Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Advertisement

Robust medical and color image cryptosystem using array index and chaotic S-box

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

Providing robust security within an image cryptosystem during network communication is more essential than ever, highlighting the fundamental aspects of confusion and diffusion. This study presents a novel approach for securely transmitting images through insecure channels, using array index manipulation for scrambling and simple pixel-level confusion and diffusion through XOR operations, effectively involving row and column permutation to achieve robust scrambling. This method operates two layers of confusion by rearranging array indexes using a Tent map and constructing an S-box algorithm derived from the Henon map, while the diffusion process uses a pseudo-random sequence generator based on the Henon map, with their chaotic dynamics analyzed through investigations of Lyapunov exponents and bifurcation diagrams. The expanded chaotic range and improved effects of chaotic maps produce new S-boxes with satisfactory cryptographic performance, including balancedness and non-linearity, with S-box3 achieving the highest non-linearity at 108. Following a performance and security assessment of the proposed technique, it has been found that the entropy value for the cipher image is nearly 7.998; also, the NPCR and UACI values for the cipher images are 99.6 and 33.4, respectively, and it demonstrates closeness to the ideal value. Finally, the proposed method demonstrates high randomness, undergoes evaluation using the NIST test suite, has good operation efficiency, and exhibits resilience against various attack forms such as statistical, differential, data-loss, and noise attacks, affirming its security and relevance for real-time cryptosystems.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Algorithm 1
Algorithm 2
Algorithm 3
Fig. 5
Algorithm 4
Algorithm 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

Data availability

No datasets were generated or analysed during the current study.

References

  1. Mishra, R., Bhanodiya, P.: A review on steganography and cryptography. In: 2015 International Conference on Advances in Computer Engineering and Applications, pp. 119–122. IEEE (2015)

  2. Wang, X.-Y., Chen, F., Wang, T.: A new compound mode of confusion and diffusion for block encryption of image based on chaos. Commun. Nonlinear Sci. Numer. Simul. 15(9), 2479–2485 (2010)

    Article  MathSciNet  Google Scholar 

  3. Deb, S., Bhuyan, B.: Chaos-based medical image encryption scheme using special nonlinear filtering function based IFSR. Multimedia Tools Appl. 80, 19803–19826 (2021)

    Article  Google Scholar 

  4. Deb, S., Biswas, B., Bhuyan, B.: Secure image encryption scheme using high efficiency word-oriented feedback shift register over finite field. Multimedia Tools Appl. 78, 34901–34925 (2019)

    Article  Google Scholar 

  5. Chen, J.-X., Zhu, Z.-L., Fu, C., Zhang, L.-B., Zhang, Y.: An efficient image encryption scheme using lookup table-based confusion and diffusion. Nonlinear Dyn. 81, 1151–1166 (2015)

    Article  Google Scholar 

  6. Deb, S., Bhuyan, B., Kar, N., Reddy, K.S.: Colour image encryption using an improved version of stream cipher and chaos. Int. J. Ad Hoc Ubiquitous Comput. 41(2), 118–133 (2022)

    Article  Google Scholar 

  7. Abdelfatah, R.I., Nasr, M.E., Alsharqawy, M.A.: Encryption for multimedia based on chaotic map: several scenarios. Multimedia Tools Appl. 79, 19717–19738 (2020)

    Article  Google Scholar 

  8. Xu, L., Li, Z., Li, J., Hua, W.: A novel bit-level image encryption algorithm based on chaotic maps. Opt. Lasers Eng. 78, 17–25 (2016)

    Article  Google Scholar 

  9. Munir, N., Khan, M., Hazzazi, M.M., Aljaedi, A., Alharbi, A.R., Hussain, I., et al.: Cryptanalysis of internet of health things encryption scheme based on chaotic maps. IEEE Access 9, 105678–105685 (2021)

    Article  Google Scholar 

  10. Sekar, J.G., Arun, C., Abilash, V., Aravindan, K., Barathiselvan, K., Bharath, J.: A modified chaotic image encryption scheme for color image using diagonal pixel confusion and diffusion method. In: AIP Conference Proceedings, Vol. 2405, AIP Publishing LLC, p. 030009 (2022)

  11. Essaid, M., Akharraz, I., Saaidi, A., Mouhib, A.: A new image encryption scheme based on confusion-diffusion using an enhanced skew tent map. Procedia Comput. Sci. 127, 539–548 (2018)

    Article  Google Scholar 

  12. Deb, S., Das, A., Kar, N.: An applied image cryptosystem on Moore’s automaton operating on \(\delta\)\((q_k)/f_2\). ACM Trans. Multimed. Comput. Commun. Appl. 20(2), 1–20 (2023)

    Article  Google Scholar 

  13. Belazi, A., Abd El-Latif, A.A., Belghith, S.: A novel image encryption scheme based on substitution-permutation network and chaos. Signal Process. 128, 155–170 (2016)

    Article  Google Scholar 

  14. Belazi, A., Abd El-Latif, A.A.: A simple yet efficient s-box method based on chaotic sine map. Optik 130, 1438–1444 (2017)

    Article  Google Scholar 

  15. Özkaynak, F., Çelik, V., Özer, A.B.: A new S-box construction method based on the fractional-order chaotic Chen system. SIViP 11, 659–664 (2017)

    Article  Google Scholar 

  16. Belazi, A., Khan, M., El-Latif, A.A.A., Belghith, S.: Efficient cryptosystem approaches: S-boxes and permutation-substitution-based encryption. Nonlinear Dyn. 87, 337–361 (2017)

    Article  Google Scholar 

  17. Lambić, D.: A novel method of s-box design based on chaotic map and composition method. Chaos Solitons Fract. 58, 16–21 (2014)

    Article  Google Scholar 

  18. Çavuşoğlu, Ü., Kaçar, S., Pehlivan, I., Zengin, A.: Secure image encryption algorithm design using a novel chaos based S-box. Chaos Solitons Fract. 95, 92–101 (2017)

    Article  Google Scholar 

  19. Ullah, A., Jamal, S.S., Shah, T.: A novel construction of substitution box using a combination of chaotic maps with improved chaotic range. Nonlinear Dyn. 88, 2757–2769 (2017)

    Article  Google Scholar 

  20. Lambić, D.: A novel method of S-box design based on discrete chaotic map. Nonlinear Dyn. 87, 2407–2413 (2017)

    Article  MathSciNet  Google Scholar 

  21. Shafique, A.: A new algorithm for the construction of substitution box by using chaotic map. Eur. Phys. J. Plus 135(2), 194 (2020)

    Article  Google Scholar 

  22. Behera, P.K., Gangopadhyay, S.: Evolving bijective S-boxes using hybrid adaptive genetic algorithm with optimal cryptographic properties. J. Ambient Intell. Hum. Comput. 14, 1–18 (2021)

    Google Scholar 

  23. Azam, N.A., Hayat, U., Ayub, M.: A substitution box generator, its analysis, and applications in image encryption. Signal Process. 187, 108144 (2021)

    Article  Google Scholar 

  24. Deb, S., Behera, P.K.: Design of key-dependent bijective S-boxes for color image cryptosystem. Optik 253, 168548 (2022)

    Article  Google Scholar 

  25. Lu, Q., Zhu, C., Deng, X.: An efficient image encryption scheme based on the LSS chaotic map and single S-box. IEEE Access 8, 25664–25678 (2020)

    Article  Google Scholar 

  26. Mondal, B., Behera, P.K., Gangopadhyay, S.: A secure image encryption scheme based on a novel 2D sine-cosine cross-chaotic (SC3) map. J. Real-Time Image Proc. 18(1), 1–18 (2021)

    Article  Google Scholar 

  27. Ahmad, M., Al-Solami, E., Alghamdi, A.M., Yousaf, M.A.: Bijective s-boxes method using improved chaotic map-based heuristic search and algebraic group structures. IEEE Access 8, 110397–110411 (2020)

    Article  Google Scholar 

  28. Hosny, K.M., Kamal, S.T., Darwish, M.M.: A color image encryption technique using block scrambling and chaos. Multimedia Tools Appl. 81, 1–21 (2022)

    Article  Google Scholar 

  29. Wu, Y., Zhang, L., Berretti, S., Wan, S.: Medical image encryption by content-aware DNA computing for secure healthcare. IEEE Trans. Ind. Inf. 19(2), 2089–2098 (2022)

    Article  Google Scholar 

  30. Kamal, S.T., Hosny, K.M., Elgindy, T.M., Darwish, M.M., Fouda, M.M.: A new image encryption algorithm for grey and color medical images. IEEE Access 9, 37855–37865 (2021)

    Article  Google Scholar 

  31. Coventry, L., Branley, D.: Cybersecurity in healthcare: a narrative review of trends, threats and ways forward. Maturitas 113, 48–52 (2018)

    Article  Google Scholar 

  32. Singh, K.N., Singh, O., Singh, A.K., Agrawal, A.K.: Eimol: a secure medical image encryption algorithm based on optimization and the Lorenz system. ACM Trans. Multimed. Comput. Commun. Appl. 19(2s), 1–19 (2023)

    Article  Google Scholar 

  33. Nampalle, K.B., Manhas, S., Raman, B.: Medical image security and authenticity via dual encryption. Appl. Intell. 53(17), 20647–20659 (2023)

    Article  Google Scholar 

  34. Castro, F., Impedovo, D., Pirlo, G.: A medical image encryption scheme for secure fingerprint-based authenticated transmission. Appl. Sci. 13(10), 6099 (2023)

    Article  Google Scholar 

  35. Yasser, I., Khalil, A.T., Mohamed, M.A., Samra, A.S., Khalifa, F.: A robust chaos-based technique for medical image encryption. IEEE Access 10, 244–257 (2021)

    Article  Google Scholar 

  36. Li, C., Lin, D., Lü, J.: Cryptanalyzing an image-scrambling encryption algorithm of pixel bits. IEEE Multimedia 24(3), 64–71 (2017)

    Article  Google Scholar 

  37. Bovy, J.: Lyapunov exponents and strange attractors in discrete and continuous dynamical systems, Theoretica Phys. Project, Catholic Univ. Leuven, Flanders, Belgium, Tech. Rep 9, 1–19 (2004)

Download references

Funding

No funding.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Subhrajyoti Deb.

Ethics declarations

Competing interests

The authors declare no competing interests.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Podder, D., Deb, S., Banik, D. et al. Robust medical and color image cryptosystem using array index and chaotic S-box. Cluster Comput 27, 4321–4346 (2024). https://doi.org/10.1007/s10586-024-04584-3

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-024-04584-3

Keywords