Abstract
In a single substitution box, the same regions (pixels) of an image are encrypted to one unique symbol. To reduce this type of autocorrelation in data, chaos has been extensively applied over the last decade. By using chaotic maps, a single substitution box has been replaced with multiple substitution boxes for the encryption of autocorrelated data. The technique of multiple substitution boxes is becoming very popular among cryptographic algorithm designers to overcome the drawbacks of a single substitution box. In this paper, however, we found that replacing a single substitution box with multiple substitution boxes cannot provide a general solution for highly autocorrelated data. To address this issue, we propose a novel technique by adding chaotic diffusion to the existing substitution process. Extensive security analyses show that the proposed algorithm achieves both higher-level security and fast encryption time when compared with existing algorithms.
Similar content being viewed by others
References
Abikoye, O.-C., Adewole, K.-S., Oladipupo, A.-J.: Efficient data hiding system using cryptography and steganography. IJAIS 4(11), 6–11 (2012)
Gurpreet, S., Supriya, S.: A study of encryption algorithms (RSA, DES, 3DES and AES) for information security. IJCA 67(19), 33–38 (2013)
William, S.: Cryptography and Network Security: Principles and Practice. Pearson Education, New York City (2010)
Bruce, S.: Applied Cryptography. Wiley, New York (1996)
Andrecut, M.: Logistic map as a random number generator. Int. J. Mod. Phys. B 12(9), 921–930 (1998)
Ljupco, K.: Chaos-based cryptography: a brief overview. IEEE Circuits Syst. Mag. 1(3), 6–21 (2001)
Amir, A., Adil, M.-S., Jameel, A., Iqtadar, H.: A technique for digital steganography using chaotic maps. Nonlinear Dyn. 75(4), 807–816 (2013)
Ying Z.: Future Wireless Networks and Information Systems, vol. 1(143), pp. 639–644. Springer, Heidelberg (2012)
Ahmed, B.-A., Abd, S.B.H.-B., Hamida, A.: A novel image encryption using an integration technique of blocks rotation based on the magic cube and the AES algorithm. IJCSI 9(4), 41–47 (2012)
Majid K.: A novel image encryption scheme based on multiple chaotic S-boxes. doi:10.1007/s11071-015-2173-3
Majid K., Tariq S., Syeda I.-B: A new implementation of chaotic S-boxes in CAPTCHA. doi:10.1007/s11760-014-0741-5
Majid, K., Tariq, S.: An efficient construction of substitution box with fractional chaotic system. Signal Image Video Process. doi:10.1007/s11760-013-0577-4
Majid, K.: An image encryption by using Fourier series. J. Vib. Control. (2014). doi:10.1177/1077546314523029
Majid, K., Tariq, S., Syeda, I.-B: Construction of S-box based on chaotic Boolean functions and its application in image encryption. Neural Comput. Appl. doi:10.1007/s00521-015-1887-y
Majid, K., Tariq S.: An efficient chaotic image encryption scheme. Neural Comput. Appl. doi:10.1007/s00521-014-1800-0
Majid, K., Tariq, S.: A novel construction of substitution box with Zaslavskii chaotic map and symmetric group. J. Intell. Fuzzy Syst. 28(4), 1509–1517 (2015)
Majid, K., Tariq, S.: A copyright protection using watermarking scheme based on nonlinear permutation and its quality metrics. Neural Comput. Appl. 26(4), 845–855 (2015)
Majid, K., Tariq, S.: A novel image encryption technique based on Hnon chaotic map and S8 symmetric group. Neural Comput. Appl. 25(7–8), 1717–1722 (2014)
Majid, K., Tariq, S.: A construction of novel chaos base nonlinear component of block cipher. Nonlinear Dyn. 76(1), 377–382 (2014)
Majid, K., Tariq, S., Syeda, I.-B.: A color image watermarking scheme based on affine transformation and S4 permutation. Neural Comput. Appl. 25(7–8), 2037–2045 (2014)
Majid, K., Tariq, S., Hasan, M., Muhammad, A.-G.: An efficient method for the construction of block cipher with multi-chaotic systems. Nonlinear Dyn. 71(3), 493–504 (2013)
Majid, K., Tariq, S., Muhammad, A.-G.: An efficient technique for the construction of substitution box with chaotic partial differential equation. Nonlinear Dyn. 73(3), 1795–1801 (2013)
Majid, K., Tariq, S., Hasan, M., Muhammad, A.-G., Iqtidar, H.: A novel technique for constructions of S-Boxes based on chaotic Lorenz systems. Nonlinear Dyn. 70(3), 2303–2311 (2012)
Iqtadar, H., Tariq, S., Muhammad, A.-G., Waqar, A., Hassan, H.: Projective general linear group based algorithm for the construction of substitution box for block ciphers. Neural Comput. Appl. 23(1), 97–104 (2012)
Tran, M.-T., Bui, D.-K., Duong, A.-D.: Gray S-box for advanced encryption standard. Int. Conf. Comput. Intell. Secur. 1, 253–258 (2008)
Zhaopin, S., Guofu, Z., Jianguo, J.: Multimedia security: a survey of chaos-based encryption technology, multimedia a multidisciplinary approach to complex issues. In: Dr. Ioannis Karydis (Ed.). ISBN: 978-953-51-0216-8, InTech (2012)
Tang, D., Wang, X.: Image encryption based on bivariate polynomials, computer science and software engineering. IEEE Int. Conf. 6, 193–196 (2008)
Ying, Q.-Z., Xing, Y.-W.: Analysis and improvement of a chaos-based symmetric image encryption scheme using a bit-level permutation. Nonlinear Dyn. 77(3), 687–698 (2014)
Zhi, H.-G., Fangjun, H., Wenjie, G.: Chaos-based image encryption algorithm. Phys. Lett. A 346(13), 153–157 (2005)
Amir, A., Hadi, M., Afshin, A.: A new image encryption algorithm based on one-dimensional polynomial chaotic maps. Lect. Notes Comput. Sci. 4263, 963–971 (2006)
Pisarchik, A.N., Zanin, M.: Image encryption with chaotically coupled chaotic maps. Phys. D Nonlinear Phenom. 237(20), 2638–2648 (2008)
Shatheesh, S., Devaraj, P., Bhuvaneswaran, R.: Chaos based image encryption scheme based on enhanced logistic map. Distrib. Comput. Int. Technol. 6536, 290–300 (2011)
Shyamala, P.: Chaos based image encryption scheme. Commun. Comput. Inf. Sci. 140, 312–317 (2011)
Xuanping, Z., Zhongmeng, Z.: Chaos-based image encryption with total shuffling and bidirectional diffusion. Nonlinear Dyn. 75(12), 319–330 (2014)
Jawad, A., Seongoun, H., Arshid, A.: An experimental comparison of chaotic and non-chaotic image encryption schemes. Wirel. Pers. Commun. (2014). doi:10.1007/s11277-015-2667-9
Liu, H., Wang, X.-Y.: Color image encryption based on one-time keys and robust chaotic maps. Comput. Math. Appl. 59(10), 3320–3327 (2010)
Liu, H., Wang, X.-Y.: Color image encryption using spatial bit-level permutation and high-dimension chaotic system. Opt. Commun. 284(16), 3895–3903 (2011)
Chengqing, L., Shujun, L., Guanrong, C., Wolfgang, A.-H.: Cryptanalysis of an image encryption scheme based on a compound chaotic sequence. Image Vis. Comput. 27, 1035–1039 (2008)
Ljupco, K., Shiguo, L.: Chaos-based cryptography. Stud. Comput. Intell. 345 (2011)
Xingyuan, W., Lintao, L.: Cryptanalysis of a parallel sub-image encryption method with high-dimensional chaos. Nonlinear Dyn. 73(1–2), 795–800 (2013)
Amir, A., Adil, M.-S., Fawad, A.: Chaotic substitution for highly autocorrelated data in encryption algorithm. Commun. Nonlinear Sci. Numer. Simul. 19(9), 3106–3118 (2014)
Xianhan, Z., Yang, C.: A novel chaotic cap and an improved chaos-cased image encryption scheme. Sci. World J. 2014, 1–8 (2014)
Ying, Q.-Z., Xing, Y.-W.: Analysis and improvement of a chaos-based symmetric image encryption scheme using a bit-level permutation. Nonlinear Dyn. 77(3), 687–698 (2014)
Nawal, E.-F., Osama, M.A.-Z.: Quality of encryption measurement of bitmap images with RC6, MRC6, and Rijndael block cipher algorithms. Int. J. Netw. Secur. 5(3), 241–251 (2007)
Jawad, A., Fawad, A.: Efficiency analysis and security evaluation of image encryption schemes. Int. J. Video Image Process. Netw. Secur. 12(4), 18–31 (2012)
Hossam, E.-A., Hamdy, M.-K., Osama, S.-F.: Implementation of RC5 block cipher algorithm for image cryptosystems. Int. J. Comput. Inf. Syst. Control Eng. 1(8), 245–250 (2007)
Wang, X.-Y., Yang, L., Liu, R., Kadir, A.: A chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn. 62(3), 615–621 (2010)
Wang, X.-Y., Teng, L., Qin, X.: A novel colour image encryption algorithm based on chaos. Signal Process. 92(4), 1101–1108 (2012)
Lini, A., Neenu, D.: Secure image encryption algorithms: a review. Int. J. Sci. Technol. Res. 2(4), 186–189 (2013)
Claude, E.-S.: Communication theory of secrecy systems. Bell Syst. Tech. J. 28(4), 656–715 (1949)
Yuanyuan, S.-M, Lina, C., Rudan, X., Ruiqing, K.: An image encryption algorithm utilizing julia sets and hilbert curves. PloS One 9(1) (2014)
Nawal, E.-F., Osama, M.A.-Z.: Quality of encryption measurement of bitmap images with RC6, MRC6, and Rijndael block cipher algorithms. Int. J. Netw. Secur. 5(3), 241–251 (2007)
Elhoseny, H.M., Ahmed, H.E.H., Abbas, A.M., Kazemian, H.B., Faragallah, O.S., El-Rabaie, S.M., Abd El-Samie, F.E.: Chaotic encryption of images in the fractional Fourier transform domain using different modes of operation. SIViP 9, 611–622 (2013)
Shiguo, L.: Multimedia Content Encryption: Techniques and Applications. Auerbach Publications, Philadelphia (2008)
Muhammad, U., Muhammad, K.-K., Khaled, A., Changhoon, L.: Chaos-based secure satellite imagery cryptosystem. Comput. Math. Appl. 60(2), 326–337 (2010)
Hasan, M.-E., Mina, A.-M.: Measuring encryption quality for bitmap images encrypted with Rijndael and KAMKAR block ciphers. In: Twenty second national radio science conference (NRSC), Cairo Egypt (2005)
Ibrahim, F.-E., Osama, S.-F., Alaa, M.-A., El-Rabaie, S., Fathi, E.-S.: A new method for encrypting images with few details using Rijndael and RC6 block ciphers in the electronic code book mode. Inf. Secur. J. A Glob. Perspect. 21, 193–205 (2012)
Mohammed, A.F.-H.: A Novel Encryption Method for Image Security. Int. J. Secur. Appl. 6(1), 1–8 (2012)
Zhu, L., Li, W., Liao, L., Li, H.: A novel image scrambling algorithm for digital watermarking based on chaotic sequences. Int. J. Comput. Sci. Netw. Secur. 6(8B), 125–130 (2006)
Zhang, Y.-Q., Wang, X.-Y.: A new image encryption algorithm based on non-adjacent coupled map lattices. Appl. Soft Comput. 26, 10–20 (2015)
Zhu, L., Li, W., Liao, L., Li, H.: A symmetric image encryption algorithm based on mixed linear–nonlinear coupled map lattice. Inf. Sci. 273, 329–351 (2014)
Acknowledgments
It was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (2014R1A-1A2054174). It also was supported by the MSIP (Ministry of Science, ICT and Future Planning), Korea, under the Global IT Talent support program (NIPA-2014H0905-14-1004) supervised by the NIPA (National IT Industry Promotion Agency).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Ahmad, J., Hwang, S.O. Chaos-based diffusion for highly autocorrelated data in encryption algorithms. Nonlinear Dyn 82, 1839–1850 (2015). https://doi.org/10.1007/s11071-015-2281-0
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11071-015-2281-0