A Novel Image Stream Cipher Based On Dynamic Substitution


  • A. Elsharkawi Software Engineering, Communication Engineering, Al-Azhar University, Cairo, Egypt
  • R. M. El-Sagheer Software Engineering, Communication Engineering, Al-Azhar University, Cairo, Egypt
  • H. Akah Space Communication, National Authority For Remote Sensing And Space Science, Cairo, Egypt
  • H. Taha Space Communication, National Authority For Remote Sensing And Space Science, Cairo, Egypt
Volume: 6 | Issue: 5 | Pages: 1195-1199 | October 2016 | https://doi.org/10.48084/etasr.729


Recently, many chaos-based stream cipher algorithms have been developed. Traditional chaos stream cipher is based on XORing a generated secure random number sequence based on chaotic maps (e.g. logistic map, Bernoulli Map, Tent Map etc.) with the original image to get the encrypted image, This type of stream cipher seems to be vulnerable to chosen plaintext attacks. This paper introduces a new stream cipher algorithm based on dynamic substitution box. The new algorithm uses one substitution box (S-box) and a chaotic shuffling process. Each byte in the plain image vector is substituted using a different S-box to get the cipher image vector. This algorithm is designed to be invulnerable to chosen plaintext attacks. In addition, this algorithm is more secured compared to conventional stream cipher.


chaos, encryption, plain image, stream cipher, substitution box


Download data is not yet available.


C. Paar, Ing. J. Pelzl, Understanding Cryptography, Springer, 2010 DOI: https://doi.org/10.1007/978-3-642-04101-3

B. Schneier, Applied Cryptography, Second Edition, John Wiley & Sons, Inc., 1996

J. Boyar, “Inferring sequences produced by pseudo-random number generators”, J. ACM, Vol. 36, No. 1, pp. 129–141, 1989 DOI: https://doi.org/10.1145/58562.59305

J. Won, H. Kim, “Commun Nonlinear Sci Numer Simulat An image encryption scheme with a pseudorandom permutation based on chaotic maps”, Commun. NONLINEAR Sci. Numer. Simul., Vol. 15, No. 12, pp. 3998-4006, 2010 DOI: https://doi.org/10.1016/j.cnsns.2010.01.041

J. Yen, J.Guo, “A New Chaotic Key-Based Design for Image Encryption and Decryption”, IEEE International Symposium on ISCAS 2000, Geneva, pp. IV-49-IV-52, 2000

A. Kaushik, S. Khanna, M. Barnela, A. Kumar, “Stream Encryption Standard for Digital Images”, International Journal of Computer and Electrical Engineering, Vol. 3, No. 2, pp. 240-243, 2011 DOI: https://doi.org/10.7763/IJCEE.2011.V3.320

W. De, Z. Yuan-Biao, “Image encryption algorithm based on S-boxes substitution and chaos random sequence”, 2009 Int. Conf. Comput. Model. Simulation, ICCMS 2009, pp. 110–113, 2009

X. Wang, Q. Wang, “A novel image encryption algorithm based on dynamic S-boxes constructed by chaos”, Nonlinear Dyn., Vol. 75, No. 3, pp. 567–576, 2013 DOI: https://doi.org/10.1007/s11071-013-1086-2

X. Zhang, Z. Zhao, J. Wang, “Chaotic image encryption based on circular substitution box and key stream buffer”, Signal Process. Image Commun., Vol. 29, No. 8, pp. 902–913, 2014 DOI: https://doi.org/10.1016/j.image.2014.06.012

Y. Zhang, D. Xiao, “Cryptanalysis of S-box-only chaotic image ciphers against chosen plaintext attack”, Nonlinear Dyn., Vol. 72, No. 4, pp. 751–756, 2013 DOI: https://doi.org/10.1007/s11071-013-0750-x

Eduardo Bayro Corrochano, Handbook of Geometric Computing, Springer, 2005

R. Siwatch, V. Kumar, “Image Encryption Based on Inter-Pixel Displacement”, International Journal of Scientific Research Engineering & Technology, Vol. 3, No. 3, pp. 673–676, 2014

R. Mathews, M. Iaeng, A. Goel, M. Iaeng, P. Saxena, V. P. Mishra, “Image Encryption Based on Explosive Inter-pixel Displacement of the RGB Attributes of a PIXEL”, Proceedings of the World Congress on Engineering and Computer Science, Vol. I, pp. 19–22, 2011

B. Aïssa, D. Nadib, R. Mohamedc, “Image Encryption Using Stream Cipher Based on Nonlinear Combination Generator with Enhanced Security”, New Trends Math. Sci., Vol. 1, No. 1, pp. 10–19, 2013


How to Cite

A. Elsharkawi, R. M. El-Sagheer, H. Akah, and H. Taha, “A Novel Image Stream Cipher Based On Dynamic Substitution”, Eng. Technol. Appl. Sci. Res., vol. 6, no. 5, pp. 1195–1199, Oct. 2016.


Abstract Views: 750
PDF Downloads: 308

Metrics Information