Jan Sher Khan
A new chaos-based secure image encryption scheme using multiple substitution boxes
Khan, Jan Sher; ur Rehman, Atique; Ahmad, Jawad; Habib, Zeeshan
Abstract
Due to development in Internet and networking technology, multimedia data is broadly transmitted via wired and wireless medium. Thus security is a major concern in modern communication systems. Encryption is one of the pre-eminent ways to guarantee security in many real time applications. In this paper, confusion and diffusion phenomenon is presented for digital images. The proposed scheme provides a secure image encryption/decryption scheme using two chaotic maps and substitution boxes. To confuse the relationship between plaintext and ciphertext images, both chaotic maps play a vital role in the confusion and diffusion process. In confusion process, the plaintext image is permuted row-wise and column-wise via two random sequences generated by Henon map. The pixel values diffusion is carried out by unimodel Skew tent map through XOR operation. Furthermore, in last step of the proposed scheme, image is divided into four blocks. To get a highly diffused ciphertext, four different Substitution Boxes (S-Boxes) are applied on each block. Extensive security analysis show that the proposed scheme provides an efficient security for digital images.
Citation
Khan, J. S., ur Rehman, A., Ahmad, J., & Habib, Z. (2015, December). A new chaos-based secure image encryption scheme using multiple substitution boxes. Presented at 2015 Conference on Information Assurance and Cyber Security (CIACS), Rawalpindi, Pakistan
Presentation Conference Type | Conference Paper (published) |
---|---|
Conference Name | 2015 Conference on Information Assurance and Cyber Security (CIACS) |
Start Date | Dec 18, 2015 |
End Date | Dec 18, 2015 |
Acceptance Date | Nov 10, 2015 |
Online Publication Date | Feb 4, 2016 |
Publication Date | 2015-12 |
Deposit Date | Sep 13, 2019 |
Publisher | Institute of Electrical and Electronics Engineers |
Book Title | 2015 Conference on Information Assurance and Cyber Security (CIACS) |
ISBN | 9781467379144 |
DOI | https://doi.org/10.1109/ciacs.2015.7395561 |
Keywords | Chaotic Maps, Substitution, Information Security, Chaos and Image Encryption |
Public URL | http://researchrepository.napier.ac.uk/Output/2133543 |
You might also like
Transparent RFID tag wall enabled by artificial intelligence for assisted living
(2024)
Journal Article
A Two-branch Edge Guided Lightweight Network for infrared image saliency detection
(2024)
Journal Article
Downloadable Citations
About Edinburgh Napier Research Repository
Administrator e-mail: repository@napier.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2025
Advanced Search