Abstract
Nonlinear confusion component is one of the most important part of any modern cipher. The strength and robustness of modern cryptosystem are subjected to the cryptographic properties of this nonlineaer confusion component namely S-boxes. The principle aim of this article is twofold. Firstly, we have anticipated an innovative approach of producing S-boxes by employing the Cuckoo search algorithm (CSA) an alternative to algebraic and chaotic generation of S-boxes. Secondly, we have also proposed a new encryption technique for information confidentiality of digital color images. The suggested image encryption technique is based on generated S-boxes and Arnold map. The projected information privacy mechanism is verified against a variety of cryptographic characteristics.




Similar content being viewed by others
References
Ahmed M, Mittal N, Grag P, Khan MM (2016) Efficient cryptographic substitution box design using travelling salesman problem and chaos. Elsevier 8:465–468
Alghafis A, Firdousi F, Batool SI, Amin M (2020) An efficient image encryption scheme based on chaotic and deoxyribonucleic acid sequencing. Math Comput Simul (MATCOM), Elsevier 177(C):441–466
Bhatia D, Hassan Y, Ahmad M (2015) "A novel ant colony optimization based scheme for substitution box design," in 3rd International Conference on Recent Trends in Computing 2015 (ICRTC-2015) , new delhi
Buchmann JA (2004) Introduction to cryotography (second edition). Springer-Verlag, New York
Chen J-J, Zou H, Meng W-H, Zhan Y-F, Yu Y-W, Fu C (2012) A chaos-based digital image encryption scheme with an improved diffusion strategy. optic express 20(3):2363–2378
Eli Biham AS (1991) Differential cryptanalysis of DES-like cryptosystems 1. J Cryptol 4:3–72
Faiz ul Islam GL (2017) Designing S-Box Based on 4D-4Wing Hyperchaotic System. Springer 3D Research(8)
Farah T, Rohuma, Belghith S (2017) A novel method for designing S-box based on chaotic map and teaching-Learning-Based Optimization. Cross Mark 88:1059–1074
Gan Z, Chai X, Zhang M, Lu Y (2018) A double color image encryption scheme based on three-dimensional brownian motion. Multimed Tools Appl 77:27919–27953
Gupta SSIMP (2014) Image Encryption Based on Arnold Cat Map and S-box. IJARCSSE IV(8):–807, 812
Haley S (2018) Non-commutative Massey-Omura Encryption. Eagle Scholar. 24,
He Y, Zhang YQ, Wang XY (2020) A new image encryption algorithm based on two-dimensional spatiotemporal chaotic system. Neural Comput & Applic 32:247–260
Hüseyin Hakli HU (2014) A novel particle swarm optimization algorithm with levy flight. Appl Soft Comput 23:333–345
Isha Mehra NKN (2016) Optical asymmetric image encryption using gyrator wavelet transform. Opt Commun:344–352
Joan Daeman VR (2020) 978–3–662-60769-5_Book_OnlinePDF.pdf, germany : Springer,
Khan M, Shah T (2015) An efficient chaotic image encryption scheme. Neural Comput Appl 26:1137–1148
Khan S, Han L, Lu H, Lu HK, Butt K, Bachira G, Khan NU (2019) A new hybrid image encryption algorithm based on 2D-CA, FSM-DNA rule generator, and FSBI. IEEE Access 7:81333–81350
Liao X, Chen Y, Tang G (2005) A novel method for designing S-boxes based on chaotic maps. Elsevier 23(2):413–419
Lichtenberg MAJ (1983) Regular and stochastic motion. Springer, New York
Loaiyan ARA, Yousaf A (2020) A Novel Group Theoretic and Graphical Approach," Springer. 26
Lu B, Liu F, Ge X, Li Z (2019) Cryptanalysis and improvement of a chaotic map-control-based and the plain image-related cryptosystem. Comput, Mat Continua 61(2):687–699
Majid Khan ZA (2016) A novel construction of substitution box for image encryption applications with Gingerbreadman chaotic map and S8 permutation. Springer 29:993–999
Majid Khan M, Abd El-Latif A, Belghith S, Belazi A (2016) Efficient cryptosystem approaches: S-boxes and permutation-substitution-based encryption. Springer Nonlinear dynamics 87(30):337–361. https://doi.org/10.1007/s11071-016-3046-0
Matsui M (1993) "Linear cryptanalysis method for DES cipher." in Workshop on the theory and application of cryptographic techniques, Kamakura, Japan
Mehmet Şahin Açikkapi FOABO (2019) "Side-Channel Analysis of Chaos-Based Substitution Box Structures," IEEE, vol. 7, pp. 79030–79043
Musheer Ahmad DBH (2015) "A Novel Ant Colony Optimization Based Scheme for Substitution". in Elsevier B.V
Norouzi B, Mirzakuchaki S (2017) An image encryption algorithm based on DNA sequence operations and cellular neural network. Multimed Tools Appl 76:13681–13701
Özkaynak F (2017) "From biometric data to cryptographic primitives: a new method for generation of substitution boxes," in ACM international conference on biamedical engineering and bioinformatics, Bangkok, Thailanad
Özkaynak F (2019) "Chaos based substitution boxes as a cryptographic promitive challenges and opportunities," in chaotic modeling and simulation(CMSIM). Elazig, Turkey
Pan H, Lei Y and Jian C "Research on digital image encryption algorithm based on double logistic chaotic map," EURASIP J Image Video Processing, vol. 142, 2018.
Poomagal C, Kumar SG, Mehta D (2020) Multi level key exchange and encryption protocol for internet of things (IoT). Comput Syst Sci Eng 35(1):0267–6192
Rannou F (1974) Numerical study of discrete plane area-preserving mappings. Astron Astrophys 31:289–301
Rober MD, Payne B (2005) The cuckoos. Oxford press
S. E. T. A. F. Webster (1986) "On the Design of S-Boxes," in Advances in cryptology-CRYPTO-85 proceedings, Berlin, Heidelberg
Shah T, Majid Khan AG (2013) An efficient technique for the construction of substitution box with chaotic partial differential equation. Springer. pp. 1795–1801
Shannon C (1949) Communication theory of secrecy systems. Bell Syst Tech J:60
Shashikant Burnwal SD (2013) Scheduling optimization of flexible manufacturing. Springer Verlag 64:951–959
Shrija Somaraj MAH (2015) Performance and Security Analysis for Image. Indian J Sci Technol 8(35):1–5. https://doi.org/10.17485/ijst/2015/v8i35/73141
Swathypriyadharsini P, Premalatha K (2020) Impact of fuzzy normalization on clustering microarray temporal datasets using cuckoo search. Comput Syst Sci Eng 35(1):39–50
Vijayalakshmi K, Anandan P (2020) Global levy flight of cuckoo search with particle swarm optimization for effective cluster head selection in wireless sensor network. Intell Auto Soft Comput 26(2):303–311
Yadunath Pathak KVAST (2018) Feature selection for image steganalysis using levy flight-based grey wolf optimization. Springer 78(2019):1473–1494
Yi F, Lee YH, Javidi B, Moon I (2014) Avalanche and bit independence characteristics. J Optical Soc Am A 8
Younas I, Khan M (2018) A New Efficient Digital Image Encryption Based on Inverse Left Almost Semi Group and Lorenz Chaotic System. Entropy 20(913)
Zengin A, Pehlivan I, Kacar S, Çavuşoğlu Ü (2016) A novel approach for strong S-Box generation algorithm," Springer Science+Business Media Dordrecht, p. 14
Zhang Y, Wang X, Liu L (2018) A Novel Method for Constructing the S-Box Based on Spatiotemporal Chaotic Dynamics. Appl Sci 8(12):2650
Zolkipl MF, Ahmad M (2018) "A novel efficient substitution-box design based on firefly algorithm and discrete chaotic map" Springer. 10
Acknowledgements
One of the authors (Dr. Sajjad Shaukat Jamal) extends his gratitude to the Deanship of Scientific Research at King Khalid University for funding this work through research groups program under grant number R. G. P. 2/109/43.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors have not any conflict of interest regarding the publication of this article.
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Khan, H., Jamal, S.S., Hazzazi, M.M. et al. New image encryption scheme based on Arnold map and cuckoo search optimization algorithm. Multimed Tools Appl 82, 7419–7441 (2023). https://doi.org/10.1007/s11042-022-13600-w
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-022-13600-w