Skip to main content

Research Repository

Advanced Search

A new chaos-based secure image encryption scheme using multiple substitution boxes

Khan, Jan Sher; ur Rehman, Atique; Ahmad, Jawad; Habib, Zeeshan

Authors

Jan Sher Khan

Atique ur Rehman

Zeeshan Habib



Abstract

Due to development in Internet and networking technology, multimedia data is broadly transmitted via wired and wireless medium. Thus security is a major concern in modern communication systems. Encryption is one of the pre-eminent ways to guarantee security in many real time applications. In this paper, confusion and diffusion phenomenon is presented for digital images. The proposed scheme provides a secure image encryption/decryption scheme using two chaotic maps and substitution boxes. To confuse the relationship between plaintext and ciphertext images, both chaotic maps play a vital role in the confusion and diffusion process. In confusion process, the plaintext image is permuted row-wise and column-wise via two random sequences generated by Henon map. The pixel values diffusion is carried out by unimodel Skew tent map through XOR operation. Furthermore, in last step of the proposed scheme, image is divided into four blocks. To get a highly diffused ciphertext, four different Substitution Boxes (S-Boxes) are applied on each block. Extensive security analysis show that the proposed scheme provides an efficient security for digital images.

Citation

Khan, J. S., ur Rehman, A., Ahmad, J., & Habib, Z. (2015, December). A new chaos-based secure image encryption scheme using multiple substitution boxes. Presented at 2015 Conference on Information Assurance and Cyber Security (CIACS), Rawalpindi, Pakistan

Presentation Conference Type Conference Paper (published)
Conference Name 2015 Conference on Information Assurance and Cyber Security (CIACS)
Start Date Dec 18, 2015
End Date Dec 18, 2015
Acceptance Date Nov 10, 2015
Online Publication Date Feb 4, 2016
Publication Date 2015-12
Deposit Date Sep 13, 2019
Publisher Institute of Electrical and Electronics Engineers
Book Title 2015 Conference on Information Assurance and Cyber Security (CIACS)
ISBN 9781467379144
DOI https://doi.org/10.1109/ciacs.2015.7395561
Keywords Chaotic Maps, Substitution, Information Security, Chaos and Image Encryption
Public URL http://researchrepository.napier.ac.uk/Output/2133543