A novel modular approach based substitution-box design for image encryption

AH Zahid, E Al-Solami, M Ahmad - IEEE Access, 2020 - ieeexplore.ieee.org
In modern-day block ciphers, the role of substitution-boxes is to transform the plaintext data
nonlinearly to generate ciphertext data with sufficient confusion. It has been well-confirmed …

A novel method of S-box design based on discrete chaotic maps and cuckoo search algorithm

HS Alhadawi, MA Majid, D Lambić… - Multimedia Tools and …, 2021 - Springer
Abstract Substitution-boxes (S-boxes) are unique nonlinear elements, which are used to
achieve the property of confusion in modern symmetric ciphers and offer resistance to …

An image encryption algorithm using a dynamic S-box and chaotic maps

J Zheng, Q Zeng - Applied Intelligence, 2022 - Springer
This paper presents an image encryption algorithm based on dynamic S-box. Encryption
algorithm includes four stages: generation of encryption keys, the construction of the S-box …

A new algorithm for normal and large-scale optimization problems: Nomadic People Optimizer

SQ Salih, ARA Alsewari - Neural Computing and Applications, 2020 - Springer
Metaheuristic algorithms have received much attention recently for solving different
optimization and engineering problems. Most of these methods were inspired by nature or …

Region of interest-based medical image encryption technique based on chaotic S-boxes

SS Jamal, MM Hazzazi, MF Khan, Z Bassfar… - Expert Systems with …, 2024 - Elsevier
Block cipher has been one of the most reliable options by which data security is achieved.
The strength of block cipher against various attacks is purely dependent on its confusion …

A novel construction of efficient substitution-boxes using cubic fractional transformation

AH Zahid, MJ Arshad, M Ahmad - Entropy, 2019 - mdpi.com
A symmetric block cipher employing a substitution–permutation duo is an effective technique
for the provision of information security. For substitution, modern block ciphers use one or …

An enhanced version of black hole algorithm via levy flight for optimization and data clustering problems

HA Abdulwahab, A Noraziah, AA Alsewari… - Ieee …, 2019 - ieeexplore.ieee.org
The processes of retrieving useful information from a dataset are an important data mining
technique that is commonly applied, known as Data Clustering. Recently, nature-inspired …

An innovative design of substitution-boxes using cubic polynomial mapping

AH Zahid, MJ Arshad - Symmetry, 2019 - mdpi.com
In this paper, we propose to present a novel technique for designing cryptographically
strong substitution-boxes using cubic polynomial mapping. The proposed cubic polynomial …

SBOX-CGA: substitution box generator based on chaos and genetic algorithm

F Artuğer, F Özkaynak - Neural Computing and Applications, 2022 - Springer
What makes artificial intelligence techniques so remarkable in the field of computer science
is undoubtedly their success in producing effective solutions to difficult computational …

A new hyperchaotic system-based design for efficient bijective substitution-boxes

E Al Solami, M Ahmad, C Volos, MN Doja, MMS Beg - entropy, 2018 - mdpi.com
In this paper, we present a novel method to construct cryptographically strong bijective
substitution-boxes based on the complicated dynamics of a new hyperchaotic system. The …