Skip to main content
PLOS ONE logoLink to PLOS ONE
. 2018 Apr 2;13(4):e0194343. doi: 10.1371/journal.pone.0194343

A novel encryption scheme for high-contrast image data in the Fresnelet domain

Nargis Bibi 1, Shabieh Farwa 2, Nazeer Muhammad 2,*, Adnan Jahngir 2, Muhammad Usman 3
Editor: Jun Ma4
PMCID: PMC5880351  PMID: 29608609

Abstract

In this paper, a unique and more distinctive encryption algorithm is proposed. This is based on the complexity of highly nonlinear S box in Flesnelet domain. The nonlinear pattern is transformed further to enhance the confusion in the dummy data using Fresnelet technique. The security level of the encrypted image boosts using the algebra of Galois field in Fresnelet domain. At first level, the Fresnelet transform is used to propagate the given information with desired wavelength at specified distance. It decomposes given secret data into four complex subbands. These complex sub-bands are separated into two components of real subband data and imaginary subband data. At second level, the net subband data, produced at the first level, is deteriorated to non-linear diffused pattern using the unique S-box defined on the Galois field F28. In the diffusion process, the permuted image is substituted via dynamic algebraic S-box substitution. We prove through various analysis techniques that the proposed scheme enhances the cipher security level, extensively.

Introduction

Data encryption is an integral part of multimedia technologies. Usually, internet users require to deliver, obtain, or store secret information [1]. Extensive information exchange over internet demands safety from unwanted surveillance, thieving, and bogus publicity [2]. In this frame of reference, images are exposed to ciphers which are unrecognizable by the human eye [3]. The highest familiar way to escape from any trouble is to convert the confidential data into dummy formation [4]. The information appeared can only be restored by those who know the reverse scheme used to attain the initial pattern with exclusive key specification [513]. Data encryption enables data integrity, confidentiality, and data authentication [14]. This is achieved using a digital data encryption which transforms the meaningful information into dummy data. This strategy has been evolved to preserve the information and is heavily based on cryptography [4].

Cryptography is used for data confidentiality. Claud Shannon [15], introduced the substitution- permutation network (SPN), each layer of which uses substitution followed by permutation. Cryptographic procedures are helpful to preserve the secret information by scrambling it into an uncorrelated data [4]. Improved security and confidentiality can be served if the two schemes, confusion and diffusion, are joined together into one hybrid system [1618]. The gradual development of cryptographic systems witnesses the worth of the substitution box (Sbox). It plays the role of a standout in symmetric key cryptography and a predominant source to produce nonlinearity [1, 19]. The indispensable involvement of the S-box demands new construction algorithms and the recent literature introduces some safer and more reliable S-boxes [1, 2, 2024]. Further applications of S boxes in digital image ciphering, water marking as well as in steganography have become quite popular as well [3, 2530]. In this work, we propose an efficient strategy that uses the algebraic properties of the Galois field to structure an S-box which exhibits extra-ordinary features as compared to some prevailing designs at a very low computational labour.

In recent literature, many innovative and advanced techniques of image encryption have become pivot of attention. Liu and Wang introduced image encryption algorithms based on one-time keys [31] and spatial bit-level permutations along with chaotic systems [32]. In [33], a chaotic encryption scheme based on perceptron model is proposed. [34] describes an encryption strategy using DNA complementary rule with chaos. Some of the most recent image encryption techniques are detailed in [3542]. However, according to our learning there is no previous work on the applications of the Fresnelet transform in conjunction with S-box cryptography. In this paper, we use the cryptography to manipulate the significant information of the secret data.

Later part of this paper is ordered as follows. Section Fresnelet Transform provides a theoretical explanation of the Fresnelet transform. Section Algorithm for algebraic S-box describes the detailed algorithm used to develop an algebraic S-box. The cryptographic forte of the S-box is examined in Performance analysis of S-box, through some highly significant parameters. The remaining study present a comprehensive model for encryption and decryption, including simulations and evaluations. Lastly, Conclusion Section concludes the paper.

Fresnelet transform

The propagation phenomena of wave are structured via diffraction principle using the Fresnel transform [43]. The Fresnel transform in wavelet domain produces the bases of Fresnelet transform. These bases are used to reconstruct the digital off axis hologram with certain composition of parameters. The parameters can be tuned to desired value of the resolution scale, adjusted with particular wavelength and the specific distance between observing plane to the propagating objects. Fresnelet transform is demonstrated to simulate the approximation the monochromatic waves propagation. Propagation of monochromatic waves is shown as a function ΛΩ2(R), with the Fresnel transform model in terms of convolution integral as follows:

Λ˜τ(p)=(Λ*kτ)(p)withkτ(p)=1τexp(iπp2τ2), (1)

The kernel kτ(p) is the one-dimensional prorogation model with given parameter τ > 0 in (2), where, τ depends on the propagating distance d, based on the wavelength value λ as shown:

τ=λd. (2)

Moreover, the kernel kτ(p) can be extended to two-dimensional wave propagation using the tensor product for ΛΩ2(R2), as follows:

Λ˜τ(p,q)=(Λ*Kτ)(p,y), (3)
Kτ(p,q)=kτ(p)kτ(q). (4)

The Kτ(p, q) is also known as the separable kernel to cover the two-dimensional Fresnel transform’s family [14]. To obtain the precise reconstruction of decomposed data, the Fresnel transform unitary property facilitates, prominently. Furthermore, the extension of the separable nature of one-dimensional wavelet transform into two-dimensional wavelet transform can be achieved using the Riesz basis [43]. The Riesz basis for Ω2(R) of a two-parameter {ψj,l}j,l can be defined on Ω2(R) as family of the wavelet transform can be defined in terms of convolution integrals, such that

{ψj,l(p)=2j/2ψ(2jpl)}j,l. (5)

where, the Haar wavelet is used as an orthonormal basis generation for Ω2(R). This is the simplest form of a multi-resolution decomposition by the wavelet transform, and can be used to get the desired reconstruction of the input original data as well [44]. This composition leads to the Fresnelet basis using the the Haar wavelet in combination of the Fresnel transform as follows:

{(ψj,l)τ}j,l (6)
(ψj,l)τ(p)=2j/2ψ˜2jτ(2jp-l). (7)

For constant value of τ, an orthonormal basis in terms of Fresnelet transform can be obtained using: βj,l(p)=(ψj,l)τ(p), as follows:

Λ=j,lνj,lβj,l (8)
νj,l=Λ,βj,l. (9)

The coefficients representation using Fresnelet is done by νj, l in (9). Moreover, the separable nature is extended the Fresnelet transform’s from one-dimensional data to two-dimensional data. Following this, the four combinations are obtained using the tensor product μτ(ll),μτ(lh),μτ(hl),andμτ(hh), for producing the approximation (lower-lower subband) and three high frequency details (lower-high subband, high-lower subband, and high-high subband) as follow:

μτ(ll)=(xj,l)τ(p)(xj,l)τ(q), (10)
μτ(lh)=(xj,l)τ(p)(yj,l)τ(q), (11)
μτ(hl)=(yj,l)τ(p)(xj,l)τ(q), (12)
μτ(hh)=(yj,l)τ(p)(yj,l)τ(q). (13)

In (10)–(13), the representation of scaling functions is done using x and representation of the wavelet functions is done using y. These functions are established a low-low filter in (10) and high details filter in (11)–(13). Following this, the four Fresnelet coefficients are generated using the basis function μ to data Λ, as follows:

Λτ,d(ll)=Λ,μτ(ll),Λτ,d(lh)=Λ,μτ(lh),
Λτ,d(hl)=Λ,μτ(hl),Λτ,d(hh)=Λ,μτ(hh).

The low-low filter data is demonstrated using the coefficient measure Λτ,d(ll) and the high-details data are represented using the coefficients measure Λτ,d(lh), Λτ,d(hl), and Λτ,d(hh), respectively. Theses Fresnelet coefficients are used to propagate the input image data. It transforms the input image data from meaningful information to dummy image using the Fresnelet forward transform in the form four complex subbands data [14].

The Fresnelet transform unitary property is used in reconstruction of secret data by applying the conjugate transpose to encrypted data as shown in Fig 1. This outcome has a complex form of decrypted data. The decomposition stage of secret data of USAF image is shown in first row of Fig 2 as a 4 subbands based on the Forward Fresnelet transform with distance d1. The marked area in first row is demonstrated in second row as a zoomed-in region. This show the diffusion of meaningful data into meaning less dummy data. The inverse propagation of the first row of Fig 1 is propagated at distance d2. This inverse processing is termed as inverse Fresnelet transform. The four subbands in Fig 1(i)–1(l) are merged into complex data formation as a single image and its magnitude is shown in first image of Fig 2. The communication of encrypted data in digital form is distributed into real parts only. Therefore, the complex data is partition into two parts: real part a and magnitude of imaginary part b (in second and third image of Fig 2). Moreover, on reconstruction stage the imaginary part b (magnitude value) with i is added up into a (real value) to obtain the complex data using inverse process.

Fig 1. Fresnelet transform encryption of the given data USAF where the the magnitude of it is obtained using the Fresnelet coefficients with key parameter d1 = 1m as follows.

Fig 1

(first row) approximation, horizontal data, vertical data, and diagonal data. (Second row) shows the zooming vision of the corresponding images listed in the first row. (Last row) represents the inverse magnitude using Fresnelet transformed data to the four subbands listed in the first row using key d2 = .01cm.

Fig 2.

Fig 2

The scrambled information in last row of Fig 1 is reconstructed by combining all subband data is demonstrated in (A). It’s pixel value is composed in terms of the magnitude with complex valued data. The (B) and (C) are the real and imaginary parts of the dummy data displayed in (A). (D) The reconstructed image usaf is obtained using Fresnelet transform application with same parameter keys as in encryption case.

To transfer the given data with huge isolation and upgraded discreetness, the presented method implies the Fresnelet transform that holds distance parameters and the wavelength as keys, that are necessary for reconstruction of the correct information. Furthermore, the initial pattern of the information data is obtained in the reconstruction stage with the accurate parameters use during the inverse Fresnelet procedures.

Algorithm for algebraic S-box

In this section, we describe the algorithm used for construction of our S-box. Generally, S-box is considered as the most influential component to produce the nonlinearity effect that relates to the confusion creating capability in ciphering. In order to grasp the structural properties of an S-box, we first need to go through some fundamental facts.

An n × n S-box can be defined as a vector Boolean function F:F2nF2n.

The algebraic structure of the background Galois field used to construct an S-box, plays very basic role. For the underlying construction of 8 × 8 S-box, we use F28=F2[X]/<p(X)> with p(X)=X8+X6+X5+X4+1F2[X] is a degree 8 irreducible polynomial. It is worth mentioning that in advanced encryption standard, AES S-box algorithm uses F28 based on X8 + X4 + X3 + X + 1. In fact, any degree 8 irreducible generating polynomial could be used for the field F28 but this choice obviously affects the calculations.

We define the general linear group GL(n,F) as a group formed by all n × n invertible matrices over the field F. A projective general linear group of degree n over a field F is defined to be the quotient of GL(n,F) by its center. For this paper, we form the 8 × 8 S-box by considering the action of the aforementioned Galois field F28 on PGL(2,F28), i.e. we take a function f:PGL(2,F28)×F28F28 defined as

f(t)=a1t+a2a3t+a4 (14)

In above expression, f is known as a linear fractional transformation (LFT) with a1, a2, a3 and a4F28 satisfying the condition a1 a4a2 a3 ≠ 0. The algebraic complexity and nonlinearity of LFT gives incentive to deploy this for the process of byte substitution. For our S-box, in particular, we choose a1 = 21, a2 = 8, a3 = 3 and a4 = 17. The images of this map produce our S-box as shown in Table 1. This highly nonlinear S-box attains the nonlinearity measure 112 that is quite similar to the recent state-of-the-art AES S-box but it utilizes a straightforward and comparatively simple approach as compared to the AES S-box. In the following section we use some highly significant analysis techniques to figure out the cryptographic strength of our S-box.

Table 1. LFT-based S-box.

215 93 171 23 234 76 201 236 175 59 141 214 99 162 108 74
167 97 3 36 235 95 52 1 60 242 55 161 63 110 225 241
145 153 245 254 73 17 118 90 173 21 178 176 94 122 136 114
72 177 43 58 56 11 184 149 120 127 185 37 243 157 69 10
189 92 77 0 196 222 4 223 181 168 78 186 207 195 148 190
50 66 26 70 238 112 132 248 221 46 253 2 102 188 247 170
194 187 45 53 213 86 62 24 200 115 111 68 212 40 140 130
104 163 98 82 119 31 7 154 255 155 81 15 85 219 42 64
20 80 129 211 88 160 156 218 123 109 204 107 19 205 12 216
106 84 30 169 228 44 249 135 124 229 159 232 67 133 126 101
137 100 38 144 143 116 29 134 244 180 224 217 33 113 6 210
203 158 22 166 79 138 105 164 183 240 65 191 209 197 27 251
150 227 239 51 12 61 54 165 48 237 233 147 41 193 252 198
206 230 25 87 89 28 47 16 151 96 35 172 57 152 199 139
220 117 246 71 208 34 121 13 83 32 128 103 39 146 75 167
14 179 131 91 226 182 231 174 18 49 142 5 8 9 192 202

Performance analysis of S-box

In this section, we analyze the proposed S-box through some widely accepted parameters. The detailed analysis is presented in the following subsections. We compare the results with the famous S-boxes, as named earlier.

Nonlinearity

The nonlinearity is a measure of the minimum distance of the reference function from the set of all the affine functions [2].

The average nonlinearity value for the proposed S-box is 112. A comparison of nonlinearity measure with some formerly prevailing S-boxes is shown in Table 2. Clearly, the nonlinearity of the proposed S-box matches the best attained figure.

Table 2. Comparison of performance indices of different S-boxes with LFT S-box.

S-box Nonlinearity SAC BIC DP LP
Proposed 112 0.510254 112 0.015625 0.0625
AES 112 0.5058 112.0 0.0156 0.062
APA 112 0.4987 112.0 0.0156 0.062
Gray 112 0.5058 112.0 0.0156 0.062
Skipjack 105.7 0.4980 104.1 0.0468 0.109
Xyi 105 0.5048 103.7 0.0468 0.156
RP 99.5 0.5012 101.7 0.2810 0.132

Strict avalanche criterion

This criterion is used to gauge the confusion creating capability of an S-box. A function F:F2nF2n would be regarded to satisfy SAC if a single input-bit change assures change in 50% output-bits. The results presented in Table 2, shows that our S-box fulfils the requirements of SAC.

Linear and differential approximation probabilities

This is a measure of the unevenness of an event, mathematically defined by:

LP=maxΓx,Γy0|#{x|x.Γx=S(x).Γy}2n-12|,

where x represents all possible inputs to the S-box and Γx and Γy give the parity of the input and output bits respectively.

We further use the differential approximation probability, which determines the differential uniformity of an S-box. Its mathematical expression is given by;

DP=[#{xX|S(x)S(xΔx)=Δy}2n]

Here Δx and Δy represent the input and out put differentials respectively. The smaller LP and DP measures guarantee the stronger S-box.

Bit independence criterion

In bit independence criterion, input bits are altered exclusively, and then output bits are scrutinized for their independence. Bit independence has great worth in cryptographic structures. The goal of reaching the maximum complexity and perplexity in a system can be achieved through this property of increasing independence between the bits. In cryptographic systems, the increased independence between bits is an essential requirement as it makes harder to understand and forecast the design of the system.

The results of BIC are compared in Table 2. It is evident that, in BIC, our S-box has similarity with the Xyi S-box.

Based on the performance evaluation of the newly designed S-box, it is evident that the S-box shows extra-ordinary results and can be considered for further multimedia applications.

Encryption method

The secret image is encrypted to keep the confidential information, the Fresnelet transform is employed based on the wavelet family, known as Haar. At first, the secret image Λ is propagated using the Fresnelet transform Δτ at the distance d1 = 1m, as follow:

Δτ(Λ,d1)=(Λτ,d1(ll)Λτ,d1(hl)Λτ,d1(lh)Λτ,d1(hh)).

In the second phase, a scrambled data ψ is generated from the components of decomposed image Λ using the IΔτ (inverse Fresnelet transform) at a distance, d2 = 10−2 m, as follow:

ψ=IFτ{(Λτ,d1(ll)Λτ,d1(hl)Λτ,d1(lh)Λτ,d1(hh)),d2}.

The encrypted data from the secrete image are obtained in Fig 2 in form of complex properties of the Fresnelet transform. Moreover, complex data is separated into the imaginary part ψim and the real part ψre for getting unique pattern of non-linear pattern using S-box.

Single unit dummy data

To manage the data the encrypted dummy data, we employ the inverse wavelet transform (WT) for reconstructing the two parts (real and imaginary) into single unit dummy data. The inverse wavelet with the Haar transform is employed.

The subband data C0 is the low-passed and the diagonal detail zeros valued data. The maximum intensity values of image MR2 of horizontal detail and the vertical detail are used α1.Dre data and α2.Dim to derive the α1 and α2 as encryption normalization values. A scale parameter α is presented as a strength factor which regulates the participation of scrambled dummy data for getting single unit dummy data as follow:

α1=|(M(Dre)|+|M(Dre)||M(Dre)|,
α2=|M(Dim)|+|M(Dim)||M(Dim)|,
E=IWT(C0α1Dreα2DimC0).

The above reconstruction process with the inverse wavelet transform (IWT) gives an information dummy data E after uniting the real and imaginary parts of D in reconstruction phase.

S-Box encryption

A typical 512 × 512 image of Signature, 256 × 256 image of DDNT, and 256 × 256 image of USAF are encrypted using the proposed method. We use the inverse of S-box to decrypt the ciphered image. Fig 3(A), 3(B) and 3(C) show the true, encrypted and the decrypted image of Signature. Figs 4 and 5 show the encrypted and the decrypted image of DDNT and USAF information data using S-box and the proposed method. One can see that our algorithm is capable to recover the true secret image with high accuracy as measured out in terms of coefficient correlation.

Fig 3. S-box image encryption and decryption of signature image (Signature image is taken from flicker image database: 293 https://www.flickr.com/photos/wyncliffe/14353455608/in/photostream/.) with various range of gray values.

Fig 3

(A) original image, (B) encrypted image, and (C) decrypted image, respectively.

Fig 4. Visual and gradient estimation of S-box and propose method for highly contrast image (DDNT).

Fig 4

(A) true image, (B) S-box encrypted image, (C) proposed method encrypted image, (D) decrypted image using inverse S-box, (E) decrypted image using inverse proposed method, (F)—(G) histogram gradient estimation of information data listed in first row from (A)-(E).

Fig 5. Visual and gradient estimation of S-box and proposed method for medium contrast image (USAF).

Fig 5

(A) true image, (B) S-box encrypted image, (C) proposed method encrypted image, (D) decrypted image using inverse S-box, (E) decrypted image using inverse proposed method, (F)—(G) histogram gradient estimation of information data listed in first row from (A)-(E).

The decryption process

The opposite of an encryption process is decryption process. The wavelet transform (WT) is considered to decompose the encrypted data image E into four subband data sets Ej1(ll), Ej1(hl), Ej1(lh), and Ej1(hh). The high frequency subband data Ej1(hl) and Ej1(lh) are carrier (communication) data sets that are preserved in the same position.

The final data are split by α so that the scrambled information data of same values are obtained. The retrieved imaginary and real parts of the scrambled data are rejoined in complex data pattern. Lastly the obtained complex scrambled data is refined by the inverse Fresnelet transforms applying the exact keys specification of the Fresnelet transform for the sake of obtaining the private information image on employing the inverse cipher S-box.

Statistical analysis

In this section we gauge the security strength of the proposed algorithm by using some most significant statistical analysis, s described below.

  • Entropy: Entropy analysis measures the randomness of a system. Table 3, represents the information entropy for different images (both original and the encrypted). It is obvious that the results favor the proposed methodology.

  • Contrast: The contrast analysis is used to identify objects in an image. The numerical results for contrast of t images true and encrypted images are arranged in Table 3, which show that the proposed scheme is efficient.

  • Correlation: The correlation coefficient, between the pixels at the same indices in both the plain and the encrypted image, measures the similarity between the pixels pattern of both images. Results arranged in Table 3 witness effectiveness of the proposed method.

  • Homogeneity: The homogeneity analysis determines the closeness of the elements distribution in the gray level co-occurrence matrix (GLCM) to GLCM diagonal.

  • Differential analysis: A desirable feature of an encryption algorithm is to show high sensitivity to single-bit change in the plain image. For this purpose two measures, NPCR and UACI, are commonly used. NPCR stands for the number of pixels change rate of image as a result of one pixel change in the plain image. However UACI means unified average intensity of differences between the plain and the encrypted images. In our case, the NPCR is over 99% and the UACI is over 33%. These results prove that our algorithm is highly sensitive and robust against the differential attacks and even single-bit difference in two plain image results in absolutely different encrypted images.

Table 3. Statistical analysis.

Image
Test
Signature
true
Signature
encrypted
DDNT
true
DDNT
encrypted
USAF
true
USAF
encrypted
Entropy 7.4451 7.7512 0.0104 0.01609 0.4190 1.1379
Contrast 0.2100 8.6947 0.03602 0.0046 0.5509 -0.0014
Correlation 0.9444 0.1169 0.5928 0.0380 0.8330 0.8036
Homogeneity 0.9084 0.4524 0.9993 0.9996 0.9993 0.9284

Simulation and evaluation

In the given process, we deal with a sampling interval size Δ = 10 nm of a hypothetical CCD plane, a wavelength λ = 632.8 nm (nm = nanometer), and distances d1 = 1m (m = meter) and d2 = 10−4 m [14]. These parameters are employed in the Fresnelet transform operations for the encryption as well as decryption stages and are considered as the key parameters. The obtained information images are predicted through the evaluation of correlation coefficients (CC) with the original information image data. The index of CC followed with in the range of 0 to 1. 0 value show almost no correlation between original and decrypted image while 1 reflect almost same out compare to original image.

To analyze the presented algorithm, our main focus on encryption analysis. The decrypted out put is almost clear with average value in terms of coefficient correlation value (0.9995). Notice from Table 3 that the given scheme provides good encryption of secret information data as compared to ordinary S-box encryption methods [2].

Processing speed

It is an important feature of an efficient encryption algorithm to elapse lesser processing time. We tested our algorithm on MATLAB R-2016a, with i5 − 2520M CPU 2.50 GHZ and 8GB memory and the results are presented in Table 4. it is evident that our scheme is quite efficient.

Table 4. UACI, NPCR and Time.

Signature DDNT USAF
UACI 33.7113 33.6721 33.1214
NPCR 99.3145 99.7813 99.7162
Time (Sec) 0.6128 0.6031 0.6114

Classical attacks

By Kerckhoff’s principle, a sscure cryptosystem is one which can’t be broken even if everything is known, except for the secret key. Keeping this fact in view, classically, there are four main attacks [36], that are worth-studying.

  • Ciphertext only attack: When a string of ciphertext is known to the attacker.

  • Known Plaintext attack: When a string of plaintext along with the corresponding ciphertext is known to the attacker.

  • Chosen plaintext attack: When attacker has temporary access to the encryption mechanism such that he can choose a plaintext string and obtain its ciphered version.

  • Chosen ciphertext attack:

    When attacker has temporary access to the decryption mechanism such that he can choose a ciphertext string and can obtain its corresponding plaintext string.

    Among the above-mentioned attacks, Chosen ciphertext attack is of highest importance. If a cryptosystem can resist this attack, it would surely resist the other attacks as well [36, 40]. Obviously the proposed scheme is highly sensitive to the subband-distribution, the irreducible monic polynomial used to construct the background Galois field and the S-box parameters a1, a2, a3 and a4. Minor change in these will cause serious effects on the outcome and therefore our scheme is quite safe against the aforementioned attacks.

Conclusion

To overcome the drawback of general S-box encryption in highly contrast data, this paper presents a new encryption approach with improved cipher security of the encrypted data. The proposed method is considered better approach for two significant reasons. First, the Fresnelet transform is used for encrypting the data of information image with various distance parameters as key. Second, the algebraic s-box provide highly nonlinearity in an encrypted data. Experimental studies validate that an encryption of digital image using the proposed scheme shown great superiority over the recently existing encryption methods. Although the proposed method in this study intents at the image encryption, however, its limitation does not restrict it to only this area and can be significantly implied in various fields of security information.

Supporting information

Data Availability Statement: Signature image is taken from flicker image database: https://www.flickr.com/photos/wyncliffe/14353455608/in/photostream/. The person who associated a work with this deed has dedicated the work to the public domain by waiving all of his or her rights to the work worldwide under copyright law, including all related and neighboring rights, to the extent allowed by law. You can copy, modify, distribute and perform the work, even for commercial purposes, all without asking permission. Rest of the data used in the proposed method are available within the paper.

Data Availability

All relevant data are within the paper.

Funding Statement

The authors received no specific funding for this work.

References

  • 1. Biham E, Shamir A. Differential cryptanalysis of DES-like cryptosystems. Journal of Cryptology. 1991;4(1):372 doi: 10.1007/BF00630563 [Google Scholar]
  • 2. Farwa S, Shah T, Idrees L. A highly nonlinear S-box based on a fractional linear transformation. SpringerPlus. 2016;5(1):1658 doi: 10.1186/s40064-016-3298-7 [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 3. Farwa S, Shah T, Muhammad N, Bibi N, Jahangir A, Arshad S. An Image Encryption Technique based on Chaotic S-Box and Arnold Transform. International Journal of Advanced Computer Science and Applications. 2017;8(6):360364 doi: 10.14569/IJACSA.2017.080647 [Google Scholar]
  • 4. Muhammad N, Bibi N, Qasim I, Jahangir A, Mahmood Z. Digital watermarking using Hall property image decomposition method. Pattern Analysis and Applications. 2017;p. 116. [Google Scholar]
  • 5. Mughal B, Sharif M, Muhammad N. Bi-model processing for early detection of breast tumor in CAD system. The European Physical Journal Plus. 2017;132(6):266 doi: 10.1140/epjp/i2017-11523-8 [Google Scholar]
  • 6. Khan MA, Akram T, Sharif M, Javed MY, Muhammad N, Yasmin M. An implementation of optimized framework for action classification using multilayers neural network on selected fused features. Pattern Analysis and Applications. 2018;. doi: 10.1007/s10044-018-0688-1 [Google Scholar]
  • 7. Mahmood Z, Ali T, Muhammad N, Bibi N, Shahzad I, Azmat S. EAR: Enhanced Augmented Reality System for Sports Entertainment Applications. KSII Transactions on Internet & Information Systems. 2017;11(12). [Google Scholar]
  • 8. Mughal B, Sharif M, Muhammad N, Saba T. A novel classification scheme to decline the mortality rate among women due to breast tumor. Microscopy Research and Technique. 2018;81(2):171180 doi: 10.1002/jemt.22961 [DOI] [PubMed] [Google Scholar]
  • 9. Mahmood Z, Muhammad N, Bibi N, Ali T. A review on state-of-the-art face recognition approaches. Fractals. 2017;25(02):1750025 doi: 10.1142/S0218348X17500256 [Google Scholar]
  • 10. Bibi N, Muhammad N, Cheetham B. Inverted Wrap-Around Limiting with Bussgang Noise Cancellation Receiver for OFDM Signals. Circuits, Systems, and Signal Processing. 2018;37(2):901914 doi: 10.1007/s00034-017-0585-7 [Google Scholar]
  • 11. Bibi N, Kleerekoper A, Muhammad N, Cheetham B. Equation-Method for correcting clipping errors in OFDM signals. SpringerPlus. 2016;5(1):931 doi: 10.1186/s40064-016-2413-0 [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 12. Bashir Y, Aslam A, Kamran M, Qureshi MI, Jahangir A, Rafiq M, et al. On Forgotten Topological Indices of Some Dendrimers Structure. Molecules. 2017;22(6):867 doi: 10.3390/molecules22060867 [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 13. Ahmed N, Linardi D, Muhammad N, Chiamulera C, Fumagalli G, Biagio LS, et al. Sphingosine 1-Phosphate Receptor Modulator Fingolimod (FTY720) Attenuates Myocardial Fibrosis in Post-heterotopic Heart Transplantation. Frontiers in Pharmacology. 2017;8(645). [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 14. Muhammad N, Bibi N, Mahmood Z, Kim DG. Blind data hiding technique using the Fresnelet transform. SpringerPlus. 2015;4(1):832 doi: 10.1186/s40064-015-1534-1 [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 15. Shannon CE. Communication theory of secrecy systems. Bell Labs Technical Journal. 1949;28(4):656715. [Google Scholar]
  • 16. Muhammad N, Bibi N. Digital image watermarking using partial pivoting lower and upper triangular decomposition into the wavelet domain. IET Image Processing. 2015;9(9):795803 doi: 10.1049/iet-ipr.2014.0395 [Google Scholar]
  • 17. Muhammad N, Bibi N, Wahab A, Mahmood Z, Akram T, Naqvi SR, et al. Image de-noising with subband replacement and fusion process using bayes estimators. Computers & Electrical Engineering. 2017;. doi: 10.1016/j.compeleceng.2017.05.023 [Google Scholar]
  • 18. Muhammad N, Bibi N, Jahangir A, Mahmood Z. Image denoising with norm weighted fusion estimators. Pattern Analysis and Applications. 2017;p. 110. [Google Scholar]
  • 19.Matsui M. Linear cryptanalysis method for DES cipher. In: Workshop on the Theory and Application of of Cryptographic Techniques. Springer;. p. 386397.
  • 20. Carlet C, Ding C. Nonlinearities of S-boxes. Finite fields and their applications. 2007;13(1):121135 doi: 10.1016/j.ffa.2005.07.003 [Google Scholar]
  • 21. Hussain I, Shah T, Mahmood H, Gondal MA, Bhatti UY. Some analysis of S-box based on residue of prime number. Proc Pak Acad Sci. 2011;48(2):111115. [Google Scholar]
  • 22. Hussain I, Shah T, Gondal MA, Mahmood H. Generalized majority logic criterion to analyze the statistical strength of S-boxes. Zeitschrift fürr Naturforschung A. 2012;67(5):282288. [Google Scholar]
  • 23. Kim J, Phan RCW. Advanced differential-style cryptanalysis of the NSA’s skipjack block cipher. Cryptologia. 2009;33(3):246270. [Google Scholar]
  • 24. Hussain I, Shah T, Gondal MA, Khan WA, Mahmood H. A group theoretic approach to construct cryptographically strong substitution boxes. Neural Computing and Applications. 2013;23(1):97104 doi: 10.1007/s00521-012-0914-5 [Google Scholar]
  • 25. Zeghid M, Machhout M, Khriji L, Baganne A, Tourki R. A modified AES based algorithm for image encryption. World Academy of Science, Engineering and Technology. 2007;27:206211. [Google Scholar]
  • 26.Venkatachalam S, Vignesh R, Sathishkumar G. An improved S-box based algorithm for efficient image encryption. In: Electronics and Information Engineering (ICEIE), 2010 International Conference On. vol. 1. IEEE;. p. V1428V1431.
  • 27. Hussain I, Shah T, Gondal MA, Mahmood H. Construction of new S-boxes over finite field and their application to watermarking. Zeitschrift für Naturforschung A. 2012;67(12):705710. [Google Scholar]
  • 28. Xian ZH, Sun SL. Image encryption algorithm based on chaos and S-boxes scrambling In: Advanced Materials Research. vol. 171 Trans Tech Publ; 2011. p. 299304. [Google Scholar]
  • 29. Rehman AU, Khan JS, Ahmad J, Hwang SO. A new image encryption scheme based on dynamic s-boxes and chaotic maps. 3D Research. 2016;7(1):7 doi: 10.1007/s13319-016-0084-9 [Google Scholar]
  • 30. Jamal SS, Shah T, Farwa S, Khan MU. A new technique of frequency domain watermarking based on a local ring. Wireless Networks. 2017;p. 113. [Google Scholar]
  • 31. Liu H, Wang X. Color image encryption based on one-time keys and robust chaotic maps. Computers & Mathematics with Applications. 2010;59(10):33203327. [Google Scholar]
  • 32. Liu H, Wang X. Color image encryption using spatial bit-level permutation and 387 high-dimension chaotic system. Optics Communications. 2011;284(16–17):38953903. [Google Scholar]
  • 33. Wang XY, Yang L, Liu R, Kadir A. A chaotic image encryption algorithm based on perceptron model. Nonlinear Dynamics. 2010;62(3):615621 doi: 10.1007/s11071-010-9749-8 [Google Scholar]
  • 34. Liu H, Wang X. Image encryption using DNA complementary rule and chaotic maps. Applied Soft Computing. 2012;12(5):14571466 doi: 10.1016/j.asoc.2012.01.016 [Google Scholar]
  • 35. Zhang YQ, Wang XY. A symmetric image encryption algorithm based on mixed linear nonlinear coupled map lattice. Information Sciences. 2014;(273):329351. [Google Scholar]
  • 36. Wang X, Teng L, Qin X. A novel colour image encryption algorithm based on chaos. Signal Processing. 2012;92(4):11011108 doi: 10.1016/j.sigpro.2011.10.023 [Google Scholar]
  • 37. Ahmad J, Khan MA, Ahmed F, Khan JS. A novel image encryption scheme based on orthogonal matrix, skew tent map, and XOR operation. Neural Computing and Applications. 2017;p. 111. [Google Scholar]
  • 38. Wang X, Liu L, Zhang Y. A novel chaotic block image encryption algorithm based on dynamic random growth technique. Optics and Lasers in Engineering. 2015;66:1018 doi: 10.1016/j.optlaseng.2014.08.005 [Google Scholar]
  • 39. Farwa S, Muhammad N, Shah T, Ahmad S. A Novel Image Encryption Based on Algebraic S-box and Arnold Transform. 3D Research. 2017;8(3):26 doi: 10.1007/s13319-017-0135-x [Google Scholar]
  • 40. Wang XY, Zhang YQ, Bao XM. A novel chaotic image encryption scheme using DNA sequence operations. Optics and Lasers in Engineering. 2015;73:5361 doi: 10.1016/j.optlaseng.2015.03.022 [Google Scholar]
  • 41. Wang X, Wang Q. A novel image encryption algorithm based on dynamic S-boxes constructed by chaos. Nonlinear Dynamics. 2014;75(3):567576 doi: 10.1007/s11071-013-1086-2 [Google Scholar]
  • 42. Zhang YQ, Wang XY. A new image encryption algorithm based on non-adjacent coupled map lattices. Applied Soft Computing. 2015;26:10(20). [Google Scholar]
  • 43. Muhammad N, Bibi N, Mahmood Z, Akram T, Naqvi SR. Reversible integer wavelet transform for blind image hiding method. PloS one. 2017;12(5):e0176979 doi: 10.1371/journal.pone.0176979 [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 44. Mughal B, Muhammad N, Sharif M, Saba T, Rehman A. Extraction of breast border and removal of pectoral muscle in wavelet domain. Biomedical Research. 2017;28(11). [Google Scholar]

Associated Data

This section collects any data citations, data availability statements, or supplementary materials included in this article.

Data Availability Statement

All relevant data are within the paper.


Articles from PLoS ONE are provided here courtesy of PLOS

RESOURCES