Skip to main content
Log in

On the security of a new image encryption scheme based on a chaotic function

  • Original Paper
  • Published:
Signal, Image and Video Processing Aims and scope Submit manuscript

Abstract

This paper analyses the security of a recently proposed image encryption algorithm and shows a series of weaknesses that make it unusable in applications requiring medium or high levels of security. We show that the algorithm has some minor flaws, such as impractical decryption or impossibility to encrypt black images as well as a major flow, linearity, which makes it vulnerable to cryptanalysis. We present a chosen cipher text attack and show that, after the cryptanalysis, an attacker can successfully decrypt any cipher image, without knowledge of the secret key.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Natarahan, S., Puhan, N.B., Meher, P.K.: Special section on image and video security. Signal Image Video Process. 7(4), 607–608 (2013)

    Google Scholar 

  2. Alvarez, G., Li, S.: Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurcat. Chaos 16(8), 2129–2151 (2006)

    Article  MATH  MathSciNet  Google Scholar 

  3. Caragata, D., El Assad, S., Bakhache, B., Tutanescu, I.: Secure IP over satellite DVB using chaotic sequences. Eng. Lett. 18(2), 135–146 (2010)

    Google Scholar 

  4. Zhu, Z.-I., Zhang, W. , Wong, K.-W., Yu, H.: A chaos-based symmetric image encryption scheme using a bit-level permutation, Inf. Sci. 181(6), 1171–1186 (2011)

    Google Scholar 

  5. Yang, H., Wong, K.-W., Liao, X., Zhang, W., Wei, P.: A fast image encryption and authentication scheme based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 15(11), 3507–3517 (2010)

    Google Scholar 

  6. Wang, Y., Wong, K.-W., Liao, X., Chen, G.: A new chaos-based fast image encryption algorithm. Appl. Soft Comput. 11(1), 514–522 (2011)

    Article  Google Scholar 

  7. Awad, A., El Assad, S., Caragata, D.: A robust cryptosystem based chaos for secure data. In: International Symposium on Image/Video Communications Over Fixed and Mobile Networks, Bilbao, Spain (2008)

  8. El-Latif, A.A.A., Niu, X.: A hybrid chaotic system and cyclic elliptic curve for image encryption. Int. J. Electron. Commun. (AEU) 67(2), 136–143 (2013)

    Google Scholar 

  9. Abdullah, A.H., Enayatifar, R., Lee, M.: A hybrid genetic algorithm and chaotic function model for image encryption. Int. J. Electron. Commun. (AEU) 66(10), 806–816 (2012)

    Article  Google Scholar 

  10. Al-Romema, N.A., Mashat, A.S., AlBidewi, I.: New chaos-based image encryption scheme for RGB components of color image. Comput. Sci. Eng. 2(5), 77–85 (2012). doi:10.5923/j.computer.20120205.06

    Article  Google Scholar 

  11. Xiang, T., Liao, X., Tang, G., Chen, Y., Wong, K.: A novel block cryptosystem based on iterating a chaotic map. Phys. Lett. A 349(1–4), 109–115 (2006)

    Article  MATH  Google Scholar 

  12. Yu, W., Cao, J.: Cryptography based on delayed chaotic neural networks. Phys. Lett. A 356(4), 333–338 (2006)

    MATH  Google Scholar 

  13. Pisarchik, A., Flores-Carmona, N., Carpio-Valadez, M.: Encryption and decryption of images with chaotic map lattices. Chaos Interdiscip. J. Nonlinear Sci. 16, 033118 (2006)

    Google Scholar 

  14. Li, C., Li, S., Alvarez, G., Chen, G., Lo, K.-T.: Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations. Phys. Lett. A 369(1–2), 23–30 (2007)

    Article  MATH  Google Scholar 

  15. Arroyo, D., Li, C., Li, S., Alvarez, G., Hallang, W.A.: Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm. Chaos Solitons Fractals 41(5), 2613–2616 (2009)

    Article  MATH  Google Scholar 

  16. Solak, E., Cokal, C., Yildiz, O.T.: Cryptanalysis of Fridrichs chaotic image encryption. Int. J. Bifurcat. Chaos 20(5), 1405–1413 (2010)

    Article  MATH  MathSciNet  Google Scholar 

  17. Solak, E., Rhouma, R., Belghith, S.: Cryptanalysis of a multi-chaotic systems based image cryptosystem. Opt. Commun. 283(2), 232–236 (2010)

    Google Scholar 

  18. Arroyo, D., Rhouma, R., Alvarez, G., Li, S., Fernandez, V.: On the security of a new image encryption scheme based on chaotic map lattices. Chaos 18, 033112 (2008)

    Google Scholar 

  19. Francois, M., Grosges, T., Barchiesi, D., Erra, R.: A new image encryption scheme based on chaotic function. Signal Process. Image Commun. 27, 249–259 (2012)

    Article  Google Scholar 

  20. Ferguson, N., Schneier, B., Kohno, T.: Cryptography Engineering: Design Principles and Practical Applications. Wiley, London (2010)

    Google Scholar 

  21. Schneier, B.: Applied Cryptography. Wiley, London (1996)

    Google Scholar 

  22. NIST Special Publication 800-57: Recommendation for key management part 1: general (revision 3) (2012)

  23. ECRYPT II Network of Excellence: Yearly report on algorithms and keysizes (2009–2010) (2010)

Download references

Acknowledgments

Financial support from USM Project 23.13.84 is gratefully acknowledged.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Daniel Caragata.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Caragata, D., Tutanescu, I. On the security of a new image encryption scheme based on a chaotic function. SIViP 8, 641–646 (2014). https://doi.org/10.1007/s11760-013-0572-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11760-013-0572-9

Keywords

Navigation