Introduction
Multimedia data is an essential component in the digital world, and privacy engineering is an emerging area of research to keep user data confidential and secure. Multimedia data is a form of communication that combines one or a variety of contents, such as text, audio, images, animations, or video. Service provider companies collect multiple multimedia data from smart devices (Internet of Things (IoT)) to either provide them with services or for personal archives in the cloud. All forms of collected multimedia data require confidentiality, as this sensitive information can be used to identify and trace individuals, making them a valuable resource to an attacker. Also, most of the data-gathering devices (IoT, sensors) have limited storage capacity and require transmission of sensitive content to external storage. To secure data on these devices or during transmission to external storage, the EU-GDPR [1] and numerous research studies [2], [3], [4], [5], [6], [7] recommends data encryption.
Encryption is a reversible way of concealing information by translating the data into an unreadable format, and only authorised persons can re-translate it back to its readable format while still maintaining its confidentiality, integrity, and availability [2]. Encryption can be applied by using different ciphers (encryption algorithms) [8], and the strength level of these ciphers is determined by the security resistance provided by them against various attacks [9] or pixel tampering in visual data as simulated by [10]. The ciphers can be designed either as asymmetric or symmetric [11] with the main objective of providing maximum security against any type of attack.
The symmetric ciphers are categorised into the block and stream [12] ciphers. However, the design of secure block ciphers is dependent on properties like “encryption rounds mechanism” (with suitable key length) [13], [14], “diffusion mechanism” [15], and “confusion mechanism” [16].
This paper is focused on enhancing the security of ciphers using the confusion property, which is essential in generating chaos in encrypted data. For this purpose, S-boxes are used to implement confusion property in ciphers, such as Advanced Encryption Standard (AES) [17], PRESENT [18] and others [19] etc. S-box which serves as a mandatory component of the cipher performs a replacement of the original data with other random data to create unreadable data (ciphertext) chaotically and can be weak based on its design. A strong/secure S-box is compulsory to build a robust cipher since a crypto system’s strength is mostly determined by its capacity to withstand attacks (differential, linear) [20]. The S-box can be designed mathematically taking any input size to create any output size (i.e., m
The potency of an S-box mathematically depends on the criteria described in “Table 1”. Different studies have analysed various mathematical ways to generate an S-box such as using chaotic map [28], [29], [30], finite fields [31], linear trigonometric transformation [32], 2D mixed pseudo-random coupling PS map lattice [33], chaotic permutation [34]. Some studies combined two or more of these mathematical principles to design the S-box [35], [36].
A. Research Objectives
All the mathematical principles either satisfy two or more of these criteria in “Table 1” but none satisfy all these criteria to generate a strong S-box for the utmost chaos in the ciphertext. Hence, the reason for applying the Möbius transformation and Bit shift principles is to design an S-box that satisfies these criteria with a focus on the following research objectives (ROs).
RO1:
Investigating the weaknesses of S-box in the existing research.
RO2:
Designing a robust S-box that overcomes all the identified weaknesses in RO1.
RO3:
Testing the strength of the S-box against linear and differential attacks.
RO4:
Examining the practicality of the newly designed S-box by integrating it with the SOTA IoT cipher i.e., Chacha20.
B. Research Question and Contribution
To analyse the efficiency of designing a strong S-box, the following research question (RQ) is addressed in this paper:
RQ: What essential design principles must an S-box adhere to withstand linear and differential attacks, and how to validate its effectiveness for SOTA ciphers?
To address the earlier mentioned RQ, this paper presents a robust S-box design and examines its practicality by implementing it with SOTA cipher. The paper contributions are:
Practical and Secure S-box Design: This paper designed a secure S-box and integrated it into a SOTA stream cipher (Chacha20) to effectively secure the visual data. The results validate the practicality of the proposed S-box with any cipher to maximise content protection.
Low computation: The minimal encryption timing between the proposed S-box with Chacha20 (
Sbox+Chacha20 ) and Chacha20 cipher shows the efficacy of theSbox+Chacha20 for constrained devices.
The remainder of this paper is arranged as follows; Section II describes the related pieces of literature on different S-box designs. Section III presents the methodology for designing the proposed S-box. Section IV outlines the analysis of the proposed S-box. Section V examines the security and statistical analysis of integrating the proposed S-box with a SOTA cipher (
Background and Literature Survey
This section reviews the background and current research on different mathematical principles applied by researchers when designing substitution boxes (S-box). According to [23] and [26], the evaluation criteria analysed in “Table 1” are cryptographically desired for a good S-box.
Recently different researchers have proposed different notable ways to design a good S-box and these are discussed in this section.
A. Chaotic Map Principle
The chaotic map always manifests unpredictable behaviours and can be divided into discrete and continuous with a frequent appearance in dynamical systems.
The chaotic map has a wide range of applications across various fields, including secure communication and random number generation in physics, engineering, finance, and even biology. The study [37] designed a 2-D memristive Cubic map(2D-MCM), which produces a discrete mapping by integrating the memristor and the Cubic map to only encrypts a selective portion of the video. The research [38] derives a novel chaotic two-dimensional hyperchaotic exponential adjusted logistic and sine map (2D-HELS) from the well-known two-dimensional logistic and sine maps to design an image encryption algorithm with a good cryptographic structure called “permutation-diffusion.” This encryption algorithm achieves a highly secure cipher-image by employing a dynamic confusion strategy and an RNA operation.
The study [39] applied Rule 30 cellular automata to generate the first key, then created an
B. Permutation Principle
The permutation principle is an arrangement of elements without repetition but with an emphasis on order. Some studies have implemented this principle to design an S-box.
The authors [34] used chaotic permutation to design the S-box. Firstly, the logistic map’s ergodicity and randomness were used to increase its complexity and robustness, and lastly, the logistic map was used to create a permutation algorithm based on a chaotic sequence with a non-linearity of 108 and, SAC of 0.4988. By making little adjustments to the parameters of the transformation and permutation processes, a square polynomial transformation, an affine transformation, and a permutation technique were proposed by [35] to create a large number of robust S-box with 111.5 non-linearity, 0.502 SAC and 0.125 LP. A linear fractional transformation and permutation function was proposed by the authors [36] which involves an irreducible polynomial of degree eight being selected, and all of the primitive irreducible polynomial’s roots were computed as step one. In the second step, the Galois Field
C. Galois / Finite Field Principle
A finite field is a set that defines and satisfies the mathematical principles of addition, division (excludes division by zero), multiplication, and subtraction.
The authors [31] created an
D. Other Mathematical Principle
Aside from the three mathematical principles discussed earlier, several studies also implemented various principles like [47] designed an S-box using fractional-order time-delayed Hopfield neural network which entails the evolution of the first-generated S-box for enhanced non-linearity with a value of 111.25, SAC of 0.5007 and LP of 0.14025. The study [48] presents a controller for the plasma system that can displace its equilibria, thereby disintegrating the symmetric double-wing, resembling a butterfly, into multiple autonomous chaotic attractors to design an S-box with a non-linearity of 106, and a SAC of 0.4978. Reference [49] proposed two different S-boxes (G S-box and Algebraic S-box) using a pseudo-random generator based on Walsh Hadamard transform (WHT) and bi S-boxes to create the secure pseudo-random bit generator (CSPRBG). The first S-box has a non-linearity value of 112 but a very low SAC value of 0.375 and a good LP value of 0.062 while the second S-box has a non-linearity of 103.5, SAC of 0.5066 and high LP value of 0.1328. To create the substitution boxes, a multilevel information fusion with four layers—Multi Sources, Multi Features, Nonlinear Multi Features Whitening, and Substitution Boxes Construction—was implemented by the study [50]. This allowed for the creation of true random numbers from the unavoidable random noise found in medical imaging with the first S-box having a good result having the non-linearity and SAC to be 110, 0.503174 respectively with a high LP of 0.140625.
The study [51] applied Möbius transformation to design two different S-boxes. The first S-box was named a transformed S-box which had an average non-linearity value of 106.75 and, an average non-linearity BIC of 106.571. The second S-box was named as modified S-box which also had its average non-linearity and average non-linearity BIC as 108 and 105.286 respectively. These values are lower than the values obtained in this research. Möbius transformation was implemented by [52], to construct S-box and proposed a transformed S-box with a non-linearity of 107.3, SAC of 0.59, a BIC non-linearity of 101.3, a LP of 0.15, and a DU of 0.06 Also, [53] applied Möbius transformation to design a cryptologically robust 131028 S-Box with an average non-linearity value of 109, an average BIC non-linearity of 106, a LP of 0.125 and a DU of 0.0703125.
All the existing background and literature surveys reviewed herein show that the design of the S-box with different mathematical principles did not achieve the maximum recommended output of high NL with a SAC of ≈0.5, a very low LP. Also, none of these studies calculated the HOSAC and HOBIC of their proposed S-box.
However, this research designed an S-box with a non-linearity of 112, SAC of 0.5044, LP of 0.0625, a DU of 0.015625 and also fulfill the requirement of the HOSAC and HOBIC criteria using the Möbius transformation and bitwise shift permutation, and to the best of the authors’ knowledge, no research has utilised these methods (Möbius transformation and bitwise shift permutation) to design an S-box.
Proposed S-Box Design Scheme
This section elaborated on the design of the proposed
As described in “Fig. 1”, the proposed
A. Möbius Transformation
The Möbius transformations are bijective complex algebraic rational fractions where the upper and lower fractions are polynomials as represented in (1) where a, b, c, d complies with the condition in (2). The Möbius transformations consist of a group under composition\begin{align*} & f(x)= \frac {ax + b}{cx + d} \tag {1}\\ & (a \times d) - (b \times c) \neq 0 \tag {2}\end{align*}
The Möbius transformation can be represented as a matrix in (3) consisting of the translation, inversion, rotation, and dilation operations as given in (4).\begin{align*} \Phi (x)& \approx \begin{pmatrix} a & b \\ c & d \end{pmatrix} \begin{pmatrix} x \\ 1 \end{pmatrix} \tag {3}\\ f_{1}(x) & = x + \frac {d}{c} \\ f_{2}(x)& = \frac {1}{x} \\ f_{3}(x)& = - \frac {ad - bc}{c^{2}} x \\ f_{4}(x) & = x + \frac {a}{c} \tag {4}\end{align*}
The functions in (4) are then composed and transformed to generate (5), producing the Möbius transformation formula.\begin{equation*} f_{4}(x) \cdot f_{3}(x) \cdot f_{2}(x) \cdot f_{1}(x) = f(x) = \frac {ax + b}{cx + d} \tag {5}\end{equation*}
1) Projective General Linear Group (PGL)
The projective linear group PGL is another name for the group of Möbius transformations. The PGL is closely related to projective geometry, a quotient of the general linear (GL) group, and a sub-group of non-zero scalar transformation. Applying PGL on the sub-groups of (4) will produce (6) where \begin{equation*} \mathcal PGL(n, F) \tag {6}\end{equation*}
2) Galois Fields
Galois fields are finite fields which include a set of finite number of elements. \begin{equation*} F = \mathcal GF(p^{n}) \Rightarrow F = \mathcal GF(2^{8}) \tag {7}\end{equation*}
3) Irreducible Polynomial
These are polynomials that cannot be combined as a product of two non-constant polynomials. (7) generated a set of 30 different irreducible polynomials. Any of these irreducible polynomials can be used but this paper randomly selected
The finite fields were generated using (8), where the irreducible polynomial used was \begin{equation*} \mathcal GF(2^{8}) = \frac {\mathbb {Z}\{ 0, 1 \}} {P(n)} \tag {8}\end{equation*}
substituting (8) into (7) and also substituting (7) into (6) gives (9)\begin{equation*} \mathcal PGL \left ({{2, \frac {\mathbb {Z}\{ 0, 1 \}} {P(n)} }}\right ) \tag {9}\end{equation*}
4) Fractional Linear Transformation
This is a mathematical addition, subtraction, multiplication, and division operation carried out as a modulo on a particular irreducible polynomial that characterises the domain. Applying linear transformation on (9) where
To implement the calculation of equation (10), the Reed Solomon application [54] would be a good scenario.\begin{equation*} f(x) = \frac {ax + b}{cx + d} \Rightarrow f(x) = \frac {135x + 75}{16x + 8} \tag {10}\end{equation*}
As a result of applying the Möbius transformation to x from 0 to 255, the result of the S-box generated can be seen in “Table 4”.
B. Permutation
This is the number of practicable ways to rearrange a set of elements which could be with repetition or without repetition as given in (11) where n is the total elements and r is the number of chosen elements. This research implemented a right bitwise shift operation to produce a permutation without repetition.\begin{equation*} {\mathcal {P}}_{without-repetition} \rightarrow {\mathcal {P}}_{r}(n, r) = \frac {(n-r)!}{n!} \tag {11}\end{equation*}
1) The Bitwise Shift Operation
The bitwise shift operation is a low-level operator that manipulates binary bits individually. This operation takes two operands, the first operand is the binary value to be shifted and the second operand is the number of shifts to produce a new binary value. A bitwise shift could either be to the left or the right.
The set of elements gotten from (10) was converted to binary and a right bitwise shift was applied on each of the elements as shown in (12) where n is the operand to be shifted, d is the number of shifts. A high algebraic degree is achieved when d is odd thus, you can select any odd number but this manuscript randomly selected 5 as the d value.\begin{align*} f_{bitshift}: & \rightarrow (n \gg d) \tag {12}\\ f_{bitxor}: & \rightarrow n \oplus f_{bitshift} \mathbin {\%} 256 \tag {13}\end{align*}
A modulus 256 which is the pixel intensity and an xor process was applied to the rightmost
Algorithm 1 Pseudo-Code for Bitwise Shift Operation
for
end for
for
end for
Security Analysis of the Proposed S-Box
This section discussed the strength of the proposed substitution box (S-box). The strength of the proposed S-box was determined based on the evaluation criteria discussed in “Table 1”. The analysis shows that our S-box fulfills all criteria for robust design.
A. Balanced
The balanced criterion measures the distribution of output values for every possible input value of an S-box. When there are equal numbers of occurrences for each potential output difference of a given fixed input difference then the S-box is said to be balanced. An S-box with a balanced criterion shows an even distribution of output values. Mathematically, a balanced S-box is calculated using (14). Where \begin{align*} & S: \{0, 1\}^{n} \rightarrow \{ 0, 1 \} ^{m} \\ & \bigg \{ S(x) \oplus S(x \oplus \Delta x ): x \in \{0, 1 \} ^{n} \bigg \} \tag {14}\end{align*}
It is important to note that an S-box increases its confusion mechanism if it is balanced. Hence the proposed S-box exhibits the balanced criterion where the output bits are well-distributed and not predictable.
B. Non-Linearity
The Non-Linearity (NL) criterion is used to determine the randomness of the S-box elements and also to access the validation of the S-box against cryptanalysis attacks. The higher the NL, the higher the uncertainty output of the S-box. The NL of an S-box is measured mathematically using (15) the Walsh spectrum.\begin{align*} W_{f}(z) & = \sum _{t \in (0, 1)^{n}} (-1)^{f(t)\oplus t.z} \\ \mathcal NL & = 2^{n-1} \Biggl ( 2^{n} - \max _{t \in GF(2^{n})} \Big |\; W_{f}(z) \; \Big |\Biggl ) \tag {15}\end{align*}
The NL result of the proposed S-box is displayed in “Table 6” with a maximum and minimum result of 112. This proves the resistance of the S-box against the linear attacks.
C. Strict Avalanche Criterion
The Strict Avalanche Criterion (SAC) estimates a change when a single input bit is flipped, then a probability of half or
The result of the proposed S-box SAC is rounded off at 4th place and analysed in “Table 7”. The result shows most of the values can be ≈0.5 and with an average of 0.50439 which successfully meets the SAC requirement. The SAC result is close to the expected 0.5 with an offset value of 0.00439.
D. Higher-Order Strict Avalanche Criterion
This is a quantitative measure that calculates the average number of changes that occur in the output bit when more than one input bits are changed at the same time. The result of the Higher-Order Strict Avalanche Criterion (HOSAC) ranges from 0 to 1, where values close to 1 mean the S-box shows more chaotic and avalanche-like behaviour.
HOSAC was applied to the proposed S-box by changing different numbers of input bits out of its
E. Bit Independence Criterion
The Bit Independence Criterion (BIC) is a metric for assessing the level of bit independence in the output bits of an S-box. The BIC is computed as the probability that changing a particular input bit will result in a change in a specific output bit regardless of other input and output bits [55]. Each input bit “i” should transpose independently for all the output bits of “j” and “k”. BIC determines the maximum absolute correlation coefficient between avalanche vector “j” and “k” components. Mathematically, the BIC of a \begin{equation*} BIC(V_{j}, V_{k}) \rightarrow \max _{1 \leq i \leq n} \Big | \; corr({V_{j}^{e{i}}}, {V_{k}^{e{i}}}) \; \Big | \tag {16}\end{equation*}
This paper performs the BIC for the NL in “Table 9” and the SAC in “Table 10” with good correlation and each output value was approximately 0.5 for the BIC-SAC, preventing right guessing and recognition of patterns.
F. Higher-Order Bit Independence Criterion
The Higher-Order Bit Independence Criterion (HOBIC) is a metric used to assess the level of bit independence in the output bits of an S-box when several input bits are changed at once. The HOBIC calculates the average bit independence of all possible combinations of an input bit count. It is computed by averaging over all combinations while taking into account the bit independence for each combination. The HOBIC can be mathematically calculated as (17) where k is the number of changed input bit,
The BIC value ranges from 0 to 1, where 0 indicates that the corresponding output bits remain completely independent and 1 denotes a higher level of dependence between the output bits.\begin{equation*} {\mathcal {HOBIC}}_{k} \rightarrow \frac {1}{2^{n}} \sum _{\binom {n }{ k}} P(Y \;|\; X_{1}, X_{2}, \cdot \cdot \cdot , X_{k}) \tag {17}\end{equation*}
This paper changed
G. Linear Approximation Probability
The Linear Approximation Probability (LAP) evaluates the maximal imbalance between the input bits and the output bits elements. The uniformity of the input bits must not be different from the output bits and this is examined individually to give the maximal number of the same outputs. The LAP criterion is calculated as given in (18) where \begin{equation*} LP = \max _{\Gamma _{x}, \Gamma _{y} \neq 0} \Bigg | \; \frac {\# \; \{x|x \cdot \Gamma _{x} = S(x) \cdot \Gamma _{y}\}}{2^{n}} - \frac {1}{2} \; \Bigg | \tag {18}\end{equation*}
The proposed S-box achieved an absolute maximal imbalance of 16 as shown in “Table 12” hence, the linear approximation probability value gives 0.0625 which is low. A low LAP value indicates there is a low correlation between the linear approximations of the S-box’s input and output bits. This means the S-box is resistant to linear cryptanalysis attacks.
H. Differential Uniformity
The Differential Uniformity (DU) is the maximum probability of getting a uniform XOR change in the output bit \begin{align*} DU_{\psi }= \max _{\Delta p \neq 0, \Delta q} \left ({{ \frac { \{ p \in X \;| \psi (p) \oplus \psi (p \oplus \Delta p ) = \Delta q \}}{2^{n}} }}\right ) \tag {19}\end{align*}
The maximum differential uniformity result of the proposed S-box is 4 or 0.015625 which is less and proves that the S-box is secure against differential attacks.
I. Comparative Analysis with SOTA S-Box
The proposed S-box was compared with existing S-box designs as shown in “Table 13”. Authors [31] and [50] proposed the designs of ten and seven different S-boxes respectively and this paper selected the best S-box out of the several designs. The first S-box from [50] and the last S-box from [31] were selected for comparison with our S-box. The X in “Table 13” indicates that the authors did not mention or provide the information.
It is understood that a SAC value of perfectly 0.5 shows better confusion properties while a value that varies from 0.5 may result in biased output. The more the variation from 0.5 the higher the output biases. The SAC-Offset is used to determine the variation of the SAC. When the proposed S-box, [17] and [31] were compared based on the SAC-Offset, the proposed S-box has a lower variation.
From “Table 13”, the proposed S-box, has a consistent result in all the criteria specified in the table. In the average Non-Linearity (NL Average) column it has a high result, also in the strict avalanche criterion (SAC) column, the value is approximately 0.5 as required. The SAC offset of the proposed S-box is low as well as the linear approximation probability (LAP) and the differential uniformity (DU). The bit independence criterion for the Non-Linearity (BIC-NL) has an average of 112 while the average SAC (BIC-SAC) is 0.5074 which is in the expected range of ≈0.5.
Evaluation
This section discussed the methodology to integrate the proposed S-box with the existing IoT cipher (Chacha20). Also, this section elaborates on the complexity analysis and experimental evaluation including security and statistical analysis.
A. S-Box Integration With Chacha20
In this paper, we tested the effectiveness of the newly designed S-box while implementing it as a part of SOTA IoT cipher i.e., Chacha20
Chacha20; a stream cipher was created by Daniel Bernstein and it belongs to the Salsa family [56] with a
1) Design Analysis of Sbox+Chacha20
The pseudo-code of implemented
Algorithm 2 Pseudo-Code for Sbox+Chacha20 Cipher
procedure addSbox(encodevid)
for
end for
end procedure
2) Complexity Analysis of Sbox+Chacha20
The paper has evaluated the complexity analysis of the implementation of S-box only in \begin{align*} Step \; 1 \; to \; 7: \hspace {1.5mm} Big(O)& = 4 + 3n \\ Step \; 8: \hspace {1.5mm} Big(O)& = n \hspace {1.5mm} \Rightarrow \hspace {1.0mm}(O(n)) \\ T_{sum} & = \big [Step1 \; to \; Step7 \; + Step8 \big ] \\ & = \big [4 + 3n + n \big ] \\ Big(O) & = 4 + 4n\end{align*}
B. Experimental Analysis of Sbox+Chacha20
This sub-section discussed the dataset, visual results, security analysis, and statistical analysis of the
1) Dataset
The experiment was conducted on Intel NUC, a low-power constrained IoT (Internet of Things) with the specifications enumerated in “Table 14” and it was implemented in the Python programming language as well as Cython.
The experiment was also carried out with a dataset of two (02) dynamic backgrounds and two (02) static backgrounds, yielding a total of four (04) videos based on publicly available surveillance camera footage [58], [59] with varying characteristics such as colour, motion activity, and spatial details. “Table 15” describes the dataset properties captured from dynamic and static camera devices.
2) Visual Result
The visual results of applying the
C. Security Analysis of Sbox+Chacha20
This sub-section covers the security paradigm of the
1) Differential Attacks
The differential attack is a crucial analytical technique for evaluating an algorithm’s cipher-image sensitivity to its original-image when slightly altered. If the cipher-image obtained from the original-image is very different from the cipher-image obtained when there is a pixel alternation in the original-image, then the algorithm is secured and can resist differential attack [60].
A differential attack analysis can be calculated using the Numbers of Pixel Changing Rate (NPCR) and the UACI (Unified Average Changing Intensity) as given in (20) and (21) respectively where \begin{align*} NPCR\left ({{{VF}_{1},{VF}_{2}}}\right )& =\frac {{\sum }_{i,j}{D}_{{VF}_{1},{VF}_{2}}\left ({{i,j}}\right )}{{T}_{p}}\times 100\%, \\ D_{VF_{1},VF_{2} } \left ({{i,j}}\right ) & = \begin{cases} \displaystyle 1 & {\quad if\quad VF_{1} \left ({{i,j}}\right ) \ne VF_{2} \left ({{i,j}}\right )} \\ \displaystyle 0 & {\quad if\quad VF_{1} \left ({{i,j}}\right ) = VF_{2} \left ({{i,j}}\right )} \end{cases} \tag {20}\\ \\ UACI\left ({{{VF}_{1},{VF}_{2}}}\right )& =\frac {{\sum }_{i,j} \Big |{VF}_{1}\left ({{i,j}}\right )-{VF}_{2}\left ({{i,j}}\right ) \Big |}{{{T}_{p}}\times 255}\times 100\%. \tag {21}\end{align*}
To conduct the differential attack analysis, a single video frame was chosen, one of its pixels was altered and encrypted and then was compared with the original encrypted video frame using (20) and (21) to justify the
“Table 17”, shows that the
D. Statistical Analysis
This sub-section examined the statistical analysis such as the correlation analysis, histogram analysis, and the video quality metrics of the
1) Correlation Analysis
Correlation is a measure of the degree to which variables are interconnected or linearly related to each other and it is represented as r as shown in (22), where \begin{align*} E(x)& =\frac {1}{N}\sum \limits _{i-1}^{N} {x_{i}} \\ F(x)& =\frac {1}{N}\sum \limits _{i=1}^{N} {(x_{i} -E(x))^{2}} \\ r & = \frac { \sum {(x_{i} - \widehat {x}_{i})(y_{i} - \widehat {y}_{i})}} {\sqrt { \sum {(x_{i} - \widehat {x}_{i})^{2}} \sum {(y_{i} - \widehat {y}_{i})^{2}}}} \tag {22}\end{align*}
The correlation analysis of the full encrypted video frames with the
2) Video Quality Metric (PSNR)
The video quality metric evaluated in this paper is the Peak-Signal-to-Noise Ratio (PSNR). The PSNR is defined as the ratio of the maximum possible signal power to the power of the corrupting noise that affects the authenticity of the image representation. The PSNR test was conducted on the decrypted frames to measure the quality disparity between the original video frame and their respective decrypted video frames randomly selected from the full video.
PSNR was calculated using (23), where \begin{align*} {\text {PSNR}} = 10 \times \log _{10} \left ({{\frac {I_{\text {Max}^{2}} }{\text {MSE}}}}\right ) = 20 \times \log _{10} \left ({{\frac {I_{\text {Max}} }{\sqrt {\text {MSE}}}}}\right ) \tag {23}\end{align*}
All the videos used in this manuscript are of datatype
A PSNR value for an
Comparing the original video frames with the decrypted video frames, as discussed in “Table 20”, demonstrated that the decrypted video frames maintain the quality of the original video frames, indicating that there was no data loss, and the proposed S-box does not degrade the video quality.
Furthermore, if there is no data loss between the original and decrypted image, the mean square error (MSE) is zero (0). Hence, the two images are identical since there is no variation between the images, the PSNR in this instance tends to infinity (
3) Histogram Analysis
The histogram analysis of a video frame is a graphical representation of the pixel intensity values. It reveals the number of pixels within a video frame at each of the frame’s various intensity values. This analysis can be applied to any type of video frame (greyscale and coloured). Hence, this paper applied the histogram analysis to encrypted coloured video frames. The histogram analysis of an encrypted video frame is uniformly distributed when using a good cipher for encryption.
The histogram analysis was applied on both original and encrypted video frames as evaluated in “Table 21”. “Table 21” a(1-4) represents the histogram analysis of the original video frame which does not match the result of “Table 21” b(1-4) which shows a uniform distribution making
E. Comparison of Sbox+Chacha20 With the Sota Ciphers
This sub-section compared the performance of SOTA ciphers with the
1) Entropy Analysis
The entropy analysis estimates the information content of a video frame, by measuring the amount of randomness or uncertainty present in it. An encrypted image entropy increases with increasing pixel randomisation. An entropy is computed on a greyscale level giving eight (8) as its ideal entropy value. When encrypted image entropy is closer to 8 then the image information can not be leaked. The entropy of the encrypted video frame was calculated using (24) where \begin{equation*} \mathcal E(Y) = - \sum _{i=0}^{x - 1} p(i)\log _{2}p(i). \tag {24}\end{equation*}
“Table 22” analysed the entropy results of the randomly selected encrypted video frames from the dataset videos with the
2) Number of Pixel Changing Rate (NPCR)
The Number of Pixel Changing Rate (NPCR) is a method for testing the sensitivity of cipher-images when a single pixel of a plain-image is altered and when the plain-image is not altered before encryption. The NPCR is computed using (20) and a result of ≥ 99 is considered highly sensitive.
The sensitivity of the proposed
3) Unified Average Changing Intensity (UACI)
The Unified Average Changing Intensity (UACI) is a technique for measuring the relative intensity of cipher-images when a plain-image is not changed, and when a single pixel of a plain-image is changed. The UACI is calculated using (21) and a result of ≥ 33 is acceptable.
The UACI of the proposed
4) Computational Cost Analysis
In this paper, the execution time taken to perform encryption on the video frames in the video dataset using
Computational cost analysis using
Comparing the
Conclusion
The fast pace of technology has introduced intelligent IoT devices with integrated cameras. These devices gather sensitive visual data for numerous services. To secure such data, this paper proposed an efficient and effective methodology for designing an
To design the proposed S-box, the Möbius transformation principle was used on the Galois field with an irreducible polynomial, followed by a bitwise right shift to generate the final output. S-box designs are crucial for strengthening the confusion properties in ciphers. Evaluation (section IV) proves that the proposed S-box fulfilled all these criteria. Because of its high NL value, the proposed S-box can withstand linear attacks, and its low differential uniformity makes it resistant to differential attacks. Also, the proposed methodology was compared with other methods of S-box designs, and the proposed S-box exhibits relatively good results.
This research validated the proposed S-box by integrating it with the existing IoT Cipher, Chacha20 (Sbox+Chacha20), for secure multimedia encryption (section V). The comparative analysis with SOTA ciphers (AES-CFB and Chach20) shows the results with higher entropy, unified average changing intensity (UACI), and numbers of pixel changing rate (NPCR) values. Hence, the suggested S-box could serve as a robust option for encrypting visual data since visual data is made up of pixels, and each pixel contains a byte
Future research could explore optimising the proposed S-box and inventing novel encryption techniques that synergise with it to enhance overall security and efficiency for low-cost, constrained devices. Also, in the future, an encryption scheme will be designed that implements the application of diffusion and other necessary techniques to secure the videos in critical areas using 2D Extended Schaffer Function Map and Neural Networks Temporal action segmentation for video encryption.