A Novel Technique for the Generation and Application of Substitution Boxes (s-box) for the Image Encryption


  • S. Bukhari Electronics Department, The Islamia University of Bahawalpur
  • A. Yousaf The Islamia University of Bahawalpur
  • S. Niazi The Islamia University of Bahawalpur, Bahawalpur,
  • M. R. Anjum The Islamia University of Bahawalpur, Bahawalpur


The increasing applications of image processing have shifted the focus to the security of images during their transmission. In this work, the main focus is on the security of gray scale images against cryptanalysis attacks. A new model for encryption algorithm of the grayscale image is presented through substitution boxes (s-box). The proposed technique contained two parts; in the first part six different substitution boxes are generated from Galois field and linear fractional transformations. In the second part, the generated substitution boxes are used for the encryption process of message image. For the estimation of the strength of the proposed technique for nonlinearity and strict avalanche criteria, statistical tests and histogram analysis are performed on the substitution boxes and on the encrypted images respectively to check its resistance. The proposed algorithm is more robust as compared to other encryption techniques against attacks in insecure transmission paths.

Author Biographies

S. Bukhari, Electronics Department, The Islamia University of Bahawalpur

I am a Master student in Electronics Department in Islamia University of Bahawalpur and my research interest is cryptography.

A. Yousaf, The Islamia University of Bahawalpur

Department of Mathematics

S. Niazi, The Islamia University of Bahawalpur, Bahawalpur,

1Department of Electronic Engineering, University College of Engineering & Technology

M. R. Anjum, The Islamia University of Bahawalpur, Bahawalpur

Department of Electronic Engineering, University College of Engineering & Technology,


⦠Q. Jiang, W. Zeng, W. Ou and R. Xu, "A scrambling and encryption algorithm for selective block of identification photo", IEEE 8th International Conference on Wireless Communications & Signal Processing, WCSP, Yangzhou, China, pp. 1-5, October 13-15, 2016,

⦠J. Mondal and D. Swain, A Contemplator on Topical Image Encryption Measures: In Security Breaches and Threat Prevention in the Internet of Things, India: IGI Global, pp. 189-212, 2017.

⦠L. Bao and Y. Zhou, “Image encryption: generating visually meaningful encrypted imagesâ€, Information Sciences, vol. 324, pp. 197-207, December 2015.

⦠N.K. Pareek and V. Patidar, "Medical image protection using genetic algorithm operations", Soft Computing, vol. 20, pp.763-772, February 2016.

⦠R. Enayatifar, A.H. Abdullah, I.F. Isnin, A. Altameem and M. Lee, "Image encryption using a synchronous permutation-diffusion technique", Optics and Lasers in Engineering, vol. 90, pp.146-154, March 2017.

⦠L. Teng, X. Wang and J. Meng, "A chaotic color image encryption using integrated bit-level permutation", Multimedia Tools and Applications, vol. 24, pp. 1-14, March 2018.

⦠L. Xu, Z. Li, J. Li, and W. Hua, "A novel bit-level image encryption algorithm based on chaotic maps", Optics and Lasers in Engineering, vol. 78, pp. 17-25, March 2016.

⦠X. Zhang, and X. Wang, "Multiple-image encryption algorithm based on mixed image element and permutation", Optics and Lasers in Engineering, vol. 92, pp. 6-16, May 2017.

⦠Y. Tian, and Z. Lu, "Novel permutation-diffusion image encryption algorithm with chaotic dynamic S-box and DNA sequence operation", AIP Advances, vol. 7, pp. 085008, August 2017.

⦠S.M. Pan, R.H. Wen, Z.H. Zhou and N.R. Zhou, "Optical multi-image encryption scheme based on discrete cosine transform and nonlinear fractional Mellin transform", Multimedia Tools and Applications ,

vol. 76, pp. 2933-2953, January 2017.

⦠Z. Liu, M. Gong, Y. Dou, F. Liu, S. Lin, M.A. Ahmad, J. Dai, and

S. Liu, "Double image encryption by using Arnold transform and discrete fractional angular transform", Optics and Lasers in Engineering, vol.50, pp. 248-255, February 2012.

⦠G.C. Wu, D. Baleanu, and Z.X. Lin, "Image encryption technique based on fractional chaotic time series", Journal of Vibration and Control, vol. 22, pp. 2092-2099, March 2016.

⦠W. Yuan, X. Yang, W. Guo, and W. Hu, "A double-domain image encryption using hyper chaos", IEEE 19th International Conference on Transparent Optical Networks, ICTON, 2017, Gerona, Spain, pp. 1-4, July 2-6, 2017,.

⦠S. Bukhari, M. S. Arif, M. R. Anjum, and S. Dilbar, "Enhancing security of images by Steganography and Cryptography techniques", IEEE Sixth international Conference on Innovative Computing Technology, INTECH, Dublin, Ireland, pp. 531-534, August 24-26, 2016.

⦠T. Cipresso and M. Stamp, “Software reverse engineeringâ€: Handbook of Information and Communication Security, 2nd ed., Berlin Heidelberg: Springer, pp. 659-696, 2010.

⦠C. Paar and J. Pelzl, “Understanding cryptography: A textbook for students and practitioners, Germany: Springer Science & Business Media, pp. 30-40, 2009.

⦠A. Biryukov, L. Perrin and A. Udovenko, "Reverse-engineering the

S-box of Streebog, Kuznyechik and STRIBOBr", Advaces in cryptology eurocrypt: 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2nd ed.,

vol. 003, M. Fichlin and S.J. Coron, Ed. Austria: Springer,

pp. 372-402, 2016.

⦠M.N.A. Wahid, A. Ali, B. Esparham and M. Marwan, “A Comparison of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish for Guessing Attacks Preventionâ€, Journal Computer Science Applications and Information Technology, vol. 3, pp. 1-7, August 2018.

⦠G. Liu, W. Yang, W. Liu and Y. Dai, "Designing S-boxes based on

-D four-wing autonomous chaotic system", Nonlinear Dynamics, vol. 4, pp. 1867-1877, December 2015.

⦠M. Sarfraz, I. Hussain and F. Ali, "Construction of S-Box Based on Mobius Transformation and Increasing its Confusion Creating Ability through Invertible Function", Int. J. of Computer Science and Information Security, vol. 14, pp. 187, February 2016.

⦠A.H. Alkhaldi, I. Hussain and M.A. Gondal, "A novel design for the construction of safe S-boxes based on TDERC sequence", Alexandria Engineering Journal, vol. 54, pp. 65-69, March 2015.

⦠N.R. Zhou, T.X. Hua, L.H. Gong, D.J. Pei and Q.H. Liao, "Quantum image encryption based on generalized Arnold transform and double random-phase encoding", Quantum Information Processing, vol. 14, pp. 1193-1213, April 2015.

⦠M. Juhani and O. Saarinen, "Cryptographic analysis of all 4×4-bit

s-boxes", International Workshop on Selected Areas in Cryptography, Berlin Heidelberg, Springer, vol. 7118, pp. 118-133, August 2011.

⦠N.A. Azam, "A Novel Fuzzy Encryption Technique Based on Multiple Right Translated AES Gray S-Boxes and Phase Embedding", Security and Communication Networks, vol.2017, pp-1-9, January 2017.

⦠S. Farwa, N. Muhammad, T. Shah and S. Ahmad, “A novel image encryption based on algebraic S-box and Arnold transformâ€, 3D Research, vol.8(3), pp.26, September 2017.

⦠X. Zhang, Z. Zhao and J. Wang, "Chaotic image encryption based on circular substitution box and key stream buffer", Signal Processing: Image Communication, vol. 29, pp. 902-913, September 2014.

⦠V.M.S. Garcia, R.F. Carapia, C.R. Marquez, B.L. Benoso and M.A. Perez, "Substitution box generation using Chaos: An image encryption application", Applied Mathematics and Computation, vol. 332,

pp. 123-135, September 2018.

⦠I. Hussain, T. Shah, H. Mahmood and M.A. Gondal, "Construction of S 8 Liu J S-boxes and their applications", Computers & Mathematics with Applications, vol. 64, pp. 2450-2458, October 2012.

⦠F.A. Khan, J. Ahmed, J.S. Khan, J. Ahmad and M.A. Khan, "A novel substitution box for encryption based on Lorenz equations", IEEE International Conference on Circuits, System and Simulation, pp. 32-36, July 14, 2017, London, UK.

⦠W. Wen, Y. Zhang, Y. Fang, and Z. Fang “Image salient regions encryption for generating visually meaningful cipher text imageâ€, Neural Computing and Applications, vol.29 (3), pp. 653-663, February 2018.

⦠C.J. Benvenuto, “Galois Field in Cryptographyâ€, University of Washington, pp. 56, 2012.

⦠C. Adams, and S. Tavares, "The structured design of cryptographically good S-boxes", Journal of Cryptology, vol. 3, pp. 27-41, January 1990.

⦠O. Kazymyrov, V. Kazymyrova and R. Oliynykov, "A Method for Generation of High-Nonlinear S-Boxes Based on Gradient Descent", IACR Cryptology ePrint Archive , vol.23, pp. 578, June 2013.


⦠R. Forre, "The strict avalanche criterion: spectral properties of Boolean functions and an extended definition", Lecture notes in computer science: Advances in cryptology, Ed. 1, vol. 403, New York, Springer-Verlag, pp. 450-468, 1990.

⦠S.A.K.E. Hafiz, A.G. Radwan, S.H.A. Haleem and M.L. Barakat, "A fractal-based image encryption system", IET Image Processing,

vol. 8, pp. 742-752, December 2014.

⦠S. Som, and S. Sen, “A non-adaptive partial encryption of grayscale images based on chaosâ€. Procedia Technology, vol. 10, pp. 663-671, December 2013.




How to Cite

S. Bukhari, A. Yousaf, S. Niazi, and M. R. Anjum, “A Novel Technique for the Generation and Application of Substitution Boxes (s-box) for the Image Encryption”, The Nucleus, vol. 55, no. 4, pp. 219–225, Apr. 2019.