Cargando…
A Novel Image Encryption Technique Based on Mobius Transformation
The nonlinear transformation concedes as S-box which is responsible for the certainty of contemporary block ciphers. Many kinds of S-boxes are planned by various authors in the literature. Construction of S-box with a powerful cryptographic analysis is the vital step in scheming block cipher. Throug...
Autores principales: | , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Hindawi
2021
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8709777/ https://www.ncbi.nlm.nih.gov/pubmed/34956343 http://dx.doi.org/10.1155/2021/1912859 |
_version_ | 1784623017563783168 |
---|---|
author | Asif, Muhammad Mairaj, Sibgha Saeed, Zafar Ashraf, M. Usman Jambi, Kamal Zulqarnain, Rana Muhammad |
author_facet | Asif, Muhammad Mairaj, Sibgha Saeed, Zafar Ashraf, M. Usman Jambi, Kamal Zulqarnain, Rana Muhammad |
author_sort | Asif, Muhammad |
collection | PubMed |
description | The nonlinear transformation concedes as S-box which is responsible for the certainty of contemporary block ciphers. Many kinds of S-boxes are planned by various authors in the literature. Construction of S-box with a powerful cryptographic analysis is the vital step in scheming block cipher. Through this paper, we give more powerful and worthy S-boxes and compare their characteristics with some previous S-boxes employed in cryptography. The algorithm program planned in this paper applies the action of projective general linear group PGL(2, GF(2(8))) on Galois field GF(2(8)). The proposed S-boxes are constructed by using Mobius transformation and elements of Galois field. By using this approach, we will encrypt an image which is the preeminent application of S-boxes. These S-boxes offer a strong algebraic quality and powerful confusion capability. We have tested the strength of the proposed S-boxes by using different tests, BIC, SAC, DP, LP, and nonlinearity. Furthermore, we have applied these S-boxes in image encryption scheme. To check the strength of image encryption scheme, we have calculated contrast, entropy, correlation, energy, and homogeneity. The results assured that the proposed scheme is better. The advantage of this scheme is that we can secure our confidential image data during transmission. |
format | Online Article Text |
id | pubmed-8709777 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2021 |
publisher | Hindawi |
record_format | MEDLINE/PubMed |
spelling | pubmed-87097772021-12-25 A Novel Image Encryption Technique Based on Mobius Transformation Asif, Muhammad Mairaj, Sibgha Saeed, Zafar Ashraf, M. Usman Jambi, Kamal Zulqarnain, Rana Muhammad Comput Intell Neurosci Research Article The nonlinear transformation concedes as S-box which is responsible for the certainty of contemporary block ciphers. Many kinds of S-boxes are planned by various authors in the literature. Construction of S-box with a powerful cryptographic analysis is the vital step in scheming block cipher. Through this paper, we give more powerful and worthy S-boxes and compare their characteristics with some previous S-boxes employed in cryptography. The algorithm program planned in this paper applies the action of projective general linear group PGL(2, GF(2(8))) on Galois field GF(2(8)). The proposed S-boxes are constructed by using Mobius transformation and elements of Galois field. By using this approach, we will encrypt an image which is the preeminent application of S-boxes. These S-boxes offer a strong algebraic quality and powerful confusion capability. We have tested the strength of the proposed S-boxes by using different tests, BIC, SAC, DP, LP, and nonlinearity. Furthermore, we have applied these S-boxes in image encryption scheme. To check the strength of image encryption scheme, we have calculated contrast, entropy, correlation, energy, and homogeneity. The results assured that the proposed scheme is better. The advantage of this scheme is that we can secure our confidential image data during transmission. Hindawi 2021-12-17 /pmc/articles/PMC8709777/ /pubmed/34956343 http://dx.doi.org/10.1155/2021/1912859 Text en Copyright © 2021 Muhammad Asif et al. https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. |
spellingShingle | Research Article Asif, Muhammad Mairaj, Sibgha Saeed, Zafar Ashraf, M. Usman Jambi, Kamal Zulqarnain, Rana Muhammad A Novel Image Encryption Technique Based on Mobius Transformation |
title | A Novel Image Encryption Technique Based on Mobius Transformation |
title_full | A Novel Image Encryption Technique Based on Mobius Transformation |
title_fullStr | A Novel Image Encryption Technique Based on Mobius Transformation |
title_full_unstemmed | A Novel Image Encryption Technique Based on Mobius Transformation |
title_short | A Novel Image Encryption Technique Based on Mobius Transformation |
title_sort | novel image encryption technique based on mobius transformation |
topic | Research Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8709777/ https://www.ncbi.nlm.nih.gov/pubmed/34956343 http://dx.doi.org/10.1155/2021/1912859 |
work_keys_str_mv | AT asifmuhammad anovelimageencryptiontechniquebasedonmobiustransformation AT mairajsibgha anovelimageencryptiontechniquebasedonmobiustransformation AT saeedzafar anovelimageencryptiontechniquebasedonmobiustransformation AT ashrafmusman anovelimageencryptiontechniquebasedonmobiustransformation AT jambikamal anovelimageencryptiontechniquebasedonmobiustransformation AT zulqarnainranamuhammad anovelimageencryptiontechniquebasedonmobiustransformation AT asifmuhammad novelimageencryptiontechniquebasedonmobiustransformation AT mairajsibgha novelimageencryptiontechniquebasedonmobiustransformation AT saeedzafar novelimageencryptiontechniquebasedonmobiustransformation AT ashrafmusman novelimageencryptiontechniquebasedonmobiustransformation AT jambikamal novelimageencryptiontechniquebasedonmobiustransformation AT zulqarnainranamuhammad novelimageencryptiontechniquebasedonmobiustransformation |