Design and optimization of nonlinear component of block cipher: Applications to multimedia security
Nowadays, various image encryption schemes based on chaotic systems have been developed, each of them has its own limitations and strength in terms of security and computational speed. The proposed image encryption scheme utilizes 2-D maps without disturbing their mathematical structure, characteriz...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Elsevier
2024-03-01
|
Series: | Ain Shams Engineering Journal |
Subjects: | |
Online Access: | http://www.sciencedirect.com/science/article/pii/S2090447923003969 |
_version_ | 1797253950069538816 |
---|---|
author | Adil Waheed Fazli Subhan Mazliham Mohd Suud Muhammad Mansoor Alam Sajjad Haider |
author_facet | Adil Waheed Fazli Subhan Mazliham Mohd Suud Muhammad Mansoor Alam Sajjad Haider |
author_sort | Adil Waheed |
collection | DOAJ |
description | Nowadays, various image encryption schemes based on chaotic systems have been developed, each of them has its own limitations and strength in terms of security and computational speed. The proposed image encryption scheme utilizes 2-D maps without disturbing their mathematical structure, characterized by topological features such as chaotic behavior and fractal properties, namely the Zaslavasky, Bakers, and Henon Maps. This approach utilizes both confusion and diffusion stages to achieve high levels of security against various attacks. The confusion stage utilizes chaotic values to muddle the rows and columns of the image, reducing the correlations between neighboring pixels, while the diffusion step achieves the avalanche effect with 2D Bakers map and Henon map. The proposed image encryption scheme is analyzed thoroughly to evaluate its security and performance. To evaluate the security and computational efficiency of the proposed image encryption method, various analysis such as correlation, contrast, entropy, energy, homogeneity, and performance analyses are conducted. Moreover, the three proposed S-boxes are also tested to evaluate their effectiveness using cryptographic analysis tests such as nonlinearity, strict Avalanche criterion, differential probability, linear probability, and bit independence criterion, which we also utilized in our proposed image encryption scheme. |
first_indexed | 2024-03-09T07:34:51Z |
format | Article |
id | doaj.art-0769bf1c8d1a4599a4633b2fc10c3d64 |
institution | Directory Open Access Journal |
issn | 2090-4479 |
language | English |
last_indexed | 2024-04-24T21:42:12Z |
publishDate | 2024-03-01 |
publisher | Elsevier |
record_format | Article |
series | Ain Shams Engineering Journal |
spelling | doaj.art-0769bf1c8d1a4599a4633b2fc10c3d642024-03-21T05:36:25ZengElsevierAin Shams Engineering Journal2090-44792024-03-01153102507Design and optimization of nonlinear component of block cipher: Applications to multimedia securityAdil Waheed0Fazli Subhan1Mazliham Mohd Suud2Muhammad Mansoor Alam3Sajjad Haider4Faculty of Engineering and Computer Sciences, National University of Modern Languages, Islamabad, PakistanFaculty of Engineering and Computer Sciences, National University of Modern Languages, Islamabad, Pakistan; Faculty of Computing and Informatics, Multimedia University, Cyberjaya, MalaysiaFaculty of Computing and Informatics, Multimedia University, Cyberjaya, Malaysia; Corresponding author.Faculty of Computing and Informatics, Multimedia University, Cyberjaya, Malaysia; School of Computer Science in the Faculty of Engineering and IT, University of Technology Sydney, AustraliaFaculty of Engineering and Computer Sciences, National University of Modern Languages, Islamabad, PakistanNowadays, various image encryption schemes based on chaotic systems have been developed, each of them has its own limitations and strength in terms of security and computational speed. The proposed image encryption scheme utilizes 2-D maps without disturbing their mathematical structure, characterized by topological features such as chaotic behavior and fractal properties, namely the Zaslavasky, Bakers, and Henon Maps. This approach utilizes both confusion and diffusion stages to achieve high levels of security against various attacks. The confusion stage utilizes chaotic values to muddle the rows and columns of the image, reducing the correlations between neighboring pixels, while the diffusion step achieves the avalanche effect with 2D Bakers map and Henon map. The proposed image encryption scheme is analyzed thoroughly to evaluate its security and performance. To evaluate the security and computational efficiency of the proposed image encryption method, various analysis such as correlation, contrast, entropy, energy, homogeneity, and performance analyses are conducted. Moreover, the three proposed S-boxes are also tested to evaluate their effectiveness using cryptographic analysis tests such as nonlinearity, strict Avalanche criterion, differential probability, linear probability, and bit independence criterion, which we also utilized in our proposed image encryption scheme.http://www.sciencedirect.com/science/article/pii/S2090447923003969S-boxNonlinear componentImage encryptionNonlinearitySecurityChaotic maps |
spellingShingle | Adil Waheed Fazli Subhan Mazliham Mohd Suud Muhammad Mansoor Alam Sajjad Haider Design and optimization of nonlinear component of block cipher: Applications to multimedia security Ain Shams Engineering Journal S-box Nonlinear component Image encryption Nonlinearity Security Chaotic maps |
title | Design and optimization of nonlinear component of block cipher: Applications to multimedia security |
title_full | Design and optimization of nonlinear component of block cipher: Applications to multimedia security |
title_fullStr | Design and optimization of nonlinear component of block cipher: Applications to multimedia security |
title_full_unstemmed | Design and optimization of nonlinear component of block cipher: Applications to multimedia security |
title_short | Design and optimization of nonlinear component of block cipher: Applications to multimedia security |
title_sort | design and optimization of nonlinear component of block cipher applications to multimedia security |
topic | S-box Nonlinear component Image encryption Nonlinearity Security Chaotic maps |
url | http://www.sciencedirect.com/science/article/pii/S2090447923003969 |
work_keys_str_mv | AT adilwaheed designandoptimizationofnonlinearcomponentofblockcipherapplicationstomultimediasecurity AT fazlisubhan designandoptimizationofnonlinearcomponentofblockcipherapplicationstomultimediasecurity AT mazlihammohdsuud designandoptimizationofnonlinearcomponentofblockcipherapplicationstomultimediasecurity AT muhammadmansooralam designandoptimizationofnonlinearcomponentofblockcipherapplicationstomultimediasecurity AT sajjadhaider designandoptimizationofnonlinearcomponentofblockcipherapplicationstomultimediasecurity |