Skip to main content
Log in

A novel image encryption algorithm based on LFT based S-boxes and chaos

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

A novel and efficient image encryption algorithm based on the chaotic system and S-boxes is introduced in this paper, in which an original S-box is produced by linear fractional transformation (LFT) on Galois field of order 256, and then a set of S-boxes are obtained by performing zigzag confusion on the original S-box. The encryption architecture of forward substitution process (FSP) and reverse substitution process (RSP) is adopted. For each pixel of the plain image, a corresponding element in a certain S-box is chosen, and the choosing process of the S-box and element depends on two random numbers, the plain image pixel and the previous cipher pixel. Moreover, 2D–LASM is used to generate the random numbers, and its initial values and system parameter are computed by the SHA 256 hash of the plain image and the given values. Therefore, the proposed scheme has highly relationship with the original image and it can resist known-plaintext and chosen-plaintext attacks. Besides, correlated chaos and correlated substitution are used to improve the security level. Experiment results and security analyses demonstrate that the proposed image encryption algorithm is secure and efficient.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Belazi A, Abd AA, El-Latif SB (2016) A novel image encryption scheme based on substitution-permutation network and chaos. Signal Procss 128:155–170

    Article  Google Scholar 

  2. Chai XL (2015) An image encryption algorithm based on bit level Brownian motion and new chaotic systems. Multimed Tools Appl. doi:10.1007/s11042-015-3088-1

    Google Scholar 

  3. Chai XL, Yang K, Gan ZH (2016) A new chaos-based image encryption algorithm with dynamic key selection mechanisms. Multimed Tools Appl. doi:10.1007/s11042-016-3585-x

    Google Scholar 

  4. Chai XL, Gan ZH, Chen YR, Zhang YS (2017) A visually secure image encryption scheme based on compressive sensing. Signal Process 134:35–51

    Article  Google Scholar 

  5. Chen JX, Zhu ZL, Fu C, Zhang LB, Zhang YS (2015) An efficient image encryption scheme using lookup table-based confusion and diffusion. Nonlinear Dyn 81:1151–1166

    Article  Google Scholar 

  6. Chen YH, Huang HC, Lin CC (2016) Block-based reversible data hiding with multi-round estimation and difference alteration. Multimed Tools Appl 75:13679–13704

    Article  Google Scholar 

  7. Enayatifar R, Sadaei HJ, Abdullah AH, Lee M, Isnin IF (2015) A novel chaotic based image encryption using a hybrid model of deoxyribonucleic acid and cellular automata. Opt Lasers Eng 71:33–41

    Article  Google Scholar 

  8. Hua ZY, Zhou YC (2016) Image encryption using 2D logistic-adjusted-Sine map. Inf Sci 339:237–253

    Article  Google Scholar 

  9. Huang HC, Lu YY, Lin J (2016) Ownership protection for progressive image transmission with reversible data hiding and visual secret sharing. Optik 127:5950–5960

    Article  Google Scholar 

  10. Hussain I, Shah T, Gondal MA (2012) An efficient image algorithm based on S8 S-box transformation and NCA map. Opt Commn 285:4887–4890

    Article  Google Scholar 

  11. Hussain I, Shah T, Gondal MA (2012) Image encryption algorithm based on PGL(2, GF(2(8))) S-boxes and TD-ERCS chaotic sequence. Nonlinear Dyn 70:181–187

    Article  MathSciNet  Google Scholar 

  12. Hussain I, Shah T, Gondal MA, Mahmood H (2013) A novel image encryption algorithm based on chaotic maps and GF(2(8)) exponent transformation. Nonlinear Dyn 72:399–406

    Article  MathSciNet  Google Scholar 

  13. Hussain I, Shah T, Mahmood H, Gondal MA (2013) A projective general linear group based algorithm for the construction of substitution box for block ciphers. Neural Comput & Applic 22:1085–1093

    Article  Google Scholar 

  14. Iqtadar H, Muhammad AG (2014) An extended image encryption using chaotic coupled map and S-box transformation. Nonlinear Dyn 76:1355–1363

    Article  Google Scholar 

  15. Liu HJ, Abdurahman K, Gong PJ (2015) A fast color image encryption scheme using one-time S-boxes based on complex chaotic system and random noise. Opt Commun 338:340–347

    Article  Google Scholar 

  16. Mirzaei O, Yaghoobi M, Irani H (2012) A new image encryption method: parallel sub-image encryption with hyper chaos. Nonlinear Dyn 67:557–566

    Article  MathSciNet  Google Scholar 

  17. Pareek NK, Patidar V, Sud KK (2013) Diffusion-substitution based gray image encryption scheme. Digit Signal Process 23:894–901

    Article  MathSciNet  Google Scholar 

  18. Qin D, Jia S, Yang S, Wang E, Ding Q (2016) Research on secure aggregation scheme based on stateful public key cryptology in wireless sensor networks. J Inf Hid Multimed Signal Process 7:938–948

    Google Scholar 

  19. Rehman AU, Khan JS, Ahmad J, Hwang SO (2016) A new image encryption scheme based on dynamic S-boxes and chaotic maps. 3D Res 7:7

    Article  Google Scholar 

  20. Seyedzadeh SM, Norouzi B, Mosavi MR, Mirzakuchaki S (2015) A novel color image encryption algorithm based on spatial permutation and quantum chaotic map. Nonlinear Dyn 81:511–529

    Article  MathSciNet  Google Scholar 

  21. Suryanto Y, Ramli K (2016) A secure and robust image encryption based on chaotic permutation multiple circular shrinking and expanding. J Inf Hid Multimed Signal Process 7:697–713

    Google Scholar 

  22. Wang XY, Guo K (2014) A new image alternate encryption algorithm based on chaotic map. Nonlinear Dyn 76:1943–1950

    Article  MATH  Google Scholar 

  23. Wang XY, Liu CM (2016) A novel and effective image encryption algorithm based on chaos and DNA encoding. Multimed Tools Appl. doi:10.1007/s11042-016-3311-8

    Google Scholar 

  24. Wang XY, Wang Q (2014) A novel image encryption algorithm based on dynamic S-boxes constructed by chaos. Nonlinear Dyn 75:567–576

    Article  Google Scholar 

  25. Wang XY, Xu DH (2014) A novel image encryption scheme based on Brownian motion and PWLCM chaotic system. Nonlinear Dyn 75:345–353

    Article  Google Scholar 

  26. Wang XY, Zhang YQ, Bao XM (2015) A novel chaotic image encryption scheme using DNA sequence operations. Opt Lasers Eng 73:53–61

    Article  Google Scholar 

  27. Wu Y, Zhou YC, George S, Sos A, Noonan Joseph P, Premkumar N (2013) Local Shannon entropy measure with statistical tests for image randomness. Inf Sci 222:323–342

    Article  MathSciNet  MATH  Google Scholar 

  28. Wu Y, Zhou YC, Sos A, Noonan Joseph P (2014) A symmetric image cipher using wave perturbations. Signal Process 102:122–131

    Article  Google Scholar 

  29. Yao W, Zhang X, Zheng ZM, Qiu WJ (2015) A colour image encryption algorithm using 4-pixel Feistel structure and multiple chaotic systems. Nonlinear Dyn 81:151–168

    Article  MathSciNet  Google Scholar 

  30. Yap WS, Phan RCW, Yau WC, Heng SH (2015) Cryptanalysis of a new image alternate encryption algorithm based on chaotic map. Nonlinear Dyn 80:1483–1491

    Article  MathSciNet  MATH  Google Scholar 

  31. Ye GD (2014) A block image encryption algorithm based on wave transmission and chaotic systems. Nonlinear Dyn 75:417–427

    Article  Google Scholar 

  32. Ye GD, Huang XL (2016) A secure image encryption algorithm based on chaotic maps and SHA-3. Secur Commun Netw 9:2015–2023

    Google Scholar 

  33. Zhang YQ, Wang XY (2014) A symmetric image encryption algorithm based on mixed linear- nonlinear coupled map lattice. Inf Sci 273:329–351

    Article  Google Scholar 

  34. Zhang YS, Xiao D (2013) Cryptanalysis of S-box-only chaotic image ciphers against chosen plaintext attack. Nonlinear Dyn 72:751–756

    Article  MathSciNet  Google Scholar 

  35. Zhang YS, Xiao D (2014) On the security of symmetric ciphers based on DNA coding. Inf Sci 28:254–261

    Article  MATH  Google Scholar 

  36. Zhang W, Wong Kwok-wo YH, Zhu ZL (2013) An image encryption scheme using reverse 2-dimensional chaotic map and dependent diffusion. Commun Nonlinear Sci Numer Simul 18:2066–2080

    Article  MathSciNet  MATH  Google Scholar 

  37. Zhang XP, Mao YB, Zhao ZM (2014) An efficient chaotic image encryption based on alternate circular S-boxes. Nonlinear Dyn 78:359–369

    Article  Google Scholar 

  38. Zhang XP, Zhao ZM, Wang JY (2014) Chaotic image encryption based on circular substitution box and key stream buffer. Signal Process: Image 29:902–913

    Google Scholar 

  39. Zhou YC, Cao WJ, Philip CCL (2014) Image encryption using binary bitplane. Signal Process 100:197–207

    Article  Google Scholar 

  40. Zhou NR, Pan SM, Cheng S, Zhou ZH (2016) Image compression-encryption based on hyper-chaotic system and 2D compressive sensing. Opt Laser Technol 82:121–133

    Article  Google Scholar 

  41. Zhu ZL, Zhang W, Wong KW, Yu H (2011) A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf Sci 181:1171–1186

    Article  Google Scholar 

Download references

Acknowledgements

All the authors are deeply grateful to the editors for careful and fast handling of the manuscript. The authors would also like to thank the anonymous referees for their valuable suggestions to improve the quality of this paper. This work is supported by the National Natural Science Foundation of China (Grant No. 41571417 and U1604145), National Science Foundation of the United States (Grant No. CNS-1253424 and ECCS-1202225), Science and Technology Foundation of Henan Province of China (Grant No. 152102210048), Foundation and Frontier Project of Henan Province of China (Grant No. 162300410196), China Postdoctoral Science Foundation (Grant No. 2016M602235), Natural Science Foundation of Educational Committee of Henan Province of China (Grant No. 14A413015), the Research Foundation of Henan University (Grant No. xxjc20140006) and Henan Postdoctoral Scientific Program.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiuli Chai.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Gan, Z., Chai, X., Yuan, K. et al. A novel image encryption algorithm based on LFT based S-boxes and chaos. Multimed Tools Appl 77, 8759–8783 (2018). https://doi.org/10.1007/s11042-017-4772-0

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-017-4772-0

Keywords

Navigation