Generalized triangle group based S-box construction for secure image encryption

Cyber image security is an important issue in current communication networks, as secret images are often communicated through insecure channels. Most existing image encryption algorithms based on conventional S-box designs and chaotic maps are mostly subject to weak cryptanalysis resistance, poor ef...

Celý popis

Uložené v:
Podrobná bibliografia
Vydané v:Scientific reports Ročník 15; číslo 1; s. 38608 - 20
Hlavní autori: Abbasi, Aqsa Zafar, Rafiq, Ayesha, Jaghdam, Ines Hilali, Maatki, Chemseddine, Hassen, Walid, Alshammari, Badr M.
Médium: Journal Article
Jazyk:English
Vydavateľské údaje: London Nature Publishing Group UK 04.11.2025
Nature Publishing Group
Nature Portfolio
Predmet:
ISSN:2045-2322, 2045-2322
On-line prístup:Získať plný text
Tagy: Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
Popis
Shrnutí:Cyber image security is an important issue in current communication networks, as secret images are often communicated through insecure channels. Most existing image encryption algorithms based on conventional S-box designs and chaotic maps are mostly subject to weak cryptanalysis resistance, poor efficiency, or poor flexibility. In order to overcome such limitations, this paper introduces a new substitution box (S-box) design method based on the parametric action of Generalized Triangle Groups (GTG), represented as . The new scheme employs GTG-based substitution and permutation operations for RGB image encryption. The research process entails: (i) rigorous mathematical parameterization of GTG to design nonlinear and bijective S-boxes, (ii) thorough analysis of their cryptographic attributes, such as nonlinearity, differential uniformity, strict avalanche criterion, and linear/differential attack resistance, and (iii) integration of the S-boxes in an RGB image encryption system. Experimental testing proves that the suggested S-box has excellent nonlinearity 112, well-balanced Strict Avalanche Criterion 0.50, and minimal BIC values, showing very good resistance towards linear attacks, also entropy levels approaching the ideal 8.0, NPCR of more than 99.8%, and UACI of 33.3%, better than a number of state-of-the-art approaches. In comparison to state-of-the-art S-box and image encryption algorithms, the new scheme has larger nonlinearity, enhanced diffusion/confusion characteristics, and greater cryptanalysis resistance with comparable computational efficiency.
Bibliografia:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
content type line 23
ISSN:2045-2322
2045-2322
DOI:10.1038/s41598-025-22558-2