This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
A Hybrid Encryption using Advanced Encryption Standard and Arnold Scrambling for 3D Color Images
Corresponding Author(s) : Erna Zuni Astuti
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control,
Vol. 10, No. 1, February 2025
Abstract
Digital security ensuring the confidentiality and integrity of visual data remains a paramount challenge. The escalating sophistication of cyber threats necessitates robust encryption methods to safeguard sensitive information from unauthorized access and manipulation. Despite the development of various encryption techniques, inherent vulnerabilities exist within conventional methods that can be exploited by attackers. Therefore, this research aims to investigate the effectiveness of the combined approach of Arnold Scrambling and Advanced Encryption Standard (AES) in mitigating these vulnerabilities and providing a more secure solution. The primary goal of this research is to enhance the security of digital images by mitigating vulnerabilities associated with conventional encryption methods. Arnold Scrambling introduces chaotic mapping to disperse pixel values, while Advanced Encryption Standard (AES) provides robust cryptographic strength through its substitution-permutation network. By combining these methods in an ensemble fashion, the encryption process achieves heightened resilience against various cryptographic attacks. The proposed methodology was evaluated by using standard metrics including Unified Average Changing Intensity (UACI), Number of Pixels Change Rate (NPCR), and entropy analysis. Results indicate consistent performance across multiple test images, namely: Lena, Mandrill, Cameraman, and Plane with Unified Average Changing Intensity (UACI) averaging 33.6% and Number of Pixels Change Rate (NPCR) nearing 99.8%. Entropy values approached maximum, affirming the efficacy of the encryption in generating highly randomized outputs.
Keywords
Download Citation
Endnote/Zotero/Mendeley (RIS)BibTeX
- F. Varghese and P. Sasikala, “A Detailed Review Based on Secure Data Transmission Using Cryptography and Steganography,” Apr. 01, 2023, Springer. https://doi.org/10.1007/s11277-023-10183-z
- A. Jan, S. A. Parah, M. Hussan, and B. A. Malik, “Double layer security using crypto-stego techniques: a comprehensive review,” Jan. 01, 2022, Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/s12553-021-00602-1
- M. S. Taha, M. S. Mohd Rahim, S. A. Lafta, M. M. Hashim, and H. M. Alzuabidi, “Combination of Steganography and Cryptography: A short Survey,” in IOP Conference Series: Materials Science and Engineering, Institute of Physics Publishing, Jun. 2019. https://doi.org/10.1088/1757-899X/518/5/052003
- V. Sathananthavathi, K. Ganesh Kumar, and M. Sathish Kumar, “Secure visual communication with advanced cryptographic and ımage processing techniques,” Multimed Tools Appl, 2023. https://doi.org/10.1007/s11042-023-17224-6
- W. Alexan, N. Alexan, and M. Gabr, “Multiple-Layer Image Encryption Utilizing Fractional-Order Chen Hyperchaotic Map and Cryptographically Secure PRNGs,” Fractal and Fractional, vol. 7, no. 4, Apr. 2023. https://doi.org/10.3390/fractalfract7040287
- W. S. Sari, E. H. Rachmawanto, D. R. I. M. Setiadi, and C. A. Sari, “A Good Performance OTP encryption image based on DCT-DWT steganography,” Telkomnika (Telecommunication Computing Electronics and Control), vol. 15, no. 4, pp. 1987–1995, Dec. 2017. https://doi.org/10.12928/TELKOMNIKA.v15i4.5883
- C. A. Sari, M. H. Dzaki, E. H. Rachmawanto, R. R. Ali, and M. Doheir, “High PSNR Using Fibonacci Sequences in Classical Cryptography and Steganography Using LSB,” International Journal of Intelligent Engineering and Systems, vol. 16, no. 4, pp. 568–580, 2023. https://doi.org/10.22266/ijies2023.0831.46
- D. R. I. M. Setiadi, E. H. Rachmawanto, and R. Zulfiningrum, “Medical Image Cryptosystem using Dynamic Josephus Sequence and Chaotic-hash Scrambling,” Journal of King Saud University - Computer and Information Sciences, vol. 34, no. 9, pp. 6818–6828, Oct. 2022. https://doi.org/10.1016/j.jksuci.2022.04.002
- E. A. Sofyan, C. A. Sari, H. Rachmawanto, and R. D. Cahyo, “High-Quality Evaluation for Invisible Watermarking Based on Discrete Cosine Transform (DCT) and Singular Value Decomposition (SVD),” Advance Sustainable Science, Engineering and Technology (ASSET), vol. 6, no. 1, 2024. https://doi.org/10.26877/asset.v6i1.17186
- G. Ardiansyah, C. A. Sari, D. R. I. M. Setiadi, and E. H. Rachmawanto, “Hybrid method using 3-DES, DWT and LSB for secure image steganography algorithm,” in 2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE), 2017, pp. 249–254. https://doi.org/10.1109/ICITISEE.2017.8285505
- M. Rohini, M. A. Srikanth, M. Prajwal, P. R. Kumar, M. Basavaraj, and M. U. Vinay, “Advanced Data Security Using Modulo Operator and LSB Method,” Journal of Scholastic Engineering Science and Management, vol. 2023, no. 5, pp. 26–37, 2023. https://doi.org/10.5281/zenodo.7890771ï
- A. Mozo, A. Karamchandani, L. de la Cal, S. Gómez-Canaval, A. Pastor, and L. Gifre, “A Machine-Learning-Based Cyberattack Detector for a Cloud-Based SDN Controller,” Applied Sciences (Switzerland), vol. 13, no. 8, Apr. 2023. https://doi.org/10.3390/app13084914
- E. J. G, H. M. A, and F. H. M. S, “Enhanced Security: Implementation of Hybrid Image Steganography Technique using Low-Contrast LSB and AES-CBC Cryptography,” International Journal of Advanced Computer Science and Applications, vol. 13, no. 8, p. 2022, 2022. https://doi.org/10.14569/IJACSA.2022.01308104
- J. Shankar and C. Nandini, “Hybrid Hyper Chaotic Map with LSB for Image Encryption and Decryption,” Scalable Computing: Practice and Experience, vol. 23, no. 4, pp. 181–192, Dec. 2022. https://doi.org/10.12694/scpe.v23i4.2018
- H. Liu, B. Zhao, and L. Huang, “Quantum image encryption scheme using Arnold transform and S-box scrambling,” Entropy, vol. 21, no. 4, Apr. 2019. https://doi.org/10.3390/e21040343
- P. Bagane and S. Kotrappa, “Enriching aes through the key generation from genetic algorithm,” Indian Journal of Computer Science and Engineering, vol. 12, no. 4, pp. 955–963, Jul. 2021. https://doi.org/10.21817/indjcse/2021/v12i4/211204141
- S. Srisakthi and A. P. Shanthi, “Towards the Design of a Stronger AES: AES with Key Dependent Shift Rows (KDSR),” Wirel Pers Commun, vol. 114, no. 4, pp. 3003–3015, Oct. 2020. https://doi.org/10.1007/s11277-020-07514-9
- W. Alexan, A. Hamza, and H. Medhat, “An AES Double–Layer Based Message Security Scheme,” in 2019 International Conference on Innovative Trends in Computer Engineering (ITCE), IEEE, Feb. 2019, pp. 86–91. https://doi.org/10.1109/ITCE.2019.8646461
- K. N. Madhusudhan and P. Sakthivel, “A secure medical image transmission algorithm based on binary bits and Arnold map,” May 01, 2021, Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/s12652-020-02028-5
- F. Masood et al., “A novel image encryption scheme based on Arnold cat map, Newton-Leipnik system and Logistic Gaussian map,” Multimed Tools Appl, vol. 81, no. 21, pp. 30931–30959, Sep. 2022. https://doi.org/10.1007/s11042-022-12844-w
- D. E. Supriyo, N. Bhanja, S. K. Dhara, S. Paul, and S. Das, “Color image encryption scheme based on key dependent s-box and arnold’s cat map,” International Journal of Engineering Research and Technology (IJERT), 2021.
- D. Vamsi and R. Ch, “Color Image Encryption Based on Arnold Cat Map-Elliptic Curve Key and A Hill Cipher,” J Theor Appl Inf Technol, vol. 15, no. 9, 2024.
- S. Sabir and V. Guleria, “Multi-layer color image encryption using random matrix affine cipher, RP2DFrHT and 2D Arnold map,” Multimed Tools Appl, vol. 80, no. 18, pp. 27829–27853, Jul. 2021. https://doi.org/10.1007/s11042-021-11003-x
- H. Liu, B. Zhao, and L. Huang, “Quantum image encryption scheme using Arnold transform and S-box scrambling,” Entropy, vol. 21, no. 4, p. 343, 2019. https://doi.org/10.3390/e21040343
- K. M. Hosny, S. T. Kamal, and M. M. Darwish, “A color image encryption technique using block scrambling and chaos,” Multimed Tools Appl, vol. 81, no. 1, pp. 505–525, 2022. https://doi.org/10.1007/s11042-021-11384-z
- K. Kumar, S. Roy, U. Rawat, and S. Malhotra, “IEHC: An efficient image encryption technique using hybrid chaotic map,” Chaos Solitons Fractals, vol. 158, p. 111994, 2022. https://doi.org/10.1016/j.chaos.2022.111994
- H. Tora, E. Gokcay, M. Turan, and M. Buker, “A generalized Arnold’s Cat Map transformation for image scrambling,” Multimed Tools Appl, vol. 81, no. 22, pp. 31349–31362, 2022. https://doi.org/10.1007/s11042-022-11985-2
- M. N. Alenezi, H. Alabdulrazzaq, H. M. Alhatlani, and F. A. Alobaid, “On the performance of AES algorithm variants,” International Journal of Information and Computer Security, vol. 23, no. 3, pp. 322–337, 2024. https://doi.org/10.1504/IJICS.2024.138494
- V. Kolate and R. B. Joshi, “An information security using DNA cryptography along with AES algorithm,” Turkish Journal of Computer and Mathematics Education, vol. 12, no. 1S, pp. 183–192, 2021.
- R. H. Prayitno, S. A. Sudiro, S. Madenda, and S. Harmanto, “A modified MixColumn-InversMixColumn in AES algorithm suitable for hardware implementation using FPGA device,” Communications in Science and Technology, vol. 8, no. 2, pp. 198–207, 2023. https://doi.org/10.21924/cst.8.2.2023.1257
- M. Bedoui, H. Mestiri, B. Bouallegue, B. Hamdi, and M. Machhout, “An improvement of both security and reliability for AES implementations,” Journal of King Saud University-Computer and Information Sciences, vol. 34, no. 10, pp. 9844–9851, 2022. https://doi.org/10.1016/j.jksuci.2021.12.012
- Y. Pourasad, R. Ranjbarzadeh, and A. Mardani, “A new algorithm for digital image encryption based on chaos theory,” Entropy, vol. 23, no. 3, p. 341, 2021. https://doi.org/10.3390/e23030341
- F. Naz, I. A. Shoukat, R. Ashraf, U. Iqbal, and A. Rauf, “An ASCII based effective and multi-operation image encryption method,” Multimed Tools Appl, vol. 79, pp. 22107–22129, 2020. https://doi.org/10.1007/s11042-020-08897-4
- N. Chaudhary, T. B. Shahi, and A. Neupane, “Secure image encryption using chaotic, hybrid chaotic and block cipher approach,” J Imaging, vol. 8, no. 6, p. 167, 2022. https://doi.org/10.3390/jimaging8060167
- M. Ahmad et al., “An image encryption algorithm based on new generalized fusion fractal structure,” Inf Sci (N Y), vol. 592, pp. 1–20, 2022. https://doi.org/10.1016/j.ins.2022.01.042
References
F. Varghese and P. Sasikala, “A Detailed Review Based on Secure Data Transmission Using Cryptography and Steganography,” Apr. 01, 2023, Springer. https://doi.org/10.1007/s11277-023-10183-z
A. Jan, S. A. Parah, M. Hussan, and B. A. Malik, “Double layer security using crypto-stego techniques: a comprehensive review,” Jan. 01, 2022, Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/s12553-021-00602-1
M. S. Taha, M. S. Mohd Rahim, S. A. Lafta, M. M. Hashim, and H. M. Alzuabidi, “Combination of Steganography and Cryptography: A short Survey,” in IOP Conference Series: Materials Science and Engineering, Institute of Physics Publishing, Jun. 2019. https://doi.org/10.1088/1757-899X/518/5/052003
V. Sathananthavathi, K. Ganesh Kumar, and M. Sathish Kumar, “Secure visual communication with advanced cryptographic and ımage processing techniques,” Multimed Tools Appl, 2023. https://doi.org/10.1007/s11042-023-17224-6
W. Alexan, N. Alexan, and M. Gabr, “Multiple-Layer Image Encryption Utilizing Fractional-Order Chen Hyperchaotic Map and Cryptographically Secure PRNGs,” Fractal and Fractional, vol. 7, no. 4, Apr. 2023. https://doi.org/10.3390/fractalfract7040287
W. S. Sari, E. H. Rachmawanto, D. R. I. M. Setiadi, and C. A. Sari, “A Good Performance OTP encryption image based on DCT-DWT steganography,” Telkomnika (Telecommunication Computing Electronics and Control), vol. 15, no. 4, pp. 1987–1995, Dec. 2017. https://doi.org/10.12928/TELKOMNIKA.v15i4.5883
C. A. Sari, M. H. Dzaki, E. H. Rachmawanto, R. R. Ali, and M. Doheir, “High PSNR Using Fibonacci Sequences in Classical Cryptography and Steganography Using LSB,” International Journal of Intelligent Engineering and Systems, vol. 16, no. 4, pp. 568–580, 2023. https://doi.org/10.22266/ijies2023.0831.46
D. R. I. M. Setiadi, E. H. Rachmawanto, and R. Zulfiningrum, “Medical Image Cryptosystem using Dynamic Josephus Sequence and Chaotic-hash Scrambling,” Journal of King Saud University - Computer and Information Sciences, vol. 34, no. 9, pp. 6818–6828, Oct. 2022. https://doi.org/10.1016/j.jksuci.2022.04.002
E. A. Sofyan, C. A. Sari, H. Rachmawanto, and R. D. Cahyo, “High-Quality Evaluation for Invisible Watermarking Based on Discrete Cosine Transform (DCT) and Singular Value Decomposition (SVD),” Advance Sustainable Science, Engineering and Technology (ASSET), vol. 6, no. 1, 2024. https://doi.org/10.26877/asset.v6i1.17186
G. Ardiansyah, C. A. Sari, D. R. I. M. Setiadi, and E. H. Rachmawanto, “Hybrid method using 3-DES, DWT and LSB for secure image steganography algorithm,” in 2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE), 2017, pp. 249–254. https://doi.org/10.1109/ICITISEE.2017.8285505
M. Rohini, M. A. Srikanth, M. Prajwal, P. R. Kumar, M. Basavaraj, and M. U. Vinay, “Advanced Data Security Using Modulo Operator and LSB Method,” Journal of Scholastic Engineering Science and Management, vol. 2023, no. 5, pp. 26–37, 2023. https://doi.org/10.5281/zenodo.7890771ï
A. Mozo, A. Karamchandani, L. de la Cal, S. Gómez-Canaval, A. Pastor, and L. Gifre, “A Machine-Learning-Based Cyberattack Detector for a Cloud-Based SDN Controller,” Applied Sciences (Switzerland), vol. 13, no. 8, Apr. 2023. https://doi.org/10.3390/app13084914
E. J. G, H. M. A, and F. H. M. S, “Enhanced Security: Implementation of Hybrid Image Steganography Technique using Low-Contrast LSB and AES-CBC Cryptography,” International Journal of Advanced Computer Science and Applications, vol. 13, no. 8, p. 2022, 2022. https://doi.org/10.14569/IJACSA.2022.01308104
J. Shankar and C. Nandini, “Hybrid Hyper Chaotic Map with LSB for Image Encryption and Decryption,” Scalable Computing: Practice and Experience, vol. 23, no. 4, pp. 181–192, Dec. 2022. https://doi.org/10.12694/scpe.v23i4.2018
H. Liu, B. Zhao, and L. Huang, “Quantum image encryption scheme using Arnold transform and S-box scrambling,” Entropy, vol. 21, no. 4, Apr. 2019. https://doi.org/10.3390/e21040343
P. Bagane and S. Kotrappa, “Enriching aes through the key generation from genetic algorithm,” Indian Journal of Computer Science and Engineering, vol. 12, no. 4, pp. 955–963, Jul. 2021. https://doi.org/10.21817/indjcse/2021/v12i4/211204141
S. Srisakthi and A. P. Shanthi, “Towards the Design of a Stronger AES: AES with Key Dependent Shift Rows (KDSR),” Wirel Pers Commun, vol. 114, no. 4, pp. 3003–3015, Oct. 2020. https://doi.org/10.1007/s11277-020-07514-9
W. Alexan, A. Hamza, and H. Medhat, “An AES Double–Layer Based Message Security Scheme,” in 2019 International Conference on Innovative Trends in Computer Engineering (ITCE), IEEE, Feb. 2019, pp. 86–91. https://doi.org/10.1109/ITCE.2019.8646461
K. N. Madhusudhan and P. Sakthivel, “A secure medical image transmission algorithm based on binary bits and Arnold map,” May 01, 2021, Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/s12652-020-02028-5
F. Masood et al., “A novel image encryption scheme based on Arnold cat map, Newton-Leipnik system and Logistic Gaussian map,” Multimed Tools Appl, vol. 81, no. 21, pp. 30931–30959, Sep. 2022. https://doi.org/10.1007/s11042-022-12844-w
D. E. Supriyo, N. Bhanja, S. K. Dhara, S. Paul, and S. Das, “Color image encryption scheme based on key dependent s-box and arnold’s cat map,” International Journal of Engineering Research and Technology (IJERT), 2021.
D. Vamsi and R. Ch, “Color Image Encryption Based on Arnold Cat Map-Elliptic Curve Key and A Hill Cipher,” J Theor Appl Inf Technol, vol. 15, no. 9, 2024.
S. Sabir and V. Guleria, “Multi-layer color image encryption using random matrix affine cipher, RP2DFrHT and 2D Arnold map,” Multimed Tools Appl, vol. 80, no. 18, pp. 27829–27853, Jul. 2021. https://doi.org/10.1007/s11042-021-11003-x
H. Liu, B. Zhao, and L. Huang, “Quantum image encryption scheme using Arnold transform and S-box scrambling,” Entropy, vol. 21, no. 4, p. 343, 2019. https://doi.org/10.3390/e21040343
K. M. Hosny, S. T. Kamal, and M. M. Darwish, “A color image encryption technique using block scrambling and chaos,” Multimed Tools Appl, vol. 81, no. 1, pp. 505–525, 2022. https://doi.org/10.1007/s11042-021-11384-z
K. Kumar, S. Roy, U. Rawat, and S. Malhotra, “IEHC: An efficient image encryption technique using hybrid chaotic map,” Chaos Solitons Fractals, vol. 158, p. 111994, 2022. https://doi.org/10.1016/j.chaos.2022.111994
H. Tora, E. Gokcay, M. Turan, and M. Buker, “A generalized Arnold’s Cat Map transformation for image scrambling,” Multimed Tools Appl, vol. 81, no. 22, pp. 31349–31362, 2022. https://doi.org/10.1007/s11042-022-11985-2
M. N. Alenezi, H. Alabdulrazzaq, H. M. Alhatlani, and F. A. Alobaid, “On the performance of AES algorithm variants,” International Journal of Information and Computer Security, vol. 23, no. 3, pp. 322–337, 2024. https://doi.org/10.1504/IJICS.2024.138494
V. Kolate and R. B. Joshi, “An information security using DNA cryptography along with AES algorithm,” Turkish Journal of Computer and Mathematics Education, vol. 12, no. 1S, pp. 183–192, 2021.
R. H. Prayitno, S. A. Sudiro, S. Madenda, and S. Harmanto, “A modified MixColumn-InversMixColumn in AES algorithm suitable for hardware implementation using FPGA device,” Communications in Science and Technology, vol. 8, no. 2, pp. 198–207, 2023. https://doi.org/10.21924/cst.8.2.2023.1257
M. Bedoui, H. Mestiri, B. Bouallegue, B. Hamdi, and M. Machhout, “An improvement of both security and reliability for AES implementations,” Journal of King Saud University-Computer and Information Sciences, vol. 34, no. 10, pp. 9844–9851, 2022. https://doi.org/10.1016/j.jksuci.2021.12.012
Y. Pourasad, R. Ranjbarzadeh, and A. Mardani, “A new algorithm for digital image encryption based on chaos theory,” Entropy, vol. 23, no. 3, p. 341, 2021. https://doi.org/10.3390/e23030341
F. Naz, I. A. Shoukat, R. Ashraf, U. Iqbal, and A. Rauf, “An ASCII based effective and multi-operation image encryption method,” Multimed Tools Appl, vol. 79, pp. 22107–22129, 2020. https://doi.org/10.1007/s11042-020-08897-4
N. Chaudhary, T. B. Shahi, and A. Neupane, “Secure image encryption using chaotic, hybrid chaotic and block cipher approach,” J Imaging, vol. 8, no. 6, p. 167, 2022. https://doi.org/10.3390/jimaging8060167
M. Ahmad et al., “An image encryption algorithm based on new generalized fusion fractal structure,” Inf Sci (N Y), vol. 592, pp. 1–20, 2022. https://doi.org/10.1016/j.ins.2022.01.042