Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2017, Article ID 5790189, 9 pages
https://doi.org/10.1155/2017/5790189
Research Article

A Novel Fuzzy Encryption Technique Based on Multiple Right Translated AES Gray S-Boxes and Phase Embedding

Faculty of Engineering Sciences, GIK Institute of Engineering Sciences and Technology, Topi, Pakistan

Correspondence should be addressed to Naveed Ahmed Azam; moc.liamg@169mzdeevan

Received 15 July 2016; Revised 6 October 2016; Accepted 17 October 2016; Published 11 January 2017

Academic Editor: Pascal Lorenz

Copyright © 2017 Naveed Ahmed Azam. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. A. Philip, “A generalized pseudo-Knight's tour algorithm for encryption of an image,” IEEE Potentials, vol. 32, no. 6, pp. 10–16, 2013. View at Publisher · View at Google Scholar · View at Scopus
  2. J. Liu, H. Jin, L. Ma, Y. Li, and W. Jin, “Optical color image encryption based on computer generated hologram and chaotic theory,” Optics Communications, vol. 307, pp. 76–79, 2013. View at Publisher · View at Google Scholar · View at Scopus
  3. C. E. Shannon, “Communication theory of secrecy systems,” Bell System Technical Journal, vol. 28, no. 4, pp. 656–715, 1949. View at Publisher · View at Google Scholar
  4. J. Daemen and V. Rijmen, The Design of RIJNDAEL: AES—The Advanced Encryption Standard, Springer, Berlin, Germany, 2002.
  5. N. Ferguson, R. Schroeppel, and D. Whiting, “A simple algebraic representation of Rijndael,” in Selected Areas in Cryptography SAC '01, vol. 2259 of Lecture Notes in Computer Science, pp. 103–111, Springer, 2001. View at Google Scholar
  6. S. Murphy and M. J. Robshaw, “Essential algebraic structure within the AES,” in Advances in Cryptology—CRYPTO 2002: 22nd Annual International Cryptology Conference Santa Barbara, California, USA, August 18–22, 2002 Proceedings, vol. 2442 of Lecture Notes in Computer Science, pp. 1–16, Springer, Berlin, Germany, 2002. View at Publisher · View at Google Scholar
  7. J. Rosenthal, “A polynomial description of the Rijndael advanced encryption standard,” Journal of Algebra and Its Applications, vol. 2, no. 2, pp. 223–236, 2003. View at Publisher · View at Google Scholar
  8. J. Liu, B. Wei, X. Cheng, and X. Wang, “An AES S-box to increase complexity and cryptographic analysis,” in Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA '05), pp. 724–728, Taipei, Taiwan, March 2005. View at Publisher · View at Google Scholar · View at Scopus
  9. L. Jingmei, W. Baodian, and W. Xinmei, “One AES S-box to increase complexity and its cryptanalysis,” Journal of Systems Engineering and Electronics, vol. 18, no. 2, pp. 427–433, 2007. View at Publisher · View at Google Scholar · View at Scopus
  10. L. Cui and Y. Cao, “A new S-box structure named affine-power-affine,” International Journal of Innovative Computing, Information and Control, vol. 3, no. 3, pp. 751–759, 2007. View at Google Scholar · View at Scopus
  11. M.-T. Tran, D.-K. Bui, and A.-D. Duong, “Gray S-box for advanced encryption standard,” in Proceedings of the International Conference on Computational Intelligence and Security (CIS '08), pp. 253–258, December 2008. View at Publisher · View at Google Scholar · View at Scopus
  12. M. Khan and N. A. Azam, “Right translated AES gray S-boxes,” Security and Communication Networks, vol. 8, no. 9, pp. 1627–1635, 2015. View at Publisher · View at Google Scholar · View at Scopus
  13. M. Khan and N. A. Azam, “S-boxes based on affine mapping and orbit of power function,” 3D Research, vol. 6, article 12, 2015. View at Publisher · View at Google Scholar · View at Scopus
  14. T. Jakobsen and L. R. Knudsen, “The interpolation attack on block ciphers,” in Fast Software Encryption: 4th International Workshop, FSE'97 Haifa, Israel, January 20–22 1997 Proceedings, Lecture Notes in Computer Science, pp. 28–40, Springer, Berlin, Germany, 1997. View at Publisher · View at Google Scholar
  15. N. T. Courtois and J. Pieprzyk, “Cryptanalysis of block ciphers with overdefined systems of equations,” in Advances in Cryptology—ASIACRYPT 2002: 8th International Conference on the Theory and Application of Cryptology and Information Security Queenstown, New Zealand, December 1–5, 2002 Proceedings, vol. 2501 of Lecture Notes in Computer Science, pp. 267–287, Springer, Berlin, Germany, 2002. View at Publisher · View at Google Scholar
  16. T.-S. Chen, C.-C. Chang, and M.-S. Hwang, “A virtual image cryptosystem based upon vector quantization,” IEEE Transactions on Image Processing, vol. 7, no. 10, pp. 1485–1488, 1998. View at Publisher · View at Google Scholar · View at Scopus
  17. Y.-C. Hu, “High-capacity image hiding scheme based on vector quantization,” Pattern Recognition, vol. 39, no. 9, pp. 1715–1724, 2006. View at Publisher · View at Google Scholar · View at Scopus
  18. C.-C. Chang, C.-Y. Lin, and Y.-Z. Wang, “New image steganographic methods using run-length approach,” Information Sciences, vol. 176, no. 22, pp. 3393–3408, 2006. View at Publisher · View at Google Scholar · View at Scopus
  19. W.-Y. Chen, “Color image steganography scheme using set partitioning in hierarchical trees coding, digital Fourier transform and adaptive phase modulation,” Applied Mathematics and Computation, vol. 185, no. 1, pp. 432–448, 2007. View at Publisher · View at Google Scholar · View at Scopus
  20. G.-S. Lin, H. T. Chang, W.-N. Lie, and C.-H. Chuang, “Public-key-based optical image cryptosystem based on data embedding techniques,” Optical Engineering, vol. 42, no. 8, pp. 2331–2339, 2003. View at Publisher · View at Google Scholar · View at Scopus
  21. C.-H. Chuang and G.-S. Lin, “Optical image cryptosystem based on adaptive steganography,” Optical Engineering, vol. 47, no. 4, Article ID 047002, 2008. View at Publisher · View at Google Scholar · View at Scopus
  22. I. Hussain, N. A. Azam, and T. Shah, “Stego optical encryption based on chaotic S-box transformation,” Optics & Laser Technology, vol. 61, pp. 50–56, 2014. View at Publisher · View at Google Scholar · View at Scopus
  23. R. Manoj, N. Hemrajani, and A. K. Saxena, “Secured steganography approach using AES,” International Journal of Computer Science Engineering and Information Technology Research, vol. 3, no. 3, pp. 185–192, 2013. View at Google Scholar
  24. H. Sharma, “Secure image hiding algorithm using cryptography and steganography,” IOSR Journal of Computer Engineering, vol. 13, no. 5, pp. 1–6, 2013. View at Publisher · View at Google Scholar
  25. H. Al-Assam, R. Rashid, and S. Jassim, “Combining steganography and biometric cryptosystems for secure mutual authentication and key exchange,” in Proceedings of the 2013 8th International Conference for Internet Technology and Secured Transactions (ICITST '13), pp. 369–374, IEEE, London, UK, March 2013. View at Publisher · View at Google Scholar · View at Scopus
  26. D. Bloisi and L. Iocchi, “Image based steganography and cryptography,” in Proceedings of the 2nd International Conference on Computer Vision Theory and Applications (VISAPP '07), pp. 127–134, Barcelona, Spain, March 2007. View at Scopus
  27. K. Challita and H. Farhat, “Combining steganography and cryptography: new directions,” International Journal of New Computer Architectures and their Applications, vol. 1, no. 1, pp. 199–208, 2011. View at Google Scholar
  28. P. Xu, H. Jin, Q. Wu, and W. Wang, “Public-key encryption with fuzzy keyword search: a provably secure scheme under keyword guessing attack,” IEEE Transactions on Computers, vol. 62, no. 11, pp. 2266–2277, 2013. View at Publisher · View at Google Scholar · View at Scopus
  29. C. Kuo, S. Wang, J. Lin, C. Wang, and J. Yan, “Image encryption based on fuzzy synchronization of chaos systems,” in Proceedings of the IEEE 37th Annual Computer Software and Applications Conference (COMPSAC '13), Kyoto, Japan, July 2013. View at Publisher · View at Google Scholar
  30. A. Sahai and B. Waters, “Fuzzy identity-based encryption,” in Advances in Cryptology—EUROCRYPT 2005, vol. 3494 of Lecture Notes in Computer Science, pp. 457–473, 2005. View at Google Scholar
  31. M. Gardner, “The binary Gray code,” in Knotted Doughnuts and Other Mathematical Entertainments, chapter 2, W. H. Freeman, New York, NY, USA, 1986. View at Google Scholar
  32. X.-Y. Wang, S.-X. Gu, and Y.-Q. Zhang, “Novel image encryption algorithm based on cycle shift and chaotic system,” Optics and Lasers in Engineering, vol. 68, pp. 126–134, 2015. View at Publisher · View at Google Scholar · View at Scopus
  33. I. Hussain, T. Shah, M. A. Gondal, W. A. Khan, and H. Mahmood, “A group theoretic approach to construct cryptographically strong substitution boxes,” Neural Computing and Applications, vol. 23, no. 1, pp. 97–104, 2013. View at Publisher · View at Google Scholar · View at Scopus
  34. J. Kim and R. C.-W. Phan, “Advanced differential-style cryptanalysis of the NSA's Skipjack block Cipher,” Cryptologia, vol. 33, no. 3, pp. 246–270, 2009. View at Publisher · View at Google Scholar · View at Scopus
  35. http://sipi.usc.edu/database/database.php.
  36. H. Bahjat and M. A. Salih, “Speed image encryption scheme using dynamic Galois field GF(P) matrices,” International Journal of Computer Applications, vol. 89, no. 7, pp. 7–12, 2014. View at Publisher · View at Google Scholar
  37. C. H. Chuang and G. S. Lin, “Data steganography for optical color image cryptosystems,” International Journal of Image Processing, vol. 3, no. 6, pp. 318–327, 2010. View at Google Scholar
  38. O. M. Olaniyi, O. T. Arulogun, E. O. Omidiora, and O. O. Okediran, “Enhanced stegano-cryptographic model for secure electronic voting,” Journal of Information Engineering and Applications, vol. 5, no. 4, 2015. View at Google Scholar
  39. S. Som and S. Sen, “A non-adaptive partial encryption of grayscale images based on chaos,” Procedia Technology, vol. 10, pp. 663–671, 2013. View at Publisher · View at Google Scholar