Chaos-Based Confusion and Diffusion of Image Pixels Using Dynamic Substitution

The evolution of wireless and mobile communication from 0G to the upcoming 5G gives rise to data sharing through the Internet. This data transfer via open public networks are susceptible to several types of attacks. Encryption is a method that can protect information from hackers and hence confident...

Full description

Bibliographic Details
Main Authors: Abdullah Qayyum, Jawad Ahmad, Wadii Boulila, Saeed Rubaiee, Arshad, Fawad Masood, Fawad Khan, William J. Buchanan
Format: Article
Language:English
Published: IEEE 2020-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/9151878/
id doaj-f1fbd5aa81244f458716d266df4f8a29
record_format Article
spelling doaj-f1fbd5aa81244f458716d266df4f8a292021-03-30T04:28:47ZengIEEEIEEE Access2169-35362020-01-01814087614089510.1109/ACCESS.2020.30129129151878Chaos-Based Confusion and Diffusion of Image Pixels Using Dynamic SubstitutionAbdullah Qayyum0https://orcid.org/0000-0002-0132-1039Jawad Ahmad1https://orcid.org/0000-0001-6289-8248Wadii Boulila2https://orcid.org/0000-0003-2133-0757Saeed Rubaiee3https://orcid.org/0000-0002-4433-5529 Arshad4https://orcid.org/0000-0001-8621-2773Fawad Masood5https://orcid.org/0000-0002-5788-4228Fawad Khan6https://orcid.org/0000-0001-6609-5928William J. Buchanan7https://orcid.org/0000-0003-0809-3523Department of Electrical Engineering, University of Engineering and Technology, Peshawar, PakistanSchool of Computing, Edinburgh Napier University, Edinburgh, U.K.RIADI Laboratory, University of Manouba, Manouba, TunisiaDepartment of Industrial and Systems Engineering, University of Jeddah, Jeddah, Saudi ArabiaInstitute for Energy and Environment, University of Strathclyde, Glasgow, U.K.Department of Electrical Engineering, Institute of Space Technology, Islamabad, PakistanDepartment of Information Security, National University of Sciences and Technology, Islamabad, PakistanSchool of Computing, Edinburgh Napier University, Edinburgh, U.K.The evolution of wireless and mobile communication from 0G to the upcoming 5G gives rise to data sharing through the Internet. This data transfer via open public networks are susceptible to several types of attacks. Encryption is a method that can protect information from hackers and hence confidential data can be secured through a cryptosystem. Due to the increased number of cyber attacks, encryption has become an important component of modern-day communication. In this article, a new image encryption algorithm is presented using chaos theory and dynamic substitution. The proposed scheme is based on two-dimensional Henon, Ikeda chaotic maps, and substitution box (S-box) transformation. Through Henon, a random S-Box is selected and the image pixel is substituted randomly. To analyze security and robustness of the proposed algorithm, several security tests such as information entropy, histogram investigation, correlation analysis, energy, homogeneity, and mean square error are performed. The entropy values of the test images are greater than 7.99 and the key space of the proposed algorithm is 2<sup>798</sup>. Furthermore, the correlation values of the encrypted images using the proposed scheme are close to zero when compared with other conventional schemes. The number of pixel change rate (NPCR) and unified average change intensity (UACI) for the proposed scheme are higher than 99.50% and 33, respectively. The simulation results and comparison with the state-of-the-art algorithms prove the efficiency and security of the proposed scheme.https://ieeexplore.ieee.org/document/9151878/Henon mapIkeda mapchaosencryptionsubstitution box
collection DOAJ
language English
format Article
sources DOAJ
author Abdullah Qayyum
Jawad Ahmad
Wadii Boulila
Saeed Rubaiee
Arshad
Fawad Masood
Fawad Khan
William J. Buchanan
spellingShingle Abdullah Qayyum
Jawad Ahmad
Wadii Boulila
Saeed Rubaiee
Arshad
Fawad Masood
Fawad Khan
William J. Buchanan
Chaos-Based Confusion and Diffusion of Image Pixels Using Dynamic Substitution
IEEE Access
Henon map
Ikeda map
chaos
encryption
substitution box
author_facet Abdullah Qayyum
Jawad Ahmad
Wadii Boulila
Saeed Rubaiee
Arshad
Fawad Masood
Fawad Khan
William J. Buchanan
author_sort Abdullah Qayyum
title Chaos-Based Confusion and Diffusion of Image Pixels Using Dynamic Substitution
title_short Chaos-Based Confusion and Diffusion of Image Pixels Using Dynamic Substitution
title_full Chaos-Based Confusion and Diffusion of Image Pixels Using Dynamic Substitution
title_fullStr Chaos-Based Confusion and Diffusion of Image Pixels Using Dynamic Substitution
title_full_unstemmed Chaos-Based Confusion and Diffusion of Image Pixels Using Dynamic Substitution
title_sort chaos-based confusion and diffusion of image pixels using dynamic substitution
publisher IEEE
series IEEE Access
issn 2169-3536
publishDate 2020-01-01
description The evolution of wireless and mobile communication from 0G to the upcoming 5G gives rise to data sharing through the Internet. This data transfer via open public networks are susceptible to several types of attacks. Encryption is a method that can protect information from hackers and hence confidential data can be secured through a cryptosystem. Due to the increased number of cyber attacks, encryption has become an important component of modern-day communication. In this article, a new image encryption algorithm is presented using chaos theory and dynamic substitution. The proposed scheme is based on two-dimensional Henon, Ikeda chaotic maps, and substitution box (S-box) transformation. Through Henon, a random S-Box is selected and the image pixel is substituted randomly. To analyze security and robustness of the proposed algorithm, several security tests such as information entropy, histogram investigation, correlation analysis, energy, homogeneity, and mean square error are performed. The entropy values of the test images are greater than 7.99 and the key space of the proposed algorithm is 2<sup>798</sup>. Furthermore, the correlation values of the encrypted images using the proposed scheme are close to zero when compared with other conventional schemes. The number of pixel change rate (NPCR) and unified average change intensity (UACI) for the proposed scheme are higher than 99.50% and 33, respectively. The simulation results and comparison with the state-of-the-art algorithms prove the efficiency and security of the proposed scheme.
topic Henon map
Ikeda map
chaos
encryption
substitution box
url https://ieeexplore.ieee.org/document/9151878/
work_keys_str_mv AT abdullahqayyum chaosbasedconfusionanddiffusionofimagepixelsusingdynamicsubstitution
AT jawadahmad chaosbasedconfusionanddiffusionofimagepixelsusingdynamicsubstitution
AT wadiiboulila chaosbasedconfusionanddiffusionofimagepixelsusingdynamicsubstitution
AT saeedrubaiee chaosbasedconfusionanddiffusionofimagepixelsusingdynamicsubstitution
AT arshad chaosbasedconfusionanddiffusionofimagepixelsusingdynamicsubstitution
AT fawadmasood chaosbasedconfusionanddiffusionofimagepixelsusingdynamicsubstitution
AT fawadkhan chaosbasedconfusionanddiffusionofimagepixelsusingdynamicsubstitution
AT williamjbuchanan chaosbasedconfusionanddiffusionofimagepixelsusingdynamicsubstitution
_version_ 1724181824871071744