Skip to main content
Log in

A novel block substitution technique for image/text encryption using memory loss models and fuzzy mutation

  • Original Paper
  • Published:
Signal, Image and Video Processing Aims and scope Submit manuscript

Abstract

Robust block substitution techniques are essential to protect information against sophisticated cryptographic attacks. Existing techniques use static methods, mainly Sbox substitution, to increase nonlinearity. These static substitutions have significant weaknesses, however. Bit alterations impacts only the specific block where the bit alterations occur without extending their effects to subsequent blocks. Second, current block substitution techniques only leverage alterations in input symbols to boost confusion without considering other significant changes such as the positions of the altered symbols within the input block. To address the limitations, a more dynamic block substitution is presented. This new block substitution technique effectively monitors changes in input symbols and extends the impact of these changes to cover the entire ciphertext. The proposed method utilizes operations based on chaos, deep symbol mutation, and memory loss models to process the input blocks. We analyzed the performance of the technique using robust testing tools. Our experiments demonstrated that the proposed technique surpasses existing methods in nonlinearity and randomness metrics, achieving SAC (0.50190), BIC (111.67), NL (112.0), and entropy (7.99997). Furthermore, we integrated the proposed substitution technique into both text and image encryption techniques. The experimental study showed a substantial improvement in the performance of these techniques when using the proposed substitution technique.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Algorithm 1
Fig. 4
Algorithm 2
Algorithm 3
Algorithm 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

Data availability

All data generated or analyzed during this study are included in this published article.

References

  1. Mohammed, T., Hani, S., Yousuf, S., Al-Qutayri, M., Baker, M.: DS2B: Dynamic and secure substitution box for efficient speech encryption engine. IEEE Access 9, 93902–93915 (2021)

    Google Scholar 

  2. Daemen, J., Rijmen, V.: The Advanced Encryption Standard Process (AES). Information Security and Cryptography, vol. 1, pp. 1–8. Springer, Berlin (2002)

    Google Scholar 

  3. Abd-El-Atty, B.: Efficient S-box construction based on quantum-inspired quantum walks with PSO algorithm and its application to image cryptosystem. Complex Intell Syst (2023)

  4. Xianglian, X., Dongsheng, Z., Changjun, Z.: New insights into the existing image encryption algorithms based on DNA coding. PLoS ONE 15(10), 1–31 (2020)

    Google Scholar 

  5. Mahboob, A., Nadeem, M., Rasheed, M.W.: A study of text-theoretical approach to S-box construction with image encryption applications. Sci. Rep. 13(1), 21081 (2023)

    Google Scholar 

  6. Samiullah, M., Aslam, W., Nazir, H., Ikramullah, M.L., Shahzad, B., Mufti, M.R., Afzal, H.: An image encryption scheme based on DNA computing and multiple chaotic systems. IEEE Access 8, 25650–25663 (2020)

    Google Scholar 

  7. Wang, X., Guan, N., Zhao, H., et al.: A new image encryption scheme based on coupling map lattices with mixed multi-chaos. Sci. Rep. 10 (2020)

  8. Jamal, S.S., Hazzazi, M.M., Khan, M.F., Bassfar, Z., Aljaedi, A., ul Islam, Z.: Region of interest-based medical image encryption technique based on chaotic S-boxes. Expert Syst Appl. 238, 122030 (2024)

  9. Rajendran, S., Doraipandian, M., Seethalakshmi, R., Kirthivasan, K.: An image cipher based on bio-molecular hyper chaotic system with dual diffusion scheme. Multimed. Tools Appl. (2023)

  10. Azam, N.A., Hayat, U., Ayub, M.: A substitution box generator, its analysis, and applications in image encryption. Signal Process. 187, 108–144 (2021)

    Google Scholar 

  11. Zafar, S., Idrees, B., Rashid, T.: An algorithm for construction of substitution box based on subfield of galois field GF(\(2^{16}\)) and dynamic linear fractional transformation. Multimed. Tools Appl. (2023)

  12. Hussain, Z.A., Junaid, A.M., Musheer, A.: A novel construction of efficient substitution-boxes using cubic fractional transformation. Entropy 21(3) (2019)

  13. Hayat, U., Azam, N.A., Asif, M.: A method of generating \(8\times 8\) substitution boxes based on elliptic curves. Wirel. Pers. Commun. 101 (2018)

  14. Abdul Mujeeb Khan, M., Azam, N.A., Hayat, U., Kamarulhaili, H.: A novel deterministic substitution box generator over elliptic curves for real-time applications. J. King Saud Univ. Comput. Inf. Sci. 35(1), 219–236 (2023)

  15. Tariq, S., Ayesha, Q.: S-Box on subgroup of Galois field. Cryptography 3(2), (2019)

  16. Zahid, A.H., Elahi, H.A.M., Ahmad, M., Maghrabi, L.A., Said, R.S.A.: Secure key-based substitution-boxes design using systematic search for high nonlinearity. IEEE Access 11, 139745–139758 (2023)

    Google Scholar 

  17. Khan, M.F., Adeel, A., Khalid, S.: A novel cryptographic substitution box design using gaussian distribution. IEEE Access 7, 15999–16007 (2019)

    Google Scholar 

  18. Qing, L., Congxu, Z., Xiaoheng, D.: An efficient image encryption scheme based on the LSS chaotic map and single S-box. IEEE Access 8, 25664–25678 (2020)

    Google Scholar 

  19. Ramzan, M., Shah, T., Hazzazi, M., Aljaedi, A., Alharbi, A.R.: Construction of S-boxes using different maps over elliptic curves for image encryption. IEEE Access (2021)

  20. Mahboob, A., Siddique, I., Asif, M., Nadeem, M., Saleem, A.: Construction of highly non linear component of block cipher based on Mclaurin series and Mellin transformation with application in image encryption. Multimed. Tools Appl. (2023)

  21. Malik, A.W., Zahid, A.H., Bhatti, D.S., Kim, H.J., Kim, K.-I.: Designing S-box using tent-sine chaotic system while combining the traits of tent and sine map. IEEE Access 11, 79265–79274 (2023)

    Google Scholar 

  22. Artuğer, F., Özkaynak, F.: A method for generation of substitution box based on random selection. Egypt. Inform. J. 23(1), 127–135 (2022)

    Google Scholar 

  23. Özkaynak, F.: Construction of robust substitution boxes based on chaotic systems. Neural Comput. Appl. 31, 3317–3326 (2019)

    Google Scholar 

  24. Abd-El-Atty, B.: Efficient S-box construction based on quantum-inspired quantum walks with PSO algorithm and its application to image cryptosystem. Complex Intell. Syst. 9(5), 4817–4835 (2023)

    Google Scholar 

  25. Lawah, A.I., Ibrahim, A.A., Salih, S.Q., Alhadawi, H.S., JosephNg, P.S.: Grey wolf optimizer and discrete chaotic map for substitution boxes design and optimization. IEEE Access 11, 42416–42430 (2023)

    Google Scholar 

  26. Ahmad, M., Khaja, I.A., Baz, A., Alhakami, H., Alhakami, W.: Particle swarm optimization based highly nonlinear substitution-boxes generation for security applications. IEEE Access 8, 116132–116147 (2020)

    Google Scholar 

  27. Farah, M.A.B., Farah, A., Farah, T.: An image encryption scheme based on a new hybrid chaotic map and optimized substitution box. Nonlinear Dyn. 99, 3041–3064 (2020)

    Google Scholar 

  28. Artuğer, F., Özkaynak, F.: A new algorithm to generate AES-like substitution boxes based on sine cosine optimization algorithm. Multimed. Tools Appl. (2023)

  29. Shafique, A., Ahmed, J.: Dynamic substitution based encryption algorithm for highly correlated data. Multidimension. Syst. Signal Process. 32, 91–114 (2020)

    Google Scholar 

  30. Partheeban, P., Kavitha, V.: Dynamic key dependent AES S-box generation with optimized quality analysis. Clust. Comput. 22, 14731–14741 (2019)

    Google Scholar 

  31. Malik, M., Sarmad, M., et al.: Generation of highly nonlinear and dynamic AES substitution-boxes (S-boxes) using chaos-based rotational matrices. IEEE Access 8, 35682–35695 (2020)

    Google Scholar 

  32. Zhu, S., Deng, X., Zhang, W., Zhu, C.: Secure image encryption scheme based on a new robust chaotic map and strong S-box. Math. Comput. Simul. 207, 322–346 (2023)

    MathSciNet  Google Scholar 

  33. Razaq, A., Alolaiyan, H., et al.: A novel method for generation of strong substitution-boxes based on coset graphs and symmetric groups. IEEE Access 8, 75473–75490 (2020)

    Google Scholar 

  34. Aboytes-González, J.A., Murguía, J.S., Mejía-Carlos, M., et al.: Design of a strong S-Box based on a matrix approach. Nonlinear Dyn. 94, 2003–2012 (2018)

    Google Scholar 

  35. Zhu, D., Tong, X., Zhang, M., Wang, Z.: A new S-box generation method and advanced design based on combined chaotic system. Symmetry 12(12) 2020

  36. Xiuli, C., Zhihua, G., Kang, Y., Yiran, C., Xianxing, L.: An image encryption algorithm based on the memristive hyperchaotic system, cellular automata and DNA sequence operations. Signal Process. Image Commun. 52, 6–19 (2017)

    Google Scholar 

  37. Sun, S.: A novel hyperchaotic image encryption scheme based on DNA encoding, pixel-level scrambling and bit-level scrambling. IEEE Photonics J. 10(2), 1–14 (2018)

    Google Scholar 

  38. Zhongyun, H., Shuang, Y., Yicong, Z.: Medical image encryption using high-speed scrambling and pixel adaptive diffusion. Signal Process. 144, 134–144 (2018)

    Google Scholar 

  39. Belazi, A., Talha, M., Kharbech, S., Xiang, W.: Novel medical image encryption scheme based on chaos and DNA encoding. IEEE Access 7, 36667–36681 (2019)

    Google Scholar 

  40. Artuğer, F.: A novel algorithm based on DNA coding for substitution box generation problem. Neural Comput. Appl. (2023)

  41. Ahmed, F., Rehman, M.U., Ahmad, J., Khan, M.S., Boulila, W., Srivastava, G., Lin, J.C.-W., Buchanan, W.J.: A DNA based colour image encryption scheme using a convolutional autoencoder. ACM Trans. Multimed. Comput. Commun. Appl. 19(3s) (2023)

  42. Mohamed, A.G., Korany, N.O., El-Khamy, S.E.: New DNA coded fuzzy based (DNAFZ) S-boxes: application to robust image encryption using hyper chaotic maps. IEEE Access 9, 14284–14305 (2021)

    Google Scholar 

  43. Masood, F., Masood, J., Zhang, L., Jamal, S.S., Boulila, W., Rehman, S., Khan, F.A., Ahmad, J.: A new color image encryption technique using DNA computing and chaos-based substitution box. Soft Comput. 26(16), 7461–7477 (2022)

    Google Scholar 

  44. Liu, H., Liu, J., Ma, C.: Constructing dynamic strong S-box using 3D chaotic map and application to image encryption. Multimed. Tools Appl. 82(16), 23899–23914 (2023)

    Google Scholar 

  45. Artuğer, F., Özkaynak, F.: A method for generation of substitution box based on random selection. Egypt. Inform. J. 23(1), 127–135 (2022)

    Google Scholar 

  46. Alanazi, A.S., Munir, N., Khan, M., Asif, M., Hussain, I.: Cryptanalysis of novel image encryption scheme based on multiple chaotic substitution boxes. IEEE Access 9, 93795–93802 (2021)

    Google Scholar 

  47. Zamli, K.Z., Alhadawi, H.S., Din, F.: Utilizing the roulette wheel based social network search algorithm for substitution box construction and optimization. Neural Comput. Appl. 35(5), 4051–4071 (2023)

    Google Scholar 

  48. Fırat, A., Fatih, Ö.: A new post-processing approach for improvement of nonlinearity property in substitution boxes. Integration 94, 102105 (2024)

    Google Scholar 

  49. Cao, W., Zhou, Y., Philip-Chen, C.L., Xia, L.: Medical image encryption using edge maps. Signal Process. 132, 96–109 (2017)

    Google Scholar 

  50. Yasser, I., Mohamed, M.A., Samra, A.S., Khalifa, F.: A chaotic-based encryption/decryption framework for secure multimedia communications. Entropy 22(11) (2020)

  51. Wang, X., Wang, S., Wei, N., Zhang, Y.: A novel chaotic image encryption scheme based on hash function and cyclic shift. IETE Tech. Rev. 36(1), 39–48 (2019)

    Google Scholar 

  52. Wu, J., Liao, X., Yang, B.: Image encryption using 2D Hénon-Sine map and DNA approach. Signal Process. 153, 11–23 (2018)

    Google Scholar 

  53. Stallings, W.: Cryptography and Network Security: Principles and Practice, 8th edn. Pearson (2019)

    Google Scholar 

  54. Thoms, G.R.W., Muresan, R., Al-Dweik, A.: Chaotic encryption algorithm with key controlled neural networks for intelligent transportation systems. IEEE Access 7, 158697–158709 (2019)

    Google Scholar 

  55. Ebbinghaus, H.: Memory: a contribution to experimental psychology. Ann. Neurosci. 20(4):155—156 (1885/2013). (Reprinted) https://doi.org/10.5214/ans.0972.7531.200408

  56. Newell, A., Rosenbloom, P.S.: Mechanisms of skill acquisition and the law of practice. In: Cognitive Skills and Their Acquisition, 1st Edn, pp. 1–55. Taylor & Francis Group, New York (1981). https://doi.org/10.4324/9780203728178

  57. Donkin, C., Nosofsky, R.M.: A power-law model of psychological memory strength in short- and long-term recognition. Psychol. Sci. 23(6), 625–634 (2012). (PMID: 22527527)

    Google Scholar 

  58. Vyushin, I.D., Kushner, P.J.: Power-law and long-memory characteristics of the atmospheric general circulation. J. Clim. 22(11), 2890–2904 (2009)

    Google Scholar 

  59. Loftus, G.R.: Evaluating forgetting curves. J. Exp. Psychol. Learn. Mem. Cogn. 11(2), 397–406 (1985). https://doi.org/10.1037/0278-7393.11.2.397

    Article  Google Scholar 

  60. Anderson, J.R., Schooler, L.J.: Reflections of the environment in memory. Psychol. Sci. 2(6), 396–408 (1991). https://doi.org/10.1111/j.1467-9280.1991.tb00174.x

    Article  Google Scholar 

  61. Kocak, O., Erkan, U., Toktas, A., Gao, S.: PSO-based image encryption scheme using modular integrated logistic exponential map. Expert Syst. Appl. 237, 121452 (2024)

    Google Scholar 

  62. Soto, J.: Randomness testing of the advanced encryption standard candidate algorithms. Technical report, National Institute of Standards and Technology, 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899-8930 (1999)

  63. Webster, A.F., Tavares, S.E.: On the design of S-boxes. In: Williams, H.C. (Ed.) Advances in Cryptology—CRYPTO’85 Proceedings. CRYPTO 1985. Lecture Notes in Computer Science, vol. 218, pp. 523–534, Santa Barbara, CA, USA, August. Springer, Berlin (1985)

  64. Blondeau, C., Nyberg, K.: Perfect nonlinear functions and cryptography. Finite Fields Appl. 32, 120–147 (2015). Special Issue: Second Decade of FFA

  65. Mahmood, S., Farwa, S., Rafiq, M., Riaz, S.M.J., Shah, T., Jamal, S.S.: To study the effect of the generating polynomial on the quality of nonlinear components in block ciphers. Secur Commun. Netw. 2018 (2018)

  66. Hussain, I., Shah, T., Gondal, M.A., Khan, W.A., Mahmood, H.: A group theoretic approach to construct cryptographically strong substitution boxes. Neural Comput. Appl. 23, 97–104 (2013)

    Google Scholar 

  67. Hussain, I., Shah, T., Mahmood, H., Gondal, M.A.: A projective general linear group based algorithm for the construction of substitution box for block ciphers. Neural Comput. Appl. 22, 1085–1093 (2013)

    Google Scholar 

  68. Kazlauskas, K., Smaliukas, R., Vaicekauskas, G.: A novel method to design S-boxes based on key-dependent permutation schemes and its quality analysis. Int. J. Adv. Comput. Sci. Appl. 7(4) (2016)

  69. Zahid, A.H., Arshad, M.J.: An innovative design of substitution-boxes using cubic polynomial mapping. Symmerty 11(437), (2019)

  70. Soto, J., Bassham, L.: Randomness testing of the advanced encryption standard finalist candidates. Technical report, National Institute of Standards and Technology, 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899-8930 (2000)

  71. Siddiqui, N., Yousaf, F., et al.: A highly nonlinear substitution-box (S-box) design using action of modular group on a projective line over a finite field. Plos One (2020)

  72. Wu, Y., Noonan, J., Agaian, S.: NPCR and UACI randomness tests for image encryption. Cyber J. Multidiscip. J. Sci. Technol. J. Sel. Areas Telecommuni. (JSAT) 31–38 (2011)

  73. Anees, A., Ahmed, Z.: A technique for designing substitution box based on Van der Pol oscillator. Wirel. Pers. Commun. 82 (2015)

  74. Afiza, N., Mohd, A., Yousef, A., Ashawesh, A.: Enhanced AES algorithm based on 14 rounds in securing data and minimizing processing time. J. Phys. Conf. Ser. 1793(1):012066 (2021)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Muhammed J. Al-Muhammed.

Ethics declarations

Conflict of interest

The authors declare that they have no Conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Research Supporting Project number (RSP2024R444), King Saud University, Riyadh, Saudi Arabia.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Al-Muhammed, M.J., Alharbi, A. A novel block substitution technique for image/text encryption using memory loss models and fuzzy mutation. SIViP 18, 6115–6129 (2024). https://doi.org/10.1007/s11760-024-03301-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11760-024-03301-2

Keywords

Navigation