Abstract
Algebraic structures play a vital role in securing important data. These structures are utilized to construct the non-linear components of block ciphers. Since constructing non-linear components through algebraic structures is crucial for the confusion aspects of encryption schemes, relying solely on these structures can result in limited key spaces. To address this issue, a complex non-chain ring with combination of Henon map based algorithm is presented. This proposed work aims to enhance both security and key space by utilizing complex algebraic structures. In this study, we investigate the use of unit elements from non-chain rings, establishing a mapping from the group of units to Galois fields to enhance the algebraic robustness of the scheme. A substitution box is constructed from Galois field and is applied in image processing. For pixel mixing, the Henon map is employed, and the exclusive OR operation is performed using a key generated from image pixels and the substitution box. The algorithm’s performance is evaluated using standard parameters such as histograms, Structural Similarity Index Measure (SSIM), correlation analysis, and National Institute of Standards and Technology (NIST) tests. For S-box analysis, we apply the strict avalanche criterion (SAC), bit independence criterion (BIC), linear approximation probability (LAP), and differential approximation probability (DAP). This algebraic approach utilizes a robust and state-of-the-art image encryption system that is highly effective against potential attackers.
Similar content being viewed by others
Introduction
In the world of digital communication, information is transferred significantly between individuals due to innovations in computers. Nowadays, data hiding, and encryption are becoming more challenging for information security systems. The aims of both are the same, but their techniques differ. During the transfer of information, the main concern is to prevent data from tampering, unauthorized access, loss, and corruption. The use of images is increasing significantly across various platforms. Therefore, it is necessary to prevent image data from an unrecognized person. Image steganography and image encryption play crucial roles in concealing confidential information1. In recent years, there has been an increase in developments in the field of network multimedia. These developments have made it easy for data to be duplicated and unauthorized copies to be generated, which is a concerning situation for original data such as images, audio, text, and video. Toktas et al.2, introduces the bit-level image encryption based on Bessel map with three control parameters. To prevent data duplication, many developments are being created to enhance the security of our data. Given the increasing demands for data security, we introduce a new image encryption scheme that depends on a finite commutative non-chain ring that is based on the Galois field and provides a high level of data security capacity. In literature, various types of block ciphers are utilized to secure communication channels based on Shannon’s theory. In the confusion part of Shannon’s theory, substitutions are made to increase complexity and establish a connection between the ciphertext and the key. In a diffusion process, the statistical characteristics of plaintext are propagated throughout the ciphertext. Public-key and DES are modern encryption schemes that provide confusion and diffusion to securely transfer complex ciphers over large data blocks. Zhou et al.3, developed a bit-level extension algorithm for multiple color images, in which DWT is used for compression of multiple color images to reduce transmission.
Now, to create confusion among readers attempting to decode an encrypted message, the fundamental component utilized is an S-box. An S-box is a nonlinear component and is an essential part of a block cipher that is used in the image encryption process. To transfer secure information from one place to another, different block ciphers are used that consists of confusion and diffusion. To protect our secret information from intruders, researchers have made it more robust and powerful today. For greater robustness in transformation, the algebraic structure is utilized in S-box construction. These S-boxes have the ability and resilience against differential and linear attacks. For instance, an S-box generated by a symmetric group \(\:{S}_{8}\)that is used in AES construction is complex and robust for sharing secret information4. Similarly, an S-box called Affine Power Affine (APA) S-box is also generated by an algebraic structure and used in AES to enhance security5. The Binary Gray S-box is an algebraic component known as the Gray S-box, which plays a role in the AES construction process6. In this process, the polynomial used to create the Substitution box is different from the Advance Encryption Standard S-box. Additionally, this S-box inherits all properties such as algebraic complexity and nonlinearity. Some famous S-boxes, such as Residue Prime S-boxes, Skipjack S-boxes, and Xyi S-boxes are used for both the encryption as well as decryption processes of images7. S-boxes mentioned above are used as a standard to construct new S-boxes that meet security requirements such as the Nonlinearity, Bit Independence Criterion (BIC), Strict Avalanche Criterion (SAC), Linear Approximation Probability Method (LP), and Differential Approximation Probability (DP)8,9.
Chaos based image encryption not only produce complexity but also produces randomness between pixels. Cross-Channel Color IE (CCC-IE) by using of \(\:2D\) hyperchaotic hybrid map of optimization test function10. The \(\:2D\) hyperchaotic map is constructed by hybridizing the Rastrigin and Griewank functions. The hyperchaotic map scrambles the diagonal pixels of plain image and manipulates the pixels in bi-direction to protect from cyberthreat. Particle swarm optimization (PSO) based image encryption by using of modular integrated logistic exponential (MILE) map is used to optimize key and creating randomness between pixels11. The MILE map has a significance behavior due to its dynamical nature that makes to protect from unauthorized recipient. For getting a high performance in multi-layered image encryption using Fractional-Order \(\:3D\) Lorenz chaotic system and \(\:2D\) Discrete Polynomial hyper-chaotic map12. Feng et al.13 is improved the efficiency of image encryption by using Plane Level Image Filter and Discrete Logarithmic transformation.
In recent few years, DNA coding based new image encryption have been widely reported. In the field cryptanalysis it enhances the security and improved the robustness. As QCMDC-IEA has been used to analyze the cryptanalysis that combines of quantum chaotic mapping and DNA coding with two major parts of DNA domain substitution and pixel level permutation. But it establishes two major flaws like neither confusion nor diffusion process of DNA and equivalent keys14. Similarly, in the cryptanalyzing an image cipher using multiple chaos and DNA operations15, the author cryptanalyzes the CICI-DNA having multiple chaotic systems and exists of equivalent keys. Feng et al.16, cryptanalysis and improvement of image encryption scheme based on Feistel Network and dynamic DNA encoding. The author finding critical flaws of designing secret key and in encryption process. Li et al.17 introduces the chaotic based image encryption that’s behavior is more chaotic, and generation of key stream is more practical. Image encryption process passes three main process that makes more efficient by using vector level operations and two-dimensional enhanced logistic modular map (2D-ELMM).
To improve high computational complexity and strengthen the security against attacks involving geometric rotations watermarking algorithm plays important role. Yang et al.18 to overcome these deficiencies introduces zero watermarking algorithm, in which central pixels of RGB layers of plane image takes as the center of circle. Xia et al.19, first proposed a fractional-order radial harmonic Fourier moments (FoRHFMs) to overcome the numerical instability and computational accuracy of IoRHFMs to achieve lossless copyright protection of medical images. For the effectiveness of image reconstruction capability, zero-watermarking, and pattern recognition accuracy Yang et al.20 addresses the issue of color image analysis by combining the quaternion theory with Fractional-order weighted Spherical Bessel-Fourier Moments (FrSBFMs). He et al.21 extends the idea of quaternion fractional-order color orthogonal moments (QFr-COMs) based on Laguerre polynomials and weighted radial normalized fractional-order generalized Laguerre polynomials (WRNFr-GLPs) to quaternion fractional-order weighted generalized Laguerre-Fourier moments (QFr-WGLFMs).
The most of S-boxes consisting of \(\:256\) elements and generated by the technique of composition of inversion and bijective ma on Galois Field (GF). The most famous S-box scheme that is constructed by linear fraction transformations of GF of \(\:256\) elements by fixing the coefficients \(\:a\), \(\:b\), \(\:c\), and \(\:d\). The map used to make an \(\:8\times\:8\) S-boxes called linear fractional transformation (LFT) \(\:x\to\:\frac{ax+b}{cx+d}\). A new technique to develop a \(\:8\times\:8\) S-box consisting of unit elements of integer ring \(\:{\mathbb{Z}}_{512}\)22. The approach consists of two parts, firstly construct two maps, scalar multiple and inverse on unit elements of \(\:{\mathbb{Z}}_{512}\), to enhance the randomness. After that, apply group action on the permuted GF (\(\:{2}^{8}\)) in the way of linear fraction transformation (LFT). The ring \(\:{\mathbb{Z}}_{512}\) is commutative chain ring and module over itself. The subgroup \(\:\mathcal{N}\) of \(\:{\mathbb{Z}}_{512}\) is additive abelian and consisting of non-unit elements of order \(\:256\) and \(\:\mathcal{N}\) is submodule of module \(\:{\mathbb{Z}}_{512}.\) The other half of \(\:{\mathbb{Z}}_{512}\) form a multiplicative group \(\:{\mathcal{N}}_{{G}_{9}}\)consisting of unit elements of order \(\:256\). Two logic operations XOR and AND are supported by two binary operations depends on algebraic framework of \(\:GF\:\left({2}^{8}\right)\). The AND operation apply on multiplicative group \(\:{\mathcal{N}}_{{G}_{9}}\)and XOR operation apply on \(\:\mathcal{N}\).
It demonstrates the construction of S-box of size \(\:4\times\:4\:\) over the Galois ring \(\:GR(4,\:2)\) and an S-box over \(\:GR(4,\:4)\) is useful in visual applications. The \(\:4\times\:4\:\)S-box is constructed by Shah et al. in23 by using of chain ring \(\:\frac{{\mathbb{F}}_{2}\left[x\right]}{<{x}^{8}>}\), this S-box is widely used in image encryption24. Shah et al. in25 is also constructed S-box of size \(\:24\times\:24\) by utilizing of Galois ring \(\:GR\left(\text{8,8}\right)\) but this method is not working correctly during decryption due to absence of inverse of S-box. In26, construction of \(\:9\)-bit S-box by using of non-chain ring \(\:\frac{{\mathbb{F}}_{17}\left[x\right]}{<{x}^{2}-x>}\) and there used in RGB encryption. The main objective of this manuscript is to address knowledge gaps and introduce novel findings. A commonly employed approach for enhancing data security involves utilizing algebraic structures. The proposed scheme establishes a substitution box by using a Galois field over the non-chain ring. This S-box is utilized to encrypt RGB images. The application of algebraic structure has motivated us to create an S-box which uses a non-chain ring. Another objective is to utilize a complex mathematical structure to create a bijection map from a ring to a Galois field. Hussain et al.27, introduces image pixels swapping encryption based on TetraVex game and publicly Hash-sharing algorithm.
We use a unit elements of non-chain ring \(\:\frac{{\mathbb{F}}_{17}\left[x\right]}{<{x}^{2}-1>}\) in our study. Also, apply an affine mapping to the ring. To construct a \(\:8\times\:8\) S-box we use linear fractional transformation (LFT) i.e. \(\:x\mapsto\:\:\frac{ax+b}{cx+d}\) on \(\:GF\left({2}^{8}\right)\) by fixing \(\:a,\:b,\:c\:,\:d\). For diffusion process find the inverse of S-box on \(\:GR\left({2}^{8}\right).\) This \(\:9\)-bit S-box is used later in an encryption process. For checking the efficiency of newly proposed S-box we compare it with standard measure including Strict Avalanche Criterion (SAC), Linear Approximation Probability (LAP), Bit Independence Criterion (BIC), and Differential Approximation Probability (DAP)8,9. Similarly, for securing from intruder’s attack, apply some test like differential attack, NIST test, and statistical attack, on image encryption. The study’s main contribution and significance can be summed up as follows:
-
A novel combinatory approach using non-chain ring and \(\:2D\) Henon map to addressing limitation of image encryptions, including low key space.
-
Define the bijection between the group of units of the ring and the Galois field to create a mathematically complex scheme.
-
Construction of S-boxes by using unit elements of non-chain ring and the Galois field to increase the robustness with its best nonlinearity and SAC value.
-
Utilizing a two-dimensional Henon map creates unpredictability and sensitivity to the initial key in the scheme.
-
The S-boxes and keys generated from the Henon map are used for substitution, exclusive OR operations, and pixel mixing in the scheme, ensuring the efficacy of the proposed algorithm.
The manuscript is categorized in the sections. In section \(\:2\), we discussed some basic concepts related to commutative non chain ring. In section \(\:3\), construct of proposed encryption scheme by using of unit S-box algebraically and the proposed S-box of an encrypted color image is also presented in this section. In section \(\:4\), contains the results related to efficiency of proposed scheme S-box and comparison with other some S-boxes. Section \(\:5\) contains some test like histogram, NPCR, correlation, UACI analysis, entropy, and randomness test for cipher. Finaly, in section \(\:6\) conclusion of proposed work. In section \(\:6\), Robustness analysis under which we discussed data loss and noise analysis, speckle analysis, and cropping analysis for analyzing the performance of image encryption.
Preliminaries
Here, we will know about basic concepts and terms about commutative rings with unity. In addition, each of these definitions contains a unit commutative ring \(\:A\).
A commutative ring \(\:A\) with unity is called local ring if its non-unit elements generate abelian group under addition. In other words, a local ring \(\:A\) has exactly one maximal ideal \(\:m\). The quotient ring \(\:\frac{A}{m}\) is residue field of the ring \(\:A\). A finite \(\:{\mathbb{Z}}_{{p}^{n}}\) local ring is an integer modulo ring where \(\:p\) and \(\:n\) are prime and positive numbers respectively. A ring is called a chain ring if its left and right ideals form a chain. Also, a ring is a chain ring if and only if it is a principal local ring. If \(\:s\) is an element of ring \(\:A\), then there exist \(\:t\) in \(\:A\) such that \(\:st=e\) where \(\:e\) is the identity of \(\:A\). If \(\:s,\:t\in\:A\), both be non-zero elements of \(\:A\), and \(\:st=0\) then ring \(\:A\) is called zero divisor.
The ring \(\:A=\frac{{\mathbb{F}}_{17}\left[u\right]}{<{u}^{2}-1>}\) is commutative non-chain ring. The ring is finite and its elements of the form \(\:\frac{{\mathbb{F}}_{17}\left[u\right]}{<{u}^{2}-1>}=\left\{a+bu\right|\:{u}^{2}=1\:\&\:a,b\in\:\:{\mathbb{F}}_{17}\}\) and having cardinality \(\:289.\) In \(\:289\) elements, \(\:256\) are unit and \(\:33\) are non-unit elements. The ring has two maximal ideals \(\:<u-1>=\left\{au-a\right|a\in\:\:{\mathbb{F}}_{17}\}\) and \(\:<u+1>=\left\{bu+1\right|b\in\:\:{\mathbb{F}}_{17}\}\). Thus \(\:A\) is local and Frobenius ring. Both ideals are isomorphic to \(\:{\mathbb{F}}_{17}\). The main aim behind of this non chain ring is to construct an S-box. Its unit elements play an important role in constructing a proposed S-box. The elements called non-unit are the multiples of \(\:18\) and other units are of the form \(\:17+16i\), where \(\:1\le\:i\le\:14\). To construct a complex \(\:8\)-bit S-box used all other unit elements that used in image encryption. The fundamental objective of cryptographic algorithms are confusion and diffusion, which our provided ring and scheme achieve more effectively.
Feng et al.28 constructed a robust quadratic polynomial hyperchaotic map called 2D-SQPM and pixel fusion to overcome the flaws in key design and poor chaotic performance. As an easier approach for examining the dynamical system of the Lorenz, Henon developed \(\:2D\) invertible chaotic system, the Henon map29, and the Henon attractor, which illustrates the range and behavior chaos and is depicted in Fig. 1. The mathematical form of Henon map is defined as
Here \(\:a\) and \(\:b\) are parameters used for bifurcation. In this map, contraction does not depend on \(\:x\:\)and \(\:y\). The behaviour of Henon map with parameter and initial condition is shown in Fig. 1.
Proposed RGB image encryption scheme based on non-chain ring
This phase is divided into three main subphases, the first one is construction of proposed S-box over the non-chain ring, the second one is implementation of Chaotic Henon map and last one is encryption by using S-box, XOR operation and Henon map.
S-box construction
In many block ciphers, S-box plays a significant role. The objective of the S-box is to convert large input data into different output sets without altering the data length. When used in an iterative round, the substitution box’s primary goal is to maximize the effectiveness required to obtain statistically private data. Substitution, and Henon map are two main components for this image encryption.
The non-chain ring \(\:A=\frac{{\mathbb{F}}_{17}\left[u\right]}{<{u}^{2}-1>}\) having elements \(\:289\) and the length of a vector is \(\:9\). From \(\:289\), \(\:256\) unit elements are used in substitution. Define a bijective map \(\:\psi\:\::M\to\:GF\left({2}^{8}\right)\) by
Now apply LFT of the form \(\:\varphi\::PGL(2,\:GF({2}^{8}\left)\right)\times\:GF\left({2}^{8}\right)\to\:GF\left({2}^{8}\right)\) by \(\:\varphi\:\left(x\right)=\frac{ax+b}{cx+d}\) where \(\:a,\:b,\:c,\:d\in\:GF\left({2}^{8}\right)\). Finally, the designing of S-box by utilizing map \(\:\psi\:\:and\:\varphi\:\) is displayed in Table 1. Now this S-box is used in substitution process.
Application of 2D Henon map
We use a \(\:2D\) Henon bifurcation mapping to mix pixels in all layers of image through permutation strokes. In this stage, all pixels of an image are mixed with each other without changing its values, as a result we get distorted image. The goal for detecting the perplexity is to decrease the uncertainty between the pixels of the cover data. For this, we use \(\:2\)-dimensional Henon map to increase the security and the level of uncertainty. The map shows chaotic behaviour when \(\:a=1.4\), \(\:b=0.3\), \(\:{x}_{0}=0.07011\) and \(\:{y}_{0}=0.10022\). Figure 1 represent the graph of a given chaotic system.
To get a key, we iterate the given map into 2N times, where \(\:N\) is the size of the image \(\:(256\times\:256\) or \(\:512\times\:512)\). We have generated three keys from two sequences of the two-dimensional Henon map. The first key \(\:{k}_{1\:}\)is the selection of the first \(\:N\) elements in the first sequence, the third key \(\:{k}_{3\:}\)is the selection of the first \(\:N\) elements of the second sequence, and the second key \(\:{k}_{2\:}\)is combination of \(\:\left(N+1\right)th\) element to the \(\frac{{3N}}{2}th\) elements from the first sequence and the second sequence. These three keys have equal sizes of \(\:N\) elements. After getting the required size of a key, we apply the XOR operation to the substituted red channel of the image using the first key \(\:{k}_{1\:}\)to obtain the encrypted red channel. Similarly, we perform the XOR operation on the substituted green and blue channels of the image using the second and third keys \(\:{({k}_{2\:},\:k}_{3})\), respectively, to generate the encrypted green and blue channels.
Inversion of Galois field S-box to non-chain ring S-box
We define an inverse mapping from \(\:GF\left({2}^{8}\right)\) to unit elements of ring \(\:A\). The map is as follows:
After applying the inverse map \(\:{\psi\:}^{-1}\) we obtain an \(\:16\times\:16\:\)lookup table provided in Table 2.
Convert the image \(\:{{\mathcal{H}}_{e}\:}^{{\prime\:}}\) into three layers red (R), green (G), and blue (B). We convert the 9-bit lookup table of the non-chain ring from decimal to binary, labeling it as \(\:X\). Next, we divide \(\:X\) into the first 2048 bits, referred to as \(\:{X}_{1}\), and the last 256 bits, referred to as \(\:{X}_{2}.\) We create copies of the bits until we obtain a total of 2048 bits, and then we perform an XOR operation between \(\:{X}_{1}\) and \(\:{X}_{2}.\)
.
Apply the key \(\:Y\) for the exclusive OR operation to each channel of the image, i.e. \(\:Y\oplus\:R\), \(\:Y\oplus\:G,\) and \(\:Y\oplus\:B.\) Finally, concatenate all the image pixels into a single frame to obtain the encrypted image.
The flowchart of the given proposed encryption scheme is shown in Fig. 2. Figures 3 and 4 shows the cover and encrypted images of Baboon, House, and Peppers of order (\(\:256\times\:256\)) and Baboon and Peppers of order (\(\:512\times\:512\)).
Performance analysis of S-box
To get an efficient S-box it satisfies the cryptography criteria like bijectiveness, nonlinearity (NL), strict avalanche criteria (SAC), linear probability criteria (LP), bit independence criteria (BIC), differential criteria probability (DP) etc. To check the robustness of the newly designed S-box we implement different analyses and compare them with some fundamental S-boxes.
Nonlinearity
Nonlinearity is measured by two functions: Boolean function and direct function. On an even number, the Boolean function takes an input as variable \(\:m\) and achieves maximum nonlinearity of (\(\:{2}^{m-1}-{2}^{\frac{m}{2}-1}\)) called bent function30. On the other hand, at an odd number the value of nonlinearity (\(\:{2}^{m-1}-{2}^{\frac{m-1}{2}}\)) is called bent concatenation bound. The nonlinearity comparison of the designed S-box with other famous S-boxes as shown in Table 3. The given analysis shows that S-boxes of algebraic structure are more effective, and S-boxes based on chaos have a vast interval of randomness. These S-boxes take the place of synthesized S-boxes.
Bit independence criteria
Examining how the efficiency of the output data bits varies once the input data bits are modified is significant. Many methods have been developed to measure this change. Webster and Tavares introduced the bit independence criteria. This criterion tells the height of the dependent change of output data bits when any input data bit is retracted31,32. The proposed S-box satisfies the BIC and attains an optimum value through the implementation of indices of the proposed S-box.
Strict avalanche criteria (SAC)
Feng and Wu33 developed Strict Avalanche Criteria (SAC). This technique explains how output bits of data swapped into input bits. It is mandatory to change the value of single data bit, half of yielded bits must be changed. The change of a single data bit causes an avalanche change in output bit when iteration occurred.
The uncertainty created by encrypted in an image will be high if changing only in input data bit can alters the output data bit with possibility of \(\:0.5\). Implementation of S-box shows that generated S-box satisfies the SAC criteria. The SAC value of designed S-box is very close to the ideal value.
Differential approximation probability (DAP)
To calculate the differential uniformity of proposed S-box the DAP criterion is used34. Which is defined as:
This shows that to verify the even mapping possibility for each \(\:i\), use an exclusive map of input variance \(\:{\varDelta\:a}_{i}\) to output variance \(\:{\varDelta\:b}_{i}\). The average value through DAP of designed S-box is \(\:0.0625\), which is like APA, AES, Gray S-box.
4.2 Linear approximation probability (LAP)
This indicates an occurrence’s peak polarity. The cohesion of yield data bits selected by cover \(\:{\mathcal{H}}_{b}\) is identical to cohesion of input data bits demonstrated by cover \(\:{\mathcal{H}}_{a}\) is defined by Matsui’s35. The value LAP of proposed is calculated as:
Here ‘\(\:X\)’ is the assembly of all possible data and \(\:{2}^{n}\) is the size of ‘\(\:X\)’. So, the average value of LAP of proposed S-box is \(\:0.015625\), which is able to fend against linear attacks. The results of proposed S-box including SAC, nonlinearity, BIC, LAP and DAP with other S-boxes is shown is Table 3.
Security analysis of encrypted image
To check robustness of proposed novel encryption scheme, we take images like baboon, pepper, and house of dimension \(\:256\) and employ encryption tests like histogram, entropy, UACI, NPCR, AD, MSE, PSNR etc.
Histogram analysis
The histogram test is performed on baboon, pepper, and house images and encrypted baboon, pepper, and house images which is shown in Figs. 5, 6 and 7. The histogram of ciphered images are continuously distributed as the pixels of red, green, and blue pixels are equally distributed which shows the usefulness of proposed algorithm.
Key space analysis
Uses of distinct keys for both encryption and decryption are referred key space. As the length of the key space is large, cryptosystem is effective and secure from brute-force attack. In proposed algorithm, firstly, to describe an action of \(\:PGL(2,\:GF({2}^{8}\left)\right)\) and affine function on \(\:Im\left(f\right)=GF\left({2}^{8}\right)\) for this we have \(\:256!\) Choices and they construct \(\:{2}^{32}\) different S-boxes.
Secondly, for scalar functions we have \(\:256\) choices and \(\:{2}^{32}\) different parameters for projection. By combing all these options, we get a large key that prevents brute-force attack. So, we have multiples of alternatives for affine functions and multi scalar functions that gives an edge to produce many S-boxes. In proposed image cryptosystem, the parameters involved for secret key are \(\:a\), and \(\:b\) with two initial conditions \(\:{x}_{0}\) and \(\:{y}_{0}\). The accuracy is \(\:16\) different digits. So, the possible combinations are \(\:{10}^{16}\). The key space size is \(\:{10}^{64}\approx\:\:{2}^{217}\). Hence the total key space is \(\:{2}^{217}\times\:{2}^{32}={2}^{249}\), which is large enough to resist from brute force attack.
Correlation analysis
The correlation analysis is segregate into three clusters: horizontal, vertical, and diagonal. The relation between pixels with its neighbouring pixels is computed through this analysis. During the analysis process, the overall texture of the encrypted data was taking into account. The mathematical form is
Where \(\:{\mu\:}_{i}\), \(\:{\mu\:}_{j}\), \(\:{\sigma\:}_{i}\), and \(\:{\sigma\:}_{j}\) are mean and variance between pixels respectively. The correlation of adjacent pixels of cover image and encrypted image lies in horizontal, vertical, diagonal, and antidiagonal directions respectively as shown in Figs. 8, 9 and 10. The connection between pixels of cover image is linear and pixels of encrypted image are randomly correspondent. The results analysis of baboon, pepper, and house images and encrypted baboon, pepper, and house images is show in Table 4. For good encryption scheme, the correlation result is equal to zero or approaching to this value. The table shows that the correlation value of cover images is approximate to one and correlation value of encrypted data images is almost to zero. Hence results of correlation show good and robust as compared to other schemes presented in36,37.
Entropy
The amount of entropy in an image relates to the way objects are arranged to help humans recognize the image. In cryptosystem the replacement of nonlinearity induced the unpredictability in an image. The extent of uncertainty that comes from encryption is closely associated with the degree to which one may be certain that an image’s integrity can be detected by the human eye. The lack of unpredictability results in identification of ciphered image. So, the degree of entropy can explain important evidence about encryption. The mathematical formula for calculated entropy is:
Here ‘\(\:{x}_{i}\)’ is counts of histogram. The value of entropy analysis is explained in Table 5. The value of entropy analysis of proposed algorithm is \(\:7.9990\), \(\:7.9989\), \(\:7.9989\) for Baboon, House and Peppers respectively which is compared with other algorithms. The experimental values of proposed work is greater than or equal to other published works23,26,40,53, and lower than52. The comparison clearly shows that our approach performs better results than most other mentioned publish work.
NPCR and UACI analysis
For robust cryptosystem, common requirements are that the cover image is entirely hidden within its form of encrypted data image. Two techniques are used: number of pixels change rate (NPCR) and unified average changing intensity (UACI), to estimate the resistance of ciphered image against differential attack.
Two encrypted images are deemed by the NPCR (number of pixels change rate)38 to differ by just one pixel. If one of encrypted image \(\:{C}_{1}(i,j)\) and other one is \(\:{C}_{2}(i,j)\) then NPCR is calculated as
Here ‘\(\:T\)’ represents the total image pixels and \(\:D(i,j)\) is defined as
When the difference between cover image is subtle, the UACI38 (unified average changing intensity) is designed to analyze the number of changing pixels and intensity of arrived at the center of changed capacity among cipher image separately. Mathematical form of UACI is
Where ‘\(\:f\)’ represents maximum pixels value that can be used in encoded image and \(\:D\left(i,j\right)\) is defined as
For the best encryption scheme of images, the NPCR value should be \(\:99\%\) which is considerable and UACI value is close to \(\:33\%\). The analysis results of UACI and NPCR of our encoded image are compared with other proposed work is shown in Table 6.
The given table shows that the UACI and NPCR values of proposed scheme of encrypted image is good. The higher value of NPCR shows that pixels of image are randomized. Also, the fitting value for UACI shows that each height of grey pixel of image are closely changed in encryption scheme. For colored image, the UACI and NPCR values of proposed scheme are good and greater than the other proposed work25,26,39,39,41. Thus, the comparison shows that proposed work has ability of diffusion, which prevents algebraic attack.
Randomness test for Cipher
In a cryptosystem’s consistency of distribution, long period, and highly complicated output are its essential security related properties. For examine a randomness in a digital image we use NIST \(\:SP800-22\) to get a specific goal42. This test includes many subclasses. The discarded digital image of baboon passes NIST test. The encrypted image made by proposed encryption scheme uses of RGB image of dimension \(\:256\times\:256\) which shows in Table 7. Thus, our proposed encryption scheme consists of unitary S-box passing NIST test and these results show good encryption and secured against algebraic attack.
Mean square error (MSE)
In an image processing, mean square error indicates the strength of encoded image. It tells the square difference of cover image and encoded image over a time43. The mathematical form of mean square error is:
Here \(\:\mathcal{H}\left(i,j\right)\) is cover image, \(\:C(i,j)\) is ciphered image and \(\:m,\:n\) are its dimension. The quality of encrypted image is good if the value of MSE is larger. Table 8 shows the optimum value of images in different layers.
Average difference (AD)
The average difference measurement can also be used to calculate the total differences of two images. The larger value of average difference means the difference between images is strong and the similarity between images show lower value of mean difference. The mean difference is also be described as the arithmetic mean of data image and reference signal44. The mathematical form of mean difference is
Where \(\:\mathcal{H}\left(i,j\right)\) is cover image, \(\:C\left(i,j\right)\) is encrypted image and \(\:m\times\:n\) is dimension of images. By this technique, the deviation or rate of variation of two images can be measured easily. Table 8 depicts the optimum value of different images for proposed scheme.
Peak signal to noise ratio (PSNR)
Corrupted noises can impact a signal’s interpretation’s credibility45. PSNR is a method that is used to compare the signal’s strength to power of distorted noises. The logarithmic decibel measurement is used to represent the data because of its extensive variability. To recover ciphered images and evaluate their efficacy we use PSNR. During our investigation, cover image is used as a signal while a noise occurred during deforming into encryption. A higher PSNR is usually employed by a higher preservation. The PSNR (dB) of cover data image \(\:\mathcal{H}\left(i,j\right)\) is defined as
Table 9 shows the value of PSNR for different layers is close to ideal value. These ideal values demonstrate the strength of the proposed scheme.
Structural similarity (SSIM)
Structural similarity indexes are improved based on universal quality marker as stated in38,46. It determines the relation between pair of images. The difference between two identical sized windows of order \(\:n\times\:n\) of both images\(\:\:X\) and \(\:Y\) is calculated as
Where \(\:{\mu\:}_{\mathcal{H}},{\:\mu\:}_{I},{{\:\sigma\:}_{\mathcal{H}}}^{2},{{\:\sigma\:}_{I}}^{2}\) are mean and variance of \(\:\mathcal{H}\) and \(\:I\) and \(\:{\sigma\:}_{\mathcal{H}I}\) are the covariance of \(\:\mathcal{H}\) and \(\:I\). \(\:{c}_{1}={\left({t}_{1}k\right)}^{2}\) and \(\:{c}_{2}={\left({t}_{2}k\right)}^{2}\) are two factors used to stable the division process when term in denominator is small. \(\:k\) is value of pixels and \(\:\left({t}_{1},\:{t}_{2}\right)=(0.01,\:0.03)\) by default. The indices value of SSIM is \(\:-1\) to \(\:1\) and if two images are identical than SSIM takes value \(\:1\). The results depict the SSIM value of encrypted images in red, green, and blue layers is optimum and is shown in Table 9.
Software and hardware configuration
For testing the algorithm’s efficiency and authenticity we have taken three images of Baboon, House, and Pepper of order \(\:256\times\:256\) and \(\:512\times\:512\) that shows robustness of encrypted images by optimum value of entropy, NPCR, PSNR, histogram, SSIM, MSE, AD, and UACI. The main hardware configuration for tests are Intel(R) Core(TM) i5-1035G7 CPU @ 1.20 GHz 1.50 GHz and main software configuration are \(\:64\)-bit Window 10 and MATLAB R\(\:2020\)a.
Robustness analysis
The robustness of our application against noise attacks that could affect transmission channels is demonstrated in this section. Certain kinds of noises can disrupt the algorithm’s decryption process by affecting the security of encrypted images during transmission. Consequently, in order to assure that the decoded images may still be viewed by humans in the event that noise is introduced during transmission, the algorithm needs to be susceptible to noise attacks. In this study, we will illustrate that our proposed scheme can control the noise that creates during the transmission. Here we will investigate noise attacks on encrypted images as well as on their decrypted images.
Salt and pepper noise
Salt and pepper noise is also called spike sound that feels like natural sound that appears during the transmission process47. These are combination of bright and dark spots in pixels of an image and caused by various types of factors like digital conversional error, analog effects, and transmission error. To eliminate these noises various types of techniques are using around bright and darks pixels such as dark frame removal, interpolation, median filtering, and combine mean and median filtering. In Figure 11, shows the encrypted images having a default noise and similarly below images are original plain images that are damaged and also shows that noise affected encrypted image after decryption is also readable.
Speckle noise
Bright or noisy features frequently appear in digital images, which might distract from their visual appearance47 and is caused by constructive and destructive time where the images contain blue and black spots. In Fig. 12, shows the default encrypted noise image and below one is the original plain image that is damaged. After speckle noise the original image is visually readable.
Cropping attack
A small amount of information may be lost during the transfer of digital images over networks as a result of malicious disruption or communication barriers. A cropping analysis is used to test capabilities of different plain image from encrypted images, where some of data is missing. In Fig. 13, shows the cropping analysis of different encrypted and decrypted images which shows that some images data is lost during transmission and reveals that decryption of images is possible in an appropriate way even cipher mages have some data lost.
Conclusion
The proposed algorithm introduces a novel approach known as finite algebraic structure (non-chain ring) and \(\:2D\)-Henon chaotic map. This scheme encrypts any digital information, but we use specifically for image encryption. This algorithm has a high algebraic complexity by using complex algebraic structures to generate secure encrypted images by manipulating confidential data. In block ciphers, a substitution box is a significant component generated by mapping of unit elements to the Galois field \(\:GF\left({2}^{8}\right)\) and applying a linear fractional transformation. The \(\:9\)-bit S-box is used for exclusive operation with permuted pixels. The two-dimensional Hénon map exhibits various features, including randomness and sensitivity to initial conditions. These characteristics make the proposed scheme resistant to brute-force attacks by enhancing the key space. The performance analysis shows that combination of non-chain ring and Henon map refers a reliable encryption performance. The suggested method offers a workable solution to issues with Internet of Things devices and is both lightweight and theoretically possible. The algorithm has a significance importance in real life situations such as banks, state agencies, hospitals that have capability to protect secret information from an unauthorized recipient. The future directions to develop a robust and efficient algorithm for video, and audio encryption.
Data availability
The datasets used and / or analysed during the current study available from the corresponding author on reasonable request.
Change history
06 March 2025
A Correction to this paper has been published: https://doi.org/10.1038/s41598-025-92489-5
References
Yesilyurt, M. & Yalman, Y. New approach for ensuring cloud computing security: Using data hiding methods. Sādhanā 41 (11), 1289–1298 (2016).
Toktas, A., Erkan, U., Gao, S. & Pak, C. A robust bit-level image encryption based on Bessel map. Appl. Math. Comput. 462, 128340 (2024).
Zhou, N. R., Hu, L. L., Huang, Z. W., Wang, M. M. & Luo, G. S. Novel multiple color images encryption and decryption scheme based on a bit-level extension algorithm. Expert Syst. Appl. 238, 122052 (2024).
Hussain, I., Shah, T. & Mahmood, H. A new algorithm to construct secure keys for AES. Int. J. Contemp. Math. Sci. 5 (26), 1263–1270 (2010).
Cui, L. & Cao, Y. A new S-box structure named affine-power-affine. Int. J. Innovative Comput. Inform. Control. 3 (3), 751–759 (2007).
Tran, M. T., Bui, D. K. & Duong, A. D. Gray S-box for advanced encryption standard. In 2008 international conference on computational intelligence and security (Vol. 1, pp. 253–258). IEEE. (2008), December.
Kim*, J. & Phan**, R. C. W. Advanced differential-style cryptanalysis of the NSA’s skipjack block cipher. Cryptologia 33 (3), 246–270 (2009).
Hussain, I., Shah, T., Mahmood, H., Gondal, M. A. & Bhatti, U. Y. Some analysis of S-box based on residue of prime number. Proc. Pak Acad. Sci. 48 (2), 111–115 (2011).
Shah, T., Hussain, I., Gondal, M. A. & Mahmood, H. Statistical analysis of S-box in image encryption applications based on majority logic criterion. Int. J. Phys. Sci. 6 (16), 4110–4127 (2011).
Toktas, F., Erkan, U. & Yetgin, Z. Cross-channel color image encryption through 2D hyperchaotic hybrid map of optimization test functions. Expert Syst. Appl. 249, 123583 (2024).
Kocak, O., Erkan, U., Toktas, A. & Gao, S. PSO-based image encryption scheme using modular integrated logistic exponential map. Expert Syst. Appl. 237, 121452 (2024).
Feng, W. et al. Exploiting newly designed fractional-order 3D Lorenz chaotic system and 2D discrete polynomial hyper-chaotic map for high-performance multi-image encryption. Fractal Fract. 7 (12), 887 (2023).
Feng, W. et al. Image encryption algorithm based on plane-level image filtering and discrete logarithmic transform. Mathematics 10 (15), 2751 (2022).
Wen, H. & Lin, Y. Cryptanalysis of an image encryption algorithm using quantum chaotic map and DNA coding. Expert Syst. Appl. 237, 121514 (2024).
Wen, H. & Lin, Y. Cryptanalyzing an image cipher using multiple chaos and DNA operations. J. King Saud University-Computer Inform. Sci. 35 (7), 101612 (2023).
Feng, W., Qin, Z., Zhang, J. & Ahmad, M. Cryptanalysis and improvement of the image encryption scheme based on Feistel network and dynamic DNA encoding. IEEE Access. 9, 145459–145470 (2021).
Li, H. et al. Exploiting dynamic vector-level operations and a 2D-enhanced logistic modular map for efficient chaotic image encryption. Entropy 25 (8), 1147 (2023).
Yang, J. et al. An efficient and robust zero watermarking algorithm. Multimedia Tools Appl. 81 (14), 20127–20145 (2022).
Xia, Z. et al. A robust zero-watermarking algorithm for lossless copyright protection of medical images. Appl. Intell. 52 (1), 607–621 (2022).
Yang, T. et al. Image analysis by fractional-order weighted spherical Bessel-Fourier moments. Pattern Recogn. 157, 110872 (2025).
He, B., Liu, J., Lin, G., Peng, C. & Xi, W. Quaternion fractional-order weighted generalized Laguerre–fourier moments and moment invariants for color image analysis. Sig. Process. Image Commun. 114, 116941 (2023).
Jamal, S. S., Shah, T. & Attaullah, A. A group action method for construction of strong substitution box. 3D Res. 8, 1–10 (2017).
Shah, T., Jahangir, S. & de Andrade, A. A. Design of new \(\:4\times\:\:4\) S-box from finite commutative chain rings. Comput. Appl. Math. 36, 843–857 (2017).
Shah, T., Haq, T. U. & Farooq, G. Improved SERPENT algorithm: Design to RGB image encryption implementation. IEEE Access. 8, 52609–52621 (2020).
Shah, T., Ali, A., Khan, M., Farooq, G. & de Andrade, A. A. Galois Ring \(\:GR\:({2\:}^{3},\:8)\) Dependent 24× 24 S-Box Design: An RGB Image Encryption Application. Wireless Pers. Commun. 113 (2), 1201–1224 (2020).
Safdar, M. U., Shah, T. & Ali, A. Design of nonlinear component of Block Cipher over Non-chain Semi-local Ring with its application to color image encryption. Arab. J. Sci. Eng., 1–22. (2024).
Hussain, M., Iqbal, N. & Bashir, Z. Image pixels swapping encryption based on the TetraVex game and a publicly hash-sharing algorithm. Cluster Comput., 1–22. (2024).
Feng, W. et al. Exploiting robust quadratic polynomial hyperchaotic map and pixel fusion strategy for efficient image encryption. Expert Syst. Appl. 246, 123190 (2024).
Richter, H. The generalized Henon maps: Examples for higher-dimensional chaos. Int. J. Bifurcat. Chaos. 12 (06), 1371–1384 (2002).
Rothaus, O. S. On bent functions. J. Comb. Theory Ser. A. 20 (3), 300–305 (1976).
Detombe, J. & Tavares, S. On the design of S-boxes. Advances in cryptology: proceedings of CRYPTO_92. Lecture notes in computer science. (1992).
Jahangir, S. & Shah, T. Designing S-boxes triplet over a finite chain ring and its application in RGB image encryption. Multimedia Tools Appl. 79, 26885–26911 (2020).
Feng, D. & Wu, W. Design and Analysis of Block Ciphers (Ruhr University Bochum, 2000).
Biham, E. & Shamir, A. Differential cryptanalysis of DES-like cryptosystems. J. Cryptol. 4, 3–72 (1991).
Matsui, M. Linear cryptanalysis method for DES cipher. In Workshop on the Theory and Application of of Cryptographic Techniques (386–397). Berlin, Heidelberg: Springer Berlin Heidelberg. (1993).
Kumar, M., Mohapatra, R. N., Agarwal, S., Sathish, G. & Raw, S. N. A new RGB image encryption using generalized Vigenére-type table over symmetric group associated with virtual planet domain. Multimedia Tools Appl. 78, 10227–10263 (2019).
Shah, D., Haq & Shah, T. T., Image encryption based on action of projective general linear group on a Galois field GF (2 8). In 2018 International Conference on Applied and Engineering Mathematics (ICAEM) (pp. 38–41). IEEE. (2018), September.
Wu, Y., Noonan, J. P. & Agaian, S. NPCR and UACI randomness tests for image encryption. Cyber journals: multidisciplinary journals in science and technology. J. Sel. Areas Telecommunications (JSAT). 1 (2), 31–38 (2011).
Chai, X., Fu, X., Gan, Z., Lu, Y. & Chen, Y. A color image cryptosystem based on dynamic DNA encryption and chaos. Sig. Process. 155, 44–62 (2019).
Alexan, W., ElBeltagy, M. & Aboshousha, A. Rgb image encryption through cellular automata, s-box and the lorenz system. Symmetry 14 (3), 443 (2022).
Das, A. K., Hajra, S. & Mandal, M. K. RGB image encryption using microcontroller ATMEGA 32. Microsyst. Technol. 27 (2), 409–417 (2021).
Pareschi, F., Rovatti, R. & Setti, G. On statistical tests for randomness included in the NIST SP800-22 test suite and based on the binomial distribution. IEEE Trans. Inf. Forensics Secur. 7 (2), 491–505 (2012).
Eskicioglu, A. M. & Fisher, P. S. Image quality measures and their performance. IEEE Trans. Commun. 43 (12), 2959–2965 (1995).
Wang, Z. & Bovik, A. C. A universal image quality index. IEEE. Signal. Process. Lett. 9 (3), 81–84 (2002).
Huang, C. K. & Nien, H. H. Multi chaotic systems based pixel shuffle for image encryption. Opt. Commun. 282 (11), 2123–2127 (2009).
Wang, Z., Bovik, A. C., Sheikh, H. R. & Simoncelli, E. P. Image quality assessment: From error visibility to structural similarity. IEEE Trans. Image Process. 13 (4), 600–612 (2004).
Jithin, K. C. & Sankar, S. Colour image encryption algorithm combining Arnold map, DNA sequence operation, and a Mandelbrot set. J. Inform. Secur. Appl. 50, 102428 (2020).
Aslam, M. et al. A strong construction of S-box using Mandelbrot set an image encryption scheme. PeerJ Comput. Sci. 8, e892 (2022).
Sani, R. H., Behnia, S. & Akhshani, A. Creation of S-box based on a hierarchy of Julia sets: image encryption approach. Multidimens. Syst. Signal Process., 1–24. (2022).
El-Latif, A. A. A., Abd-El-Atty, B., Belazi, A. & Iliyasu, A. M. Efficient chaos-based substitution-box and its application to image encryption. Electronics 10 (12), 1392 (2021).
Gao, W., Idrees, B., Zafar, S. & Rashid, T. Construction of nonlinear component of block cipher by action of modular group PSL (2, Z) on projective line PL (GF (2 8)). IEEE Access. 8, 136736–136749 (2020).
Trujillo-Toledo, D. A. et al. Real-time RGB Image Encryption for IoT Applications Using Enhanced Sequences from Chaotic maps153111506 (Chaos, Solitons & Fractals, 2021).
Qayyum, T., Shah, T., Hummdi, A. Y., Aljaedi, A. & Bassfar, Z. An Innovative Feasible Approach for multi-media Security Using both Chaotic and Elliptic Curve Structures (IEEE Access, 2024).
Safdar, M. U., Shah, T., Ali, A. & ul Haq, T. Construction of algebraic complex \(\:9\)-bit lookup tables using non-chain-ring and its applications in data security. Integration 94, 102095 (2024).
Safdar, M. U., Shah, T. & Ali, A. Enhancing Image Data Security with Chain and Non-Chain Galois Ring Structures (Mathematics and Computers in Simulation, 2024).
Shah, T., Safdar, M. U., Ali, A. & ul Haq, T. Color image encryption by a non-chain Galois ring extension. Phys. Scr. 98 (12), 125117 (2023).
Acknowledgements
The authors extend their appreciation to the Deanship of Research and Graduate Studies at King Khalid University for funding this work through Large Research Project under grant number RGP2/30/45.
Author information
Authors and Affiliations
Contributions
All authors contributed equally.
Corresponding author
Ethics declarations
Competing interests
The authors declare no competing interests.
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
The original online version of this Article was revised: The original version of this Article contained an error in the name of Salman Mohi Ud Din, which was incorrectly given as two authors: Salman Mohi and Ud Din.
Electronic supplementary material
Below is the link to the electronic supplementary material.
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License, which permits any non-commercial use, sharing, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if you modified the licensed material. You do not have permission under this licence to share adapted material derived from this article or parts of it. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by-nc-nd/4.0/.
About this article
Cite this article
Mohi Ud Din, S., Shah, T., Alblehai, F. et al. A combinatory approach of non-chain ring and henon map for image encryption application. Sci Rep 15, 1781 (2025). https://doi.org/10.1038/s41598-025-85814-5
Received:
Accepted:
Published:
DOI: https://doi.org/10.1038/s41598-025-85814-5
Keywords
This article is cited by
-
Secure gray image sharing framework with adaptive key generation using image digest
Scientific Reports (2025)
-
Integrity verified lightweight ciphering for secure medical image sharing between embedded SoCs
Scientific Reports (2025)
-
A novel 2D MTMHM based key generation for enhanced security in medical image communication
Scientific Reports (2025)