Skip to main content
Log in

A novel method for image encryption using time signature-dependent s-boxes based on latin squares and the playfair system of cryptography

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

This paper presents an image encryption algorithm by using time signature-dependent S-Boxes, which are based on Latin squares, the Playfair system of cryptography, and functions that are inspired by the behavior of a Japanese ladder. The encryption algorithm includes four stages: the construction of the S-Box, the generation of keys, image diffusion, and image permutation. The public key is generated from the grey-scale values of the plaintext image and the time signature, and secret key consists of the time signature and two functions from \({\mathbb {F}_{2}^{8}} \) to \({\mathbb {F}_{2}^{8}}\). Permutation and diffusion stages of the encryption algorithm are based on a given S-Box. Moreover, a chaotic map is used in the permutation phase for an effective shuffling of pixel positions. The simulation results and security analyses show that the proposed encryption scheme is quite secure and it can resist various cyber attacks effectively.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Algorithm 1
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Aboytes-Gonzalez JA, Murguia JS, Mejia-Carlos M, Gonzalez-Aguilar H, Ramirez-Torres MT (2018) Design of a strong S-Box based on a matrix approach. Nonlinear Dyn 94(3):2003–2012

    Article  Google Scholar 

  2. Ahmed HA, Zolkipli MF, Ahmad M (2018) A novel efficient substitution-box design based on firefly algorithm and discrete chaotic map. Neural Comput Applic 31:7201–7210

    Article  Google Scholar 

  3. Alhadawi HS, Majid M, Lambi D et al (2021) A novel method of S-box design based on discrete chaotic maps and cuckoo search algorithm. Multimed Tools Appl 80:7333–7350

    Article  Google Scholar 

  4. Belazi A, Khan M, El-Latif AAA, Belghith S (2017) Efficient cryptosystem approaches: S-Boxes and permutation-substitution- based encryption. Wirel Pers Commun 87(1):337–361

    Google Scholar 

  5. Cassal-Quiroga BB, Campos-Canton E (2020) Geration of dynamical S-Boxes for block ciphers via extended logistic map. Math Probl Eng. https://doi.org/10.1155/2020/2702653

  6. Chai XL et al (2019) A novel image encryption scheme based on DNA sequence operations and chaotic systems. Neural Comput Appl 31(1):219–237

    Article  Google Scholar 

  7. Dougherty ST (2020) Combinatorics and finite geometry, Springer undergraduate mathematics series. Springer, Cham, p xv+ 369. ISBN: 978-3-030-56395-0978-3-030-56394-3 05-01

    Book  Google Scholar 

  8. Hua Z, Li J, Chen Y et al (2021) Design and application of an S-Box using complete Latin square. Nonlinear Dyn 104:807–825. https://doi.org/10.1007/s11071-021-06308-3

    Article  Google Scholar 

  9. Idrees B et al (2020) Image encryption algorithm using S-box and dynamic Henon bit level permutation. Multimed Tools Appl 79(6):135–6162

    MathSciNet  Google Scholar 

  10. Jamal SS, Khan MU, Shah T (2016) A watermarking technique with chaotic fractional S-Box transformation. Wirel Pers Commun 90(4):2033–2049

    Article  Google Scholar 

  11. Khan M, Asghar Z (2018) A novel construction of substitution box for image encryption applications with Ginger breadman chaotic map and S8 permutation. Neural Comput Appli 29:993–999

    Article  Google Scholar 

  12. Khan M, Shah T, Batool S (2016) Construction of S-Box based on chaotic Boolean functions and its application in image encryption. Neural Comput Appl 27(3):677–685

    Article  Google Scholar 

  13. Kumar CM, Vidhya R, Brindha M (2021) An efficient chaos based image encryption algorithm using enhanced thorp shuffle and chaotic convolution function. Appl Intell. https://doi.org/10.1007/s10489-021-02508-x

  14. Liu H, Kadir A, Xu C (2020) Color image encryption with cipher feedback and coupling chaotic map. International Journal of bifurcation and chaos 30(12):2050173

    Article  MathSciNet  Google Scholar 

  15. Liu H, Kadir A, Xu C (2020) Cryptanalysis and constructing S-Box based on chaotic map and backtracking. Appl Math Comput 376:125

    MathSciNet  Google Scholar 

  16. Liu L, Lei Z (2090) An approach for constructing the S-Box using the CML system. J Phys Conf Ser 1303(01):2019

    Google Scholar 

  17. Liu H, Wang X, Zhao M, Niu Y (2022) Constructing strong S-Box by 2D chaotic map with application to irreversible parallel key expansion. Int J Bifurcation and Chaos 32(11):2250163

    Article  MathSciNet  Google Scholar 

  18. Manjula G, Mohan H (2016) Constructing key dependent dynamic S-box for AES block cipher system. In: 2016 2nd International conference on applied and theoretical computing and communication technology, pp 613–617. https://doi.org/10.1109/ICATCCT.2016.7912073

  19. Moatsum A et al (2019) A new hybrid digital chaotic system with applications in image encryption. Signal Process 160:45–48

    Article  Google Scholar 

  20. Naseer A, Siddiqui N (2020) A novel approach for construction of S-Box using modified Pascal’s triangle. Int J Comput Sci Inf Sec, vol 18(1)

  21. Si Y, Liu H, Chen Y (2021) Constructing keyed strong S-Box using an enhanced quadratic map. Int J Bifurcation and Chaos 31(10):2150146

    Article  MathSciNet  Google Scholar 

  22. Sosa PM (2016) Calculating non-linearity of Boolean functions with Walsh-Hadamard Transform, UCSB, Santa Barbara, pp 1–4

  23. Toktas A, Erkan U (2022) 2D Fully chaotic map for image encryption constructed through a quadruple-objective optimization via artificial bee colony algorithm. Neural Comput and Applic 34:4295–4319. https://doi.org/10.1007/s00521-021-06552-z

    Article  Google Scholar 

  24. Trappe W, Washington CL (2006) Introduction to cryptography with coding theory, 2nd edition. Pearson Prentice Hall, Upper Saddle River, NJ. xiv+ 577 pp. ISBN: 0-13-186239-1

  25. Ullah A, Jamal SS, Shah T (2017) A novel construction of substitution box using a combination of chaotic maps with improved chaotic range. Nonlinear Dyn 88(4):2757–2769

    Article  Google Scholar 

  26. Ullah A, Jamal SS, Shah T (2018) A novel scheme for image encryption using substitution box and chaotic system. Nonlinear Dyn 91(1):359–370

    Article  MathSciNet  Google Scholar 

  27. Vidhya R, Brindha M, Gounden AN (2020) Analysis of zig-zag scan based modified feedback convolution algorithm against differential attacks and its application to image encryption. Appl Intell 50:3101–3124

    Article  Google Scholar 

  28. Webster AF, Tavares SE (1986) On the Design of S-Boxes. In: Williams H. C. (ed) Advances in cryptology -CRYPTO-85 proceedings. CRYPTO 1985. Lecture notes in computer science, vol 218. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-39799-X-41

  29. Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for Image encryption. Cyber J Multidiscip J Sci Technol J Sel Areas Telecommun 1:31–38

    Google Scholar 

  30. Zheng J, Zeng Q (2022) An image encryption algorithm using a dynamic S-box and chaotic maps. Appl Intell. https://doi.org/10.1007/s10489-022-03174-3

Download references

Acknowledgements

Serap Sahinkaya would like to thank T.U.B.I.T.A.K (Scientific and Technological Research Council of Turkey) for their support while writing this paper (Grant Number is 1059B192000947).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Serap Sahinkaya.

Ethics declarations

Data sharing not applicable to this article as no datasets were generated or analyzed during the current study. The authors declare that they have no conflicts of interest.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Dougherty, S.T., Sahinkaya, S. & Ustun, D. A novel method for image encryption using time signature-dependent s-boxes based on latin squares and the playfair system of cryptography. Multimed Tools Appl 83, 4167–4194 (2024). https://doi.org/10.1007/s11042-023-15240-0

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-15240-0

Keywords

Navigation