Abstract
Recently Usama et al. proposed a chaos-based satellite image cryptosystem, which employed multiple one-dimensional chaotic maps in novel manner to enhance the robustness, security and efficiency of sensitive satellite imagery. It is very efficient in terms of encryption time. The authors of the cryptosystem under study claimed that it has high level of security and can be applied to transmit confidential multimedia images over Internet/shared network. Unfortunately, the security analysis of the cryptosystem reveals that it has serious security flaws. Consequently, it is susceptible to a number of attacks. In this paper, the cryptanalysis of original cryptosystem is presented and it is shown that the attacker can recovers the plain-image from given cipher-image under three types of classical cryptographic attacks without knowing the secret key. The simulation results of cryptanalysis demonstrate that the cryptosystem highly lacks security and cannot be utilized for the protection of confidential/sensitive multimedia images such as the satellite imagery.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Schneier, B.: Applied Cryptography: Protocols Algorithms and Source Code in C. Wiley, New York (1996)
Matthews, R.: On the Derivation of a Chaotic Encryption Algorithm. Cryptologia 13(1), 29–42 (1989)
Fridrich, J.: Symmetric Ciphers based on two-dimensional Chaotic Maps. International Journal of Bifurcation and Chaos 8(6), 1259–1284 (1998)
Chen, G.Y., Mao, Y.B., Chui, C.K.: A Symmetric Image Encryption Scheme based on 3D Chaotic Cat maps. Chaos, Solitons & Fractals 21(3), 749–761 (2004)
Mao, Y., Lian, S., Chen, G.: A Novel Fast Image Encryption Scheme based on 3D Chaotic Baker maps. International Journal of Bifurcation and Chaos 14(10), 3616–3624 (2004)
Lian, S., Sun, J., Wang, Z.: A Block Cipher based on a Suitable use of Chaotic Standard map. Chaos, Solitons and Fractals 26(1), 117–129 (2005)
Lian, S., Sun, J., Wang, J., Wang, Z.: A Chaotic Stream Cipher and the Usage in Video Protection. Chaos, Solitons & Fractals 34(3), 851–859 (2007)
Tong, X., Cui, M.: Image Encryption Scheme based on 3D Baker with Dynamical Compound Chaotic Sequence Cipher Generator. Signal Processing 89(4), 480–491 (2008)
Patidar, V., Pareek, N.K., Sud, K.K.: A New Substitution-Diffusion based Image Cipher using Chaotic Standard and Logistic Maps. Communication in Nonlinear Science and Numerical Simulation 14(7), 3056–3075 (2009)
Tang, Y., Wang, Z., Fang, J.: Image Encryption using Chaotic Coupled Map Lattices with Time Varying Delays. Communication in Nonlinear Science and Numerical Simulation 15(9), 2456–2468 (2009)
Lian, S.: Efficient Image or Video Encryption based on Spatiotemporal Chaos System. Chaos, Solitons & Fractals 40(5), 2509–2519 (2009)
Wang, Y., Wong, K., Liao, X., Xiang, T., Chen, G.: A Chaos-based Image Encryption Algorithm with Variable Control Parameters. Chaos, Solitons & Fractals 41(4), 1773–1783 (2009)
Wang, Y., Wong, K., Liao, X.: A Block Cipher with Dynamic S-boxes based on Tent Map. Communication in Nonlinear Science and Numerical Simulation 14(7), 3089–3099 (2009)
Lian, S.: A Block Cipher based on Chaotic Neural Networks. Neurocomputing 72(4-6), 1296–1301 (2009)
Corron, N.J., Reed, B.R., Blakely, J.N., Myneni, K., Pethel, S.D.: Chaotic Scrambling for Wireless Analog Video. Communication in Nonlinear Science and Numerical Simulation 15(9), 2504–2513 (2010)
Usama, M., Khan, M.K., Alghathbar, K., Lee, C.: Chaos-based Secure Satellite Imagery Cryptosystem. Computers and Mathematics with Applications 60(2), 326–337 (2010)
Amin, M., Faragallah, O.S., Abd El-Latif, A.A.: A Chaotic Block Cipher Algorithm for Image Cryptosystem. Communication in Nonlinear Science and Numerical Simulation 15(11), 3484–3497 (2010)
Ahmad, M., Farooq, O.: A multi-level blocks scrambling based chaotic image cipher. In: Ranka, S., Banerjee, A., Biswas, K.K., Dua, S., Mishra, P., Moona, R., Poon, S.-H., Wang, C.-L. (eds.) IC3 2010. Communications in Computer and Information Science, vol. 94, pp. 171–182. Springer, Heidelberg (2010)
Chen, Z., Ip, W.H., Cha, C.Y., Yung, K.: Two-level Chaos based Video Cryptosystem on H.263 Codec. Nonlinear Dynamics 62(3), 647–664 (2010)
Furht, B., Kirovski, D.: Multimedia Security Handbook. CRC Press, Boca Raton (2005)
Lian, S.: Multimedia Content Encryption: Techniques and Applications. CRC Press, Boca Raton (2008)
Wang, K., Pei, W., Zou, L.: On the Security of 3D Cat Map based Symmetric Image Encryption Scheme. Physics Letters A 343(6), 432–439 (2005)
Alvarez, G., Li, S.: Breaking an Encryption Scheme based on Chaotic Baker Map. Physics Letters A 352(1-2), 78–82 (2005)
Rhouma, R., Solak, E., Belghith, S.: Cryptanalysis of a New Substitution-Diffusion based Image Cipher. Communication in Nonlinear Science and Numerical Simulation 15(7), 1887–1892 (2010)
Rhouma, R., Belghith, S.: Cryptanalysis of a Spatiotemporal Chaotic Image/Video Cryptosystem. Physics Letters A 372(36), 5790–5794 (2008)
Li, C., Li, S., Asim, M., Nunez, J., Alvarez, G., Chen, G.: On the Security Defects of an Image Encryption Scheme. Image and Vision Computing 27, 1371–1381 (2009)
Rhouma, R., Belghith, S.: Cryptanalysis of a Chaos-based Cryptosystem on DSP. Communication in Nonlinear Science and Numerical Simulation 16(2), 876–884 (2011)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ahmad, M. (2011). Cryptanalysis of Chaos Based Secure Satellite Imagery Cryptosystem. In: Aluru, S., et al. Contemporary Computing. IC3 2011. Communications in Computer and Information Science, vol 168. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22606-9_12
Download citation
DOI: https://doi.org/10.1007/978-3-642-22606-9_12
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22605-2
Online ISBN: 978-3-642-22606-9
eBook Packages: Computer ScienceComputer Science (R0)