Abstract

Chaotic systems are vital in designing contemporary cryptographic systems. This study proposes an innovative method for constructing an effective substitution box using a 3-dimensional chaotic map. Moreover, bouyed by the efficiency of the proposed chaos-based substitution boxes’ effectiveness, we introduce a new chaos-based image cryptosystem that combines the adeptness of Gray codes, a non-linear and sensitive hyper-chaotic system, and the proposed S-box. The generated secret key emanating from the cryptosystem is correlated to the input image to produce a unique key for each image. Extensive experimental outcomes demonstrate the utility, effectiveness, and high performance of the resulting cryptosystem.

Highlights

  • We present a new image cryptosystem based on S-box, 3D chaotic system (2), and Gray code

  • A new approach to building a strong S-box using a 3D chaotic map was presented in this paper

  • It employs a key generation process that relies on the input image and acts as its signature to make high key sensibility

Read more

Summary

Introduction

In various graphics applications such as military, medicine, homeland security, etc., advanced image encryption techniques are increasingly needed for the safe transfer, storage, and recuperation of digital images. Chaotic maps have numerous ultimate features, such as ergodicity, sensitivity to primary conditions They show a random behavior that can cause confusion and diffusion in the plaintext to get secure ciphertext [3]. In [9], a chaos-based image block encryption approach is presented using S-box, and Wang et al [24] suggested an image cryptosystem in the form of block cipher using a chaotic map and dynamic random growth mechanism. Utilising the designed S-box as the fulcrum of a new image cryptosystem that integrates the Gray code and the chaotic mapping [18] to generate unique encryption signatures with high sensitivity for each image.

Preliminary Knowledge
Gray Code
S-box Construction
Performance Analysis
Nonlinearity Criterion
Strict Avalanche Criterion
Discussion
Encryption Process
Decryption Process
Performance and Security Analyses
Key Space Analysis
Correlation Analysis
Histogram Analysis
Global Entropy
Local Entropy
Sensitivity Analysis
Key Sensitivity
Plaintext Sensitivity
Robustness Analysis
Occlusion Attack
Noise Attack
Known-Plaintext and Chosen-Plaintext Attacks
Findings
Comparative and Speed Analysis
Conclusions

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.