A Novel Fuzzy Encryption Technique Based on Multiple Right Translated AES Gray S-Boxes and Phase Embedding

This paper presents a novel image encryption technique based on multiple right translated AES Gray S-boxes (RTSs) and phase embedding technique. First of all, a secret image is diffused with a fuzzily selected RTS. The fuzzy selection of RTS is variable and depends upon pixels of the secret image. Then two random masks are used to enhance confusion in the spatial and frequency domains of the diffused secret image. These random masks are generated by applying two different RTSs on a host image. The decryption process of the proposed cryptosystem needs the host image for generation of masks. It is therefore, necessary, to secure the host image from unauthorized users. This task is achieved by diffusing the host image with another RTS and embedding the diffused secret image into the phase terms of the diffused host image. The cryptographic strength of the proposed security system is measured by implementing it on several images and applying rigorous analyses. Performance comparison of the proposed security technique with some of the state-of-the-art security systems, including S-box cryptosystem and steganocryptosystems, is also performed. Results and comparison show that the newly developed cryptosystem is more secure.

[1]  Josef Pieprzyk,et al.  Cryptanalysis of Block Ciphers with Overdefined Systems of Equations , 2002, ASIACRYPT.

[2]  Brent Waters,et al.  Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.

[3]  S. Som,et al.  A Non-adaptive Partial Encryption of Grayscale Images based on Chaos , 2013 .

[4]  Tariq Shah,et al.  A group theoretic approach to construct cryptographically strong substitution boxes , 2012, Neural Computing and Applications.

[5]  Luca Iocchi,et al.  Image based steganography and cryptography , 2007, VISAPP.

[6]  Baodian Wei,et al.  An AES S-box to increase complexity and cryptographic analysis , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).

[7]  Jongsung Kim,et al.  Advanced Differential-Style Cryptanalysis of the NSA's Skipjack Block Cipher , 2009, Cryptologia.

[8]  Xingyuan Wang,et al.  Novel image encryption algorithm based on cycle shift and chaotic system , 2015 .

[9]  Chin-Chen Chang,et al.  A virtual image cryptosystem based upon vector quantization , 1998, IEEE Trans. Image Process..

[10]  Vincent Rijmen,et al.  The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .

[11]  Michael Schreiber,et al.  Binary Gray Code , 2016 .

[12]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[13]  Anish Philip A Generalized Pseudo-Knight?s Tour Algorithm for Encryption of an Image , 2013, IEEE Potentials.

[14]  Hikmat Farhat,et al.  COMBINING STEGANOGRAPHY AND CRYPTOGRAPHY: NEW DIRECTIONS , 2011 .

[15]  Matthew J. B. Robshaw,et al.  Essential Algebraic Structure within the AES , 2002, CRYPTO.

[16]  Guo-Shiang Lin,et al.  Optical image cryptosystem based on adaptive steganography , 2008 .

[17]  Jian Liu,et al.  Optical color image encryption based on computer generated hologram and chaotic theory , 2013 .

[18]  Chin-Chen Chang,et al.  New image steganographic methods using run-length approach , 2006, Inf. Sci..

[19]  O. T. Arulogun,et al.  Enhanced Stegano-Cryptographic Model for Secure Electronic Voting , 2015 .

[20]  Wang Xin-mei,et al.  One AES S-box to increase complexity and its cryptanalysis , 2007 .

[21]  Niels Ferguson,et al.  A Simple Algebraic Representation of Rijndael , 2001, Selected Areas in Cryptography.

[22]  Tariq Shah,et al.  Stego optical encryption based on chaotic S-box transformation , 2014 .

[23]  Shun-Jih Wang,et al.  Image Encryption Based on Fuzzy Synchronization of Chaos Systems , 2013, 2013 IEEE 37th Annual Computer Software and Applications Conference.

[24]  Wen-Yuan Chen,et al.  Color image steganography scheme using set partitioning in hierarchical trees coding, digital Fourier transform and adaptive phase modulation , 2007, Appl. Math. Comput..

[25]  Yu-Chen Hu,et al.  High-capacity image hiding scheme based on vector quantization , 2006, Pattern Recognit..

[26]  Naveed Ahmed Azam,et al.  S-Boxes Based on Affine Mapping and Orbit of Power Function , 2015 .

[27]  Hisham Al-Assam,et al.  Combining steganography and biometric cryptosystems for secure mutual authentication and key exchange , 2013, 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013).

[28]  Hala Bahjat,et al.  Speed Image Encryption Scheme using Dynamic Galois Field GF(P) Matrices , 2014 .

[29]  Ling-guo Cui,et al.  A NEW S-BOX STRUCTURE NAMED AFFINE-POWER-AFFINE , 2007 .

[30]  Guo-Shiang Lin,et al.  Public-key-based optical image cryptosystem based on data embedding techniques , 2003 .

[31]  Naveed Ahmed Azam,et al.  Right translated AES gray S-boxes , 2015, Secur. Commun. Networks.

[32]  Joachim Rosenthal A Polynomial Description of the Rijndael Advanced Encryption Standard , 2002, ArXiv.

[33]  Hemlata Sharma,et al.  Secure Image Hiding Algorithm using Cryptography and Steganography , 2013 .

[34]  Lars R. Knudsen,et al.  The Interpolation Attack on Block Ciphers , 1997, FSE.

[35]  Wei Wang,et al.  Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack , 2013, IEEE Transactions on Computers.

[36]  Guo-Shiang Lin,et al.  Data Steganography for Optical Color Image Cryptosystems , 2010 .

[37]  Minh-Triet Tran,et al.  Gray S-Box for Advanced Encryption Standard , 2008, 2008 International Conference on Computational Intelligence and Security.