Abstract
This paper presents an image encryption algorithm by using time signature-dependent S-Boxes, which are based on Latin squares, the Playfair system of cryptography, and functions that are inspired by the behavior of a Japanese ladder. The encryption algorithm includes four stages: the construction of the S-Box, the generation of keys, image diffusion, and image permutation. The public key is generated from the grey-scale values of the plaintext image and the time signature, and secret key consists of the time signature and two functions from \({\mathbb {F}_{2}^{8}} \) to \({\mathbb {F}_{2}^{8}}\). Permutation and diffusion stages of the encryption algorithm are based on a given S-Box. Moreover, a chaotic map is used in the permutation phase for an effective shuffling of pixel positions. The simulation results and security analyses show that the proposed encryption scheme is quite secure and it can resist various cyber attacks effectively.
Similar content being viewed by others
References
Aboytes-Gonzalez JA, Murguia JS, Mejia-Carlos M, Gonzalez-Aguilar H, Ramirez-Torres MT (2018) Design of a strong S-Box based on a matrix approach. Nonlinear Dyn 94(3):2003–2012
Ahmed HA, Zolkipli MF, Ahmad M (2018) A novel efficient substitution-box design based on firefly algorithm and discrete chaotic map. Neural Comput Applic 31:7201–7210
Alhadawi HS, Majid M, Lambi D et al (2021) A novel method of S-box design based on discrete chaotic maps and cuckoo search algorithm. Multimed Tools Appl 80:7333–7350
Belazi A, Khan M, El-Latif AAA, Belghith S (2017) Efficient cryptosystem approaches: S-Boxes and permutation-substitution- based encryption. Wirel Pers Commun 87(1):337–361
Cassal-Quiroga BB, Campos-Canton E (2020) Geration of dynamical S-Boxes for block ciphers via extended logistic map. Math Probl Eng. https://doi.org/10.1155/2020/2702653
Chai XL et al (2019) A novel image encryption scheme based on DNA sequence operations and chaotic systems. Neural Comput Appl 31(1):219–237
Dougherty ST (2020) Combinatorics and finite geometry, Springer undergraduate mathematics series. Springer, Cham, p xv+ 369. ISBN: 978-3-030-56395-0978-3-030-56394-3 05-01
Hua Z, Li J, Chen Y et al (2021) Design and application of an S-Box using complete Latin square. Nonlinear Dyn 104:807–825. https://doi.org/10.1007/s11071-021-06308-3
Idrees B et al (2020) Image encryption algorithm using S-box and dynamic Henon bit level permutation. Multimed Tools Appl 79(6):135–6162
Jamal SS, Khan MU, Shah T (2016) A watermarking technique with chaotic fractional S-Box transformation. Wirel Pers Commun 90(4):2033–2049
Khan M, Asghar Z (2018) A novel construction of substitution box for image encryption applications with Ginger breadman chaotic map and S8 permutation. Neural Comput Appli 29:993–999
Khan M, Shah T, Batool S (2016) Construction of S-Box based on chaotic Boolean functions and its application in image encryption. Neural Comput Appl 27(3):677–685
Kumar CM, Vidhya R, Brindha M (2021) An efficient chaos based image encryption algorithm using enhanced thorp shuffle and chaotic convolution function. Appl Intell. https://doi.org/10.1007/s10489-021-02508-x
Liu H, Kadir A, Xu C (2020) Color image encryption with cipher feedback and coupling chaotic map. International Journal of bifurcation and chaos 30(12):2050173
Liu H, Kadir A, Xu C (2020) Cryptanalysis and constructing S-Box based on chaotic map and backtracking. Appl Math Comput 376:125
Liu L, Lei Z (2090) An approach for constructing the S-Box using the CML system. J Phys Conf Ser 1303(01):2019
Liu H, Wang X, Zhao M, Niu Y (2022) Constructing strong S-Box by 2D chaotic map with application to irreversible parallel key expansion. Int J Bifurcation and Chaos 32(11):2250163
Manjula G, Mohan H (2016) Constructing key dependent dynamic S-box for AES block cipher system. In: 2016 2nd International conference on applied and theoretical computing and communication technology, pp 613–617. https://doi.org/10.1109/ICATCCT.2016.7912073
Moatsum A et al (2019) A new hybrid digital chaotic system with applications in image encryption. Signal Process 160:45–48
Naseer A, Siddiqui N (2020) A novel approach for construction of S-Box using modified Pascal’s triangle. Int J Comput Sci Inf Sec, vol 18(1)
Si Y, Liu H, Chen Y (2021) Constructing keyed strong S-Box using an enhanced quadratic map. Int J Bifurcation and Chaos 31(10):2150146
Sosa PM (2016) Calculating non-linearity of Boolean functions with Walsh-Hadamard Transform, UCSB, Santa Barbara, pp 1–4
Toktas A, Erkan U (2022) 2D Fully chaotic map for image encryption constructed through a quadruple-objective optimization via artificial bee colony algorithm. Neural Comput and Applic 34:4295–4319. https://doi.org/10.1007/s00521-021-06552-z
Trappe W, Washington CL (2006) Introduction to cryptography with coding theory, 2nd edition. Pearson Prentice Hall, Upper Saddle River, NJ. xiv+ 577 pp. ISBN: 0-13-186239-1
Ullah A, Jamal SS, Shah T (2017) A novel construction of substitution box using a combination of chaotic maps with improved chaotic range. Nonlinear Dyn 88(4):2757–2769
Ullah A, Jamal SS, Shah T (2018) A novel scheme for image encryption using substitution box and chaotic system. Nonlinear Dyn 91(1):359–370
Vidhya R, Brindha M, Gounden AN (2020) Analysis of zig-zag scan based modified feedback convolution algorithm against differential attacks and its application to image encryption. Appl Intell 50:3101–3124
Webster AF, Tavares SE (1986) On the Design of S-Boxes. In: Williams H. C. (ed) Advances in cryptology -CRYPTO-85 proceedings. CRYPTO 1985. Lecture notes in computer science, vol 218. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-39799-X-41
Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for Image encryption. Cyber J Multidiscip J Sci Technol J Sel Areas Telecommun 1:31–38
Zheng J, Zeng Q (2022) An image encryption algorithm using a dynamic S-box and chaotic maps. Appl Intell. https://doi.org/10.1007/s10489-022-03174-3
Acknowledgements
Serap Sahinkaya would like to thank T.U.B.I.T.A.K (Scientific and Technological Research Council of Turkey) for their support while writing this paper (Grant Number is 1059B192000947).
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Data sharing not applicable to this article as no datasets were generated or analyzed during the current study. The authors declare that they have no conflicts of interest.
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Dougherty, S.T., Sahinkaya, S. & Ustun, D. A novel method for image encryption using time signature-dependent s-boxes based on latin squares and the playfair system of cryptography. Multimed Tools Appl 83, 4167–4194 (2024). https://doi.org/10.1007/s11042-023-15240-0
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-023-15240-0