scheme Base ...

Informatica

Information Submit your article For Referees Help ATTENTION!
  • Article info
  • Full article
  • Related articles
  • Cited by
  • More
    Article info Full article Related articles Cited by

An Improved Image Encryption Scheme Based on a Non-Linear Chaotic Algorithm and Substitution Boxes
Volume 28, Issue 4 (2017), pp. 629–649
Jan Sher Khan   Muazzam Ali Khan   Jawad Ahmad   Seong Oun Hwang   Waqas Ahmed  

Authors

 
Placeholder
https://doi.org/10.15388/Informatica.2017.149
Pub. online: 1 January 2017      Type: Research Article      Open accessOpen Access

Received
1 January 2017
Accepted
1 July 2017
Published
1 January 2017

Abstract

World has become a global village after introduction of social media and social networks. However, it extensively increased the demand for network resources, particularly multimedia traffic like images, videos and audio. The medium for this extensive traffic is always public networks such as internet or cellular networks. But the open nature of such network like internet always creates security threats for data during transmission. Due to many intrinsic features and higher correlation in multimedia traffic, existing encryption algorithms are not very convincing to perform well under critical scenarios. Therefore, many people in the research community are still working to propose new encryption schemes which can address these issues and handle multimedia traffic effectively on public networks. In this paper, we explore the weaknesses of existing encryption schemes, which compromise in many scenarios due to high correlation of multimedia traffic. To tackle this issue we proposed certain enhancements in an existing scheme. Our enhanced modification includes addition of bitwise XORed operation using non-linear chaotic algorithm. Performance of enhanced scheme is tested against state of the art security parameters. Efficiency of the proposed scheme is also validated via entropy, correlation, peak signal to noise ratio, unified average change intensity and number of pixels change rate tests.

References

 
Acharya, B., Patra, S.K., Panda, G. (2008). Image encryption by novel cryptosystem using matrix transformation. In: First International Conference on Emerging Trends in Engineering and Technology, 2008, ICETET’08. IEEE, pp. 77–81.
 
Ahmad, J., Ahmed, F. (2010). Efficiency analysis and security evaluation of image encryption schemes. Computing, 23, 25.
 
Ahmad, J., Hwang, S.O. (2015). Chaos-based diffusion for highly autocorrelated data in encryption algorithms. Nonlinear Dynamics, 82(4), 1839–1850.
 
Ahmad, J., Hwang, S.O. (2016). A secure image encryption scheme based on chaotic maps and affine transformation. Multimedia Tools and Applications, 75(21), 13951–13976.
 
Ahmad, J., Hwang, S.O., Ali, A. (2015). An experimental comparison of chaotic and non-chaotic image encryption schemes. Wireless Personal Communications, 84(2), 901–918.
 
Ahmad, J., Khan, M.A., Hwang, S.O., Khan, J.S. (2016). A compression sensing and noise-tolerant image encryption scheme based on chaotic maps and orthogonal matrices. Neural Computing and Applications, 1–15.
 
Ahmad, J., Khan, M.A., Ahmed, F., Khan, J.S. (2017). A novel image encryption scheme based on orthogonal matrix, skew tent map, and XOR operation. Neural Computing and Applications, 1–11.
 
Anees, A., Siddiqui, A.M., Ahmed, F. (2014a). Chaotic substitution for highly autocorrelated data in encryption algorithm. Communications in Nonlinear Science and Numerical Simulation, 19(9), 3106–3118.
 
Anees, A., Siddiqui, A.M., Ahmed, J., Hussain, I. (2014b). A technique for digital steganography using chaotic maps. Nonlinear Dynamics, 75(4), 807–816.
 
Belkhouche, F., Qidwai, U. (2003). Binary image encoding using 1D chaotic maps. In: IEEE Region 5, 2003 Annual Technical Conference. IEEE, pp. 39–43. 2003.
 
Bruce, S. (1996). Applied Cryptography: Protocols, Algorithms, and Source Code in C. Wiley, New York.
 
Chang, C.C., Yu, T.X. (2002). Cryptanalysis of an encryption scheme for binary images. Pattern Recognition Letters, 23(14), 1847–1852.
 
Chung, K.L., Chang, L.C. (1998). Large encrypting binary images with higher security. Pattern Recognition Letters, 19(5), 461–468.
 
Dawei, Z., Guanrong, C., Wenbo, L. (2004). A chaos-based robust wavelet-domain watermarking algorithm. Chaos, Solitons & Fractals, 22(1), 47–54.
 
Gao, H., Zhang, Y., Liang, S., Li, D. (2006). A new chaotic algorithm for image encryption. Chaos, Solitons & Fractals, 29(2), 393–399.
 
Habib, Z., Khan, J.S., Ahmad, J., Khan, M.A., Khan, F.A. (2017). Secure speech communication algorithm via DCT and TD-ERCS chaotic map. In: 2017 4th International Conference on Electrical and Electronic Engineering (ICEEE). IEEE, pp. 246–250.
 
Huang, F., Guan, Z.H. (2005). Cryptosystem using chaotic keys. Chaos, Solitons & Fractals, 23(3), 851–855.
 
Hussain, I., Shah, T., Gondal, M.A., Mahmood, H. (2012). Analysis of S-box in image encryption using root mean square error method. Zeitschrift für Naturforschung A, 67(6–7), 327–332.
 
Hussain, I., Shah, T., Gondal, M.A., Khan, W.A., Mahmood, H. (2013a). A group theoretic approach to construct cryptographically strong substitution boxes. Neural Computing and Applications, 23(1), 97–104.
 
Hussain, I., Shah, T., Mahmood, H., Gondal, M.A. (2013b). A projective general linear group based algorithm for the construction of substitution box for block ciphers. Neural Computing and Applications, 22(6), 1085–1093.
 
Jakimoski, G., Subbalakshmi, K.P. (2008). Cryptanalysis of some multimedia encryption schemes. IEEE Transactions on Multimedia, 10(3), 330–338.
 
Johansson, T., Pasalic, E. (2003). A construction of resilient functions with high nonlinearity. IEEE Transactions on Information Theory, 49(2), 494–501.
 
Kam, J.B., Davida, G.I. (1979). Structured design of substitution-permutation encryption networks. IEEE Transactions on Computers, 10, 747–753.
 
Khan, J., Ahmad, J., Hwang, S.O. (2015a). An efficient image encryption scheme based on: Henon map, skew tent map and S-Box. In: 2015 6th International Conference on Modeling, Simulation, and Applied Optimization (ICMSAO). IEEE, pp. 1–6.
 
Khan, J.S., ur Rehman, A., Ahmad, J., Habib, Z. (2015b). A new chaos-based secure image encryption scheme using multiple substitution boxes. In: 2015 Conference on Information Assurance and Cyber Security (CIACS). IEEE, pp. 16–21.
 
Khan, M.A., Ahmad, J., Javaid, Q., Saqib, N.A. (2017a). An efficient and secure partial image encryption for wireless multimedia sensor networks using discrete wavelet transform, chaotic maps and substitution box. Journal of Modern Optics, 64(5), 531–540.
 
Khan, J.S., Ahmad, J., Khan, M.A. (2017b). TD-ERCS map-based confusion and diffusion of autocorrelated data. Nonlinear Dynamics, 87(1), 93–107.
 
Kurosawa, K., Satoh, T., Yamamoto, K. (1997). Highly nonlinearfit-resilient functions. Journal of Universal Computer Science, 3(6), 721–729.
 
Leong, M.P., Cheung, O.Y., Tsoi, K.H., Leong, P.H.W. (2000). A bit-serial implementation of the international data encryption algorithm IDEA. In: 2000 IEEE Symposium on Field-Programmable Custom Computing Machines. IEEE, pp. 122–131.
 
Li, S., Zheng, X. (2002). Cryptanalysis of a chaotic image encryption method. In: IEEE International Symposium on Circuits and Systems, , 2002, ISCAS 2002, Vol. 2. IEEE.
 
Li, C., Luo, G., Qin, K., Li, C. (2017). An image encryption scheme based on chaotic tent map. Nonlinear Dynamics, 87(1), 127–133.
 
Matthews, R. (1984). On the derivation of a ‘Chaotic’ encryption algorithm. Cryptologia, 8(1), 29–41.
 
Nyberg, K. (1992). On the construction of highly nonlinear permutations. In: Workshop on the Theory and Application of of Cryptographic Techniques. Springer, Berlin, Heidelberg, pp. 92–98.
 
Rehman, A.U., Khan, J.S., Ahmad, J., Hwang, S.O. (2016). A new image encryption scheme based on dynamic s-boxes and chaotic maps. 3D Research, 7(1), 7.
 
Schneier, B. (1996). Protocol Building Blocks. Applied Cryptography. Second edition. 20th Anniversary Edition, pp. 21–46.
 
Stallings, W. (2006). Cryptography and Network Security: Principles and Practices. Pearson Education India.
 
Weister, A.F., Tavares, S.E. (1986). On the design of S-boxes [A], Dvances in Cryptology-CRYPTO?85 [C].
 
William, S. (2006). Cryptography and Network Security: for VTU. Pearson Education India.
 
Yildiz, S. (2004). Construction of Substitution Boxes Depending on Linear Block Codes. Doctoral dissertation, Middle East Technical University.
 
Younas, M.B., Ahmad, J. (2014). Comparative analysis of chaotic and non-chaotic image encryption schemes. In: 2014 International Conference on Emerging Technologies (ICET). IEEE, pp. 81–86.

Biographies

Khan Jan Sher
jskm893@gmail.com

J.S. Khan is currently pursuing his master of electrical engineering in the Department of Electrical and Electronics Engineering, Gaziantep University, Turkey. He obtained his bachelor of science degree in electrical engineering, from HITEC University in Taxila with highest distinction. As an exchange student, he completed his fourth year of undergraduate studies in the Department of Electric and Electronics Engineering at Istanbul Technical University (ITU), Turkey. His research interest includes chaos based encryption, cryptography and medical imaging.

Khan Muazzam Ali
khattakmuazzam@gmail.com

M. Khan (Senior member IEEE) is an assistant professor in the Department of Computing, SEECS, National University of Sciences & Technology, Islamabad, Pakistan. He received his master with major in mobile networks from IIUI and PhD degree in computer sciences as a sandwich program from IIUI and UMKC, USA, in 2011. He completed his Post doc at University of Ulm, Germany, and University of Missouri, USA, in 2013 and 2016, respectively. He joined Awk University Mardan as an assistant professor/chair CS department in 2011. He has been at School of Computer Science, University of Ulm, Germany, and School of Computer and Electrical Engineering University of Missouri, USA, as post doc fellow with professor dr. G.M. Chaudhry and prof. dr. Frank. Later, dr. Khattak joined College of National University of Sciences & Technology, Islamabad, as an assistant professor in 2013. He worked at the Networking and Multimedia Lab, University of Missouri, Kansas City, USA, as a research fellow. His research interests include wireless networks sensor, body area networks, image processing, image compression, image encryption and data network security.

Ahmad Jawad
jawad.saj@gmail.com

J. Ahmad received his BS degree in electronics engineering in 2009 from Muhammad Ali Jinnah University, Pakistan, and his MS degree in electrical engineering technology, from HITEC University, Pakistan, in 2012. Currently, he is enrolled as a PhD student at Glasgow Caledonian University, United Kingdom. His interest includes energy efficient systems, neural networks, cryptography and image encryption.

Hwang Seong Oun
sohwang@hongik.ac.kr

S.O. Hwang received the BS degree in mathematics in 1993 from the Seoul National University, the MS degree in computer and communications engineering in 1998 from the Pohang University of Science and Technology, and the PhD degree in computer science from the Korea Advanced Institute of Science and Technology. He worked as a software engineer at the LGCNS Systems, Inc. from 1994 to 1996. He worked as a senior researcher at the Electronics and Telecommunications Research Institute (ETRI) from 1998 to 2007. Since 2008, he has been working as an associate professor with the Department of Computer and Information Communication Engineering, Hongik University, Korea. His research interests include cryptography, cybernetic security and mobile network. He is a member of the IEEE.

Ahmed Waqas
imwaqasahmed@live.com

W. Ahmed attained his bachelor degree in communication engineering in the year 2008 from FAST University Islamabad, Pakistan. He did his masters in electrical engineering from HITEC University, Taxila. Currently, he is pursuing his PhD in computer vision from UET, Taxila, Pakistan. His area of interest involves signal processing, image processing, computer vision, and secure communication.


Full article Related articles Cited by PDF XML
Full article Related articles Cited by PDF XML

Copyright
© 2017 Vilnius University
by logo by logo
Open access article under the CC BY license.

Keywords
non-linear chaotic algorithm substitution box chaos uniform average change intensity number of pixel change

Metrics
since January 2020
1379

Article info
views

631

Full article
views

586

PDF
downloads

242

XML
downloads

Export citation

Copy and paste formatted citation
Placeholder

Download citation in file


Share


RSS

INFORMATICA

  • Online ISSN: 1822-8844
  • Print ISSN: 0868-4952
  • Copyright © 2023 Vilnius University

About

  • About journal

For contributors

  • OA Policy
  • Submit your article
  • Instructions for Referees
    •  

    •  

Contact us

  • Institute of Data Science and Digital Technologies
  • Vilnius University

    Akademijos St. 4

    08412 Vilnius, Lithuania

    Phone: (+370 5) 2109 338

    E-mail: informatica@mii.vu.lt

    https://informatica.vu.lt/journal/INFORMATICA
Powered by PubliMill  •  Privacy policy