Skip to main content

Cryptanalysis of Chaos Based Secure Satellite Imagery Cryptosystem

  • Conference paper

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 168))

Abstract

Recently Usama et al. proposed a chaos-based satellite image cryptosystem, which employed multiple one-dimensional chaotic maps in novel manner to enhance the robustness, security and efficiency of sensitive satellite imagery. It is very efficient in terms of encryption time. The authors of the cryptosystem under study claimed that it has high level of security and can be applied to transmit confidential multimedia images over Internet/shared network. Unfortunately, the security analysis of the cryptosystem reveals that it has serious security flaws. Consequently, it is susceptible to a number of attacks. In this paper, the cryptanalysis of original cryptosystem is presented and it is shown that the attacker can recovers the plain-image from given cipher-image under three types of classical cryptographic attacks without knowing the secret key. The simulation results of cryptanalysis demonstrate that the cryptosystem highly lacks security and cannot be utilized for the protection of confidential/sensitive multimedia images such as the satellite imagery.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Schneier, B.: Applied Cryptography: Protocols Algorithms and Source Code in C. Wiley, New York (1996)

    MATH  Google Scholar 

  2. Matthews, R.: On the Derivation of a Chaotic Encryption Algorithm. Cryptologia 13(1), 29–42 (1989)

    Article  MathSciNet  Google Scholar 

  3. Fridrich, J.: Symmetric Ciphers based on two-dimensional Chaotic Maps. International Journal of Bifurcation and Chaos 8(6), 1259–1284 (1998)

    Article  MathSciNet  MATH  Google Scholar 

  4. Chen, G.Y., Mao, Y.B., Chui, C.K.: A Symmetric Image Encryption Scheme based on 3D Chaotic Cat maps. Chaos, Solitons & Fractals 21(3), 749–761 (2004)

    Article  MathSciNet  MATH  Google Scholar 

  5. Mao, Y., Lian, S., Chen, G.: A Novel Fast Image Encryption Scheme based on 3D Chaotic Baker maps. International Journal of Bifurcation and Chaos 14(10), 3616–3624 (2004)

    Article  MathSciNet  MATH  Google Scholar 

  6. Lian, S., Sun, J., Wang, Z.: A Block Cipher based on a Suitable use of Chaotic Standard map. Chaos, Solitons and Fractals 26(1), 117–129 (2005)

    Article  MATH  Google Scholar 

  7. Lian, S., Sun, J., Wang, J., Wang, Z.: A Chaotic Stream Cipher and the Usage in Video Protection. Chaos, Solitons & Fractals 34(3), 851–859 (2007)

    Article  MathSciNet  MATH  Google Scholar 

  8. Tong, X., Cui, M.: Image Encryption Scheme based on 3D Baker with Dynamical Compound Chaotic Sequence Cipher Generator. Signal Processing 89(4), 480–491 (2008)

    Article  MATH  Google Scholar 

  9. Patidar, V., Pareek, N.K., Sud, K.K.: A New Substitution-Diffusion based Image Cipher using Chaotic Standard and Logistic Maps. Communication in Nonlinear Science and Numerical Simulation 14(7), 3056–3075 (2009)

    Article  MathSciNet  Google Scholar 

  10. Tang, Y., Wang, Z., Fang, J.: Image Encryption using Chaotic Coupled Map Lattices with Time Varying Delays. Communication in Nonlinear Science and Numerical Simulation 15(9), 2456–2468 (2009)

    Article  MathSciNet  MATH  Google Scholar 

  11. Lian, S.: Efficient Image or Video Encryption based on Spatiotemporal Chaos System. Chaos, Solitons & Fractals 40(5), 2509–2519 (2009)

    Article  MATH  Google Scholar 

  12. Wang, Y., Wong, K., Liao, X., Xiang, T., Chen, G.: A Chaos-based Image Encryption Algorithm with Variable Control Parameters. Chaos, Solitons & Fractals 41(4), 1773–1783 (2009)

    Article  MATH  Google Scholar 

  13. Wang, Y., Wong, K., Liao, X.: A Block Cipher with Dynamic S-boxes based on Tent Map. Communication in Nonlinear Science and Numerical Simulation 14(7), 3089–3099 (2009)

    Article  MathSciNet  MATH  Google Scholar 

  14. Lian, S.: A Block Cipher based on Chaotic Neural Networks. Neurocomputing 72(4-6), 1296–1301 (2009)

    Article  Google Scholar 

  15. Corron, N.J., Reed, B.R., Blakely, J.N., Myneni, K., Pethel, S.D.: Chaotic Scrambling for Wireless Analog Video. Communication in Nonlinear Science and Numerical Simulation 15(9), 2504–2513 (2010)

    Article  Google Scholar 

  16. Usama, M., Khan, M.K., Alghathbar, K., Lee, C.: Chaos-based Secure Satellite Imagery Cryptosystem. Computers and Mathematics with Applications 60(2), 326–337 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  17. Amin, M., Faragallah, O.S., Abd El-Latif, A.A.: A Chaotic Block Cipher Algorithm for Image Cryptosystem. Communication in Nonlinear Science and Numerical Simulation 15(11), 3484–3497 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  18. Ahmad, M., Farooq, O.: A multi-level blocks scrambling based chaotic image cipher. In: Ranka, S., Banerjee, A., Biswas, K.K., Dua, S., Mishra, P., Moona, R., Poon, S.-H., Wang, C.-L. (eds.) IC3 2010. Communications in Computer and Information Science, vol. 94, pp. 171–182. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  19. Chen, Z., Ip, W.H., Cha, C.Y., Yung, K.: Two-level Chaos based Video Cryptosystem on H.263 Codec. Nonlinear Dynamics 62(3), 647–664 (2010)

    Article  Google Scholar 

  20. Furht, B., Kirovski, D.: Multimedia Security Handbook. CRC Press, Boca Raton (2005)

    Google Scholar 

  21. Lian, S.: Multimedia Content Encryption: Techniques and Applications. CRC Press, Boca Raton (2008)

    MATH  Google Scholar 

  22. Wang, K., Pei, W., Zou, L.: On the Security of 3D Cat Map based Symmetric Image Encryption Scheme. Physics Letters A 343(6), 432–439 (2005)

    Article  MATH  Google Scholar 

  23. Alvarez, G., Li, S.: Breaking an Encryption Scheme based on Chaotic Baker Map. Physics Letters A 352(1-2), 78–82 (2005)

    Article  MATH  Google Scholar 

  24. Rhouma, R., Solak, E., Belghith, S.: Cryptanalysis of a New Substitution-Diffusion based Image Cipher. Communication in Nonlinear Science and Numerical Simulation 15(7), 1887–1892 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  25. Rhouma, R., Belghith, S.: Cryptanalysis of a Spatiotemporal Chaotic Image/Video Cryptosystem. Physics Letters A 372(36), 5790–5794 (2008)

    Article  MATH  Google Scholar 

  26. Li, C., Li, S., Asim, M., Nunez, J., Alvarez, G., Chen, G.: On the Security Defects of an Image Encryption Scheme. Image and Vision Computing 27, 1371–1381 (2009)

    Article  Google Scholar 

  27. Rhouma, R., Belghith, S.: Cryptanalysis of a Chaos-based Cryptosystem on DSP. Communication in Nonlinear Science and Numerical Simulation 16(2), 876–884 (2011)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ahmad, M. (2011). Cryptanalysis of Chaos Based Secure Satellite Imagery Cryptosystem. In: Aluru, S., et al. Contemporary Computing. IC3 2011. Communications in Computer and Information Science, vol 168. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22606-9_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22606-9_12

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22605-2

  • Online ISBN: 978-3-642-22606-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics