Recent Trends and Techniques in Computing Information IntelligenceView this Special Issue
Research Article | Open Access
Ensemble of Chaotic and Naive Approaches for Performance Enhancement in Video Encryption
Owing to the growth of high performance network technologies, multimedia applications over the Internet are increasing exponentially. Applications like video conferencing, video-on-demand, and pay-per-view depend upon encryption algorithms for providing confidentiality. Video communication is characterized by distinct features such as large volume, high redundancy between adjacent frames, video codec compliance, syntax compliance, and application specific requirements. Naive approaches for video encryption encrypt the entire video stream with conventional text based cryptographic algorithms. Although naive approaches are the most secure for video encryption, the computational cost associated with them is very high. This research work aims at enhancing the speed of naive approaches through chaos based S-box design. Chaotic equations are popularly known for randomness, extreme sensitivity to initial conditions, and ergodicity. The proposed methodology employs two-dimensional discrete Henon map for (i) generation of dynamic and key-dependent S-box that could be integrated with symmetric algorithms like Blowfish and Data Encryption Standard (DES) and (ii) generation of one-time keys for simple substitution ciphers. The proposed design is tested for randomness, nonlinearity, avalanche effect, bit independence criterion, and key sensitivity. Experimental results confirm that chaos based S-box design and key generation significantly reduce the computational cost of video encryption with no compromise in security.
The advancements in networks and communication have promoted the usage of digital multimedia data in the field of education, commerce, defense, and entertainment. Usage of video applications such as video messaging, video conferencing, video surveillance, and Internet video sites such as YouTube is becoming increasingly popular and pervasive. Telemedicine is an application of clinical medicine and information technology where consultation, medical procedures, and examinations are performed remotely using interactive audiovisual media. These applications generate and transmit large amount of sensitive data in a resource constrained environment characterized by lower bandwidth, frequent packet drops, quality of service concerns, and limited computational resources of the communicating devices. The increasing use of video based applications demands not only secure algorithms for transmission and storage of videos but also efficient algorithms to reduce computational overhead.
Confidentiality for multimedia data is offered by means of encryption, in which the legitimate users can only gain access to data with the secret keys possessed by them. Video encryption algorithms are classified based on the way of encrypting data. Fully Layered Encryption (Naive Encryption) considers the whole content of video stream as a sequence of bits and encrypts with text based symmetric 3 algorithms such as Advanced Encryption Standard (AES), Blowfish, and Triple DES and so forth [1, 2]. As these algorithms have no strong evidences of cryptanalysis reports, they provide complete security to the whole multimedia stream. However, because of the complexity involved in key generation and encryption, delay increases and overload will be unacceptable for real time processing.
To increase the encryption efficiency, a large number of permutation and selective video encryption strategies are proposed in the literature. Permutation based video encryption algorithms scramble the bytes within every frame of a video stream. In Zig-Zag permutation , an individual 8 8 block is mapped onto 1 64 vector by using a random permutation list. Shi and Bhargava  proposed a methodology to save computational time by combining MPEG compression and data encryption at the same time. As MPEG compression rate depends upon Huffman codeword list, the same codeword list is used as a secret key for permutation. Permutation based algorithms are vulnerable to known plain text attack , because by comparing the ciphered frames with the original frames, the permutation list can be easily figured out.
Selective encryption algorithms encrypt only selective subset of bytes within video frames to reduce the volume of data to be encrypted and at the same time to preserve a sufficient level of security. Meyer and Gadegast  proposed a scheme in which RSA or DES was used to encrypt MPEG video stream at four levels of security: (i) encrypting all stream headers, (ii) encrypting all stream headers and all DC and lower AC coefficients of intracoded blocks, (iii) encrypting I-frames and all I-blocks in P and B frames, and (iv) encrypting all the bit streams. However, special encoder and decoder are required to read unencrypted stream. In Aegis scheme proposed by Spanos and Maples , the intraframes, video stream header, and the ISO 32-bit end code of the MPEG stream are encrypted using DES in Cipher Block Chaining (CBC) mode, while the P and B frames are left unencrypted. The limitation of this idea is that the stream headers are predictable and broken by plaintext-ciphertext pairs . Socek et al.  proposed a video encryption algorithm that securely encrypts the video stream but also preserves data correlation in the video sequence. An improvised H.264/AVC comprehensive video encryption scheme is proposed by Wang et al.  in which the intraprediction mode, motion vector difference, and quantization coefficients are encrypted and the encryption keys are generated based on the cryptographic hash function.
From the literature, it can be inferred that there is no scheme that fits all applications. Permutation and selective encryption algorithms can reduce the computational overhead, but for complete and provable security of video in sensitive applications such as telemedicine, military, and business meetings, the entire video stream needs to be encrypted. Hence, development of video encryption algorithms encrypting the entire video stream at low computational cost is inevitable.
The proposed system encrypts the entire stream of video data but with a significant reduction in computational time through the application of Henon map. Henon map is employed in video encryption to address two levels of security: (i) ensemble of dynamic and key-dependent S-box with symmetric algorithms (Blowfish and DES) and (ii) generation of one-time keys for simple substitution ciphers.
In cryptography, an S-box is a basic component of symmetric key algorithms, which performs substitution. It is typically used to establish a nonlinear relationship between the key and the cipher text. An S-box should exhibit cryptographic properties such as bijection, strict avalanche, output bits independence, and equiprobable input/output XOR distribution. The input to an S-box could be an “” bit word, but the output can be an “” bit word, where “” and “” are not necessarily the same. An S-box can also be keyed or keyless and linear or nonlinear. S-boxes help the block ciphers to exhibit two important characteristics, namely, diffusion and confusion. The idea of diffusion is to hide the relationship between the plain text and the cipher text, which will frustrate the adversary who uses cipher text statistics to find the plain text. The idea of confusion is to hide the relationship between the cipher text and the key, which will frustrate the adversary who uses cipher text to find the key.
2.2. Analysis of S-Box Design in Symmetric Cryptosystems
Eight S-boxes are used in DES, in which each S-box is constructed as a table of four rows and sixteen columns . The design of S-box in DES is not open, not key-dependent, and not dynamic, which could serve as a point of vulnerability. In Blowfish, four S-boxes are used each of which is constructed as a one-dimensional array of 256 elements . Even though the S-box values are key-dependent, 521 Blowfish encryptions are required to generate all values thereby leading to a significant increase in computational time. The S-boxes of AES are prone to being attacked and hard to mask for its nonlinear characteristic. In addition, large amounts of circuit resources in chips and power consumption are involved in protecting S-boxes against power analysis . Many researchers have proposed alternative design of S-boxes to address the above-mentioned limitations. The following four approaches are normally followed in S-box design .(i)Random: pseudorandom numbers are used to generate the entries in the S-boxes.(ii)Random with testing: the S-box entries are chosen randomly and tested against various criteria and the values that do not pass are not considered.(iii)Human-made: the S-boxes of DES are designed in this mode, where the entries are filled manually. However, the approach is difficult to carry out for large S-boxes.(iv)Math-made: S-boxes are generated by using mathematical principles, and hence they have proven security against linear and differential cryptanalysis. Use of chaotic equations is one such mathematical way of S-box design.
2.3. Related Works
Discretized chaotic maps are used for generating dynamic and cryptographically strong S-boxes by Tang and Liao . The cryptographic properties such as bijection, nonlinearity, strict avalanche, output bits independence, and equiprobable input/output XOR distribution of these S-boxes were analyzed in detail. A method for designing S-box based on chaos and genetic algorithm is proposed by Wang et al. . The problem of S-box generation is converted into a Travelling Salesman Problem (TSP). A stronger S-box is obtained because of the complete utilization of traits of chaotic map and evolution process. Attempts have also been made to design strong S-boxes based on chaotic Lorenz system  and Tangent delay for elliptic cavity chaotic sequence . Lambić  has used an idea of ensemble of chaotic maps and composition method to generate random and bijective S-boxes. It is based on compositions of S-boxes from a fixed starting set. The sequence of the indices of starting S-boxes used is obtained by using chaotic maps. Chandrasekaran et al.  have proposed a method based on logistic map for S-box generation and reported the reduction in computational costs for text and image encryption on integration with Blowfish algorithm.
Henon map has been used for pseudorandom number generation  and for encryption of satellite imagery . Most of the research articles have analyzed the effect of one-dimensional chaotic system for S-box generation. This research work employs two-dimensional discrete Henon map in construction of S-boxes and in generation of one-time keys for video encryption, as Henon map offers better pseudo randomness than logistic maps .
2.4. Henon Map
The random-like, unpredictable dynamics and simplicity in realization of chaotic systems make them suitable for cryptographic applications. The Henon map is a two-dimensional discrete dynamical system introduced by Michael Henon as a simplified model of Lorenz system . Henon map takes a point () in the plane and maps it onto a new point () as defined by the equationsThe desired statistical properties can be obtained from the generated values if the input values are as follows. “” can be in the range of 1.16 to 1.41. “” can be in the range of 0.2 to 0.3. “” can be in the range of −1 to 1. “” can be in the range of −0.35 to 0.35. Skip value can be in the range of 80 to 1000.
Henon map is found to exhibit good chaotic behavior for values and , as shown in Figure 1.
A minute variation in the initial parameters even in ten-millionth place value of the chaotic systems could yield widely divergent results. In any cryptographic application, the property of confusion aims to make the relationship between statistics of cipher and key as complex as possible to thwart attempts to discover the key. The property of diffusion aims to make the statistical relationship between the input and cipher as complex as possible. The extreme sensitiveness to initial conditions of the Henon map makes it suitable for cryptographic applications due to the enhanced confusion and diffusion properties.
3. Application of Henon Maps in Proposed S-Box Design
Certain applications such as business and military meetings require a very high level of security. Extreme level of security could be achieved only by naive approaches of video encryption but with high computational costs. In order to increase the encryption speed and to reduce the computational cost of symmetric algorithms, the proposed S-box design using Henon maps can be integrated into the chosen symmetric algorithms.
3.1. Implementation Procedure
The various steps involved in integration of the proposed S-box design with symmetric algorithms including Blowfish and DES are as follows.
Step 1 (exchange of secret parameters). For generation of S-boxes, the following parameters are to be exchanged using the public keys of the communicating entities or through a secret channel.:The parameters of the Henon map and seed values .:The number for decimal places of the mantissa that are to be supported by the calculating machine.:The number of iterations after which the first value is to be picked for generating keys.:The skip value to be maintained for picking successive values thereafter.
Step 2 (encoding of chaotic values into binary sequence). (1) Iterate the two-dimensional equations of the Henon map for a predefined number of times, which is specific to the crypto algorithm chosen for encryption. Process the result in two one-dimensional arrays x and y of length . The number of iterations () is given by where “” represents the word length of S-box elements. “” represents the total number of S-box elements. “” represents the skip value to be maintained for picking up successive values in iterations of Henon map equations.
(2) Split the arrays and into subarrays of length equal to the word length () of the S-box elements.
(3) Mix the individual subarrays with each other at predefined crossover points as illustrated in Figure 2.
(4) Calculate the medians ( and ) of each individual array of and .
(5) To generate a binary sequence, compare each element of and with its median, and , respectively. If is greater than , encode as “1”; else encode as “0.” If is greater than , encode as “1”; else encode as “0.”
(6) Partition each binary sequence across the word length and use alternatively to generate the individual S-box elements.
A sample 8-bit S-box with eight rows and eight columns (64 elements) is illustrated in (3). It could be inferred that the S-box entries are almost random and nonlinear:
Step 3 (video encryption). Let be the video to be encrypted consisting of frames . The S-boxes generated are integrated with the Feistel cipher structure of both Blowfish and DES to perform encryption. The entire video stream is treated as a sequence of bits and is completely encrypted with the corresponding crypto algorithm. A detailed description of Blowfish and DES can be found in  and , respectively.
3.2. Experimental Results and Discussion
3.2.1. Performance Enhancement
Integration of the proposed S-box design with DES aims to enhance security through dynamic and key-dependent S-boxes. Existing S-box design of DES is static and hence it is possible for an opponent to perform cryptanalysis by exploiting its weaknesses . Cryptanalysis of DES mainly focuses on the construction of eight S-boxes. The present work increases the resistivity of DES against cryptanalysis. The significant advantage of key-dependent S-boxes is that it is computationally impossible to analyze the S-box values ahead of time to look for weaknesses.
Existing Blowfish algorithm requires 521 encryptions for generation of P-arrays and S-boxes. The proposed S-box design when integrated with Blowfish results in significant reduction of time by eliminating the 521 encryptions. Thus, the proposed S-box design makes Blowfish suitable for memory limited and low powered devices with no compromise in security.
Nonlinearity is the major requirement of any S-box design. The proposed design of S-boxes is tested for nonlinearity against different criteria  as given below. As a sample, the S-box generated for integration with DES is used as a test case and is shown in (4)The S-boxes thus generated are tested against various criteria specified for quality checks and the results are as follows.
Criterion 1 (no output bit of any S-box should be too close to a linear function of the input bits). The relation between the input and output bits is plotted in Figure 3 for different seed values. The graph depicts a highly nonlinear relationship between the input and output bits.
Criterion 2 (if two inputs to an S-box differ in exactly one bit, the outputs must differ in at least two bits). For the given inputs and , which differ by one bit, the corresponding outputs are and which differ by at least two bits.
Criterion 3 (if two inputs to an S-box differ in the two middle bits exactly, the outputs must differ in at least two bits). For the given inputs and , which differ by two middle bits exactly, the corresponding outputs are and which differ by at least two bits.
Criterion 4 (if two inputs to an S-box differ in their first two bits and are identical in their last two bits, the two outputs must not be the same). For the given inputs and , which differ in two middle bits exactly, the corresponding outputs are and which differ by at least two bits.
The proposed S-box design has been tested for the above four criteria for 30 test cases drawn from 10 samples of S-boxes. About 99% of the test cases were found satisfactory with respect to all criteria.
3.2.3. Key Sensitivity Analysis
For a good cryptosystem, the output should vary significantly by a larger number of bits for minor changes in input. A sample of generated and encoded values in decimal format for minor changes in seed values of Henon map is shown in Table 1. It can be inferred that the generated S-box values for varying inputs that differ by a minor value result in significant changes in the output, thus making crypt analysis practically infeasible.
3.2.4. Avalanche Effect
A desirable property of any cryptographic algorithm is that the key space should be discretized in such a way that two ciphers encrypted by two slightly different keys should be completely different. The proposed methodology has been examined with Blowfish encryption for text inputs with a difference of 1 bit retaining all the other inputs to be similar. If a function is to satisfy the strict avalanche criterion, then each of its output bits should change with a probability of one half whenever a single input bit is complemented. The deviation has been analysed in each round of Blowfish encryption for the input parameters, , skip value = 100 and slightly differing plain text input , and plain text input . It can be observed from Table 2 that the output of each round significantly differs by large number of bits thereby exhibiting good avalanche effect.
4. Application of Henon Maps in Generation of Random Keys for Simple Substitution Cipher
Certain applications like pay TV require medium level of security but high speed for video encryption. To facilitate this, the chaotic values generated by the Henon map are encoded as one-time keys. As the encryption and decryption involve a simple and reversible XOR operation of keys with all the pixels of every frame, the time taken for encryption and decryption is significantly reduced.
4.1. Implementation Procedure
The steps involved in generation of random keys for simple substitution cipher operating in counter mode of operation are as follows.
Step 1 (exchange of secret parameters). In addition to the exchange of secret parameters () as mentioned in Section 3.1 (Step 1), another parameter for increment of seed value () is also exchanged. For random generation of keys, the seed values and are incremented by the value of during encryption of every frame.
Step 2 (encoding of chaotic values into binary sequence). (1) Iterate the Henon map for a predefined number of times, which directly depends upon number of frames and count of pixels in each frame. The number of iterations () is given by where “” represents the number of frames in the video sequence. “” represents the number of pixels in every frame. “” represents the number of bits used for pixel representation. “” represents the skip value to be maintained for picking up successive values in iterations of Henon map equations.
(2) Create a key table consisting of all possible keys, which is sequentially arranged and indexed.
(3) Encode the chaotic values generated to the indices of the key table using the same procedure as described in Section 3.1 (Step 2). Identify the key for encryption from the corresponding index of the key table.
Step 3 (video encryption). Let be the video to be encrypted consisting of frames . The number of pixels in every frame is represented by “” and “” bits are used for every pixel representation.(1)Perform XOR operation on every pixel () of the frame () with the keys () in keyset () to produce the ciphered frame () as illustrated in Figure 4.(2)Update the seed () using the increment parameter () to generate new random keys for encryption of every frame, thereby making the crypto system as strong as one-time pads. To enhance the speed of encryption, the key generation can be done as a preprocessing step prior to encryption.
4.2. Experimental Results and Discussion
The key generation algorithm has been implemented in MATLAB in Microsoft Windows environment and is tested with various video formats. The strength of the proposed design and its suitability for video encryption have been tested for key space, key sensitivity, resistance against statistical attacks, randomness, and computational time. The experimental results are demonstrated for “dfs.avi” file and its properties are enlisted in Table 3.
The results of encrypting the video file and an individual frame are illustrated in Figures 5 and 6, respectively. It can be inferred that encryption with the proposed scheme provides complete visual degradation, thus providing no clue to deploy statistical and differential attacks.
(a) Original video file
(b) Encrypted video file
(a) Original video frame
(b) Encrypted video frame
4.2.1. Key Space Analysis
Attempt to recover the original data by trying out all possible keys is called Brute force attack. The strength of any cryptographic algorithm depends on the size of its key space to make Brute force attack infeasible. The values of S-boxes depend on the initial seed and its related parameters associated with the chaotic equation. The initial seed “” is in the range of −1 to 1 and “” is in the range of −0.35 to 0.35. The key space also depends upon the number of decimal places of the mantissa that are supported by the calculating machine which is approximately infinitely large, thus making Brute force attack computationally infeasible.
4.2.2. Resistance against Statistical Attacks
(A) Correlation Coefficient. A high level of correlation exists among pixels in adjacent frames of a video and in order to make a video encryption algorithm resistant towards crypt analysis, the correlation between the adjacent frames of the ciphered video must be minimized. The correlation coefficient () is calculated bywhere and are the intensity values of two pixels in the same position of adjacent frames and represents the total number of pixels in a frame. From Table 4 it is inferred that there exists negligible correlation between plain and ciphered images, thereby providing no clue for statistical crypt analysis.
(B) Histogram Analysis. Statistical attacks are made by exploiting the predictable relationships between the plain and cipher frame pairs. Significant changes in the histograms of original and cipher frames reveal the strength of the algorithm against statistical attacks. The histograms of red, green, and blue components of original and ciphered frames are illustrated in Figures 7, 8, and 9, respectively. Since the histograms of the ciphered frame are uniformly distributed and significantly different from the original frames, they do not provide any clue to deploy statistical attacks.
(a) Original frame
(b) Ciphered frame
(a) Original frame
(b) Ciphered frame
(a) Original frame
(b) Ciphered frame
4.2.3. Randomness Test
The National Institute of Standards and Technology (NIST) has recommended certain set of statistical tests for detecting deviations of a binary sequence from randomness . The randomness testing is required in many cryptographic, modelling, and simulation applications. Table 5 shows the results of the statistical test on the generated binary sequence. The sequence is said to exhibit random behaviour if the value obtained in each of the statistical tests is greater than or equal to 0.01. The result clearly shows that the values obtained for all the tests are greater than 0.01 and hence the proposed design has passed the randomness testing.
5. Overall Performance Analysis of Henon Maps in Video Encryption
The performance metrics for video encryption such as visual degradation, trade-off between encryption ratio and speed, compression friendliness, and format compliance are examined in both applications of Henon maps, namely, (i) integration of proposed S-box design with DES and Blowfishand (ii) generation of random keys for simple substitution cipher in counter mode of operation.
5.1. Visual Degradation
Visual degradation measures the perceptual distortion of the video data with respect to the plain video. It can be inferred from Figures 5 and 6 that the proposed methodology on integration with symmetric algorithms offers high visual degradation and hence can be used for encrypting sensitive data. As a miniature substitution cipher, the algorithm provides high degradation at a less computational time.
5.2. Encryption Ratio versus Speed
Encryption ratio measures the ratio between the size of the encrypted part and the whole data size. In order to increase the speed of the encryption algorithm, encryption ratio has to be minimized. A balance between security and speed is achieved by completely encrypting the entire data and at the same time increasing the speed of encryption through modified design of S-boxes. The proposed design significantly reduces the time taken for encryption/decryption by eliminating the 521 iterations of Blowfish making it suitable for real time processing. In application of the proposed design for generation of random key, the encryption is carried out in counter mode which involves parallel processing of multiple frames for significant reduction in encryption/decryption time. Since every frame is operated independently of the other frame, propagation of bit errors in transmission is completely eliminated and hence the quality of decrypted video is ensured.
5.3. Compression Friendliness
The proposed video encryption algorithm is compression friendly as it has no impact on the efficiency of data compression. Also the size of the data is not increased with reference to the original size of the file.
5.4. Format Compliance
The syntax of the encrypted video stream of the proposed video encryption algorithm is also compliant with the standardized syntax of the compressed video stream. The encryption does not disturb the standardized syntax structure of the video stream such as the frame header, slice header, and the block header.
6. Conclusion and Future Work
This research work deploys the concept of Henon map to create dynamic S-boxes for symmetric key cryptosystems and for generation of random keys for simple substitution ciphers. The randomness, sensitivity to initial conditions, and ergodicity make Henon map suitable for S-box generation and one-time pads. The ease of encoding and transformation technique makes the system suitable for memory limited and low powered devices. The proposed methodology attains a high level of security at a less computational time. Experimental results prove the robustness of the algorithm against statistical attacks, key sensitivity tests, and randomness test and in performance enhancement. Future work may be attempted at deriving mathematical proofs for nonlinearity. The proposed video encryption algorithm may be extended and tested for mobile and cloud environments.
Conflict of Interests
The authors declare that there is no conflict of interests regarding the publication of this paper.
- F. Liu and H. Koenig, “A survey of video encryption algorithms,” Computers & Security, vol. 29, no. 1, pp. 3–15, 2010.
- S. Lian, Multimedia Content Encryption: Algorithms and Applications, CRC Press, New York, NY, USA, 2008.
- L. Tang, “Methods for encrypting and decrypting MPEG video data efficiently,” in Proceedings of the Fourth ACM International Conference on Multimedia (MULTIMEDIA '96), pp. 219–230, 1996.
- C. Shi and B. Bhargava, “Light weight MPEG video Encryption algorithm,” in Proceedings of the International Conference on Multimedia, pp. 55–61, Bristol, UK, September 1998.
- A. J. Slagel, “Known plain text attack against a permutation based video encryption algorithm,” http://eprint.iacr.org.
- J. Meyer and F. Gadegast, “Security mechanisms for multimedia data with the example MPEG-1 video,” Project Description of SECMPEG, Technical University of Berlin, 1995.
- G. A. Spanos and T. B. Maples, “Performance study of a selective encryption scheme for the security of networked real time video,” in Proceedings of the International Conference on Computer Communications and Networks, pp. 2–10, September 1995.
- I. Agi and L. Gong, “An empirical study of secure MPEG video transmissions,” in Proceedings of the Symposium on Network and Distributed System Security, pp. 137–144, IEEE, San Diego, Calif, USA, February 1996.
- D. Socek, H. Kalva, S. S. Magliveras, O. Marques, D. Culibrk, and B. Furht, “New approaches to encryption and steganography for digital videos,” Multimedia Systems, vol. 13, no. 3, pp. 191–204, 2007.
- X. Wang, N. Zheng, and L. Tian, “Hash key-based video encryption scheme for H.264/AVC,” Signal Processing: Image Communication, vol. 25, no. 6, pp. 427–437, 2010.
- National Bureau of Standards, Data Encryption Standard (DES), FIPS Publication 46, National Bureau of Standards, 1977.
- Y.-C. Chen, X.-C. Zou, Z.-L. Liu, X.-F. Chen, and Y. Han, “Dynamic inhomogeneous S-Boxes design for efficient AES masking mechanisms,” The Journal of China Universities of Posts and Telecommunications, vol. 15, no. 2, pp. 72–76, 2008.
- B. Schneier, Applied Cryptography, Wiley, New York, NY, USA, 1996.
- G. Tang and X. Liao, “A method for designing dynamical S-boxes based on discretized chaotic map,” Chaos, Solitons & Fractals, vol. 23, no. 5, pp. 1901–1909, 2005.
- Y. Wang, K.-W. Wong, C. Li, and Y. Li, “A novel method to design S-box based on chaotic map and genetic algorithm,” Physics Letters A: General, Atomic and Solid State Physics, vol. 376, no. 6-7, pp. 827–833, 2012.
- F. Özkaynak and A. B. Özer, “A method for designing strong S-Boxes based on chaotic Lorenz system,” Physics Letters, Section A: General, Atomic and Solid State Physics, vol. 374, no. 36, pp. 3733–3738, 2010.
- A. H. Alkhaldi, I. Hussain, and M. A. Gondal, “A novel design for the construction of safe S-boxes based on TDERC sequence,” Alexandria Engineering Journal, vol. 54, pp. 65–69, 2015.
- D. Lambić, “A novel method of S-box design based on chaotic map and composition method,” Chaos, Solitons & Fractals, vol. 58, pp. 16–21, 2014.
- J. Chandrasekaran, B. Subramanyan, and G. S. Raman, “Ensemble of blowfish with chaos based s box design for text and image encryption,” International Journal of Network Security & Its Applications, vol. 3, no. 4, pp. 165–173, 2011.
- F. Zheng, X.-J. Tian, J.-Y. Song, and X.-Y. Li, “Pseudo-random sequence generator based on the generalized Henon map,” The Journal of China Universities of Posts and Telecommunications, vol. 15, no. 3, pp. 64–68, 2008.
- M. Usama, M. K. Khan, K. Alghathbar, and C. Lee, “Chaos-based secure satellite imagery cryptosystem,” Computers & Mathematics with Applications, vol. 60, no. 2, pp. 326–337, 2010.
- B. Song and Q. Ding, “Comparisons of typical discrete logistic map and Henon map,” in Intelligent Data Analysis and Its Applications, Volume I, vol. 297 of Advances in Intelligent Systems and Computing, pp. 267–275, Springer, Berlin, Germany, 2014.
- M. Suneel, “Cryptographic pseudo-random sequences from the chaotic Hénon map,” Sadhana, vol. 34, no. 5, pp. 689–701, 2009.
- W. Stallings, Cryptography and Network Security, Prentice-Hall, 5th edition, 2011.
- NIST Test suite, http://csrc.nist.gov/publications/nistpubs/800-22-rev1a/SP800-22rev1a.pdf.
Copyright © 2015 Jeyamala Chandrasekaran and S. J. Thiruvengadam. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.