A new image encryption algorithm based on single S-box and dynamic encryption step
Chaotic-based S-box image encryption schemes promise to be a practical solution for securing digital images. However, the high-dimensional continuous chaotic has increased the algorithm’s complexity. Recent alternatives that focused on double or multiple S-boxes approaches, on the other hand, have b...
Saved in:
| Main Authors: | , |
|---|---|
| Format: | Experiment |
| Language: | en en |
| Published: |
Institute of Electrical and Electronics Engineers Inc.
2021
|
| Subjects: | |
| Online Access: | https://eprints.ums.edu.my/id/eprint/31761/2/A%20new%20image%20encryption%20algorithm%20based%20on%20single%20s-box%20and%20dynamic%20encryption%20step_ABSTRACT.pdf https://eprints.ums.edu.my/id/eprint/31761/1/A%20new%20image%20encryption%20algorithm%20based%20on%20single%20s-box%20and%20dynamic%20encryption%20step.pdf https://eprints.ums.edu.my/id/eprint/31761/ https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=9525072 https://doi.org/10.1109/ACCESS.2021.3108789 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Summary: | Chaotic-based S-box image encryption schemes promise to be a practical solution for securing digital images. However, the high-dimensional continuous chaotic has increased the algorithm’s complexity. Recent alternatives that focused on double or multiple S-boxes approaches, on the other hand, have been proven vulnerable to differential attacks. This paper presents an efficient and secure chaotic-based S-box image encryption scheme. Firstly, a single S-box with a size of 10 × 26 was constructed by using a low-dimensional chaotic system. Without a complex mathematical operation, the constructed single S-box has obvious efficiency advantages and achieved a higher image entropy rate than recent double or multiple S-boxes. Secondly, a new dynamic encryption step method is proposed to solve the high correlation and deterministic problems in multiple S-box encryptions. Under the control of the dynamic encryption step algorithm, it effectively destroys the correlation between the source image’s pixels. The experimental results and security analysis show that the proposed scheme enjoys higher security and is more efficient to secure digital images in real-world applications. |
|---|
