An Innovative Algorithm Based on Chaotic Maps Amalgamated with Bit-Level Permutations for Robust S-Box Construction and Its Application in Medical Image Privacy
Abstract
:1. Introduction
1.1. Motivation
1.2. Contribution
- The proposed cryptographic solution deals with chaos theory and an approach that combines the complexity and natural unpredictability of chaotic systems to create security models.
- This paper presents a symmetric block encryption technique using a permutation group to operate a set of pseudo-random numbers generated by the chaotic maps.
- The technique iterates the chaotic map between a pair’s changes to produce a binary output. Furthermore, we adjust these sequences to construct a solid substitution box (S-box), a crucial aspect of cryptographic systems.
- Furthermore, block substitution in the encryption process involves unique permutations that are critical for strong encryption because they create confusion and diffusion.
- The proposed method effectively demonstrates its application of medical image confidentiality through a thorough analysis based on several metrics compared to the existing methodologies.
2. Chaos Theory
2.1. Tent Map
2.2. May Map
3. Novel Tent–May Map
3.1. Detailed Analysis of the Novel Tent-May Map
Conversion between Tent and May Maps
- a.
- Tent Map Region
- b.
- May Map Region
4. Cryptographic Applications
Algorithm 1: Construction of | |
00 | Input: |
01 | Initialize parameter and iterations |
02 | |
03 | Output: |
04 | |
05 | |
06 | Iterate Tent–May Map: |
07 | from to iterations |
08 | Calculate by Tent–May Map |
09 | |
10 | Store each value in array (say) |
11 | |
12 | Initialize arrays and : |
13 | for from to iterations: |
14 | Calculate by converting each value to binary |
15 | End |
16 | |
17 | for from to iterations: |
18 | Calculate by Transforming values of to binary |
19 | End |
20 | |
21 | Perform the operation between and |
22 | Convert to binary string |
23 | |
24 | Make segments of bits: |
25 | Convert each segment to decimal |
26 | |
27 | Find unique values: |
28 | Store the unique values in array |
29 | |
30 | Update Array : |
31 | Add fixed integer to each value and restrict between |
32 | Convert each to binary |
33 | Reordered the bits with unique pattern. |
34 | Convert the rearranged binary string back to decimal. |
35 | |
36 | Find : |
37 | is generated by updated values. |
38 | Interchange the position of fix point with first element in |
39 | |
40 | Tweaking the Nonlinearity: |
41 | Take the Action of a permutation group |
with generators and of order on , through | |
right mutilation. | |
42 | |
43 | Update : |
44 | |
45 | End |
5. Performance Analysis for Proposed S-Box
- —Nonlinearity;
- —Strict Avalanche Criterion;
- —Bit Independent Criterion;
- —Linear Approximation Probability;
- —Differential Approximation Probability.
5.1. Nonlinearity (NL)
5.2. Strict Avalanche Criterion (SAC)
5.3. Bit Independence Criterion (BIC)
5.4. Linear Approximation Probability
5.5. Differential Approximation Probability
6. Proposed Algorithm of Image Encryption
Algorithm 2: Image Encryption Algorithm | ||
00. | Input: | Input image |
01. | Substitution box | |
02. | Key (8-byte key) | |
03. | Output: | Encrypted image |
04. | Step 1: | |
05. | Perform block-wise substitution for the first round: | |
06. | Divide the image into blocks of size | |
07. | For each block: | |
08. | Extract the block. | |
09. | Perform substitution for each pixel in the block using the key. | |
10. | Update the encrypted image with the substituted block. | |
11. | Write the encrypted image to file Enc_round_1 | |
12. | Step 2: | |
13. | Perform permutation for the second round: | |
14. | Reshape the encrypted image into a vector. | |
15. | ||
16. | Permute the reshaped vector according to the permutation vector. | |
17. | Reshape the permuted vector back into the image shape. | |
18. | Write the encrypted image to file Enc_round_2 |
7. Proposed Technique Analysis
Histogram
8. Majority Logical Criterion (MLC)
8.1. Homogeneity Analysis
8.2. Energy
8.3. Contrast
9. Adjacent Pixel Correlation
10. Information Entropy
11. Encrypted Image Quality Measure
11.1. Mean Square Error (MSE)
11.2. Peak Signal-To-Noise Ratio (PSNR)
11.3. Structural Similarity Index Method (SSIM)
11.4. Average and Maximum Difference (AD and MD)
11.5. Structural Content (SC)
11.6. Normalized Cross-Correlation (NCC)
11.7. Normalized Absolute Error (NAE)
11.8. Root Mean Square Error (RMSE)
12. NPCR, UACI, and & BACI Analysis
13. Conclusions
Author Contributions
Funding
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Banning, S.; Höglinger, M.; Meyer, D.; Reich, O. Evaluation of the effect of a multifunctional telemedicine device on health care use and costs: A nonrandomized pragmatic trial. Telemed. E-Health 2023, 29, 510–517. [Google Scholar] [CrossRef]
- Pan, T.; Thomas, M.A.; Luo, D. Data-driven gated CT: An automated respiratory gating method to enable data-driven gated PET/CT. Med. Phys. 2022, 29, 3597–3611. [Google Scholar] [CrossRef] [PubMed]
- Chen, C.; Qin, C.; Qiu, H.; Tarroni, G.; Duan, J.; Bai, W.; Rueckert, D. Deep learning for cardiac image segmentation: A review. Front. Cardiovasc. Med. 2020, 7, 25. [Google Scholar] [CrossRef] [PubMed]
- Chen, Y.; Ding, S.; Xu, Z.; Zheng, H.; Yang, S. Blockchain-based medical records secure storage and medical service framework. J. Med. Syst. 2019, 43, 1–9. [Google Scholar] [CrossRef] [PubMed]
- Nittari, G.; Khuman, R.; Baldoni, S.; Pallotta, G.; Battineni, G.; Sirignano, A.; Ricci, G. Telemedicine practice: Review of the current ethical and legal challenges. Telemed. E-Health 2020, 26, 1427–1437. [Google Scholar] [CrossRef] [PubMed]
- Barney, A.; Buckelew, S.; Mesheriakova, V.; Raymond-Flesch, M. The COVID-19 pandemic and rapid implementation of adolescent and young adult telemedicine: Challenges and opportunities for innovation. J. Adolesc. Health 2020, 67, 164–171. [Google Scholar] [CrossRef] [PubMed]
- Ijaz, M.F.; Woźniak, M. Recent Advances in Deep Learning and Medical Imaging for Cancer Treatment. Cancers 2024, 16, 700. [Google Scholar]
- Olaisen, R.H.; Schluchter, M.D.; Flocke, S.A.; Smyth, K.A.; Koroukian, S.M.; Stange, K.C. Assessing the longitudinal impact of physician-patient relationship on functional health. Ann. Fam. Med. 2020, 15, 422–429. [Google Scholar] [CrossRef] [PubMed]
- Wu, Q.; Jin, Z.; Wang, P. The relationship between the physician-patient relationship, physician empathy, and patient trust. J. Gen. Intern. Med. 2022, 37, 1388–1393. [Google Scholar] [CrossRef] [PubMed]
- Yu, H.; He, F.; Pan, Y. A novel segmentation model for medical images with intensity inhomogeneity based on adaptive perturbation. Multimed. Tools Appl. 2019, 78, 11779–11798. [Google Scholar] [CrossRef]
- Kim, D.W.; Jang, H.Y.; Kim, K.W.; Shin, Y.; Park, S.H. Design characteristics of studies reporting the performance of artificial intelligence algorithms for diagnostic analysis of medical images: Results from recently published papers. Korean J. Radiol. 2019, 20, 405–410. [Google Scholar] [CrossRef]
- Gu, Z.; Cheng, J.; Fu, H.; Zhou, K.; Hao, H.; Zhao, Y.; Liu, J. Ce-net: Context encoder network for 2d medical image segmentation. IEEE Trans. Med. Imaging 2019, 38, 2281–2292. [Google Scholar] [CrossRef] [PubMed]
- Chai, X.; Fu, X.; Gan, Z.; Lu, Y.; Chen, Y. A color image cryptosystem based on dynamic DNA encryption and chaos. Signal Process. 2019, 155, 44–62. [Google Scholar] [CrossRef]
- Wang, X.; Liu, P. A new full chaos coupled mapping lattice and its application in privacy image encryption. IEEE Trans. Circuits Syst. I Regul. Pap. 2021, 69, 1291–1301. [Google Scholar] [CrossRef]
- Xian, Y.; Wang, X.; Teng, L. Double parameters fractal sorting matrix and its application in image encryption. IEEE Trans. Circuits Syst. Video Technol. 2021, 32, 4028–4037. [Google Scholar] [CrossRef]
- Gao, X.; Mou, J.; Xiong, L.; Sha, Y.; Yan, H.; Cao, Y. A fast and efficient multiple images encryption based on single-channel encryption and chaotic system. Nonlinear Dyn. 2022, 108, 613–636. [Google Scholar] [CrossRef]
- Xian, Y.; Wang, X. Fractal sorting matrix and its application on chaotic image encryption. Inf. Sci. 2021, 547, 1154–1169. [Google Scholar] [CrossRef]
- Dong, Y.; Zhao, G. A spatiotemporal chaotic system based on pseudo-random coupled map lattices and elementary cellular automata. Chaos Solitons Fractals 2021, 151, 111217. [Google Scholar] [CrossRef]
- Roy, M.; Poria, S. Enhancement of synchronized chaotic state in a delay-coupled complex neuronal network. Nonlinear Dyn. 2020, 102, 745–758. [Google Scholar] [CrossRef]
- Tomizawa, F.; Sawada, Y. Combining ensemble Kalman filter and reservoir computing to predict spatiotemporal chaotic systems from imperfect observations and models. Geosci. Model Dev. 2021, 14, 5623–5635. [Google Scholar] [CrossRef]
- Wei, D.; Jiang, M.; Yang, D. A secure image encryption algorithm based on hyper-chaotic and bit-level permutation. Expert Syst. Appl. 2023, 213, 119074. [Google Scholar] [CrossRef]
- Al Sibahee, M.A.; Abduljabbar, Z.A.; Luo, C.; Zhang, J.; Huang, Y.; Abduljaleel, I.Q.; Ma, J.; Nyangaresi, V.O. Hiding scrambled text messages in speech signals using a lightweight hyperchaotic map and conditional LSB mechanism. PLoS ONE 2024, 19, e0296469. [Google Scholar] [CrossRef] [PubMed]
- Rehman, M.U. Quantum-enhanced chaotic image encryption: Strengthening digital data security with 1-D sine-based chaotic maps and quantum coding. J. King Saud Univ. Comput. Inf. Sci. 2024, 36, 101980. [Google Scholar] [CrossRef]
- Abduljabbar, Z.A.; Abduljaleel, I.Q.; Ma, J.; Al Sibahee, M.A.; Nyangaresi, V.O.; Honi, D.G.; Abdulsada, A.I.; Jiao, X. Provably secure and fast color image encryption algorithm based on s-boxes and hyperchaotic map. IEEE Access 2022, 10, 26257–26270. [Google Scholar] [CrossRef]
- Hazzazi, M.M.; Rehman, M.U.; Shafique, A.; Aljaedi, A.; Bassfar, Z.; Usman, A.B. Enhancing image security via chaotic maps, Fibonacci, Tribonacci transformations, and DWT diffusion: A robust data encryption approach. Sci. Rep. 2024, 14, 12277. [Google Scholar] [CrossRef]
- Abduljaleel, I.Q.; Abduljabbar, Z.A.; Al Sibahee, M.A.; Ghrabat, M.J.; Ma, J.; Nyangaresi, V.O. A lightweight hybrid scheme for hiding text messages in colour images using LSB, Lah transform and Chaotic techniques. J. Sens. Actuator Netw. 2022, 11, 66. [Google Scholar] [CrossRef]
- Riaz, M.; Dilpazir, H.; Naseer, S.; Mahmood, H.; Anwar, A.; Khan, J.; Benitez, I.B.; Ahmad, T. Secure and fast image encryption algorithm based on modified logistic map. Information 2024, 15, 172. [Google Scholar] [CrossRef]
- Rahman, M.; Murmu, A.; Kumar, P.; Moparthi, N.R.; Namasudra, S. A novel compression-based 2D-chaotic sine map for enhancing privacy and security of biometric identification systems. J. Inf. Secur. Appl. 2024, 80, 103677. [Google Scholar] [CrossRef]
- Chai, X.; Shang, G.; Wang, B.; Gan, Z.; Zhang, W. Exploiting 2D-SDMCHM and matching embedding driven by flag-shaped hexagon prediction for visually meaningful medical image cryptosystem. Chaos Solitons Fractals 2024, 185, 115153. [Google Scholar] [CrossRef]
- Ullah, A.; Jamal, S.S.; Shah, T. A novel construction of substitution box using a combination of chaotic maps with improved chaotic range. Nonlinear Dyn. 2017, 88, 2757–2769. [Google Scholar] [CrossRef]
- Ali, K.M.; Khan, M. Application based construction and optimization of substitution boxes over 2D mixed chaotic maps. Int. J. Theor. Phys. 2019, 58, 3091–3117. [Google Scholar] [CrossRef]
- Shafique, A. A new algorithm for the construction of substitution box by using chaotic map. Eur. Phys. J. Plus 2020, 135, 1–13. [Google Scholar] [CrossRef]
- Majid, M.A.; Alhadawi, H.S.; Lambić, D.; Ahmad, M. A novel method of S-box design based on discrete chaotic maps and cuckoo search algorithm. Multimed. Tools Appl. 2021, 80, 7333–7350. [Google Scholar]
- Ibrahim, S.; Alhumyani, H.; Masud, M.; Alshamrani, S.S.; Cheikhrouhou, O.; Muhammad, G.; Abbas, A.M. Framework for efficient medical image encryption using dynamic S-boxes and chaotic maps. IEEE Access 2020, 8, 160433–160449. [Google Scholar] [CrossRef]
- Long, M.; Wang, L. S-box design based on discrete chaotic map and improved artificial bee colony algorithm. IEEE Access 2021, 9, 86144–86154. [Google Scholar] [CrossRef]
- Zahid, A.H.; Arshad, M.J.; Ahmad, M.; Soliman, N.F.; El-Shafai, W. Dynamic S-Box Generation Using Novel Chaotic Map with Nonlinearity Tweaking. Comput. Mater. Contin. 2023, 75, 7516. [Google Scholar]
- Ali, T.S.; Ali, R. A novel color image encryption scheme based on a new dynamic compound chaotic map and S-box. Multimed. Tools Appl. 2022, 81, 20585–20609. [Google Scholar] [CrossRef] [PubMed]
- Jiang, Z.; Ding, Q. Construction of an S-box based on chaotic and bent functions. Symmetry 2021, 13, 671. [Google Scholar] [CrossRef]
- Farah, T.; Rhouma, R.; Belghith, S. A novel method for designing S-box based on chaotic map and teaching–learning-based optimization. Nonlinear Dyn. 2017, 88, 1059–1074. [Google Scholar] [CrossRef]
- Lambić, D. A new discrete-space chaotic map based on the multiplication of integer numbers and its application in S-box design. Nonlinear Dyn. 2020, 100, 699–711. [Google Scholar] [CrossRef]
- Lambić, D. S-box design method based on improved one-dimensional discrete chaotic map. J. Inf. Telecommun. 2018, 2, 181–191. [Google Scholar] [CrossRef]
- Lambić, D. A novel method of S-box design based on discrete chaotic map. Nonlinear Dyn. 2017, 87, 2407–2413. [Google Scholar] [CrossRef]
- Lambić, D. A novel method of S-box design based on chaotic map and composition method. Chaos Solitons Fractals 2014, 58, 16–21. [Google Scholar] [CrossRef]
- Masood, F.; Masood, J.; Zhang, L.; Jamal, S.S.; Boulila, W.; Rehman, S.U.; Ahmad, J. A new color image encryption technique using DNA computing and Chaos-based substitution box. Soft Comput. 2022, 26, 7461–7477. [Google Scholar] [CrossRef]
- Liu, J.; Tong, X.; Zhang, M.; Wang, Z. The design of S-box based on combined chaotic map. In Proceedings of the 3rd International Conference on Advanced Electronic Materials, Computers and Software Engineering (AEMCSE), Nanchang, China, 24–26 April 2020. [Google Scholar]
- Williams, H.; Webster, A.; Tavares, S. On the design of s-boxes. In Advances in Cryptology—CRYPTO’85 Proceedings; Springer: Berlin/Heidelberg, Germany, 1986. [Google Scholar]
- Biham, E.; Shamir, A. Differential cryptanalysis of DES-like cryptosystems. J. Cryptol. 1991, 4, 3–72. [Google Scholar] [CrossRef]
- Matsui, M. Linear cryptanalysis method for DES cipher. In Workshop on the Theory and Application of of Cryptographic Techniques; Springer: Berlin/Heidelberg, Germany, 1993. [Google Scholar]
- Heys, H.M. A tutorial on linear and differential cryptanalysis. Cryptologia 2002, 26, 189–221. [Google Scholar] [CrossRef]
- Hussain, I.; Shah, T.; Gondal, M.A.; Mahmood, H. Generalized majority logic criterion to analyze the statistical strength of S-boxes. Z. Für Naturforschung A 2012, 65, 282–288. [Google Scholar] [CrossRef]
- Naseer, Y.; Shah, T.; Javeed, A. Advance image encryption technique utilizing compression, dynamical system and S-boxes. Math. Comput. Simul. 2020, 178, 207–217. [Google Scholar] [CrossRef]
- Ahmad, J.; Hwang, S.O. Chaos-based diffusion for highly autocor related data in encryption algorithms. Nonlinear Dyn. 2015, 82, 1839–1850. [Google Scholar] [CrossRef]
- Razzaque, A.; Razaq, A.; Farooq, S.M.; Masmali, I.; Faraz, M.I. An efficient S-box design scheme for image encryption based on the combination of a coset graph and a matrix transformer. Electron. Res. Arch. 2023, 31, 2708–2732. [Google Scholar] [CrossRef]
- Zhu, S.; Deng, X.; Zhang, W.; Zhu, C. Secure image encryption scheme based on a new robust chaotic map and strong S-box. Math. Comput. Simul. 2023, 207, 322–346. [Google Scholar] [CrossRef]
- Su, Y.; Tong, X.; Zhang, M.; Wang, Z. Efficient image encryption algorithm based on dynamic high-performance S-box and hyperchaotic system. Phys. Scr. 2023, 98, 065215. [Google Scholar] [CrossRef]
- Pareek, N.K.; Patidar, V.; Sud, K.K. Image encryption using chaotic logistic map. Image Vis. Comput. 2006, 24, 926–934. [Google Scholar] [CrossRef]
- Artuğer, F.; Özkaynak, F. A new algorithm to generate aes-like substitution boxes based on sine cosine optimization algorithm. Multimed. Tools Appl. 2024, 83, 38949–38964. [Google Scholar]
- Liu, H.; Kadir, A.; Xu, C. Color image encryption with cipher feedback and coupling chaotic map. Int. J. Bifurc. Chaos 2020, 30, 2050173. [Google Scholar] [CrossRef]
- Shannon, C.E. Communication theory of secrecy systems. Bell Syst. Tech. J. 1949, 28, 656–715. [Google Scholar] [CrossRef]
- Khan, M.; Shah, T.; Mahmood, H.; Gondal, M.A. An efcient method for the construction of block cipher with multi-chaotic systems. Nonlinear Dyn. 2013, 71, 489–492. [Google Scholar] [CrossRef]
- Huynh-Thu, Q.; Ghanbari, M. Scope of validity of PSNR in image/video quality assessment. Electron. Lett. 2008, 44, 800–801. [Google Scholar] [CrossRef]
- Baowidan, S.A.; Alamer, A.; Hassan, M.; Yousaf, A. Group-Action-Based S-box Generation Technique for Enhanced Block Cipher Security and Robust Image Encryption Scheme. Symmetry 2024, 16, 954. [Google Scholar]
- Liang, H.; Zhang, G.; Hou, W.; Huang, P.; Liu, B.; Li, S. A novel asymmetric hyperchaotic image encryption scheme based on elliptic curve cryptography. Appl. Sci. 2021, 11, 5691. [Google Scholar] [CrossRef]
Boolean Function | ||||||||
NL Score |
Images | Approach | Contrast | Correlation | Energy | Homogeneity | |
---|---|---|---|---|---|---|
Medical_Image_1 | Original | |||||
Proposed | ||||||
Ref. [36] | ||||||
Ref. [53] | ||||||
Ref. [54] | ||||||
Ref. [55] | ||||||
Medical_Image_2 | Original | |||||
Proposed | ||||||
Ref. [36] | ||||||
Ref. [53] | ||||||
Ref. [54] | ||||||
Ref. [55] | ||||||
Medical_Image_3 | Original | |||||
Proposed | ||||||
Ref. [36] | ||||||
Ref. [53] | ||||||
Ref. [54] | ||||||
Ref. [55] | ||||||
Original | ||||||
Proposed | ||||||
Ref. [36] | ||||||
Medical_Image_4 | Ref. [53] | |||||
Ref. [54] | ||||||
Ref. [55] |
Images | Information Entropy Values |
---|---|
Medical_Image_1 Org | |
Medical_Image_1 Enc | |
Medical_Image_2 Org | |
Medical_Image_2 Enc | |
Medical_Image_3 Org | |
Medical_Image_3 Enc | |
Medical_Image_4 Org | |
Medical_Image_4 Enc |
Images | MSE | PSNR | MD | AD | UQI | SSIM | NCC | NAE | SC | RMSC |
---|---|---|---|---|---|---|---|---|---|---|
Med_Imege_1 | ||||||||||
Med_Imege_2 | ||||||||||
Med_Imege_3 | ||||||||||
Med_Imege_4 |
Images | UACI% | NPCR% | BACI% |
---|---|---|---|
Medical_Image_1 | 43.6086 | 26.6778 | |
Medical_Image_2 | 99.4961 | ||
Medical_Image_3 | |||
Medical_Image_4 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Hazzazi, M.M.; Baowidan, S.A.; Yousaf, A.; Adeel, M. An Innovative Algorithm Based on Chaotic Maps Amalgamated with Bit-Level Permutations for Robust S-Box Construction and Its Application in Medical Image Privacy. Symmetry 2024, 16, 1070. https://doi.org/10.3390/sym16081070
Hazzazi MM, Baowidan SA, Yousaf A, Adeel M. An Innovative Algorithm Based on Chaotic Maps Amalgamated with Bit-Level Permutations for Robust S-Box Construction and Its Application in Medical Image Privacy. Symmetry. 2024; 16(8):1070. https://doi.org/10.3390/sym16081070
Chicago/Turabian StyleHazzazi, Mohammad Mazyad, Souad Ahmad Baowidan, Awais Yousaf, and Muhammad Adeel. 2024. "An Innovative Algorithm Based on Chaotic Maps Amalgamated with Bit-Level Permutations for Robust S-Box Construction and Its Application in Medical Image Privacy" Symmetry 16, no. 8: 1070. https://doi.org/10.3390/sym16081070
APA StyleHazzazi, M. M., Baowidan, S. A., Yousaf, A., & Adeel, M. (2024). An Innovative Algorithm Based on Chaotic Maps Amalgamated with Bit-Level Permutations for Robust S-Box Construction and Its Application in Medical Image Privacy. Symmetry, 16(8), 1070. https://doi.org/10.3390/sym16081070