Skip to main content
Log in

New image encryption scheme based on Arnold map and cuckoo search optimization algorithm

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Nonlinear confusion component is one of the most important part of any modern cipher. The strength and robustness of modern cryptosystem are subjected to the cryptographic properties of this nonlineaer confusion component namely S-boxes. The principle aim of this article is twofold. Firstly, we have anticipated an innovative approach of producing S-boxes by employing the Cuckoo search algorithm (CSA) an alternative to algebraic and chaotic generation of S-boxes. Secondly, we have also proposed a new encryption technique for information confidentiality of digital color images. The suggested image encryption technique is based on generated S-boxes and Arnold map. The projected information privacy mechanism is verified against a variety of cryptographic characteristics.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Ahmed M, Mittal N, Grag P, Khan MM (2016) Efficient cryptographic substitution box design using travelling salesman problem and chaos. Elsevier 8:465–468

    Google Scholar 

  2. Alghafis A, Firdousi F, Batool SI, Amin M (2020) An efficient image encryption scheme based on chaotic and deoxyribonucleic acid sequencing. Math Comput Simul (MATCOM), Elsevier 177(C):441–466

    Article  MATH  Google Scholar 

  3. Bhatia D, Hassan Y, Ahmad M (2015) "A novel ant colony optimization based scheme for substitution box design," in 3rd International Conference on Recent Trends in Computing 2015 (ICRTC-2015) , new delhi

  4. Buchmann JA (2004) Introduction to cryotography (second edition). Springer-Verlag, New York

  5. Chen J-J, Zou H, Meng W-H, Zhan Y-F, Yu Y-W, Fu C (2012) A chaos-based digital image encryption scheme with an improved diffusion strategy. optic express 20(3):2363–2378

    Article  Google Scholar 

  6. Eli Biham AS (1991) Differential cryptanalysis of DES-like cryptosystems 1. J Cryptol 4:3–72

    Article  MATH  Google Scholar 

  7. Faiz ul Islam GL (2017) Designing S-Box Based on 4D-4Wing Hyperchaotic System. Springer 3D Research(8)

  8. Farah T, Rohuma, Belghith S (2017) A novel method for designing S-box based on chaotic map and teaching-Learning-Based Optimization. Cross Mark 88:1059–1074

    Google Scholar 

  9. Gan Z, Chai X, Zhang M, Lu Y (2018) A double color image encryption scheme based on three-dimensional brownian motion. Multimed Tools Appl 77:27919–27953

    Article  Google Scholar 

  10. Gupta SSIMP (2014) Image Encryption Based on Arnold Cat Map and S-box. IJARCSSE IV(8):–807, 812

  11. Haley S (2018) Non-commutative Massey-Omura Encryption. Eagle Scholar. 24,

  12. He Y, Zhang YQ, Wang XY (2020) A new image encryption algorithm based on two-dimensional spatiotemporal chaotic system. Neural Comput & Applic 32:247–260

    Article  Google Scholar 

  13. Hüseyin Hakli HU (2014) A novel particle swarm optimization algorithm with levy flight. Appl Soft Comput 23:333–345

    Article  Google Scholar 

  14. Isha Mehra NKN (2016) Optical asymmetric image encryption using gyrator wavelet transform. Opt Commun:344–352

  15. Joan Daeman VR (2020) 978–3–662-60769-5_Book_OnlinePDF.pdf, germany : Springer,

  16. Khan M, Shah T (2015) An efficient chaotic image encryption scheme. Neural Comput Appl 26:1137–1148

    Article  Google Scholar 

  17. Khan S, Han L, Lu H, Lu HK, Butt K, Bachira G, Khan NU (2019) A new hybrid image encryption algorithm based on 2D-CA, FSM-DNA rule generator, and FSBI. IEEE Access 7:81333–81350

    Article  Google Scholar 

  18. Liao X, Chen Y, Tang G (2005) A novel method for designing S-boxes based on chaotic maps. Elsevier 23(2):413–419

    MATH  Google Scholar 

  19. Lichtenberg MAJ (1983) Regular and stochastic motion. Springer, New York

  20. Loaiyan ARA, Yousaf A (2020) A Novel Group Theoretic and Graphical Approach," Springer. 26

  21. Lu B, Liu F, Ge X, Li Z (2019) Cryptanalysis and improvement of a chaotic map-control-based and the plain image-related cryptosystem. Comput, Mat Continua 61(2):687–699

    Google Scholar 

  22. Majid Khan ZA (2016) A novel construction of substitution box for image encryption applications with Gingerbreadman chaotic map and S8 permutation. Springer 29:993–999

    Google Scholar 

  23. Majid Khan M, Abd El-Latif A, Belghith S, Belazi A (2016) Efficient cryptosystem approaches: S-boxes and permutation-substitution-based encryption. Springer Nonlinear dynamics 87(30):337–361. https://doi.org/10.1007/s11071-016-3046-0

    Article  Google Scholar 

  24. Matsui M (1993) "Linear cryptanalysis method for DES cipher." in Workshop on the theory and application of cryptographic techniques, Kamakura, Japan

  25. Mehmet Şahin Açikkapi FOABO (2019) "Side-Channel Analysis of Chaos-Based Substitution Box Structures," IEEE, vol. 7, pp. 79030–79043

  26. Musheer Ahmad DBH (2015) "A Novel Ant Colony Optimization Based Scheme for Substitution". in Elsevier B.V

  27. Norouzi B, Mirzakuchaki S (2017) An image encryption algorithm based on DNA sequence operations and cellular neural network. Multimed Tools Appl 76:13681–13701

    Article  Google Scholar 

  28. Özkaynak F (2017) "From biometric data to cryptographic primitives: a new method for generation of substitution boxes," in ACM international conference on biamedical engineering and bioinformatics, Bangkok, Thailanad

  29. Özkaynak F (2019) "Chaos based substitution boxes as a cryptographic promitive challenges and opportunities," in chaotic modeling and simulation(CMSIM). Elazig, Turkey

  30. Pan H, Lei Y and Jian C "Research on digital image encryption algorithm based on double logistic chaotic map," EURASIP J Image Video Processing, vol. 142, 2018.

  31. Poomagal C, Kumar SG, Mehta D (2020) Multi level key exchange and encryption protocol for internet of things (IoT). Comput Syst Sci Eng 35(1):0267–6192

    Google Scholar 

  32. Rannou F (1974) Numerical study of discrete plane area-preserving mappings. Astron Astrophys 31:289–301

    MATH  Google Scholar 

  33. Rober MD, Payne B (2005) The cuckoos. Oxford press

    Google Scholar 

  34. S. E. T. A. F. Webster (1986) "On the Design of S-Boxes," in Advances in cryptology-CRYPTO-85 proceedings, Berlin, Heidelberg

  35. Shah T, Majid Khan AG (2013) An efficient technique for the construction of substitution box with chaotic partial differential equation. Springer. pp. 1795–1801

  36. Shannon C (1949) Communication theory of secrecy systems. Bell Syst Tech J:60

  37. Shashikant Burnwal SD (2013) Scheduling optimization of flexible manufacturing. Springer Verlag 64:951–959

    Google Scholar 

  38. Shrija Somaraj MAH (2015) Performance and Security Analysis for Image. Indian J Sci Technol 8(35):1–5. https://doi.org/10.17485/ijst/2015/v8i35/73141

    Article  Google Scholar 

  39. Swathypriyadharsini P, Premalatha K (2020) Impact of fuzzy normalization on clustering microarray temporal datasets using cuckoo search. Comput Syst Sci Eng 35(1):39–50

    Article  Google Scholar 

  40. Vijayalakshmi K, Anandan P (2020) Global levy flight of cuckoo search with particle swarm optimization for effective cluster head selection in wireless sensor network. Intell Auto Soft Comput 26(2):303–311

    Google Scholar 

  41. Yadunath Pathak KVAST (2018) Feature selection for image steganalysis using levy flight-based grey wolf optimization. Springer 78(2019):1473–1494

    Google Scholar 

  42. Yi F, Lee YH, Javidi B, Moon I (2014) Avalanche and bit independence characteristics. J Optical Soc Am A 8

  43. Younas I, Khan M (2018) A New Efficient Digital Image Encryption Based on Inverse Left Almost Semi Group and Lorenz Chaotic System. Entropy 20(913)

  44. Zengin A, Pehlivan I, Kacar S, Çavuşoğlu Ü (2016) A novel approach for strong S-Box generation algorithm," Springer Science+Business Media Dordrecht, p. 14

  45. Zhang Y, Wang X, Liu L (2018) A Novel Method for Constructing the S-Box Based on Spatiotemporal Chaotic Dynamics. Appl Sci 8(12):2650

    Article  Google Scholar 

  46. Zolkipl MF, Ahmad M (2018) "A novel efficient substitution-box design based on firefly algorithm and discrete chaotic map" Springer. 10

Download references

Acknowledgements

One of the authors (Dr. Sajjad Shaukat Jamal) extends his gratitude to the Deanship of Scientific Research at King Khalid University for funding this work through research groups program under grant number R. G. P. 2/109/43.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hamza Khan.

Ethics declarations

Conflict of interest

The authors have not any conflict of interest regarding the publication of this article.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Khan, H., Jamal, S.S., Hazzazi, M.M. et al. New image encryption scheme based on Arnold map and cuckoo search optimization algorithm. Multimed Tools Appl 82, 7419–7441 (2023). https://doi.org/10.1007/s11042-022-13600-w

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-022-13600-w

Keywords

Navigation