Skip to main content
Log in

Chaos based adaptive double-image encryption scheme using hash function and S-boxes

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Most current symmetric cryptographic algorithms (symmetric ciphers and hash functions) are considered to be relatively secure against attacks by quantum computers. Here we propose an adaptive color double-image encryption scheme based on autonomous ODE chaotic system and SHA-512. The double-image is diffused firstly by chaotic sequences with bitwise exclusive or operation, and an algorithm is designed to transform two 512-bit hash values into two S-Boxes, to substitute for the pixels of diffused double-image respectively. In each encryption process, the initial values of chaotic system are from random signal, they are true random numbers. Simulation results demonstrate that the scheme is suitable and effective for color double-image encryption.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Bernstein DJ (2010a) Grover vs. mceliece. Post-Quantum Cryptography. Springer, Berlin, p 73–80

  2. Bernstein DJ (2010b) Grover vs. mceliece. International Workshop on Post-Quantum Cryptography. Springer, Berlin, p 73–80

  3. Bernstein DJ, Hopwood D, Hülsing A, et al. (2015) SPHINCS: practical stateless hash-based signatures. Advances in Cryptology--EUROCRYPT 2015. Springer, Berlin, p 368–397

  4. Cafagna D, Grassi G (2012) On the simplest fractional-order memristor-based chaotic system. Nonlinear Dynamics 70(2):1185–1197

    Article  MathSciNet  Google Scholar 

  5. Chen J, Zhu Z, Fu C et al (2015) A fast chaos-based image encryption scheme with a dynamic state variables selection mechanism. Commun Nonlinear Sci Numer Simul 20(3):846–860

    Article  Google Scholar 

  6. De Feo L, Jao D, Plût J (2014) Towards quantum-resistant cryptosystems from super singular elliptic curve isogenies. J Math Cryptol 8(3):209–247

    Article  MathSciNet  MATH  Google Scholar 

  7. Delfs C, Galbraith S D. (2013) Computing isogenies between super singular elliptic curves over Fp arXiv preprint arXiv: 1310.7789

  8. Hussain I, Gondal MA (2014) An algorithm to generating inverse S-box for Rijndael encryption standard. 3D Res 5(4):1–5

    Article  Google Scholar 

  9. Hussain I, Shah T, Gondal MA (2012) Image encryption algorithm based on PGL(2,GF(28)) S-boxes and TD-ERCS chaotic sequence. Nonlinear Dynamics 70(1):181–187

    Article  MathSciNet  Google Scholar 

  10. Hussain I, Shah T, Gondal MA (2013) Application of S-box and chaotic map for image encryption. Math Comput Model 57(9):2576–2579

    Article  MATH  Google Scholar 

  11. Hussain I, Azam NA, Shah T (2014) Stego optical encryption based on chaotic S-box transformation. Opt Laser Technol 61:50–56

    Article  Google Scholar 

  12. Liu H, Wang X (2011) Color image encryption using spatial bit-level permutation and high-dimension chaotic system. Opt Commun 284(16–17):3895–3903

    Article  Google Scholar 

  13. Liu H, Wang X (2013) Triple-image encryption scheme based on one-time key stream generated by chaos and plain images. J Syst Softw 86(3):826–834

    Article  Google Scholar 

  14. Liu G, Li J, Liu H (2014) Chaos-based color pathological image encryption scheme using one-time keys. Comput Biol Med 45:111–117 

    Article  Google Scholar 

  15. Liu Y, Pang S, Chen D (2013) An unusual chaotic system and its control. Math Comput Model 57(9):2473–2493

    Article  MathSciNet  MATH  Google Scholar 

  16. Liu H, Kadir A, Gong P (2015) A fast color image encryption scheme using one-time S-boxes based on complex chaotic system and random environmental noise. Opt Commun 338:340–347

    Article  Google Scholar 

  17. Nyberg K (1991) Perfect nonlinear S-boxes. Advances in Cryptology—EUROCRYPT’91. Springer, Berlin, p 378–386

  18. Radhakrishnan SV, Subramanian S (2013) An analytical approach to s-box generation. Comput Electr Eng 39(3):1006–1015

    Article  Google Scholar 

  19. Seyedzadeh SM, Mirzakuchaki S (2012) A fast color image encryption algorithm based on coupled two-dimensional piecewise chaotic map. Signal Process 92(5):1202–1215

    Article  Google Scholar 

  20. Sui L, Duan K, Liang J et al (2014a) Asymmetric double-image encryption based on cascaded discrete fractional random transform and logistic maps. Opt Express 22(9):10605–10621

    Article  Google Scholar 

  21. Sui L, Lu H, Wang Z et al (2014b) Double-image encryption using discrete fractional random transform and logistic maps. Opt Lasers Eng 56:1–12

    Article  Google Scholar 

  22. Wang Y, Wong KW, Li C et al (2012) A novel method to design S-box based on chaotic map and genetic algorithm. Phys Lett A 376(6):827–833

    Article  MATH  Google Scholar 

  23. Wang Y, Lei P, Wong KW (2015) A method for constructing Bijective S-box with high nonlinearity based on chaos and optimization. Int J Bifurcation Chaos 25(10):1550127

    Article  MathSciNet  MATH  Google Scholar 

  24. Wu X, Kan H, Kurths J (2015) A new color image encryption scheme based on DNA sequences and multiple improved 1D chaotic maps. Appl Soft Comput 37:24–39

    Article  Google Scholar 

  25. Xiao D, Zhang YS (2014) Self-adaptive permutation and combined global diffusion for chaotic color image encryption. AEU Int J Electron Commun 68(4):361–368

    Article  Google Scholar 

  26. Xu Y. DCT domain image encryption algorithm based on Lorenz chaotic system. 2014, 556: 5168–5171.

  27. Ye G (2014) A block image encryption algorithm based on wave transmission and chaotic systems. Nonlinear Dynamics 75(3):417–427

    Article  Google Scholar 

  28. Zhang X, Zhao Z, Wang J (2014) Chaotic image encryption based on circular substitution box and key stream buffer. Signal Process Image Commun 29(8):902–913

    Article  Google Scholar 

  29. Zhou G, Zhang D, Liu Y et al (2015a) A novel image encryption algorithm based on chaos and line map. Neurocomputing 169:150–157

    Article  Google Scholar 

  30. Zhou Y, Ionescu C, Machado JAT (2015b) Fractional dynamics and its applications. Nonlinear Dynamics 80(4):1661–1664

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgements

This research is supported by the National Natural Science Foundation of China (No: 61363082, 61662073), the Natural Science Foundation of Shandong Province (No: ZR2015FM019), and the Natural Science Foundation of Weifang (No. 2014ZJ1060).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hongjun Liu.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Liu, H., Kadir, A., Sun, X. et al. Chaos based adaptive double-image encryption scheme using hash function and S-boxes. Multimed Tools Appl 77, 1391–1407 (2018). https://doi.org/10.1007/s11042-016-4288-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-016-4288-z

Keywords

Navigation