Skip to main content
Log in

Dynamic substitution based encryption algorithm for highly correlated data

  • Published:
Multidimensional Systems and Signal Processing Aims and scope Submit manuscript

Abstract

In this paper, single and multiple S-box encryption issues are discussed and a new algorithm is then proposed to solve those issues. As the single S-box encryption completely fails to encrypt the plain image because a single S-box replaces the pixels of the same region with a unique symbol. To break this type of correlation in the image, chaos has been extensively used. The multiple S-boxes techniques are becoming more popular over the last decade to overcome the drawbacks of single S-box encryption. However, replacing single S-box with multiple S-boxes is somehow good for the encryption of those images which contain more number gray levels i.e 256 gray levels, but it cannot properly conceal the pixels of an image having less number of gray levels i.e binary or plain white images which contain only one gray level. To solve these issues, a dynamic substitution based encryption algorithm (DSA) is proposed, which is specially designed for the highly correlated images. Security analysis and evaluation show that the proposed algorithm can accomplish to conceal the highly correlated data.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

References

  • Ahmad, M., & Chopra, A. (2017). Chaotic dynamic s boxes based substitution approach for digital images. arXiv:1709.07620

  • Ahmad, J., & Hwang, S. O. (2015). Chaos-based diffusion for highly autocorrelated data in encryption algorithms. Nonlinear Dynamics, 82(4), 1839–1850.

    MathSciNet  MATH  Google Scholar 

  • Ahmad, J., & Hwang, S. O. (2016). A secure image encryption scheme based on chaotic maps and affine transformation. Multimedia Tools and Applications, 75(21), 13951–13976.

    Google Scholar 

  • Ahmed, F., Anees, A., Abbas, V. U., & Siyal, M. Y. (2014). A noisy channel tolerant image encryption scheme. Wireless Personal Communications, 77(4), 2771–2791.

    Google Scholar 

  • Alvarez, G., & Li, S. (2006). Some basic cryptographic requirements for chaos-based cryptosystems. International Journal of Bifurcation and Chaos, 16(08), 2129–2151.

    MathSciNet  MATH  Google Scholar 

  • Anees, A., & Chen, Y.-P. P. (2019). Designing secure substitution boxes based on permutation of symmetric group. Neural Computing and Applications, 1–12.

  • Anees, A., Hussain, I., Algarni, A., & Aslam, M. (2018). A robust watermarking scheme for online multimedia copyright protection using new chaotic map. Security and Communication Networks, 2018.

  • Anees, A. (2015). An image encryption scheme based on lorenz system for low profile applications. 3D Research, 6(3), 24.

    Google Scholar 

  • Anees, A., & Ahmed, Z. (2015). A technique for designing substitution box based on van der pol oscillator. Wireless Personal Communications, 82(3), 1497–1503.

    Google Scholar 

  • Anees, A., & Chen, Y.-P. P. (2018). Discriminative binary feature learning and quantization in biometric key generation. Pattern Recognition, 77, 289–305.

    Google Scholar 

  • Anees, A., & Gondal, M . A. (2015). Construction of nonlinear component for block cipher based on one-dimensional chaotic map. 3D Research, 6(2), 17.

    Google Scholar 

  • Anees, A., & Hussain, I. (2019). A novel method to identify initial values of chaotic maps in cybersecurity. Symmetry, 11(2), 140.

    MATH  Google Scholar 

  • Anees, A., Siddiqui, A. M., & Ahmed, F. (2014). Chaotic substitution for highly autocorrelated data in encryption algorithm. Communications in Nonlinear Science and Numerical Simulation, 19(9), 3106–3118.

    MathSciNet  MATH  Google Scholar 

  • Anees, A., Siddiqui, A. M., Ahmed, J., & Hussain, I. (2014). A technique for digital steganography using chaotic maps. Nonlinear Dynamics, 75(4), 807–816.

    Google Scholar 

  • Arroyo, D., Rhouma, R., Alvarez, G., Li, S., & Fernandez, V. (2008). On the security of a new image encryption scheme based on chaotic map lattices. Chaos: An Interdisciplinary Journal of Nonlinear Science, 18(3), 033112.

    Google Scholar 

  • Çavuşoğlu, Ü., Kaçar, S., Pehlivan, I., & Zengin, A. (2017). Secure image encryption algorithm design using a novel chaos based s-box. Chaos, Solitons & Fractals, 95, 92–101.

    MATH  Google Scholar 

  • Dan, T., & Xiaojing, W. (2008). Image encryption based on bivariate polynomials. In 2008 international conference on computer science and software engineering, vol. 6, pp. 193–196, IEEE.

  • Devaraj, P., & Kavitha, C. (2016). An image encryption scheme using dynamic s-boxes. Nonlinear Dynamics, 86(2), 927–940.

    MathSciNet  MATH  Google Scholar 

  • Elkamchouchi, H., & Makar, M. (2005). Measuring encryption quality for bitmap images encrypted with rijndael and kamkar block ciphers. In Radio science conference, 2005. NRSC 2005. Proceedings of the twenty-second national (pp. 277–284). IEEE.

  • Gondal, M. A., & Anees, A. (2013). Analysis of optimized signal processing algorithms for smart antenna system. Neural Computing and Applications, 23(3–4), 1083–1087.

    Google Scholar 

  • Guan, Z.-H., Huang, F., & Guan, W. (2005). Chaos-based image encryption algorithm. Physics Letters A, 346(1), 153–157.

    MATH  Google Scholar 

  • Helmy, M., EL-Rabaie, E.-S . M., Eldokany, I., & Abd ElSamie, F. (2018). A chaotic image encryption algorithm based on rubik’s cube principle for wireless communication. Menoufia Journal of Electronic Engineering Research, 27(2), 151–164.

    Google Scholar 

  • Hu, F., Wang, J., Xu, X., Pu, C., & Peng, T. (2017). Batch image encryption using generated deep features based on stacked autoencoder network. Mathematical Problems in Engineering, 2017.

  • Hua, Z., Zhou, Y., Pun, C.-M., & Chen, C. P. (2015). 2d sine logistic modulation map for image encryption. Information Sciences, 297, 80–94.

    Google Scholar 

  • Hussain, I., Anees, A., & Algarni, A. (2018). A novel algorithm for thermal image encryption. Journal of Integrative Neuroscience, 17(3–4), 447–461.

    Google Scholar 

  • Hussain, I., Anees, A., Alkhaldi, A. H., Aslam, M., Siddiqui, N., & Ahmed, R. (2019). Image encryption based on chebyshev chaotic map and s8 s-boxes. Optica Applicata, 49(2), 317–330.

    Google Scholar 

  • Hussain, I., Anees, A., Aslam, M., Ahmed, R., & Siddiqui, N. (2018). A noise resistant symmetric key cryptosystem based on s 8 s-boxes and chaotic maps. The European Physical Journal Plus, 133(4), 167.

    Article  Google Scholar 

  • Jamal, S. S., Anees, A., Ahmad, M., Khan, M. F., & Hussain, I. (2019). Construction of cryptographic s-boxes based on mobius transformation and chaotic tent-sine system. IEEE Access, 7, 173273–173285.

    Google Scholar 

  • Jolfaei, A., Wu, X.-W., & Muthukkumarasamy, V. (2014). Comments on the security of “diffusion-substitution based gray image encryption” scheme. Digital Signal Processing, 32, 34–36.

    Google Scholar 

  • Khan, J. S., & Ahmad, J. (2019). Chaos based efficient selective image encryption. Multidimensional Systems and Signal Processing, 30(2), 943–961.

    MathSciNet  MATH  Google Scholar 

  • Khan, F. A., Ahmed, J., Khan, J. S., Ahmad, J., & Khan, M. A. (2017). A novel image encryption based on lorenz equation, gingerbreadman chaotic map and s 8 permutation. Journal of Intelligent & Fuzzy Systems, 33(6), 3753–3765.

    Google Scholar 

  • Li, C., Li, S., Chen, G., & Halang, W. A. (2009). Cryptanalysis of an image encryption scheme based on a compound chaotic sequence. Image and Vision Computing, 27(8), 1035–1039.

    Google Scholar 

  • Liu, H., Kadir, A., Sun, X., & Li, Y. (2018). Chaos based adaptive double-image encryption scheme using hash function and s-boxes. Multimedia Tools and Applications, 77(1), 1391–1407.

    Google Scholar 

  • Liu, J., Tang, S., Lian, J., Ma, Y., & Zhang, X. (2019). A novel fourth order chaotic system and its algorithm for medical image encryption. Multidimensional Systems and Signal Processing, 30(4), 1637–1657.

    MATH  Google Scholar 

  • Liu, H., & Wang, X. (2010). Color image encryption based on one-time keys and robust chaotic maps. Computers & Mathematics with Applications, 59(10), 3320–3327.

    MathSciNet  MATH  Google Scholar 

  • Luo, Y., Zhou, R., Liu, J., Cao, Y., & Ding, X. (2018). A parallel image encryption algorithm based on the piecewise linear chaotic map and hyper-chaotic map. Nonlinear Dynamics, 93(3), 1165–1181.

    Google Scholar 

  • Mandal, M. K., Banik, G. D., Chattopadhyay, D., & Nandi, D. (2012). An image encryption process based on chaotic logistic map. IETE Technical Review, 29(5), 395–404.

  • Pareek, N., Patidar, V., & Sud, K. (2005). Cryptography using multiple one-dimensional chaotic maps. Communications in Nonlinear Science and Numerical Simulation, 10(7), 715–723.

  • Pisarchik, A., & Zanin, M. (2008). Image encryption with chaotically coupled chaotic maps. Physica D: Nonlinear Phenomena, 237(20), 2638–2648.

    MathSciNet  MATH  Google Scholar 

  • Ponuma, R., & Amutha, R. (2019). Image encryption using sparse coding and compressive sensing. Multidimensional Systems and Signal Processing, 1–15.

  • Rehman, A. U., Khan, J. S., Ahmad, J., & Hwang, S. O. (2016). A new image encryption scheme based on dynamic s-boxes and chaotic maps. 3D Research, 7(1), 7.

    Google Scholar 

  • Sam, I.S ., Devaraj, P., & Bhuvaneswaran, R. S. (2011). Chaos based image encryption scheme based on enhanced logistic map. In ICDCIT (pp. 290–300). Springer.

  • Shafique, A. (2020). A new algorithm for the construction of substitution box by using chaotic map. The European Physical Journal Plus, 135(2), 1–13.

    Google Scholar 

  • Shafique, A., & Shahid, J. (2018). Novel image encryption cryptosystem based on binary bit planes extraction and multiple chaotic maps. The European Physical Journal Plus, 133(8), 331.

    Google Scholar 

  • Shah, T., Hussain, I., Gondal, M. A., & Mahmood, H. (2011). Statistical analysis of s-box in image encryption applications based on majority logic criterion. International Journal of Physical Sciences, 6(16), 4110–4127.

    Google Scholar 

  • Shannon, C. E. (1949). Communication theory of secrecy systems. Bell Labs Technical Journal, 28(4), 656–715.

    MathSciNet  MATH  Google Scholar 

  • Su, Z., Zhang, G., & Jiang, J. (2012). Multimedia security: a survey of chaos-based encryption technology. In Multimedia—A multidisciplinary approach to complex Issues, IntechOpen.

  • Tian, Y., & Lu, Z. (2017). Novel permutation–diffusion image encryption algorithm with chaotic dynamic s-box and dna sequence operation. AIP Advances, 7(8), 085008.

    Google Scholar 

  • Ullah, A., Jamal, S. S., & Shah, T. (2018). A novel scheme for image encryption using substitution box and chaotic system. Nonlinear Dynamics, 91(1), 359–370.

    MathSciNet  Google Scholar 

  • Wang, X., & Liu, L. (2013). Cryptanalysis of a parallel sub-image encryption method with high-dimensional chaos. Nonlinear Dynamics, 73(1–2), 795–800.

    MathSciNet  MATH  Google Scholar 

  • Wang, Y., Wong, K.-W., Liao, X., & Chen, G. (2011). A new chaos-based fast image encryption algorithm. Applied Soft Computing, 11(1), 514–522.

    Google Scholar 

  • Wang, X.-Y., Yang, L., Liu, R., & Kadir, A. (2010). A chaotic image encryption algorithm based on perceptron model. Nonlinear Dynamics, 62(3), 615–621.

    MathSciNet  MATH  Google Scholar 

  • Yildiz, S. (2004). Construction of substitution boxes depending on linear block codes. PhD thesis, Middle East Technical University.

  • Zhang, X., Fan, X., Wang, J., & Zhao, Z. (2016). A chaos-based image encryption scheme using 2d rectangular transform and dependent substitution. Multimedia Tools and Applications, 75(4), 1745–1763.

    Google Scholar 

  • Zhang, G., & Liu, Q. (2011). A novel image encryption method based on total shuffling scheme. Optics Communications, 284(12), 2775–2780.

    Google Scholar 

  • Zhang, X., & Zhao, Z. (2014). Chaos-based image encryption with total shuffling and bidirectional diffusion. Nonlinear Dynamics, 75(1–2), 319–330.

    Google Scholar 

  • Zhu, C., Wang, G., & Sun, K. (2018). Cryptanalysis and improvement on an image encryption algorithm design using a novel chaos based s-box. Symmetry, 10(9), 399.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Arslan Shafique.

Ethics declarations

Conflict of Interest

The authors declare no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shafique, A., Ahmed, J. Dynamic substitution based encryption algorithm for highly correlated data. Multidim Syst Sign Process 32, 91–114 (2021). https://doi.org/10.1007/s11045-020-00730-3

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11045-020-00730-3

Keywords

Navigation