A medical image encryption scheme based on Mobius transformation and Galois field

被引:15
作者
Ali, Javed [1 ]
Jamil, Muhammad Kamran [1 ]
Alali, Amal S. [2 ]
Ali, Rashad [1 ]
Gulraiz [1 ]
机构
[1] Riphah Int Univ, Dept Math, Lahore, Pakistan
[2] Princess Nourah Bint Abdulrahman Univ, Coll Sci, Dept Math Sci, POB 84428, Riyadh 11671, Saudi Arabia
关键词
Mobius transformation; Substitution box; Entropy; Correlation; Encryption; ALGORITHM;
D O I
10.1016/j.heliyon.2023.e23652
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Data security and privacy are considered to be the biggest problems faced by service providers who have worked with public data for a long time. A key element of modern encryption that is utilized to increase textual confusion is the Substitution box (S-box) and the algebraic strength of the S-box has a significant impact on how secure the encryption method is. In this article, we present a unique method that uses a linear fractional transformation on a finite field to produce cryptographically robust S-boxes. Firstly, we choose a specific irreducible polynomial of degree 8 in DOUBLE-STRUCK CAPITAL Z2[x] to construct GF (28). Later, we used the action of PGL(2, GF (28)) on GF (28) to generate a robust S-box. The effectiveness of the built-in S-box was evaluated using several criteria including non-linearity, differential uniformity, strict avalanche criteria, linear approximation probability, and bit independence criterion. The proposed S-box's characteristics are compared to those of most recent S-boxes to confirm the higher performance. Additionally, the S box was used to encrypt images to show its usefulness for multimedia security applications. We performed several tests, including contrast, correlation, homogeneity, entropy, and energy, to evaluate the success of the encryption technique. The proposed method for ciphering an image is very effective, as proven by its comparison with several S boxes.
引用
收藏
页数:12
相关论文
共 48 条
[1]   Selective medical image encryption using DNA cryptography [J].
Akkasaligar, Prema T. ;
Biradar, Sumangala .
INFORMATION SECURITY JOURNAL, 2020, 29 (02) :91-101
[2]  
Ali R., 2023, IEEE Access, V11
[3]   A New 1D Chaotic Map and β-Hill Climbing for Generating Substitution-Boxes [J].
Alzaidi, Amer Awad ;
Ahmad, Musheer ;
Doja, M. N. ;
Al Solami, Eesa ;
Beg, M. M. Sufyan .
IEEE ACCESS, 2018, 6 :55405-55418
[4]  
[Anonymous], 2012, HKIE Trans Hong Kong Inst Eng, DOI DOI 10.1080/1023697X.2012.10669006
[5]  
[Anonymous], 2011, Proceedings of the Pakistan Academy of Sciences
[6]   A Novel Algebraic Technique for the Construction of Strong Substitution Box [J].
Attaullah ;
Jamal, Sajjad Shaukat ;
Shah, Tariq .
WIRELESS PERSONAL COMMUNICATIONS, 2018, 99 (01) :213-226
[7]  
BIHAM E, 1991, LECT NOTES COMPUT SC, V537, P2
[8]   Highly dispersive substitution box (S-box) design using chaos [J].
Bin Faheem, Zaid ;
Ali, Asim ;
Khan, Muhamad Asif ;
Ul-Haq, Muhammad Ehatisham ;
Ahmad, Waqar .
ETRI JOURNAL, 2020, 42 (04) :619-632
[9]   Medical image encryption using edge maps [J].
Cao, Weijia ;
Zhou, Yicong ;
Chen, C. L. Philip ;
Xia, Liming .
SIGNAL PROCESSING, 2017, 132 :96-109
[10]  
Cui LG, 2007, INT J INNOV COMPUT I, V3, P751