Skip to main content

Advertisement

Log in

An Innovative Image/Text Encryption Technique using Fuzzy Substitution and Chaotic Key Expansion Module

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Although many encryption techniques purport to provide adequate information protection, it is unclear how the struggle between these encryption techniques and constantly evolving hacking tools will play out. Cryptanalysis techniques are becoming more sophisticated and may soon challenge current encryption techniques. This paper proposes a new encryption technique that employs three effective and confusion-inducing methods. Specifically, the technique utilizes (1) an innovative key expansion technique that generates highly complex key sequences using chaotic means, (2) chaotic substitution that significantly transforms input symbols into different ones, and (3) a diffusion technique that induces a high avalanche effect in the output. The proposed technique was simulated on both plaintext and images and evaluated using standard NIST and ENT randomness testing as well as other effective testing techniques such as avalanche effect, pixel correlation, and entropy. The simulation results showed that the proposed encryption technique is secure and efficient for plaintext and image data.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Budati AK, Snv G, Cherukupalli K, Kumar A, Moorthy T, V. K. (2021) High speed data encryption technique with optimized memory based RSA algorithm for communications. Circuit World 47(3):269–273

  2. Alghafis A, Munir N, Khan M (2021) An encryption scheme based on chaotic Rabinovich-Fabrikant system and \(S_8\) confusion component. Multimedia Tools and Applications 80(5):7967–7985. https://doi.org/10.1007/s11042-020-10142-x

    Article  Google Scholar 

  3. Al-Muhammed MJ, Al-Daraiseh A (2022) Encryption technique based on fuzzy neural network hiding module and effective distortion method. Neural Computing and Applications 34(12):9613–9633. https://doi.org/10.1007/s00521-022-06950-x

    Article  Google Scholar 

  4. Al-Saffar NFH, Al-Saiq IR (2022) Symmetric text encryption scheme based karhunen loeve transform. Journal of Discrete Mathematical Sciences and Cryptography 25(8):2773–2781. https://doi.org/10.1080/09720529.2022.2095114

    Article  Google Scholar 

  5. Bui, D. H. (2019). An innovative lightweight cryptography system for internet-of-things ULP applications. Ph. D. Dissertation. Available at: https://tel.archives-ouvertes.fr/tel-02295267/

  6. Aqeel-ur-Rehman Liao X, Hahsmi MA, Haider R (2018) An efficient mixed inter-intra pixels substitution at 2bits-level for image encryption technique using DNA and chaos. Optik - International Journal for Light and Electron Optics 153:117–134. https://doi.org/10.1016/j.ijleo.2017.09.099

    Article  CAS  Google Scholar 

  7. Bao Z, Xue R (2021) Research on the avalanche effect of image encryption based on the cycle-GAN. Applied Optic 60(18):5320–5334. https://doi.org/10.1364/AO.428203

    Article  ADS  Google Scholar 

  8. Alghafis A, Munir N, Khan M (2021) An encryption scheme based on chaotic Rabinovich-Fabrikant system and \(S_8\) confusion component. Multimedia Tools and Applications 80(5):7967–7985. https://doi.org/10.1007/s11042-020-10142-x

  9. Benaissi S, Noureddine C, Rafik H (2023) A novel image encryption algorithm based on hybrid chaotic maps using a key image. Optik 272:170316. https://doi.org/10.1016/j.ijleo.2022.170316

    Article  ADS  Google Scholar 

  10. Budati AK, Snv G, Cherukupalli K, Kumar A, Moorthy T, V. K. (2021) High speed data encryption technique with optimized memory based RSA algorithm for communications. Circuit World 47(3):269–273

  11. Thoms GRW, Muresan R, Al-Dweik A (2019) Chaotic encryption algorithm with key controlled neural networks for intelligent transportation systems. IEEE Access 7:158697–158709. https://doi.org/10.1109/ACCESS.2019.2950007

  12. Pushpa, B. R. (2017). A new technique for data encryption using DNA sequence. Proceedings 2017 International Conference on Intelligent Computing and Control (I2C2), 1-4. https://doi.org/10.1109/I2C2.2017.8321834

  13. Chen X, Yu S, Wang Q, Guyeux C, Wang M (2023) On the cryptanalysis of an image encryption algorithm with quantum chaotic map and DNA coding. Multimedia Tools and Applications. https://doi.org/10.1007/s11042-023-15003-x

    Article  PubMed  PubMed Central  Google Scholar 

  14. Chen X, Gong M, Gan Z, Lu Y, Chai X, He X (2023) CIE-LSCP: color image encryption scheme based on the lifting scheme and cross-component permutation. Complex & Intelligent Systems 9(1):927–950

    Article  Google Scholar 

  15. Mahboob A, Asif M, Siddique I, Saleem A, Nadeem M, Grzelczyk D, Awrejcewicz J (2022) A novel construction of substitution box based on polynomial mapped and finite field with image encryption application. IEEE Access 10:119244–119258. https://doi.org/10.1109/ACCESS.2022.3218643

  16. El Hanouti I, El Fadili H (2021) Security analysis of an audio data encryption scheme based on key chaining and DNA encoding. Multimedia Tools and Applications 80(8):12077–12099. https://doi.org/10.1007/s11042-020-10153-8

    Article  Google Scholar 

  17. Firdous A, Rehman AU, Missen MMS (2021) A gray image encryption technique using the concept of water waves, chaos and hash function. IEEE Access 9:11675–11693. https://doi.org/10.1109/ACCESS.2021.3049791

    Article  Google Scholar 

  18. Gao H, Wang X (2021) Chaotic image encryption algorithm based on zigzag transform with bidirectional crossover from random position. IEEE Access 9:105627–105640. https://doi.org/10.1109/ACCESS.2021.3099214

    Article  Google Scholar 

  19. Gao S, Wu R, Wang X, Liu J, Li Q, Wang C, Tang X (2023) Asynchronous updating Boolean network encryption algorithm. IEEE Transactions on Circuits and Systems for Video Technology. https://doi.org/10.1109/TCSVT.2023.3237136

    Article  Google Scholar 

  20. Haiping C, Enjian B, Xueqing J, Yun W (2022) A fast image encryption algorithm based on improved 6-D hyper-chaotic system. IEEE Access 10:116031–116044. https://doi.org/10.1109/ACCESS.2022.3218668

    Article  Google Scholar 

  21. Hosny KM, Kamal ST, Darwish MM (2022) Novel encryption for color images using fractional-order hyperchaotic system. Journal of Ambient Intelligence and Humanized Computing 13:973–988. https://doi.org/10.1007/s12652-021-03675-y

    Article  PubMed  PubMed Central  Google Scholar 

  22. Hosny KM, Kamal ST, Darwish MM (2022) A color image encryption technique using block scrambling and chaos. Multimedia Tools and Applications 81:505–525. https://doi.org/10.1007/s11042-021-11384-z

    Article  Google Scholar 

  23. Hosny KM, Kamal ST, Darwish MM (2023) A novel color image encryption based on fractional shifted Gegenbauer moments and 2D logistic-sine map. Visual Computer 39:1027–1044. https://doi.org/10.1007/s00371-021-02382-1

    Article  Google Scholar 

  24. Hua Z, Zhu Z, Yi S, Zhang Z, Huang H (2021) Cross-plane colour image encryption using a two-dimensional logistic tent modular map. Information Sciences 546:1063–1083. https://doi.org/10.1016/j.ins.2020.09.032

    Article  MathSciNet  Google Scholar 

  25. Huang Z-W, Zhou N-R (2022) Image encryption scheme based on discrete cosine stockwell transform and DNA-level modulus diffusion. Optics & Laser Technology 149:107879. https://doi.org/10.1016/j.optlastec.2022.107879

    Article  CAS  Google Scholar 

  26. Lidkea VM, Muresan R, Al-Dweik A (2020) Convolutional neural network framework for encrypted image classification in cloud-based ITS. IEEE Open Journal of Intelligent Transportation Systems 1:35–50. https://doi.org/10.1109/OJITS.2020.2996063

  27. Li J, Chen L, Cai W, Xiao J, Zhu J, Hu Y, Wen K (2022) Holographic encryption algorithm based on bit-plane decomposition and hyperchaotic Lorenz system. Optics & Laser Technology 152:108127. https://doi.org/10.1016/j.optlastec.2022.108127

    Article  Google Scholar 

  28. Lidkea VM, Muresan R, Al-Dweik A (2020) Convolutional neural network framework for encrypted image classification in cloud-based ITS. IEEE Open Journal of Intelligent Transportation Systems 1:35–50. https://doi.org/10.1109/OJITS.2020.2996063

    Article  Google Scholar 

  29. Lone PN, Singh D, Mir UH (2022) Image encryption using DNA coding and three-dimensional chaotic systems. Multimedia Tools and Applications 81(4):5669–5693

    Article  Google Scholar 

  30. Mahboob A, Asif M, Siddique I, Saleem A, Nadeem M, Grzelczyk D, Awrejcewicz J (2022) A novel construction of substitution box based on polynomial mapped and finite field with image encryption application. IEEE Access 10:119244–119258. https://doi.org/10.1109/ACCESS.2022.3218643

    Article  Google Scholar 

  31. Man Z, Li J, Di X, Sheng Y, Liu Z (2021) Double image encryption algorithm based on neural network and chaos. Chaos, Solitons & Fractals 152:111318. https://doi.org/10.1016/j.chaos.2021.111318

    Article  MathSciNet  Google Scholar 

  32. Hua Z, Zhu Z, Yi S, Zhang Z, Huang H (2021) Cross-plane colour image encryption using a two-dimensional logistic tent modular map. Information Sciences 546:1063–1083. https://doi.org/10.1016/j.ins.2020.09.032

  33. Wang T, Wang M-H (2020) Hyperchaotic image encryption algorithm based on bit-level permutation and DNA encoding. Optics & Laser Technology 132:106355. https://doi.org/10.1016/j.optlastec.2020.106355

  34. Namasudra S (2022) Fast and secure data accessing by using DNA computing for the cloud environment. IEEE Transactions on Services Computing 15(4):2289–2300. https://doi.org/10.1109/TSC.2020.3046471

    Article  Google Scholar 

  35. Nardo LG, Nepomuceno EG, Arias-Garcia J, Butusov DN (2019) Image encryption using finite-precision error. Chaos, Solitons & Fractals 123:69–78. https://doi.org/10.1016/j.chaos.2019.03.026

    Article  ADS  Google Scholar 

  36. Naveed A, A., Jianshen, Z., Umar, H., Aleksandar, S. (2023) Towards provably secure asymmetric image encryption schemes. Information Sciences 631:164–184. https://doi.org/10.1016/j.ins.2023.02.057

  37. Su, J., Kankani, A., Zajko, G., Elchouemi, A., Kurniawan, H. (2020). Review of Image encryption techniques using neural network for optical security in the healthcare sector - PNO System. 2020 5th International Conference on Innovative Technologies in Intelligent Systems and Industrial Applications (CITISIA), 1-10. https://doi.org/10.1109/CITISIA50690.2020.9371805

  38. Chen X, Yu S, Wang Q, Guyeux C, Wang M (2023) On the cryptanalysis of an image encryption algorithm with quantum chaotic map and DNA coding. Multimedia Tools and Applications. https://doi.org/10.1007/s11042-023-15003-x

  39. Qian X, Yang Q, Li Q, Liu Q, Wu Y, Wang W (2021) A novel color image encryption algorithm based on three-dimensional chaotic maps and reconstruction techniques. IEEE Access 9:61334–61345. https://doi.org/10.1109/ACCESS.2021.3073514

    Article  Google Scholar 

  40. Sawka M, Niemiec M (2022) A sponge-based key expansion scheme for modern block ciphers. Energies 15(19):6864. https://doi.org/10.3390/en15196864

    Article  Google Scholar 

  41. Shi J, Chen S, Lu Y, Feng Y, Shi R, Yang Y, Li J (2020) An approach to cryptography based on continuous-variable quantum neural network. Scientific Reports 10(1):2107. https://doi.org/10.1038/s41598-020-58928-1

    Article  ADS  CAS  PubMed  PubMed Central  Google Scholar 

  42. Bao Z, Xue R (2021) Research on the avalanche effect of image encryption based on the cycle-GAN. Applied Optic 60(18):5320–5334. https://doi.org/10.1364/AO.428203

  43. Sawka M, Niemiec M (2022) A sponge-based key expansion scheme for modern block ciphers. Energies 15(19):6864. https://doi.org/10.3390/en15196864

  44. Alawida, M., Teh, J. S., Mehmood, A., Shoufan, A., Alshoura, W. H. (2022). A chaos-based block cipher based on an enhanced logistic map and simultaneous confusion-diffusion operations. Journal of King Saud University - Computer and Information Sciences, 34(10, Part A), 8136-8151. https://doi.org/10.1016/j.jksuci.2022.07.025

  45. Tao L, Baoxiang D, Xiaowen L (2020) Image encryption algorithm based on logistic and two-dimensional Lorenz. IEEE Access 8:13792–13805. https://doi.org/10.1109/ACCESS.2020.2966264

    Article  Google Scholar 

  46. Thoms GRW, Muresan R, Al-Dweik A (2019) Chaotic encryption algorithm with key controlled neural networks for intelligent transportation systems. IEEE Access 7:158697–158709. https://doi.org/10.1109/ACCESS.2019.2950007

    Article  Google Scholar 

  47. Unal D, Al-Ali A, Catak FO, Hammoudeh M (2021) A secure and efficient internet of things cloud encryption scheme with forensics investigation compatibility based on identity-based encryption. Future Generation Computer Systems 125:433–445. https://doi.org/10.1016/j.future.2021.06.050

    Article  Google Scholar 

  48. Gao H, Wang X (2021) Chaotic image encryption algorithm based on zigzag transform with bidirectional crossover from random position. IEEE Access 9:105627–105640. https://doi.org/10.1109/ACCESS.2021.3099214

  49. Wang X, Gao S (2020) Image encryption algorithm based on the matrix semi-tensor product with a compound secret key produced by a Boolean network. Information Sciences 539:195–214. https://doi.org/10.1016/j.ins.2020.06.030

    Article  ADS  MathSciNet  Google Scholar 

  50. Wang X, Gao S (2020) Image encryption algorithm for synchronously updating Boolean networks based on matrix semi-tensor product theory. Information Sciences 507:16–36. https://doi.org/10.1016/j.ins.2019.08.041

    Article  ADS  MathSciNet  Google Scholar 

  51. Wang X, Gao S (2020) Image encryption algorithm based on the matrix semi-tensor product with a compound secret key produced by a boolean network. Information Sciences 539:195–214. https://doi.org/10.1016/j.ins.2020.06.030

    Article  ADS  MathSciNet  Google Scholar 

  52. Wang T, Wang M-H (2020) Hyperchaotic image encryption algorithm based on bit-level permutation and DNA encoding. Optics & Laser Technology 132:106355. https://doi.org/10.1016/j.optlastec.2020.106355

    Article  CAS  Google Scholar 

  53. Wang X, Yang J (2021) A privacy image encryption algorithm based on piecewise coupled map lattice with multi dynamic coupling coefficient. Information Sciences 569:217–240. https://doi.org/10.1016/j.ins.2021.04.013

    Article  MathSciNet  Google Scholar 

  54. Wang X, Liu L, Zhang Y (2015) A novel chaotic block image encryption algorithm based on dynamic random growth technique. Optics and Lasers in Engineering 66:10–18. https://doi.org/10.1016/j.optlaseng.2014.08.005

    Article  ADS  Google Scholar 

  55. Wang X, Feng L, Zhao H (2019) Fast image encryption algorithm based on parallel computing system. Information Sciences 486:340–358. https://doi.org/10.1016/j.ins.2019.02.049

    Article  Google Scholar 

  56. Wang X, Guan N, Zhao H, Wang S, Zhang Y (2020) A new image encryption scheme based on coupling map lattices with mixed multi-chaos. Scientific Reports 10(1):9784. https://doi.org/10.1038/s41598-020-66486-9

    Article  ADS  CAS  PubMed  PubMed Central  Google Scholar 

  57. Wang X, Guan N, Zhao H, Wang S, Zhang Y (2020) A new image encryption scheme based on coupling map lattices with mixed multi-chaos. Scientific Reports 10(1):9784. https://doi.org/10.1038/s41598-020-66486-9

    Article  ADS  CAS  PubMed  PubMed Central  Google Scholar 

  58. Wang X, Su Y, Luo C, Wang C (2020) A novel image encryption algorithm based on fractional order 5D cellular neural network and Fisher-Yates scrambling. PLOS ONE 15(7):1–18. https://doi.org/10.1371/journal.pone.0236015

    Article  CAS  Google Scholar 

  59. Wang X, Gao S (2020) Image encryption algorithm based on the matrix semi-tensor product with a compound secret key produced by a boolean network. Information Sciences 539:195–214. https://doi.org/10.1016/j.ins.2020.06.030

  60. Wu W, Wang Q (2023) Cryptanalysis and improvement of an image encryption algorithm based on chaotic and Latin square. Nonlinear Dynamics 111(4):3831–3850. https://doi.org/10.1007/s11071-022-07990-7

    Article  Google Scholar 

  61. Xian Y, Wang X (2021) Fractal sorting matrix and its application on chaotic image encryption. Information Sciences 547:1154–1169. https://doi.org/10.1016/j.ins.2020.09.055

    Article  MathSciNet  Google Scholar 

  62. Xian Y, Wang X (2021) Fractal sorting matrix and its application on chaotic image encryption. Information Sciences 547:1154–1169. https://doi.org/10.1016/j.ins.2020.09.055

    Article  MathSciNet  Google Scholar 

  63. Hosny KM, Kamal ST, Darwish MM (2022) A color image encryption technique using block scrambling and chaos. Multimedia Tools and Applications 81:505–525. https://doi.org/10.1007/s11042-021-11384-z

  64. Hosny KM, Kamal ST, Darwish MM (2023) A novel color image encryption based on fractional shifted Gegenbauer moments and 2D logistic-sine map. Visual Computer 39:1027–1044. https://doi.org/10.1007/s00371-021-02382-1

  65. Yi L, Tong X, Wang Z, Zhang M, Zhu H, Liu J (2019) A novel block encryption algorithm based on chaotic S-box for wireless sensor network. IEEE Access 7:53079–53090. https://doi.org/10.1109/ACCESS.2019.2911395

    Article  Google Scholar 

  66. Benaissi S, Noureddine C, Rafik H (2023) A novel image encryption algorithm based on hybrid chaotic maps using a key image. Optik 272:170316. https://doi.org/10.1016/j.ijleo.2022.170316

  67. Zhenlong M, Jinqing L, Xiaoqiang D, Yaohui S, Zefei L (2021) Double image encryption algorithm based on neural network and chaos. Chaos, Solitons & Fractals 152:111318. https://doi.org/10.1016/j.chaos.2021.111318

    Article  MathSciNet  Google Scholar 

  68. Zhou J, Zhou N-R, Gong L-H (2020) Fast color image encryption scheme based on 3D orthogonal Latin squares and matching matrix. Optics & Laser Technology 131:106437. https://doi.org/10.1016/j.optlastec.2020.106437

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Muhammed J. Al-Muhammed.

Ethics declarations

Conflicts of Interests

The authors state that there is no conflict of interest regarding publishing this paper.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Al-Muhammed, M.J., Al-Daraiseh, A. An Innovative Image/Text Encryption Technique using Fuzzy Substitution and Chaotic Key Expansion Module. Multimed Tools Appl 83, 23201–23226 (2024). https://doi.org/10.1007/s11042-023-16469-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-16469-5

Keywords