Skip to main content
Log in

Chaos-based diffusion for highly autocorrelated data in encryption algorithms

  • Original Paper
  • Published:
Nonlinear Dynamics Aims and scope Submit manuscript

Abstract

In a single substitution box, the same regions (pixels) of an image are encrypted to one unique symbol. To reduce this type of autocorrelation in data, chaos has been extensively applied over the last decade. By using chaotic maps, a single substitution box has been replaced with multiple substitution boxes for the encryption of autocorrelated data. The technique of multiple substitution boxes is becoming very popular among cryptographic algorithm designers to overcome the drawbacks of a single substitution box. In this paper, however, we found that replacing a single substitution box with multiple substitution boxes cannot provide a general solution for highly autocorrelated data. To address this issue, we propose a novel technique by adding chaotic diffusion to the existing substitution process. Extensive security analyses show that the proposed algorithm achieves both higher-level security and fast encryption time when compared with existing algorithms.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Abikoye, O.-C., Adewole, K.-S., Oladipupo, A.-J.: Efficient data hiding system using cryptography and steganography. IJAIS 4(11), 6–11 (2012)

    Article  Google Scholar 

  2. Gurpreet, S., Supriya, S.: A study of encryption algorithms (RSA, DES, 3DES and AES) for information security. IJCA 67(19), 33–38 (2013)

    Article  Google Scholar 

  3. William, S.: Cryptography and Network Security: Principles and Practice. Pearson Education, New York City (2010)

    Google Scholar 

  4. Bruce, S.: Applied Cryptography. Wiley, New York (1996)

    Google Scholar 

  5. Andrecut, M.: Logistic map as a random number generator. Int. J. Mod. Phys. B 12(9), 921–930 (1998)

    Article  MathSciNet  MATH  Google Scholar 

  6. Ljupco, K.: Chaos-based cryptography: a brief overview. IEEE Circuits Syst. Mag. 1(3), 6–21 (2001)

    Article  Google Scholar 

  7. Amir, A., Adil, M.-S., Jameel, A., Iqtadar, H.: A technique for digital steganography using chaotic maps. Nonlinear Dyn. 75(4), 807–816 (2013)

    Google Scholar 

  8. Ying Z.: Future Wireless Networks and Information Systems, vol. 1(143), pp. 639–644. Springer, Heidelberg (2012)

  9. Ahmed, B.-A., Abd, S.B.H.-B., Hamida, A.: A novel image encryption using an integration technique of blocks rotation based on the magic cube and the AES algorithm. IJCSI 9(4), 41–47 (2012)

    Google Scholar 

  10. Majid K.: A novel image encryption scheme based on multiple chaotic S-boxes. doi:10.1007/s11071-015-2173-3

  11. Majid K., Tariq S., Syeda I.-B: A new implementation of chaotic S-boxes in CAPTCHA. doi:10.1007/s11760-014-0741-5

  12. Majid, K., Tariq, S.: An efficient construction of substitution box with fractional chaotic system. Signal Image Video Process. doi:10.1007/s11760-013-0577-4

  13. Majid, K.: An image encryption by using Fourier series. J. Vib. Control. (2014). doi:10.1177/1077546314523029

  14. Majid, K., Tariq, S., Syeda, I.-B: Construction of S-box based on chaotic Boolean functions and its application in image encryption. Neural Comput. Appl. doi:10.1007/s00521-015-1887-y

  15. Majid, K., Tariq S.: An efficient chaotic image encryption scheme. Neural Comput. Appl. doi:10.1007/s00521-014-1800-0

  16. Majid, K., Tariq, S.: A novel construction of substitution box with Zaslavskii chaotic map and symmetric group. J. Intell. Fuzzy Syst. 28(4), 1509–1517 (2015)

    Google Scholar 

  17. Majid, K., Tariq, S.: A copyright protection using watermarking scheme based on nonlinear permutation and its quality metrics. Neural Comput. Appl. 26(4), 845–855 (2015)

    Article  Google Scholar 

  18. Majid, K., Tariq, S.: A novel image encryption technique based on Hnon chaotic map and S8 symmetric group. Neural Comput. Appl. 25(7–8), 1717–1722 (2014)

    Google Scholar 

  19. Majid, K., Tariq, S.: A construction of novel chaos base nonlinear component of block cipher. Nonlinear Dyn. 76(1), 377–382 (2014)

    Article  Google Scholar 

  20. Majid, K., Tariq, S., Syeda, I.-B.: A color image watermarking scheme based on affine transformation and S4 permutation. Neural Comput. Appl. 25(7–8), 2037–2045 (2014)

    Google Scholar 

  21. Majid, K., Tariq, S., Hasan, M., Muhammad, A.-G.: An efficient method for the construction of block cipher with multi-chaotic systems. Nonlinear Dyn. 71(3), 493–504 (2013)

    Article  Google Scholar 

  22. Majid, K., Tariq, S., Muhammad, A.-G.: An efficient technique for the construction of substitution box with chaotic partial differential equation. Nonlinear Dyn. 73(3), 1795–1801 (2013)

    Article  Google Scholar 

  23. Majid, K., Tariq, S., Hasan, M., Muhammad, A.-G., Iqtidar, H.: A novel technique for constructions of S-Boxes based on chaotic Lorenz systems. Nonlinear Dyn. 70(3), 2303–2311 (2012)

    Article  Google Scholar 

  24. Iqtadar, H., Tariq, S., Muhammad, A.-G., Waqar, A., Hassan, H.: Projective general linear group based algorithm for the construction of substitution box for block ciphers. Neural Comput. Appl. 23(1), 97–104 (2012)

    Google Scholar 

  25. Tran, M.-T., Bui, D.-K., Duong, A.-D.: Gray S-box for advanced encryption standard. Int. Conf. Comput. Intell. Secur. 1, 253–258 (2008)

    Google Scholar 

  26. Zhaopin, S., Guofu, Z., Jianguo, J.: Multimedia security: a survey of chaos-based encryption technology, multimedia a multidisciplinary approach to complex issues. In: Dr. Ioannis Karydis (Ed.). ISBN: 978-953-51-0216-8, InTech (2012)

  27. Tang, D., Wang, X.: Image encryption based on bivariate polynomials, computer science and software engineering. IEEE Int. Conf. 6, 193–196 (2008)

    Google Scholar 

  28. Ying, Q.-Z., Xing, Y.-W.: Analysis and improvement of a chaos-based symmetric image encryption scheme using a bit-level permutation. Nonlinear Dyn. 77(3), 687–698 (2014)

    Article  Google Scholar 

  29. Zhi, H.-G., Fangjun, H., Wenjie, G.: Chaos-based image encryption algorithm. Phys. Lett. A 346(13), 153–157 (2005)

    MATH  Google Scholar 

  30. Amir, A., Hadi, M., Afshin, A.: A new image encryption algorithm based on one-dimensional polynomial chaotic maps. Lect. Notes Comput. Sci. 4263, 963–971 (2006)

    Article  Google Scholar 

  31. Pisarchik, A.N., Zanin, M.: Image encryption with chaotically coupled chaotic maps. Phys. D Nonlinear Phenom. 237(20), 2638–2648 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  32. Shatheesh, S., Devaraj, P., Bhuvaneswaran, R.: Chaos based image encryption scheme based on enhanced logistic map. Distrib. Comput. Int. Technol. 6536, 290–300 (2011)

    Article  Google Scholar 

  33. Shyamala, P.: Chaos based image encryption scheme. Commun. Comput. Inf. Sci. 140, 312–317 (2011)

    Article  Google Scholar 

  34. Xuanping, Z., Zhongmeng, Z.: Chaos-based image encryption with total shuffling and bidirectional diffusion. Nonlinear Dyn. 75(12), 319–330 (2014)

    Google Scholar 

  35. Jawad, A., Seongoun, H., Arshid, A.: An experimental comparison of chaotic and non-chaotic image encryption schemes. Wirel. Pers. Commun. (2014). doi:10.1007/s11277-015-2667-9

  36. Liu, H., Wang, X.-Y.: Color image encryption based on one-time keys and robust chaotic maps. Comput. Math. Appl. 59(10), 3320–3327 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  37. Liu, H., Wang, X.-Y.: Color image encryption using spatial bit-level permutation and high-dimension chaotic system. Opt. Commun. 284(16), 3895–3903 (2011)

    Article  Google Scholar 

  38. Chengqing, L., Shujun, L., Guanrong, C., Wolfgang, A.-H.: Cryptanalysis of an image encryption scheme based on a compound chaotic sequence. Image Vis. Comput. 27, 1035–1039 (2008)

    Google Scholar 

  39. Ljupco, K., Shiguo, L.: Chaos-based cryptography. Stud. Comput. Intell. 345 (2011)

  40. Xingyuan, W., Lintao, L.: Cryptanalysis of a parallel sub-image encryption method with high-dimensional chaos. Nonlinear Dyn. 73(1–2), 795–800 (2013)

    MATH  Google Scholar 

  41. Amir, A., Adil, M.-S., Fawad, A.: Chaotic substitution for highly autocorrelated data in encryption algorithm. Commun. Nonlinear Sci. Numer. Simul. 19(9), 3106–3118 (2014)

    Article  MathSciNet  Google Scholar 

  42. Xianhan, Z., Yang, C.: A novel chaotic cap and an improved chaos-cased image encryption scheme. Sci. World J. 2014, 1–8 (2014)

    Google Scholar 

  43. Ying, Q.-Z., Xing, Y.-W.: Analysis and improvement of a chaos-based symmetric image encryption scheme using a bit-level permutation. Nonlinear Dyn. 77(3), 687–698 (2014)

    Article  Google Scholar 

  44. Nawal, E.-F., Osama, M.A.-Z.: Quality of encryption measurement of bitmap images with RC6, MRC6, and Rijndael block cipher algorithms. Int. J. Netw. Secur. 5(3), 241–251 (2007)

    Google Scholar 

  45. Jawad, A., Fawad, A.: Efficiency analysis and security evaluation of image encryption schemes. Int. J. Video Image Process. Netw. Secur. 12(4), 18–31 (2012)

    Google Scholar 

  46. Hossam, E.-A., Hamdy, M.-K., Osama, S.-F.: Implementation of RC5 block cipher algorithm for image cryptosystems. Int. J. Comput. Inf. Syst. Control Eng. 1(8), 245–250 (2007)

    Google Scholar 

  47. Wang, X.-Y., Yang, L., Liu, R., Kadir, A.: A chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn. 62(3), 615–621 (2010)

    Article  MATH  Google Scholar 

  48. Wang, X.-Y., Teng, L., Qin, X.: A novel colour image encryption algorithm based on chaos. Signal Process. 92(4), 1101–1108 (2012)

    Article  Google Scholar 

  49. Lini, A., Neenu, D.: Secure image encryption algorithms: a review. Int. J. Sci. Technol. Res. 2(4), 186–189 (2013)

    Google Scholar 

  50. Claude, E.-S.: Communication theory of secrecy systems. Bell Syst. Tech. J. 28(4), 656–715 (1949)

    Article  MATH  Google Scholar 

  51. Yuanyuan, S.-M, Lina, C., Rudan, X., Ruiqing, K.: An image encryption algorithm utilizing julia sets and hilbert curves. PloS One 9(1) (2014)

  52. Nawal, E.-F., Osama, M.A.-Z.: Quality of encryption measurement of bitmap images with RC6, MRC6, and Rijndael block cipher algorithms. Int. J. Netw. Secur. 5(3), 241–251 (2007)

    Google Scholar 

  53. Elhoseny, H.M., Ahmed, H.E.H., Abbas, A.M., Kazemian, H.B., Faragallah, O.S., El-Rabaie, S.M., Abd El-Samie, F.E.: Chaotic encryption of images in the fractional Fourier transform domain using different modes of operation. SIViP 9, 611–622 (2013)

    Article  Google Scholar 

  54. Shiguo, L.: Multimedia Content Encryption: Techniques and Applications. Auerbach Publications, Philadelphia (2008)

    Google Scholar 

  55. Muhammad, U., Muhammad, K.-K., Khaled, A., Changhoon, L.: Chaos-based secure satellite imagery cryptosystem. Comput. Math. Appl. 60(2), 326–337 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  56. Hasan, M.-E., Mina, A.-M.: Measuring encryption quality for bitmap images encrypted with Rijndael and KAMKAR block ciphers. In: Twenty second national radio science conference (NRSC), Cairo Egypt (2005)

  57. Ibrahim, F.-E., Osama, S.-F., Alaa, M.-A., El-Rabaie, S., Fathi, E.-S.: A new method for encrypting images with few details using Rijndael and RC6 block ciphers in the electronic code book mode. Inf. Secur. J. A Glob. Perspect. 21, 193–205 (2012)

    Article  Google Scholar 

  58. Mohammed, A.F.-H.: A Novel Encryption Method for Image Security. Int. J. Secur. Appl. 6(1), 1–8 (2012)

    Google Scholar 

  59. Zhu, L., Li, W., Liao, L., Li, H.: A novel image scrambling algorithm for digital watermarking based on chaotic sequences. Int. J. Comput. Sci. Netw. Secur. 6(8B), 125–130 (2006)

    Google Scholar 

  60. Zhang, Y.-Q., Wang, X.-Y.: A new image encryption algorithm based on non-adjacent coupled map lattices. Appl. Soft Comput. 26, 10–20 (2015)

    Article  Google Scholar 

  61. Zhu, L., Li, W., Liao, L., Li, H.: A symmetric image encryption algorithm based on mixed linear–nonlinear coupled map lattice. Inf. Sci. 273, 329–351 (2014)

    Article  Google Scholar 

Download references

Acknowledgments

It was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (2014R1A-1A2054174). It also was supported by the MSIP (Ministry of Science, ICT and Future Planning), Korea, under the Global IT Talent support program (NIPA-2014H0905-14-1004) supervised by the NIPA (National IT Industry Promotion Agency).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Seong Oun Hwang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ahmad, J., Hwang, S.O. Chaos-based diffusion for highly autocorrelated data in encryption algorithms. Nonlinear Dyn 82, 1839–1850 (2015). https://doi.org/10.1007/s11071-015-2281-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11071-015-2281-0

Keywords

Navigation