X-Cross: Image Encryption Featuring Novel Dual-Layer Block Permutation and Dynamic Substitution Techniques

📅 2025-03-13
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
To address security threats to digital images during transmission and storage, this paper proposes the X-Cross image encryption algorithm. The method integrates a two-layer block permutation—comprising bit-level IBT permutation and a novel X-cross pixel permutation—with a key-driven dynamic S-box confusion mechanism. A strong nonlinear 2D chaotic map generates dynamic keys, while a Bit-Extraction mechanism enables key-sensitive bit-level rearrangement, effectively eliminating statistical redundancy and structural features. Experimental results demonstrate an information entropy of 7.9993, adjacent-pixel correlation coefficients below 0.002, and robust resistance against differential and statistical attacks—achieving ideal security metrics. The core contributions include: (i) the first two-layer block permutation architecture; (ii) the X-cross pixel permutation algorithm; and (iii) a synergistic chaotic–bit-extraction key generation mechanism.

Technology Category

Application Category

📝 Abstract
In this digital age, ensuring the security of digital data, especially the image data is critically important. Image encryption plays an important role in securing the online transmission/storage of images from unauthorized access. In this regard, this paper presents a novel diffusion-confusion-based image encryption algorithm named as X-CROSS. The diffusion phase involves a dual-layer block permutation. It involves a bit-level permutation termed Inter-Bit Transference (IBT) using a Bit-Extraction key, and pixel permutation with a unique X-crosspermutation algorithm to effectively scramble the pixels within an image. The proposed algorithm utilizes a resilient 2D chaotic map with non-linear dynamical behavior, assisting in generating complex Extraction Keys. After the permutation phase, the confusion phase proceeds with a dynamic substitution technique on the permuted images, establishing the final encryption layer. This combination of novel permutation and confusion results in the removal of the image's inherent patterns and increases its resistance to cyber-attacks. The close to ideal statistical security results for information entropy, correlation, homogeneity, contrast, and energy validate the proposed scheme's effectiveness in hiding the information within the image.
Problem

Research questions and friction points this paper is trying to address.

Develops a novel image encryption algorithm for secure data transmission.
Introduces dual-layer block permutation and dynamic substitution techniques.
Enhances resistance to cyber-attacks by removing image patterns.
Innovation

Methods, ideas, or system contributions that make the work stand out.

Dual-layer block permutation for image scrambling
Dynamic substitution technique for final encryption
2D chaotic map for complex key generation
🔎 Similar Papers
No similar papers found.
H
Hansa Ahsan
Department of Electrical Engineering, HITEC University, Taxila, 47080, Pakistan.
S
Safee Ullah
Department of Electrical Engineering, HITEC University, Taxila, 47080, Pakistan.
J
Jawad Ahmad
Cyber Security Center, Prince Mohammad Bin Fahd University, Al Khobar, 31952, Saudi Arabia.
Aizaz Ahmad Khattak
Aizaz Ahmad Khattak
Edinburgh Napier University
Image EncryptionCyber SecurityInformation SecurityIoT Security
M
Muhammad Ali
Department of Electrical Engineering, HITEC University, Taxila, 47080, Pakistan.
Muhammad Shahbaz Khan
Muhammad Shahbaz Khan
Edinburgh Napier University
Image EncryptionApplied CryptographyPost-Quantum CryptographyQuantum Image EncryptionAI/ML