Skip to main content

Advertisement

Log in

Breaking a chaotic image encryption algorithm

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Image encryption is an important issue in information security. Due to sensitivity to initial values, randomness and simple computation, chaos-based image encryption algorithms efficiently provide security. In a recent paper a chaos-based image encryption was proposed that employs genetic algorithm to optimize correlation between adjacent pixels. We show via simulations a security exploit that can find the key and decrypt the image. To fix the the aforementioned vulnerability we harness Knuth shuffle where we replace the rand function with the logistic map. We then evaluate the security of our proposed algorithm by testing the impact of several attacks on it. We show that while improving the security, our algorithm keeps the same level of pixel entropy as the previous method. Moreover, the correlation coefficient among adjacent pixels of the cipher image was reduced by an order of magnitude.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Abdullah AH, Enayatifar R, Lee M (2012) A hybrid genetic algorithm and chaotic function model for image encryption. AEU Int J Electron Commun 66(10):806–16

    Article  Google Scholar 

  2. Alvarez E, Fernandez A, Garcıa P, Jiménez J, Marcano A (1999) New approach to chaotic encryption. Phys Lett A 263(4):373–5

    Article  Google Scholar 

  3. Alvarez G, Montoya F, Romera M, Pastor G (2000) Cryptanalysis of a chaotic encryption system. Phys Lett A 276(1):191–6

    Article  MathSciNet  MATH  Google Scholar 

  4. Amin M, Faragallah OS, El-Latif AA (2010) A chaotic block cipher algorithm for image cryptosystems. Commun Nonlinear Sci Numer Simul 15(11):3484–97

    Article  MathSciNet  MATH  Google Scholar 

  5. Behnia S, Akhshani A, Mahmodi H, Akhavan A (2008) Novel algorithm for image encryption based on mixture of chaotic maps. Chaos, Solitons & Fractals 35(2):408–19

    Article  MathSciNet  MATH  Google Scholar 

  6. Belkhouche F, Qidwai U (2003) Binary image encoding using 1D chaotic maps. In: IEEE region 5, 2003 annual technical conference. IEEE, pp 39–43

  7. Bouvry P, Seredyński F, Zomaya AY (2003) Application of cellular automata for cryptography. In: International conference on parallel processing and applied mathematics, pp 447–454

  8. Chen G, Mao Y, Chui CKA (2004) Symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons & Fractals 21(3):749–61

    Article  MathSciNet  MATH  Google Scholar 

  9. Chen RJ, Lu WK, Lai JL (2005) Image encryption using progressive cellular automata substitution and SCAN. IEEE International Symposium on Circuits and Systems, pp 1690–1693

  10. Chen RJ, Lai JL (2007) Image security system using recursive cellular automata substitution. Pattern Recogn 40(5):1621–31

    Article  MATH  Google Scholar 

  11. Cheng H, Li X (2000) Partial encryption of compressed images and videos. IEEE Transactions on Signal Processing 48(8):2439–51

    Article  Google Scholar 

  12. Enayatifar R (2011) Image encryption via logistic map function and heap tree. Int J Phys Sci 6(2):221–8

    Google Scholar 

  13. Encinas LH, Domínguez AP (2006) Comment on ’A technique for image encryption using digital signature’. Optics Commun 268(2):261–5

    Article  Google Scholar 

  14. Gao T, Chen Z (2008) A new image encryption algorithm based on hyper-chaos. Phys Lett A 372(4):394–400

    Article  MATH  Google Scholar 

  15. Ge X, Liu F, Lu B, Yang C (2010) Improvement of Rhouma’s attacks on Gao algorithm. Phys Lett A 374(11):1362–7

    Article  MATH  Google Scholar 

  16. Guo JI (2000) A new chaotic key-based design for image encryption and decryption. In: The 2000 IEEE international symposium on circuits and systems, 2000. Proceedings. ISCAS, vol 4, pp 49–52

  17. Jolfaei A, Mirghadri A (2010) A new approach to measure quality of image encryption. Int J Comput Netw Secur 2(8):38–44

    Google Scholar 

  18. Knuth DE (1998) The art of computer programming, sorting and searching. International Monetary Fund 3

  19. Lafe O (1996) Data compression and encryption using cellular automata transforms. In: IEEE international joint symposia, intelligence and systems, pp 234–241

  20. Li S, Zheng X (2002) Cryptanalysis of a chaotic image encryption method. In: IEEE international symposium, circuits and systems, ISCAS 2002, vol 2, pp II–708

  21. Li C, Li S, Chen G, Chen G, Hu L (2005) Cryptanalysis of a new signal security system for multimedia data transmission, vol 2005, p 962703

  22. Lian S, Sun J, Wang ZA (2005) Block cipher based on a suitable use of the chaotic standard map. Chaos, Solitons & Fractals 26(1):117–29

    Article  MATH  Google Scholar 

  23. Liao X, Lai S, Zhou Q (2010) A novel image encryption algorithm based on self-adaptive wave transmission. Signal Processing 90(9):2714–2722

    Article  MATH  Google Scholar 

  24. Lian S (2009) Efficient image or video encryption based on spatiotemporal chaos system. Chaos, Solitons & Fractals 40(5):2509–19

    Article  MATH  Google Scholar 

  25. Liu Z, Xu L, Lin C, Dai J, Liu S (2011) Image encryption scheme by using iterative random phase encoding in gyrator transform domains. Opt Lasers Eng 49(4):542–6

    Article  Google Scholar 

  26. Malan DJ, Welsh M, Smith MDA (2004) Public-key infrastructure for key distribution in tinyOS based on elliptic curve cryptography. In: Sensor and Ad Hoc Communications and Networks, IEEE SECON 2004. 2004 First Annual IEEE Communications Society Conference, pp 71–80

  27. Mazloom S, Eftekhari-Moghadam AM (2009) Color image encryption based on coupled nonlinear chaotic map. Chaos, Solitons & Fractals 42(3):1745–54

    Article  MATH  Google Scholar 

  28. Norouzi B, Mirzakuchaki S, Seyedzadeh SM, Mosavi MR (2014) A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process. Multimed Tools Appl 71(3):1469–97

    Article  Google Scholar 

  29. Rhouma R, Belghith S (2008) Cryptanalysis of a new image encryption algorithm based on hyper-chaos. Phys Lett A 372(38):5973–8

    Article  MATH  Google Scholar 

  30. Sivakumar T, Venkatesan R (2014) A novel approach for image encryption using dynamic SCAN pattern. IAENG Int J Comput Sci 41(2):91–101

    Google Scholar 

  31. Sun F, Liu S, Li Z, Lü ZA (2008) Novel image encryption scheme based on spatial chaos map. Chaos, Solitons & Fractals 38(3):631–40

    Article  MathSciNet  MATH  Google Scholar 

  32. Wang Y, Wong KW, Liao X, Chen G (2011) A new chaos-based fast image encryption algorithm. Applied Soft Computing 11(1):514–22

    Article  Google Scholar 

  33. Wong KW, Kwok BS, Law WS (2008) A fast image encryption scheme based on chaotic standard map. Phys Lett A 372(15):2645–52

    Article  MATH  Google Scholar 

  34. Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for image encryption. Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT) 1(2):31–38

    Google Scholar 

  35. Zhang Q, Guo L, Wei X (2010) Image encryption using DNA addition combining with chaotic maps. Mathematical and Computer Modelling 52 (11):2028–35

    Article  MathSciNet  MATH  Google Scholar 

  36. Zhang G, Liu Q (2011) A novel image encryption method based on total shuffling scheme. Opt Commun 284(12):2775–80

    Article  Google Scholar 

  37. Zhu Z-L, Zhang W, Wong K-W, Yu H (2011) A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf Sci 181(6):1171–1186

    Article  Google Scholar 

  38. Zhu C (2012) A novel image encryption scheme based on improved hyperchaotic sequences. Opt Commun 285(1):29–37

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Seyed Javad Kazemitabar.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Noshadian, S., Ebrahimzade, A. & Kazemitabar, S.J. Breaking a chaotic image encryption algorithm. Multimed Tools Appl 79, 25635–25655 (2020). https://doi.org/10.1007/s11042-020-09233-6

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-09233-6

Keywords

Navigation