Design and optimization of nonlinear component of block cipher: Applications to multimedia security

Nowadays, various image encryption schemes based on chaotic systems have been developed, each of them has its own limitations and strength in terms of security and computational speed. The proposed image encryption scheme utilizes 2-D maps without disturbing their mathematical structure, characteriz...

Full description

Bibliographic Details
Main Authors: Adil Waheed, Fazli Subhan, Mazliham Mohd Suud, Muhammad Mansoor Alam, Sajjad Haider
Format: Article
Language:English
Published: Elsevier 2024-03-01
Series:Ain Shams Engineering Journal
Subjects:
Online Access:http://www.sciencedirect.com/science/article/pii/S2090447923003969
_version_ 1797253950069538816
author Adil Waheed
Fazli Subhan
Mazliham Mohd Suud
Muhammad Mansoor Alam
Sajjad Haider
author_facet Adil Waheed
Fazli Subhan
Mazliham Mohd Suud
Muhammad Mansoor Alam
Sajjad Haider
author_sort Adil Waheed
collection DOAJ
description Nowadays, various image encryption schemes based on chaotic systems have been developed, each of them has its own limitations and strength in terms of security and computational speed. The proposed image encryption scheme utilizes 2-D maps without disturbing their mathematical structure, characterized by topological features such as chaotic behavior and fractal properties, namely the Zaslavasky, Bakers, and Henon Maps. This approach utilizes both confusion and diffusion stages to achieve high levels of security against various attacks. The confusion stage utilizes chaotic values to muddle the rows and columns of the image, reducing the correlations between neighboring pixels, while the diffusion step achieves the avalanche effect with 2D Bakers map and Henon map. The proposed image encryption scheme is analyzed thoroughly to evaluate its security and performance. To evaluate the security and computational efficiency of the proposed image encryption method, various analysis such as correlation, contrast, entropy, energy, homogeneity, and performance analyses are conducted. Moreover, the three proposed S-boxes are also tested to evaluate their effectiveness using cryptographic analysis tests such as nonlinearity, strict Avalanche criterion, differential probability, linear probability, and bit independence criterion, which we also utilized in our proposed image encryption scheme.
first_indexed 2024-03-09T07:34:51Z
format Article
id doaj.art-0769bf1c8d1a4599a4633b2fc10c3d64
institution Directory Open Access Journal
issn 2090-4479
language English
last_indexed 2024-04-24T21:42:12Z
publishDate 2024-03-01
publisher Elsevier
record_format Article
series Ain Shams Engineering Journal
spelling doaj.art-0769bf1c8d1a4599a4633b2fc10c3d642024-03-21T05:36:25ZengElsevierAin Shams Engineering Journal2090-44792024-03-01153102507Design and optimization of nonlinear component of block cipher: Applications to multimedia securityAdil Waheed0Fazli Subhan1Mazliham Mohd Suud2Muhammad Mansoor Alam3Sajjad Haider4Faculty of Engineering and Computer Sciences, National University of Modern Languages, Islamabad, PakistanFaculty of Engineering and Computer Sciences, National University of Modern Languages, Islamabad, Pakistan; Faculty of Computing and Informatics, Multimedia University, Cyberjaya, MalaysiaFaculty of Computing and Informatics, Multimedia University, Cyberjaya, Malaysia; Corresponding author.Faculty of Computing and Informatics, Multimedia University, Cyberjaya, Malaysia; School of Computer Science in the Faculty of Engineering and IT, University of Technology Sydney, AustraliaFaculty of Engineering and Computer Sciences, National University of Modern Languages, Islamabad, PakistanNowadays, various image encryption schemes based on chaotic systems have been developed, each of them has its own limitations and strength in terms of security and computational speed. The proposed image encryption scheme utilizes 2-D maps without disturbing their mathematical structure, characterized by topological features such as chaotic behavior and fractal properties, namely the Zaslavasky, Bakers, and Henon Maps. This approach utilizes both confusion and diffusion stages to achieve high levels of security against various attacks. The confusion stage utilizes chaotic values to muddle the rows and columns of the image, reducing the correlations between neighboring pixels, while the diffusion step achieves the avalanche effect with 2D Bakers map and Henon map. The proposed image encryption scheme is analyzed thoroughly to evaluate its security and performance. To evaluate the security and computational efficiency of the proposed image encryption method, various analysis such as correlation, contrast, entropy, energy, homogeneity, and performance analyses are conducted. Moreover, the three proposed S-boxes are also tested to evaluate their effectiveness using cryptographic analysis tests such as nonlinearity, strict Avalanche criterion, differential probability, linear probability, and bit independence criterion, which we also utilized in our proposed image encryption scheme.http://www.sciencedirect.com/science/article/pii/S2090447923003969S-boxNonlinear componentImage encryptionNonlinearitySecurityChaotic maps
spellingShingle Adil Waheed
Fazli Subhan
Mazliham Mohd Suud
Muhammad Mansoor Alam
Sajjad Haider
Design and optimization of nonlinear component of block cipher: Applications to multimedia security
Ain Shams Engineering Journal
S-box
Nonlinear component
Image encryption
Nonlinearity
Security
Chaotic maps
title Design and optimization of nonlinear component of block cipher: Applications to multimedia security
title_full Design and optimization of nonlinear component of block cipher: Applications to multimedia security
title_fullStr Design and optimization of nonlinear component of block cipher: Applications to multimedia security
title_full_unstemmed Design and optimization of nonlinear component of block cipher: Applications to multimedia security
title_short Design and optimization of nonlinear component of block cipher: Applications to multimedia security
title_sort design and optimization of nonlinear component of block cipher applications to multimedia security
topic S-box
Nonlinear component
Image encryption
Nonlinearity
Security
Chaotic maps
url http://www.sciencedirect.com/science/article/pii/S2090447923003969
work_keys_str_mv AT adilwaheed designandoptimizationofnonlinearcomponentofblockcipherapplicationstomultimediasecurity
AT fazlisubhan designandoptimizationofnonlinearcomponentofblockcipherapplicationstomultimediasecurity
AT mazlihammohdsuud designandoptimizationofnonlinearcomponentofblockcipherapplicationstomultimediasecurity
AT muhammadmansooralam designandoptimizationofnonlinearcomponentofblockcipherapplicationstomultimediasecurity
AT sajjadhaider designandoptimizationofnonlinearcomponentofblockcipherapplicationstomultimediasecurity