Abstract
Internet is used as the main source of communication throughout the world. However due to public nature of internet data are always exposed to different types of attacks. To address this issue many researchers are working in this area and proposing data encryption techniques. Recently a new substitution box has been proposed for image encryption using many interesting properties like gingerbread-man chaotic map and S8 permutation. But there are certain weaknesses in aforesaid technique which does not provide sufficient security. To resolve the security issue an enhanced version of existing technique is proposed in this paper. Lorenz chaotic map based confusion and diffusion processes in existing technique are employed. Lorenz map is used to remove strong correlation among the plain text image pixels. In diffusion stage a random matrix is generated through lorenz chaotic map and XORed with shuffled image. It the end, existing gingerbread-man chaotic map based S-box is applied to extract the final cipher text image. The proposed enhanced scheme is analysed by statistical analysis, key space analysis, information entropy analysis and differential analysis. In order to ensure the robustness and higher security of proposed scheme, results via Number of Pixel Rate Change (NPRC) and Unified Average Change Intensity (UACI) tests are also validated.
Introduction
Internet is considered as the most cheaper, faster and easier way to share data and information throughout the world. However the insecurity and open nature of Internet, information can be easily accessed, modified and interrupted by eavesdroppers. Multimedia application produced different types of data such as audio, videos, images which used the insecure wireless and wired IP networks for propagation. But both source and destination are not satisfied with from the security of public networks. They reported certain security issues during transmission and processing of multimedia contents. Therefore it is necessary that multimedia contents must be encrypted in such a way that it can not be accessible to anyone except its final destination. Cryptography is a science, through which one can conceal important multimedia information from illegal access and unauthorized person [1, 2]. Since many decades, cryptographic research community is looking for highly secure image encryption schemes [3–5]. In addition to security, researchers are also working to provide such techniques which can efficiently encrypt data in real-time applications.
Multimedia contents such as images, videos and audio are different from normal text and thereforemany traditional encryption algorithm such as Advanced Encryption Standard (AES), Data Encryption Standard (DES) and Rivest, Shamir, & Adleman (RSA) have a very extensive and complex encryption mechanism, which made it unsuitable for encryption of real time multimedia application [6, 7]. Some intrinsic features of images such as high correlation among pixels and high redundancy play a vital role in motivation of researchers to work for development of new image encryption schemes as per their requirements [8]. There exist a close relationship between chaos and cryptography, through which a highly unpredictable signals are generated which can be further deployed in confusion and diffusion process of encryption. To fulfill the requirements of higher security and minimum latency, chaotic random signals are generated from chaotic maps and has been deployed in many image encryption schemes [9, 10].
There are many inherit properties of chaotic maps such as pseudo-randomness, sensitivity of control parameters and sensitive initial conditions [11–18]. These properties attract many researchers to deploy chaotic maps in image encryption area [19, 20]. In 1989, Mathew et al. [21] were first cryptographers who used the application of chaotic maps in field of cryptography. In [21], authors suggested chaotic map as a replacement of one time pad. Alvarez et al. and Jakimoski et al. verified that chaotic maps are strongly dependent on initial conditions and proved that chaotic cryptosystem can resist statistical and differential attacks [22]. In 2007, Behnis et al. used the application of chaos in the image encryption [23]. A highly secure image encryption scheme was designed via utilizing piece-wise nonlinear chaotic map (PWLCM) [23]. Gao et al. introduced the concept of hyper chaos for image encryption applications [24]. [25], Rhouma et al. found security weakness in Gao et scheme and an enhanced version was presented. Three Dimensional (3-D) baker based image encryption scheme with dynamic compound chaotic sequence was proposed in [26]. Mazloom et al. [27], utilized coupled Nonlinear Chaotic Algorithm (NCA) for color image encryption. In 2010, Yoon et al. introduced the concept of large pseudo-random permutation based image encryption scheme [28]. In the same year Wang et al. propose a novel image encryption scheme based on perceptron model within a neural network [29]. In [30], Hongjun et al. designed a stream-cipher algorithm based on one-time keys and robust chaotic maps, in order to get high security and improve the dynamical degradation by utilizing the piecewise linear chaotic map as the generator of a pseudo-random key stream sequence. In 2011 Hongjun et al. proposes a bit-level permutation and high-dimension chaotic map to encrypt color image [31]. Conversion of 2 - D images into 1 - D using raster and zigzag scanning pattern followed by sub blocks division was proposed in [32]. Zhu et al. presented a modified hyper-chaotic sequences for image encryption applications [33]. In the first stage of Zhu’s scheme, chaotic key stream was generated via hyper-chaotic sequences. In second phase, Zhu et al. uses chaotic key stream and plaintext image to generate high level key and plaintext sensitivity [33]. Zhang et al. encrypted the plaintext image using linear hyperbolic chaotic system based on partial differential equations [16]. To remove high correlation in images, Amir et al. [34] introduced the idea of multiple S-Boxes. However, Jawad et al. found that Amir’s scheme completely fails for highly autocorrelated data i.e., binary images [35]. Jawad et al. enhanced Amir’s scheme via adding XORed diffusion to the existing scheme. In [36], Rehman et al. proposed a new image encryption schemes by using the concept of dynamic S-Boxes. 2 - D Burger chaotic map was employed to shuffle the plaintext image row-wise and column-wise, respectively. In the final stage, shuffled image was divided in blocks and Logistic chaotic map was used to substitute each block of shuffled image with distinct block. Recently, Khan et al. [37] proposed a novel S-Box based image encryption via Gingerbreadman chaotic map and S8 permutation. In this paper, we have reported the security weakness of Khan’s [37] encryption scheme.
In bijective S-Box, each element must be mapped with a unique symbol. In this context, let us consider message symbols M0, M1... M255 that maps to S0, S1... S255 as shown in Figure 2. It can be seen from Fig. 2 similar data symbols are replaced with only single S-Box element. Therefore, in case of a correlated image, the histogram peaks remain constant when single S-Box is deployed in substitution. In [34], Amir et al. found that single S-Box cannot conceal information in a good way and hence they proposed the concept of multiple S-Boxes. In [34], Logistic chaotic map is used as decision maker for symbol selection. However, Jawad et al. [35], highlighted some drawbacks in Amir’s scheme and concluded that Amir’s scheme is not fit for correlated images. In Khan’s proposed scheme [37] a single S-Box was applied for image encryption. The concept of single S-Box can work for color and some gray-scale images but it does not work for highly correlated images i.e., binary images. Issue for binary image is highlighted in Fig. 1. From Fig. 1, it is very straight forward that Khan’s scheme is not secure even by visual inspection and hence an improvement in Khan’s scheme is required.

Encryption results of Khan’s scheme.

Bijective mapping nature of S-box.
As aforementioned that Khan’s scheme cannot work well for binary images and eavesdroppers can apply various attacks on encrypted images. Firstly, we have explained in very detail about the problems may cause by Khan’s scheme. An improved scheme is then presented and analysed against various security tests.
The rest of article is organized as follows: Section 2 describes the proposed scheme. Security analysis and comparison with the existing schemes is illustrated in Section 3. Finally, the research work is concluded in Section 4.
It has been found that Khan’s scheme cannot encrypt the image information in an effective way, therefore any attacker can easily extract actual information from the ciphertext image. Chaotic confusion and diffusion can be a good solution to the aforementioned problems which can make the scheme more robust and complex.
Flowchart of the proposed modified image encryption scheme is shown in Fig. 3. As explained in [38], Lorenz equations are highly chaotic for a specific range of initial conditions therefore we selected Lorenz equation as a pseudo-random chaotic number generator for confusion and diffusion processes. Mathematical representation of Lorenz equation is shown by Equations 1, 2 and 3.

Flow chart of the proposed scheme.
In above equation t demonstrate time, a, b and c are constant while x, y, and z represent the state of the Lorenz system. Steps involved in the proposed scheme are explained briefly.
For decryption purpose, apply all the steps in reverse order to get the plaintext image P from ciphertext image C.
Experimental results of the proposed scheme for color, gray and binary pepper images are shown in Fig. 4. To show robustness and effectiveness of the designed scheme, the proposed image encryption scheme is tested via entropy, histogram, correlation, Mean Square Error (MSE), energy, contrast, homogeneity, Peak Signal to Noise Ratio (PSNR), key sensitivity test and encryption qualityanalysis.

Encryption results of the proposed scheme.
In image encryption scenario, entropy is an important parameter used for the computation of randomness in an encrypted image [39]. We assume an image encryption algorithm which deals with 28 symbols. In such case, the ideal value of entropy must be 8 bits. For a secure image encryption algorithm, the entropy value should be close to the ideal value. If the entropy value is closer to ideal value, the scheme is resistant against entropy attacks. Entropy is calculated as:
For a quick visual analysis, histogram test is an easy method. Histogram analysis shows the number of pixel distribution in an image [40–42]. A flat histogram for the ciphertext image indicates uniform pixels distribution. The histogram plots of all schemes are shown in Fig. 5. From histogram plots, it is evident that the proposed scheme has flat histogram in all cases. For colour and gray scale images, the proposed and Jawad’s scheme has almost similar histograms. However, in case of binary image, the proposed scheme is consistent to flat histogram while Jawad’ scheme losses consistency. [37].

Correlation coefficients is the method to measure similarity between two variables or images [43]. To carry out correlation analysis, one thousand pairs of neighbouring pixels of plaintext image and its corresponding ciphertext image are selected in three directions, i.e., vertical, horizontal and diagonal directions. Mathematically, correlation coefficient is calculated as:
Cov (g, h) is covariance at the adjacent pixels values g and h of plaintext and ciphertext image, respectively. Correlation coefficients for plaintext and ciphertext images are shown from Table 2 to Table 6. One can see from these tables that the ciphertext images have less correlation values. From each table, it is evident that the proposed scheme has lower correlation coefficient than Amir’s scheme [34], Jawad’s scheme [35] and Khan’s scheme [37].
MSE computes average squared difference between the plaintext image and encrypted image. Higher value of MSE reveals that the encryption scheme can strongly resist many attacks. The formula for MSE can be written as [44]:
Energy of an image illustrates the information of plaintext image in terms of the sum of squared values. Energy can be written as:
Intensity differences between a pixel and its neighbour pixels is calculated via contrast parameters. Contrast can be given as:
where, X (g, h) is the number of gray level co-occurrence matrices. The contrast values in Table 9 shows that the proposed scheme has considerably higher contrast values as compared to others schemes. Thus, these greater values of contrast shows higher security of the proposed scheme.
The homogeneity analysis returns the closeness of the distribution in the Gray Level Co-occurrence Matrix (GLCM). The GLCM measures the combinations of pixels brightness values in a tabular form. Mathematically, homogeneity can be determined as:
Two different tests are carried out for key analysis. One is key space analysis and other is key sensitivity test. Key space analysis of an encryption is checked so that the feasibility of brute force attack is checked [45]. As specified by IEEE standard format that minimum key space must be 2100 [46]. The available key space for Khan’s scheme [37] and the proposed scheme can be computed as:
The key sensitivity test can be applied by making a small change to the initial conditions. Let CK1 represent the ciphertext image with an initial condition ψ and CK2 represent the ciphertext image with initial condition ψ + 10-15. This test is applied on gray scale image only. The resultant difference images are shown in Fig. 6. It is evident that Khan’s scheme completely fails with slight change in initial conditions.

Key sensitivity analysis.
Encryption quality analysis judges an image encryption scheme in terms of pixel deviation of plaintext image from encrypted image. Two parameters are used to compute encryption quality i.e., Maximum Deviation (M
D
) and Irregular Deviation (I . D). Mathematically M
D
and I
D
can be calculated as:
Two most common measures, NPCR and UACI are used to check the possibility of differential attacks. Detail mathematical description of NPCR and UACI can be found in [35, 39]. As outlined in [35, 39], higher the values of NPCR/UACI, higher the security level is. Tables 13 and 14 are obtained after NPCR and UACI randomness tests which highlights that the proposed scheme is more secure against differential attack.
Contrast analysis computes the intensity differences between a pixel and its neighbour over the whole image [4, 5]. Higher value of contrast reflects that image encryption scheme is good. Contrast parameter can be written as:
Let us consider that hash value of original plaintext P is HashP1. A single bit change in the original plaintext P will generate totally different hash value i.e., HashP2. Due to the fact that HashP1 ≠ HashP2, values x, y and z are different. The ciphertexts C1 and C2 are different which proves that theproposed scheme is resistant against chosen plaintextattack.
Time analysis
The proposed and existing schemes are tested on MATLAB 2012b and the results are shown in Table 16. One can conclude from Table 16 that the proposed scheme has slighter greater time than [34, 35] and [37]. It’s due to the fact that Amir’s and Khan’s scheme only consist of substitution and Jawad’s scheme just added bitwise XOR to Amir’s scheme. In the proposed scheme we added row and column wise confusion and bitwise XOR operation. Such row and column permutation and XOR operation are time consuming parts of algorithm.
In this paper, we enhanced the existing Gingerbreadman chaotic map and S8 permutation based image encryption scheme. Firstly, we identified some shortcomings in existing image encryption scheme and then proposed a solution. In our enhanced solution, we employed chaotic confusion and diffusion technique in already existing scheme. The proposed scheme broke the strong correlation among pixels, whereas the Lorenz equations shuffled the plaintext image in row-wise and column-wise, respectively. In our first stage i.e., diffusion stage, a bitwise XORed operation is used to diffused and shuffle the image, which is followed by the existing substitution scheme. The results of our proposed and enhance image encryption scheme is verified through various experiements and tests such as entropy, histogram, correlation, mean square error, peak signal to noise ratio, energy, contrast, homogeneity, key space, key sensitivity, NPCR and UACI. The experimental results are compared with existing Gingerbreadman chaotic map scheme and two other traditional schemes, extensively used for image encryption. The comparative analysis of our proposed/enhance scheme with existing schemes reveals that the proposed/enhanced image encryption scheme is more efficient, robust and highly resistant/secure against many attacks as compared to existing schemes.
Conflict of interest
There is no conflict of interest.
