Abstract
In this paper, single and multiple S-box encryption issues are discussed and a new algorithm is then proposed to solve those issues. As the single S-box encryption completely fails to encrypt the plain image because a single S-box replaces the pixels of the same region with a unique symbol. To break this type of correlation in the image, chaos has been extensively used. The multiple S-boxes techniques are becoming more popular over the last decade to overcome the drawbacks of single S-box encryption. However, replacing single S-box with multiple S-boxes is somehow good for the encryption of those images which contain more number gray levels i.e 256 gray levels, but it cannot properly conceal the pixels of an image having less number of gray levels i.e binary or plain white images which contain only one gray level. To solve these issues, a dynamic substitution based encryption algorithm (DSA) is proposed, which is specially designed for the highly correlated images. Security analysis and evaluation show that the proposed algorithm can accomplish to conceal the highly correlated data.















Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Ahmad, M., & Chopra, A. (2017). Chaotic dynamic s boxes based substitution approach for digital images. arXiv:1709.07620
Ahmad, J., & Hwang, S. O. (2015). Chaos-based diffusion for highly autocorrelated data in encryption algorithms. Nonlinear Dynamics, 82(4), 1839–1850.
Ahmad, J., & Hwang, S. O. (2016). A secure image encryption scheme based on chaotic maps and affine transformation. Multimedia Tools and Applications, 75(21), 13951–13976.
Ahmed, F., Anees, A., Abbas, V. U., & Siyal, M. Y. (2014). A noisy channel tolerant image encryption scheme. Wireless Personal Communications, 77(4), 2771–2791.
Alvarez, G., & Li, S. (2006). Some basic cryptographic requirements for chaos-based cryptosystems. International Journal of Bifurcation and Chaos, 16(08), 2129–2151.
Anees, A., & Chen, Y.-P. P. (2019). Designing secure substitution boxes based on permutation of symmetric group. Neural Computing and Applications, 1–12.
Anees, A., Hussain, I., Algarni, A., & Aslam, M. (2018). A robust watermarking scheme for online multimedia copyright protection using new chaotic map. Security and Communication Networks, 2018.
Anees, A. (2015). An image encryption scheme based on lorenz system for low profile applications. 3D Research, 6(3), 24.
Anees, A., & Ahmed, Z. (2015). A technique for designing substitution box based on van der pol oscillator. Wireless Personal Communications, 82(3), 1497–1503.
Anees, A., & Chen, Y.-P. P. (2018). Discriminative binary feature learning and quantization in biometric key generation. Pattern Recognition, 77, 289–305.
Anees, A., & Gondal, M . A. (2015). Construction of nonlinear component for block cipher based on one-dimensional chaotic map. 3D Research, 6(2), 17.
Anees, A., & Hussain, I. (2019). A novel method to identify initial values of chaotic maps in cybersecurity. Symmetry, 11(2), 140.
Anees, A., Siddiqui, A. M., & Ahmed, F. (2014). Chaotic substitution for highly autocorrelated data in encryption algorithm. Communications in Nonlinear Science and Numerical Simulation, 19(9), 3106–3118.
Anees, A., Siddiqui, A. M., Ahmed, J., & Hussain, I. (2014). A technique for digital steganography using chaotic maps. Nonlinear Dynamics, 75(4), 807–816.
Arroyo, D., Rhouma, R., Alvarez, G., Li, S., & Fernandez, V. (2008). On the security of a new image encryption scheme based on chaotic map lattices. Chaos: An Interdisciplinary Journal of Nonlinear Science, 18(3), 033112.
Çavuşoğlu, Ü., Kaçar, S., Pehlivan, I., & Zengin, A. (2017). Secure image encryption algorithm design using a novel chaos based s-box. Chaos, Solitons & Fractals, 95, 92–101.
Dan, T., & Xiaojing, W. (2008). Image encryption based on bivariate polynomials. In 2008 international conference on computer science and software engineering, vol. 6, pp. 193–196, IEEE.
Devaraj, P., & Kavitha, C. (2016). An image encryption scheme using dynamic s-boxes. Nonlinear Dynamics, 86(2), 927–940.
Elkamchouchi, H., & Makar, M. (2005). Measuring encryption quality for bitmap images encrypted with rijndael and kamkar block ciphers. In Radio science conference, 2005. NRSC 2005. Proceedings of the twenty-second national (pp. 277–284). IEEE.
Gondal, M. A., & Anees, A. (2013). Analysis of optimized signal processing algorithms for smart antenna system. Neural Computing and Applications, 23(3–4), 1083–1087.
Guan, Z.-H., Huang, F., & Guan, W. (2005). Chaos-based image encryption algorithm. Physics Letters A, 346(1), 153–157.
Helmy, M., EL-Rabaie, E.-S . M., Eldokany, I., & Abd ElSamie, F. (2018). A chaotic image encryption algorithm based on rubik’s cube principle for wireless communication. Menoufia Journal of Electronic Engineering Research, 27(2), 151–164.
Hu, F., Wang, J., Xu, X., Pu, C., & Peng, T. (2017). Batch image encryption using generated deep features based on stacked autoencoder network. Mathematical Problems in Engineering, 2017.
Hua, Z., Zhou, Y., Pun, C.-M., & Chen, C. P. (2015). 2d sine logistic modulation map for image encryption. Information Sciences, 297, 80–94.
Hussain, I., Anees, A., & Algarni, A. (2018). A novel algorithm for thermal image encryption. Journal of Integrative Neuroscience, 17(3–4), 447–461.
Hussain, I., Anees, A., Alkhaldi, A. H., Aslam, M., Siddiqui, N., & Ahmed, R. (2019). Image encryption based on chebyshev chaotic map and s8 s-boxes. Optica Applicata, 49(2), 317–330.
Hussain, I., Anees, A., Aslam, M., Ahmed, R., & Siddiqui, N. (2018). A noise resistant symmetric key cryptosystem based on s 8 s-boxes and chaotic maps. The European Physical Journal Plus, 133(4), 167.
Jamal, S. S., Anees, A., Ahmad, M., Khan, M. F., & Hussain, I. (2019). Construction of cryptographic s-boxes based on mobius transformation and chaotic tent-sine system. IEEE Access, 7, 173273–173285.
Jolfaei, A., Wu, X.-W., & Muthukkumarasamy, V. (2014). Comments on the security of “diffusion-substitution based gray image encryption” scheme. Digital Signal Processing, 32, 34–36.
Khan, J. S., & Ahmad, J. (2019). Chaos based efficient selective image encryption. Multidimensional Systems and Signal Processing, 30(2), 943–961.
Khan, F. A., Ahmed, J., Khan, J. S., Ahmad, J., & Khan, M. A. (2017). A novel image encryption based on lorenz equation, gingerbreadman chaotic map and s 8 permutation. Journal of Intelligent & Fuzzy Systems, 33(6), 3753–3765.
Li, C., Li, S., Chen, G., & Halang, W. A. (2009). Cryptanalysis of an image encryption scheme based on a compound chaotic sequence. Image and Vision Computing, 27(8), 1035–1039.
Liu, H., Kadir, A., Sun, X., & Li, Y. (2018). Chaos based adaptive double-image encryption scheme using hash function and s-boxes. Multimedia Tools and Applications, 77(1), 1391–1407.
Liu, J., Tang, S., Lian, J., Ma, Y., & Zhang, X. (2019). A novel fourth order chaotic system and its algorithm for medical image encryption. Multidimensional Systems and Signal Processing, 30(4), 1637–1657.
Liu, H., & Wang, X. (2010). Color image encryption based on one-time keys and robust chaotic maps. Computers & Mathematics with Applications, 59(10), 3320–3327.
Luo, Y., Zhou, R., Liu, J., Cao, Y., & Ding, X. (2018). A parallel image encryption algorithm based on the piecewise linear chaotic map and hyper-chaotic map. Nonlinear Dynamics, 93(3), 1165–1181.
Mandal, M. K., Banik, G. D., Chattopadhyay, D., & Nandi, D. (2012). An image encryption process based on chaotic logistic map. IETE Technical Review, 29(5), 395–404.
Pareek, N., Patidar, V., & Sud, K. (2005). Cryptography using multiple one-dimensional chaotic maps. Communications in Nonlinear Science and Numerical Simulation, 10(7), 715–723.
Pisarchik, A., & Zanin, M. (2008). Image encryption with chaotically coupled chaotic maps. Physica D: Nonlinear Phenomena, 237(20), 2638–2648.
Ponuma, R., & Amutha, R. (2019). Image encryption using sparse coding and compressive sensing. Multidimensional Systems and Signal Processing, 1–15.
Rehman, A. U., Khan, J. S., Ahmad, J., & Hwang, S. O. (2016). A new image encryption scheme based on dynamic s-boxes and chaotic maps. 3D Research, 7(1), 7.
Sam, I.S ., Devaraj, P., & Bhuvaneswaran, R. S. (2011). Chaos based image encryption scheme based on enhanced logistic map. In ICDCIT (pp. 290–300). Springer.
Shafique, A. (2020). A new algorithm for the construction of substitution box by using chaotic map. The European Physical Journal Plus, 135(2), 1–13.
Shafique, A., & Shahid, J. (2018). Novel image encryption cryptosystem based on binary bit planes extraction and multiple chaotic maps. The European Physical Journal Plus, 133(8), 331.
Shah, T., Hussain, I., Gondal, M. A., & Mahmood, H. (2011). Statistical analysis of s-box in image encryption applications based on majority logic criterion. International Journal of Physical Sciences, 6(16), 4110–4127.
Shannon, C. E. (1949). Communication theory of secrecy systems. Bell Labs Technical Journal, 28(4), 656–715.
Su, Z., Zhang, G., & Jiang, J. (2012). Multimedia security: a survey of chaos-based encryption technology. In Multimedia—A multidisciplinary approach to complex Issues, IntechOpen.
Tian, Y., & Lu, Z. (2017). Novel permutation–diffusion image encryption algorithm with chaotic dynamic s-box and dna sequence operation. AIP Advances, 7(8), 085008.
Ullah, A., Jamal, S. S., & Shah, T. (2018). A novel scheme for image encryption using substitution box and chaotic system. Nonlinear Dynamics, 91(1), 359–370.
Wang, X., & Liu, L. (2013). Cryptanalysis of a parallel sub-image encryption method with high-dimensional chaos. Nonlinear Dynamics, 73(1–2), 795–800.
Wang, Y., Wong, K.-W., Liao, X., & Chen, G. (2011). A new chaos-based fast image encryption algorithm. Applied Soft Computing, 11(1), 514–522.
Wang, X.-Y., Yang, L., Liu, R., & Kadir, A. (2010). A chaotic image encryption algorithm based on perceptron model. Nonlinear Dynamics, 62(3), 615–621.
Yildiz, S. (2004). Construction of substitution boxes depending on linear block codes. PhD thesis, Middle East Technical University.
Zhang, X., Fan, X., Wang, J., & Zhao, Z. (2016). A chaos-based image encryption scheme using 2d rectangular transform and dependent substitution. Multimedia Tools and Applications, 75(4), 1745–1763.
Zhang, G., & Liu, Q. (2011). A novel image encryption method based on total shuffling scheme. Optics Communications, 284(12), 2775–2780.
Zhang, X., & Zhao, Z. (2014). Chaos-based image encryption with total shuffling and bidirectional diffusion. Nonlinear Dynamics, 75(1–2), 319–330.
Zhu, C., Wang, G., & Sun, K. (2018). Cryptanalysis and improvement on an image encryption algorithm design using a novel chaos based s-box. Symmetry, 10(9), 399.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of Interest
The authors declare no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Shafique, A., Ahmed, J. Dynamic substitution based encryption algorithm for highly correlated data. Multidim Syst Sign Process 32, 91–114 (2021). https://doi.org/10.1007/s11045-020-00730-3
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11045-020-00730-3