Skip to main content
Log in

A new image encryption scheme with Feistel like structure using chaotic S-box and Rubik cube based P-box

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In this paper, a novel chaos-based dynamic encryption scheme with a permutation-substitution structure is presented. The S-boxes and P-boxes of the scheme are constructed with chaotic transformation and Rubik cube-based permutation to enrich the security, sensitivity, and robustness of the scheme. We use chaotic map and Feistel network to generate our block cipher. The purpose of using a Feistel network is to do encryption and decryption with the same structure. Due to using chaotic systems in our design, the required rounds of Feistel structure are only seven rounds which are less than the number of rounds for encryption algorithms, and, it would be helpful to improve the efficiency of our design. We made this block cipher fully dynamic, to achieve enhanced security and efficiency. Our design consists of a 192-bit block cipher and 8 × 8-bit S-box which due to chaotic systems is created simple and secure. We studied and tested our scheme with security analyses such as algorithm evalustion, correlation coefficients, histogram, plain text analysis, NPCR, key sensitivity, UACI, and key space analysis and corresponding results are given in detail. The results of simulation and analysis show that the proposed block-cipher encryption scheme provides a secure and efficient encryption.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7.
Fig. 8

Similar content being viewed by others

References

  1. Abutaha M, Assad SE, Queudet A, Déforges O (2017) Design and Efficient Implementation of a Chaos based Stream Cipher. Int J Internet Technol Secured Trans 7:1–15. https://doi.org/10.1504/IJITST.2017.10008009

    Article  Google Scholar 

  2. Albahrani EA, Kadhum RN (2019) A New Cipher Based on Feistel Structure and Chaotic Maps. Ghana Social Sci 16:270–280

    Google Scholar 

  3. Bouslehi H, Seddik H (2018) A new rapid hyper-chaotic system for more efficient 2D data encryption. Multimedia Tools Appl. https://doi.org/10.1007/s11042-017-4675-0

  4. Chai X, Zheng X, Gan Z, Chen Y, Han D (2018) An image encryption algorithm based on chaotic system and compressive sensing. Signal Process 148:124–144

    Article  Google Scholar 

  5. Chen S, Yu S, Lu J, Chen G, He J (2018) Design and FPGA-based realization of a chaotic secure video communication system. IEEE Trans Circuits Syst Video Technol. https://doi.org/10.1109/TCSVT.2017.2703946

  6. Fan C, Ding Q (2018) A Novel Image Encryption Scheme Based on Self-Synchronous Cha-otic Stream Cipher and Wavelet Transform. Entropy. https://doi.org/10.3390/e20060445

  7. Fan H, Li M, Liu D, An K (2018) Cryptanalysis of a plaintext-related chaotic RGB image encryption scheme using total plain image characteristics. Multimed Tools Appl 77:20103–20127. https://doi.org/10.1007/s11042-017-5437-8

    Article  Google Scholar 

  8. Hamza R, Yan Z, Muhammad K, Bellavista P, Titouna F (2018) A privacy-preserving cryptosystem for IoT E-healthcare. Inform Sci 527:493–510. https://doi.org/10.1016/j.ins.2019.01.070

    Article  MathSciNet  MATH  Google Scholar 

  9. Hamza R, Hassan A, Huang T, Ke L, Yan H (2019) An Efficient Cryptosystem for Video Surveillance in the Internet of Things Environment. Complexity. https://doi.org/10.1155/2019/1625678

  10. Helmy M, El-Rabaie E, Eldokany IM, Abd El-Samie FE (2018) Chaotic encryption with different modes of operation based on Rubik’s cube for efficient wireless communication. Multimed Tools Appl 77:27337–27361

    Article  Google Scholar 

  11. Hua Z, Zhou Y (2018) One-dimensional nonlinear model for producing chaos. IEEE Trans Circuit System. https://doi.org/10.1109/TCSI.2017.2717943

  12. Hua Z, Zhou B, Zhou Y (2018) Sine-transform-based chaotic system with FPGA implementation. IEEE Trans Indust Electron. https://doi.org/10.1109/TIE.2017.2736515

  13. Hua Z, Yi S, Zhou Y, Li C, Wu Y (2018) Designing hyper chaotic cat maps with any desired number of positive Lyapunov exponents. IEEE Trans Cyber. https://doi.org/10.1109/TCYB.2016.2642166

  14. Hua Z, Xu B, Jin F, Huang H (2019) Image Encryption Using Josephus Image Encryption Using Josephus. IEEE Access 7:8660–8674

    Article  Google Scholar 

  15. Kanda M (2001) Practical security evaluation against differential and linear cryptanalyses for Feistel ciphers with SPN round function. Springer Heidelberg 2012:324–338

    MathSciNet  MATH  Google Scholar 

  16. Li C (2018) Cracking a hierarchical chaotic image encryption algorithm based on per mutation. Signal Process 118:203–210. https://doi.org/10.1016/j.sigpro.2015.07.008

    Article  Google Scholar 

  17. Li M, Guo Y, Huang J, Li Y (2018) Cryptanalysis of a chaotic image encryption scheme based on permutation-diffusion structure. Signal Process Image Commun 62:164–172. https://doi.org/10.1016/j.image.2018.01.002

    Article  Google Scholar 

  18. Li C, Zhang Y, Yong XE (2019) When an attacker meets a cipher-image in 2018: A year in review. J Inform Secur Appl. https://doi.org/10.1016/j.jisa.2019.102361

  19. Liu L, Hao S, Lin J, Wang Z, Hu X, Miao S (2018) Image block encryption algorithm based on chaotic maps. IET Signal Process 12:22–30. https://doi.org/10.1049/iet-spr.2016.0584

    Article  Google Scholar 

  20. Luo Y, Zhou R, Liu J, Qiu S, Cao Y (2018) An efficient and self-adapting colour-image encryption algorithm based on chaos and interactions among multiple layers. Multimed Tools Appl. https://doi.org/10.1007/s11042-018-5844-5

  21. Luo Y, Zhou R, Liu J, Qiu S, Cao Y (2018) An efficient and self-adapting colour-image encryption algorithm based on chaos and interactions among multiple layers. Multimed Tools Appl 77:26191–26217

    Article  Google Scholar 

  22. Lv X, Liao X, Yang (2018) A novel scheme for simultaneous image compression and encryption based on wavelet packet transform and multi-chaotic systems. Multimed Tools Appl 77:28633–28663. https://doi.org/10.1007/s11042-018-6013-6

    Article  Google Scholar 

  23. Moafimadani SS, Yucheng C, Tang C (2019) A New Algorithm for Medical Color Images Encryption Using Chaotic Systems. Entropy 21:577–585. https://doi.org/10.3390/e21060577

    Article  MathSciNet  Google Scholar 

  24. Mondal B, Kumar P, Singh S (2018) A chaotic permutation and diffusion based image encryption algorithm for secure communications. Multimed Tools Appl 77:31177–31198. https://doi.org/10.1007/s11042-018-6214-z

    Article  Google Scholar 

  25. Nachef V, Marrière N, Volte E (2017) Improved Attacks on Extended Generalized Feistel Networks. Int Confer Cryptol Network Secur. https://doi.org/10.1007/978-3-319-61273-7_16

  26. Ni B, Dong X (2019) Improved quantum attack on Type-1 Generalized Feistel Schemes and Its application to CAST-256. IACR Cryptol. https://doi.org/10.1007/978-3-030-35423-7_22

  27. Özkaynak F (2017) Brief review on application of nonlinear dynamics in image encryption. Nonlinear dynamic 92:305–331.  https://doi.org/10.1007/s11071-018-4056-x

  28. Ping P, Fan J, Mao Y, Xu F, Gao J (2018) A chaos based image encryption scheme using digit-level permutation and block diffusion. IEEE Access 6:67581–67593. https://doi.org/10.1109/ACCESS.2018.2879565

    Article  Google Scholar 

  29. Preishuber M, Hutter T, Katzenbeisser S, Uhl A (2018) Depreciating Motivation and Empirical Security Analysis of Chaos-Based Image and Video Encryption. Inform Forensics Secur. https://doi.org/10.1109/TIFS.2018.2812080

  30. Pudi V, Chattopadhyay A, Lam KY (2018) Secure and lightweight compressive sensing using stream cipher. IEEE Trans Circ SystII 65:371–375. https://doi.org/10.1109/TCSII.2017.2715659

    Article  Google Scholar 

  31. Shailani M, Kumar S, Das MK, Budhiraja R, Singh S (2018) A cryptographic model for better information security. J Inform Secur Appl 43:123–138. https://doi.org/10.1016/j.jisa.2018.10.011

    Article  Google Scholar 

  32. Tutueva A, Nepomucenob E, Karimovc A, Andreeva V, Butusov DN (2020) Adaptive chaotic maps and their application to pseudo-random numbers generation. Chaos Solitons Fractals 133:109615

    Article  MathSciNet  Google Scholar 

  33. Ullah A, amal S, Shah T (2018) A novel scheme for image encryption using substitution box and chaotic system. Nonlinear Dyn 91:359–370. https://doi.org/10.1007/s11071-017-3874-6

    Article  MathSciNet  Google Scholar 

  34. Xie E, Li C, Yu S, Lu J (2018) On the cryptanalysis of Fridrich’s chaotic image en-cryption scheme. Signal Process 132:150–154. https://doi.org/10.1016/j.sigpro.2016.10.002

    Article  Google Scholar 

  35. Xuncai Z, Zhou Z, Ying N (2018) An Image Encryption Method Based on the Feistel Network and Dynamic DNA Encoding. IEEE Photonics J 99:1–1. https://doi.org/10.1109/JPHOT.2018.2859257

    Article  Google Scholar 

  36. Yang CH, Huang SJ (2018) Secure color image encryption algorithm based on chaotic signals and its FPGA realization. Int J Circuit Theory Appl 46:1–18. https://doi.org/10.1016/j.ins.2018.03.055

    Article  Google Scholar 

  37. Ye G, Pan C, Huang X, Mei Q (2018) An efficient pixel-level chaotic image encryption algorithm. Nonlinear Dynamic 94:745–756. https://doi.org/10.1007/s11071-018-4391-y

    Article  Google Scholar 

  38. Zhong S, Deng Z (2019) A digital image encryption algorithm based on chaotic mapping. J Algorithms Comput Technol 13:1–11. https://doi.org/10.36478/jeasci.2019.6954.6958

    Article  MathSciNet  Google Scholar 

  39. Zhu C, Sun K (2018) Cryptanalyzing and improving a novel color image encryption algorithm using RT-enhanced chaotic tent maps. IEEE Access 6:18759–18770. https://doi.org/10.1109/ACCESS.2018.2817600

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Maryam Mousavi.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Mousavi, M., Sadeghiyan, B. A new image encryption scheme with Feistel like structure using chaotic S-box and Rubik cube based P-box. Multimed Tools Appl 80, 13157–13177 (2021). https://doi.org/10.1007/s11042-020-10440-4

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-10440-4

Keywords

Navigation