scispace - formally typeset
Search or ask a question
Journal ArticleDOI

Enhancement of the CAST Block Algorithm Based on Novel S-Box for Image Encryption

TL;DR: In this article , the authors proposed an algorithm for encrypting images based on the Carlisle Adams and Stafford Tavares CAST block cipher algorithm with 3D and 2D logistic maps.
Abstract: Background and Aim: due to the rapid growth of data communication and multimedia system applications, security becomes a critical issue in the communication and storage of images. This study aims to improve encryption and decryption for various types of images by decreasing time consumption and strengthening security. Methodology: An algorithm is proposed for encrypting images based on the Carlisle Adams and Stafford Tavares CAST block cipher algorithm with 3D and 2D logistic maps. A chaotic function that increases the randomness in the encrypted data and images, thereby breaking the relation sequence through the encryption procedure, is introduced. The time is decreased by using three secure and private S-Boxes rather than using six S-Boxes, as in the traditional method. Moreover, the CAST encryption algorithm was modified to be used on the private keys and substitution stage (S-Boxes), with the keys and S-Boxes of the encryption algorithm being generated according to the 2D and 3D chaotic map functions. The proposed system passed all evaluation criteria, including (MSE, PSNR, EQ, MD, SC, NC, AD, SNR, SIM, MAE, Time, CC, Entropy, and histograms). Results: Moreover, the results also illustrate that the created S-Boxes passed all evaluation criteria; compared with the results of the traditional method that was used in creating S-Box, the proposed method achieved better results than other methods used in the other works. The proposed solution improves the entropy which is between (7.991–7.999), reduces the processing time which is between (0.5–11 s/Images), and improves NCPR, which is between (0.991–1). Conclusions: The proposed solution focuses on reducing the total processing time for encryption and decryption and improving transmission security. Finally, this solution provides a fast security system for surgical telepresence with secure real-time communication. The complexity of this work needs to know the S-Box creation method used, the chaotic method, the values of the chaotic parameters, and which of these methods was used in the encryption process.

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI
TL;DR: In this paper , the non-permutation function that was generated from the binomial operation of the power function was used to construct a cryptographically strong S-box, which can thwart any cryptanalysis tools on cryptosystems.
Abstract: A Substitution box (S-box) is an important component used in symmetric key cryptosystems to satisfy Shannon’s property on confusion. As the only nonlinear operation, the S-box must be cryptographically strong to thwart any cryptanalysis tools on cryptosystems. Generally, the S-boxes can be constructed using any of the following approaches: the random search approach, heuristic/evolutionary approach or mathematical approach. However, the current S-box construction has some drawbacks, such as low cryptographic properties for the random search approach and the fact that it is hard to develop mathematical functions that can be used to construct a cryptographically strong S-box. In this paper, we explore the non-permutation function that was generated from the binomial operation of the power function to construct a cryptographically strong S-box. By adopting the method called the Redundancy Removal Algorithm, we propose some enhancement in the algorithm such that the desired result can be obtained. The analytical results of our experiment indicate that all criteria such as bijective, nonlinearity, differential uniformity, algebraic degree and linear approximation are found to hold in the obtained S-boxes. Our proposed S-box also surpassed several bijective S-boxes available in the literature in terms of cryptographic properties.

1 citations

References
More filters
Book
01 Jul 1993
TL;DR: This handy desktop reference gathers together into one easy-to-use volume the most popular image processing algorithms.
Abstract: This handy desktop reference gathers together into one easy-to-use volume the most popular image processing algorithms. Designed to be used at the computer terminal, it features an illustrated, annotated dictionary format -- with clear, concise definitions, examples, and C program code.

173 citations

Journal ArticleDOI
TL;DR: Experimental results demonstrate that the presented technique has a high-security, high embedding capacity and good visual quality, and the results prove that the constructed S-box has vital qualities for viable applications in security purposes.
Abstract: Substitution boxes play an essential role in designing secure cryptosystems. With the evolution of quantum technologies, current data security mechanisms may be broken due to their construction based on mathematical computation. Quantum walks, a universal quantum computational model, play an essential role in designing quantum algorithms. We utilize the benefits of quantum walks to present a novel technique for constructing substitution boxes (S-boxes) based on quantum walks (QWs). The performance of the presented QWs S-box technique is evaluated by S-box evaluation criteria, and our results prove that the constructed S-box has vital qualities for viable applications in security purposes. Furthermore, a new technique for image steganography is constructed. The proposed technique is an integrated mechanism between classical data hiding and quantum walks to achieve better security for the embedded data. The embedding and extraction procedures are controlled by QWs S-box. The inclusion of cryptographic QWs S-box ensures the security of both embedding and extraction phases. At the extraction phase, only the stego image and the secret values are needed for constructing the secret data. Experimental results demonstrate that the presented technique has a high-security, high embedding capacity and good visual quality.

124 citations

Journal ArticleDOI
Chunyan Han1
01 Mar 2019-Optik
TL;DR: The safety performance analysis shows that the proposed modified Logistic chaotic map has infinite key space and high security, and can resist the attack of the exhaustive method and statistical analysis.

96 citations

Journal ArticleDOI
TL;DR: A novel lossless image encryption algorithm based on edge detection and generalized chaotic maps for key generation that has higher statistical and cryptanalytic properties and is suitable for medical imaging security is presented.

84 citations

Journal ArticleDOI
TL;DR: Uppermost cryptanalytic properties that are proven by statistical/numeric tests show good performance and reliability of proposed algorithm for image encryption tasks while unlike any other chaotic image encryption system, the algorithm uses a string input for secret key.

81 citations