A Novel Technique for the Generation and Application of Substitution Boxes (s-box) for the Image Encryption

S. Bukhari, A. Yousaf, S. Niazi, M. R. Anjum


The increasing applications of image processing have shifted the focus to the security of images during their transmission. In this work, the main focus is on the security of gray scale images against cryptanalysis attacks. A new model for encryption algorithm of the grayscale image is presented through substitution boxes (s-box). The proposed technique contained two parts; in the first part six different substitution boxes are generated from Galois field and linear fractional transformations. In the second part, the generated substitution boxes are used for the encryption process of message image. For the estimation of the strength of the proposed technique for nonlinearity and strict avalanche criteria, statistical tests and histogram analysis are performed on the substitution boxes and on the encrypted images respectively to check its resistance. The proposed algorithm is more robust as compared to other encryption techniques against attacks in insecure transmission paths.

Full Text:



⦁ Q. Jiang, W. Zeng, W. Ou and R. Xu, "A scrambling and encryption algorithm for selective block of identification photo", IEEE 8th International Conference on Wireless Communications & Signal Processing, WCSP, Yangzhou, China, pp. 1-5, October 13-15, 2016,

⦁ J. Mondal and D. Swain, A Contemplator on Topical Image Encryption Measures: In Security Breaches and Threat Prevention in the Internet of Things, India: IGI Global, pp. 189-212, 2017.

⦁ L. Bao and Y. Zhou, “Image encryption: generating visually meaningful encrypted images”, Information Sciences, vol. 324, pp. 197-207, December 2015.

⦁ N.K. Pareek and V. Patidar, "Medical image protection using genetic algorithm operations", Soft Computing, vol. 20, pp.763-772, February 2016.

⦁ R. Enayatifar, A.H. Abdullah, I.F. Isnin, A. Altameem and M. Lee, "Image encryption using a synchronous permutation-diffusion technique", Optics and Lasers in Engineering, vol. 90, pp.146-154, March 2017.

⦁ L. Teng, X. Wang and J. Meng, "A chaotic color image encryption using integrated bit-level permutation", Multimedia Tools and Applications, vol. 24, pp. 1-14, March 2018.

⦁ L. Xu, Z. Li, J. Li, and W. Hua, "A novel bit-level image encryption algorithm based on chaotic maps", Optics and Lasers in Engineering, vol. 78, pp. 17-25, March 2016.

⦁ X. Zhang, and X. Wang, "Multiple-image encryption algorithm based on mixed image element and permutation", Optics and Lasers in Engineering, vol. 92, pp. 6-16, May 2017.

⦁ Y. Tian, and Z. Lu, "Novel permutation-diffusion image encryption algorithm with chaotic dynamic S-box and DNA sequence operation", AIP Advances, vol. 7, pp. 085008, August 2017.

⦁ S.M. Pan, R.H. Wen, Z.H. Zhou and N.R. Zhou, "Optical multi-image encryption scheme based on discrete cosine transform and nonlinear fractional Mellin transform", Multimedia Tools and Applications ,

vol. 76, pp. 2933-2953, January 2017.

⦁ Z. Liu, M. Gong, Y. Dou, F. Liu, S. Lin, M.A. Ahmad, J. Dai, and

S. Liu, "Double image encryption by using Arnold transform and discrete fractional angular transform", Optics and Lasers in Engineering, vol.50, pp. 248-255, February 2012.

⦁ G.C. Wu, D. Baleanu, and Z.X. Lin, "Image encryption technique based on fractional chaotic time series", Journal of Vibration and Control, vol. 22, pp. 2092-2099, March 2016.

⦁ W. Yuan, X. Yang, W. Guo, and W. Hu, "A double-domain image encryption using hyper chaos", IEEE 19th International Conference on Transparent Optical Networks, ICTON, 2017, Gerona, Spain, pp. 1-4, July 2-6, 2017,.

⦁ S. Bukhari, M. S. Arif, M. R. Anjum, and S. Dilbar, "Enhancing security of images by Steganography and Cryptography techniques", IEEE Sixth international Conference on Innovative Computing Technology, INTECH, Dublin, Ireland, pp. 531-534, August 24-26, 2016.

⦁ T. Cipresso and M. Stamp, “Software reverse engineering”: Handbook of Information and Communication Security, 2nd ed., Berlin Heidelberg: Springer, pp. 659-696, 2010.

⦁ C. Paar and J. Pelzl, “Understanding cryptography: A textbook for students and practitioners, Germany: Springer Science & Business Media, pp. 30-40, 2009.

⦁ A. Biryukov, L. Perrin and A. Udovenko, "Reverse-engineering the

S-box of Streebog, Kuznyechik and STRIBOBr", Advaces in cryptology eurocrypt: 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2nd ed.,

vol. 003, M. Fichlin and S.J. Coron, Ed. Austria: Springer,

pp. 372-402, 2016.

⦁ M.N.A. Wahid, A. Ali, B. Esparham and M. Marwan, “A Comparison of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish for Guessing Attacks Prevention”, Journal Computer Science Applications and Information Technology, vol. 3, pp. 1-7, August 2018.

⦁ G. Liu, W. Yang, W. Liu and Y. Dai, "Designing S-boxes based on

-D four-wing autonomous chaotic system", Nonlinear Dynamics, vol. 4, pp. 1867-1877, December 2015.

⦁ M. Sarfraz, I. Hussain and F. Ali, "Construction of S-Box Based on Mobius Transformation and Increasing its Confusion Creating Ability through Invertible Function", Int. J. of Computer Science and Information Security, vol. 14, pp. 187, February 2016.

⦁ A.H. Alkhaldi, I. Hussain and M.A. Gondal, "A novel design for the construction of safe S-boxes based on TDERC sequence", Alexandria Engineering Journal, vol. 54, pp. 65-69, March 2015.

⦁ N.R. Zhou, T.X. Hua, L.H. Gong, D.J. Pei and Q.H. Liao, "Quantum image encryption based on generalized Arnold transform and double random-phase encoding", Quantum Information Processing, vol. 14, pp. 1193-1213, April 2015.

⦁ M. Juhani and O. Saarinen, "Cryptographic analysis of all 4×4-bit

s-boxes", International Workshop on Selected Areas in Cryptography, Berlin Heidelberg, Springer, vol. 7118, pp. 118-133, August 2011.

⦁ N.A. Azam, "A Novel Fuzzy Encryption Technique Based on Multiple Right Translated AES Gray S-Boxes and Phase Embedding", Security and Communication Networks, vol.2017, pp-1-9, January 2017.

⦁ S. Farwa, N. Muhammad, T. Shah and S. Ahmad, “A novel image encryption based on algebraic S-box and Arnold transform”, 3D Research, vol.8(3), pp.26, September 2017.

⦁ X. Zhang, Z. Zhao and J. Wang, "Chaotic image encryption based on circular substitution box and key stream buffer", Signal Processing: Image Communication, vol. 29, pp. 902-913, September 2014.

⦁ V.M.S. Garcia, R.F. Carapia, C.R. Marquez, B.L. Benoso and M.A. Perez, "Substitution box generation using Chaos: An image encryption application", Applied Mathematics and Computation, vol. 332,

pp. 123-135, September 2018.

⦁ I. Hussain, T. Shah, H. Mahmood and M.A. Gondal, "Construction of S 8 Liu J S-boxes and their applications", Computers & Mathematics with Applications, vol. 64, pp. 2450-2458, October 2012.

⦁ F.A. Khan, J. Ahmed, J.S. Khan, J. Ahmad and M.A. Khan, "A novel substitution box for encryption based on Lorenz equations", IEEE International Conference on Circuits, System and Simulation, pp. 32-36, July 14, 2017, London, UK.

⦁ W. Wen, Y. Zhang, Y. Fang, and Z. Fang “Image salient regions encryption for generating visually meaningful cipher text image”, Neural Computing and Applications, vol.29 (3), pp. 653-663, February 2018.

⦁ C.J. Benvenuto, “Galois Field in Cryptography”, University of Washington, pp. 56, 2012.

⦁ C. Adams, and S. Tavares, "The structured design of cryptographically good S-boxes", Journal of Cryptology, vol. 3, pp. 27-41, January 1990.

⦁ O. Kazymyrov, V. Kazymyrova and R. Oliynykov, "A Method for Generation of High-Nonlinear S-Boxes Based on Gradient Descent", IACR Cryptology ePrint Archive , vol.23, pp. 578, June 2013.

⦁ R. Forre, "The strict avalanche criterion: spectral properties of Boolean functions and an extended definition", Lecture notes in computer science: Advances in cryptology, Ed. 1, vol. 403, New York, Springer-Verlag, pp. 450-468, 1990.

⦁ S.A.K.E. Hafiz, A.G. Radwan, S.H.A. Haleem and M.L. Barakat, "A fractal-based image encryption system", IET Image Processing,

vol. 8, pp. 742-752, December 2014.

⦁ S. Som, and S. Sen, “A non-adaptive partial encryption of grayscale images based on chaos”. Procedia Technology, vol. 10, pp. 663-671, December 2013.


  • There are currently no refbacks.