A novel scheme for image encryption using substitution box and chaotic system

被引:119
作者
Ullah, Atta [1 ]
Jamal, Sajjad Shaukat [1 ]
Shah, Tariq [1 ]
机构
[1] Quaid I Azam Univ, Dept Math, Islamabad, Pakistan
关键词
Group action; Substitution box; Chaotic system; Secure communication; WAVE TRANSMISSION; MAP; CRYPTANALYSIS; PERMUTATION; SEQUENCE;
D O I
10.1007/s11071-017-3874-6
中图分类号
TH [机械、仪表工业];
学科分类号
0802 ;
摘要
For the last 3 decades, the inclusion of chaos for the encryption of multimedia information is considered as a remarkable aspect of nonlinear dynamics. In this article, chaotic system along with substitution box is used for image encryption. Substitution box is constructed by the group action of the projective general linear group over a finite field. On multiple attempts, using the same security key the host image gives a different encrypted image which is the main feature of this scheme. For secure communication, this idea of chaos-based image encryption along with substitution box shows relatively improved results as depicted in simulation and security analysis. The scheme demonstrates resistance against image processing attacks.
引用
收藏
页码:359 / 370
页数:12
相关论文
共 34 条
[1]   A technique for digital steganography using chaotic maps [J].
Anees, Amir ;
Siddiqui, Adil Masood ;
Ahmed, Jameel ;
Hussain, Iqtadar .
NONLINEAR DYNAMICS, 2014, 75 (04) :807-816
[2]   Cryptanalysis of a one round chaos-based Substitution Permutation Network [J].
Arroyo, David ;
Diaz, Jesus ;
Rodriguez, F. B. .
SIGNAL PROCESSING, 2013, 93 (05) :1358-1364
[3]   Efficient cryptosystem approaches: S-boxes and permutation-substitution-based encryption [J].
Belazi, Akram ;
Khan, Majid ;
Abd El-Latif, Ahmed A. ;
Belghith, Safya .
NONLINEAR DYNAMICS, 2017, 87 (01) :337-361
[4]   Novel SCAN-CA-based image security system using SCAN and 2-D von Neumann cellular automata [J].
Chen, Rong-Jian ;
Horng, Shi-Jinn .
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2010, 25 (06) :413-426
[5]   Multi-image encryption by circular random grids [J].
Chen, Tzung-Her ;
Li, Kuang-Che .
INFORMATION SCIENCES, 2012, 189 :255-265
[6]   Compression-unimpaired batch-image encryption combining vector quantization and index compression [J].
Chen, Tzung-Her ;
Wu, Chang-Sian .
INFORMATION SCIENCES, 2010, 180 (09) :1690-1701
[7]  
Daemen J., 2002, DESIGN RIJNDAEL AES, DOI DOI 10.1007/978-3-662-04722-4
[8]   2D Sine Logistic modulation map for image encryption [J].
Hua, Zhongyun ;
Zhou, Yicong ;
Pun, Chi-Man ;
Chen, C. L. Philip .
INFORMATION SCIENCES, 2015, 297 :80-94
[9]  
Hussain I, 2011, P PAKISTAN ACAD SCI, V48, P111
[10]   Literature survey on nonlinear components and chaotic nonlinear components of block ciphers [J].
Hussain, Iqtadar ;
Shah, Tariq .
NONLINEAR DYNAMICS, 2013, 74 (04) :869-904