scispace - formally typeset
Search or ask a question
Author

Arslan Shafique

Other affiliations: HITEC University
Bio: Arslan Shafique is an academic researcher from Riphah International University. The author has contributed to research in topics: Encryption & Computer science. The author has an hindex of 5, co-authored 12 publications receiving 75 citations. Previous affiliations of Arslan Shafique include HITEC University.

Papers
More filters
Journal ArticleDOI
TL;DR: In this article, the bit level permutation is performed by extracting the binary bit planes from the plaintext image, and a new random image is introduced to create more diffusion, and chaotic cubic-logistic and logistic map are also used in the proposed cryptosystem.
Abstract: In recent years, a number of chaos-based image encryption schemes have been proposed. In digital images, pixel is considered as the smallest element. So, most of the image encryption schemes implement diffusion and permutation operation at the pixel level. The substitution process creates diffusion. It can be done by using the substitution box (S-box). Although the S-box plays a vital role in any cryptosystem, the S-box substitution takes too much time to substitute the pixels of an image of size $ 256 \times 256$ or more than $ 256 \times 256$ . So, in this paper, for the low time complexity, bit level permutation is performed by extracting the binary bit planes from the plaintext image. Bit level permutation has an ability to create confusion and diffusion at the same time. A new random image is introduced to create more diffusion. The chaotic cubic-logistic and logistic map are also used in the proposed cryptosystem. Experimental results are carried out to show the efficiency of the proposed cryptosystem.

64 citations

Journal ArticleDOI
Arslan Shafique1
TL;DR: There is hardly any information in the substituted image which is substituted with the proposed Cubic-Logistic substitution box, whereas patterns of the original image can be visualized in those substituted images which are substituted with other existing substitution boxes.
Abstract: In the last few decades, security of digital information has become more important. This study focuses on the substitution of grayscale digital images. By using Cubic-Logistic map, a new substitution box is proposed which has been given the name Cubic-Logistic substitution box. Some substituted images have been examined which are substituted with the proposed and other existing substitution boxes. There is hardly any information in the substituted image which is substituted with the proposed substitution box, whereas patterns of the original image can be visualized in those substituted image which are substituted with other existing substitution boxes. Cubic-Logistic substitution box has also shown good statistical analysis such as strict avalanche criterion, differential approximation probability, linear approximation probability, nonlinearity, bit independent criterion, correlation and energy. These analyses of proposed Cubic-Logistic substitution box are then compared with the analysis of other existing substitution boxes such as Rijndael substitution box, Affine-Power-Affine substitution box and skipjack substitution box to show the strength of the proposed S-box.

37 citations

Journal ArticleDOI
TL;DR: A new substitution technique using multiple S-boxes with dynamic substitution is proposed and the proposed discrete wavelet transform based scheme is employed to reduce the encryption computational time.
Abstract: A number of image encryption techniques have been proposed in recent years. These techniques use either spatial or transform domain image processing. A major challenge when designing an image encryption scheme is to conceal the pixel of the input image, especially when the image has a low texture region. Another problem is the encryption computational time. In this paper, these two issues are addressed. As the use of a single substitution box (S-box) to encrypt digital images does not work well for greater as well as a lower number of gray levels. To solve this problem, a new substitution technique using multiple S-boxes with dynamic substitution is proposed. In the second part of this paper, the proposed discrete wavelet transform based scheme is employed to reduce the encryption computational time. A number of parameters like correlation, entropy, energy, contrast, homogeneity, MSE and PSNR are used to analyze the quality of cipher images.

35 citations

Journal ArticleDOI
TL;DR: In this article, the authors explore the vulnerabilities in the security protocols and propose guidelines to improve the security and provide future research directions, which can be exploited by the malicious UAVs.
Abstract: With the rapid growth in technology, the use of Unmanned Aerial Vehicles (UAVs) have increased in civil and military applications including rescue operations, disaster recovery, and military operations. Despite the utility and advantages of UAVs, they may lead to major security breaches in the context of hardware, software, and communication channel, due their ease of use and availability. UAVs are vulnerable to various types of attacks such as spoofing, false data injection, jamming, fuzzing, availability, confidentiality, and integrity attacks. To overcome these security threats, researchers have been investigating strong security protocols to keep UAVs safe from the attackers. Nevertheless, there are many flaws in the developed protocols which can be exploited by hackers. Therefore, it is becomes crucial to study and analyze the existing security protocols used in UAVs to discover and address their vulnerabilities and weaknesses. The purpose of this study is to explore the vulnerabilities in the security protocols and propose guidelines to improve the security and provide future research directions.

34 citations

Journal ArticleDOI
TL;DR: The proposed algorithm can decrypt the plaintext image with little loss of information, but the content of the original image is visible, and the number of pixel change rate (NPCR) and unified average change intensity (UACI) for the proposed encryption scheme is higher than 99.4% and 33, respectively.
Abstract: In this paper, a noise-resistant image encryption scheme is proposed. We have used a cubic-logistic map, Discrete Wavelet Transform (DWT), and bit-plane extraction method to encrypt the medical images at the bit-level rather than pixel-level. The proposed work is divided into three sections; In the first and the last section, the image is encrypted in the spatial domain. While the middle section of the proposed algorithm is devoted to the frequency domain encryption in which DWT is incorporated. As the frequency domain encryption section is a sandwich between the two spatial domain encryption sections, we called it a ”sandwich encryption.” The proposed algorithm is lossless because it can decrypt the exact pixel values of an image. Along with this, we have also gauge the proposed scheme’s performance using statistical analysis such as entropy, correlation, and contrast. The entropy values of the cipher images generated from the proposed encryption scheme are more remarkable than 7.99, while correlation values are very close to zero. Furthermore, the number of pixel change rate (NPCR) and unified average change intensity (UACI) for the proposed encryption scheme is higher than 99.4% and 33, respectively. We have also tested the proposed algorithm by performing attacks such as cropping and noise attacks on enciphered images, and we found that the proposed algorithm can decrypt the plaintext image with little loss of information, but the content of the original image is visible.

27 citations


Cited by
More filters
01 Apr 1997
TL;DR: The objective of this paper is to give a comprehensive introduction to applied cryptography with an engineer or computer scientist in mind on the knowledge needed to create practical systems which supports integrity, confidentiality, or authenticity.
Abstract: The objective of this paper is to give a comprehensive introduction to applied cryptography with an engineer or computer scientist in mind. The emphasis is on the knowledge needed to create practical systems which supports integrity, confidentiality, or authenticity. Topics covered includes an introduction to the concepts in cryptography, attacks against cryptographic systems, key use and handling, random bit generation, encryption modes, and message authentication codes. Recommendations on algorithms and further reading is given in the end of the paper. This paper should make the reader able to build, understand and evaluate system descriptions and designs based on the cryptographic components described in the paper.

2,188 citations

Journal ArticleDOI
TL;DR: The main feature of this algorithm is that the robust chaos-based keystream and encryption process are highly sensitive to the plaintext, which will effectively resist against chosen-plain text and known-plaintext attacks.
Abstract: This paper introduces an image encryption algorithm shorted as CITSPD, manipulated by circle index table scrambling and partition diffusion Firstly, the circle index table is obtained through the generation, circle shift and transposition of the benchmark sequence Secondly, the plain image is transformed into the wavelet coefficient and is then scrambled by the circle index table Thirdly, the permutated image is disturbed by different noises and is further divided into four subsections Finally, the forward and inverse partition diffusions are performed to the subsections for getting the cipher image The main feature of this algorithm is that the robust chaos-based keystream and encryption process are highly sensitive to the plaintext, which will effectively resist against chosen-plaintext and known-plaintext attacks In addition, the encryption scheme is free of noise attack since the inverse diffusion differs from the forward one And the diffusion effect can be effectively enhanced by, as much as possible, increasing the small pixel value and decreasing the large pixel value Experimental tests and security analyses are carried out to verify the advantages of the scheme

69 citations

Journal ArticleDOI
TL;DR: Experimental results and security analysis show that the proposed algorithm has excellent image encryption performance and can resist a variety of common attacks against the image encryption system.
Abstract: In this paper, a new four-dimensional memristive hyperchaotic system is constructed based on Liu chaotic system by introducing a flux-controlled memristor model. Then the dynamic characteristics of the new system such as phase portraits, dissipation, Lyapunov exponent and power spectrum are investigated. Subsequently, a novel image encryption algorithm is designed based on the chaotic sequence generated by the proposed hyperchaotic system combining the hash algorithm and DNA sequence operations. In this image encryption algorithm, the coupling relationship between plaintext and ciphertext is established by using the hash value of plaintext image obtained by hash algorithm, and then the plaintext is decomposed into eight bit-plane, to improve the efficiency of the algorithm, only the higher four bit-plane are selected for scrambling. After scrambling, the data stream is further processed by the DNA encoding/decoding rules and DNA sequence operations to obtain the intermediate ciphertext. Finally, the ultimate encrypted image is obtained by performing order and reverse-order diffusion operations at the pixel level on the intermediate ciphertext. Experimental results and security analysis show that the proposed algorithm has excellent image encryption performance and can resist a variety of common attacks against the image encryption system.

63 citations

Journal ArticleDOI
TL;DR: Performance analysis and comparison analysis show that the proposed image cryptosystem has the advantages of fast processing speed, strong system sensitivity and high security, and can be applied to the actual image communications.

55 citations