Skip to main content
Log in

Cryptanalysis of a chaos-based image encryption scheme combining DNA coding and entropy

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

An image encryption scheme based on chaos system combining with DNA coding and information entropy has been proposed recently, in which chaos system and DNA operation are used to perform substitution, and entropy driven chaos system is used to perform permutation. However, two vulnerabilities are found and presented in this paper, which make the encryption fail under chosen-plaintext attack. A complete chosen-plaintext attack algorithm is given to rebuild chaos systems’ outputs and recover plain image, and its efficiency is demonstrated by analysis and experiments. Further, some improvements are proposed to make up these vulnerabilities and enhance the security.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Chen GR, Mao YB, Chui CK (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Soliton Frac 21(3):749–761. doi:10.1016/j.chaos.2003.12.022

    Article  MathSciNet  MATH  Google Scholar 

  2. Guan ZH, Huang FJ, Guan WJ (2005) Chaos-based image encryption algorithm. Phys Lett A 346(1-3):153–157. doi:10.1016/j.physleta.2005.08.006

    Article  MATH  Google Scholar 

  3. Halvorsen K, Wong WP (2012) Binary DNA nanostructures for data encryption. Plos One 7(9). ARTN e44212 doi:10.1371/journal.pone.0044212

  4. Li SJ, Li CQ, Chen GR, Lo KT (2008) Cryptanalysis of the RCES/RSES image encryption scheme. J Syst Softw 81(7):1130–1143. doi:10.1016/j.jss.2007.07.037

    Article  Google Scholar 

  5. Masuda N, Jakimoski G, Aihara K, Kocarev L (2006) Chaotic block ciphers: from theory to practical algorithms. IEEE T Circuits-I 53(6):1341–1352. doi:10.1109/Tcsi.2006.874186

    Article  MathSciNet  Google Scholar 

  6. Mirzaei O, Yaghoobi M, Irani H (2012) A new image encryption method: parallel sub-image encryption with hyper chaos. Nonlinear Dynam 67(1):557–566. doi:10.1007/s11071-011-0006-6

    Article  MathSciNet  Google Scholar 

  7. Mousa H, Moustafa K, Abdel-Wahed W, Hadhoud M (2011) Data hiding based on contrast mapping using DNA medium. Int Arab J Inf Techn 8(2):147–154

    Google Scholar 

  8. O’Driscoll C (2009) DNA encryption On The Origin of Species could be archived in bacteria. Chem Ind-London 6:10–10

    Google Scholar 

  9. Rhouma R, Belghith S (2008) Cryptanalysis of a new image encryption algorithm based on hyper-chaos. Phys Lett A 372(38):5973–5978. doi:10.1016/j.physleta.2008.07.057

    Article  MATH  Google Scholar 

  10. Shoshani S, Piran R, Arava Y, Keinan E (2012) A molecular cryptosystem for images by DNA computing. Angew Chem Int Edit 51(12):2883–2887. doi:10.1002/anie.201107156

    Article  Google Scholar 

  11. Solak E (2009) Cryptanalysis of image encryption with compound chaotic sequence. In: 2009 6th international multi-conference on systems, signals and devices, vol 1 and 2, pp 317–321

  12. Solak E, Cokal C, Yildiz OT, Biyikoglu T (2010) Cryptanalysis of Fridrich’s chaotic image encryption. Int J Bifurcat Chaos 20(5):1405–1413. doi:10.1142/S0218127410026563

    Article  MathSciNet  MATH  Google Scholar 

  13. Xiao GZ, Lu MX, Lei Q, Lai XJ (2006) New field of cryptography: DNA cryptography. Chinese Sci Bull 51(12):1413–1420. doi:10.1007/s11434-006-2012-5

    MathSciNet  MATH  Google Scholar 

  14. Xiao D, Liao XF, Wei PC (2009) Analysis and improvement of a chaos-based image encryption algorithm. Chaos Soliton Frac 40(5):2191–2199. doi:10.1016/j.chaos.2007.10.009

    Article  MathSciNet  MATH  Google Scholar 

  15. Zhen P, Zhao G, Min LQ, Jin X (2015) Chaos-based image encryption scheme combining DNA coding and entropy. Multimed Tools Appl:1–17. doi:10.1007/s11042-015-2573-x

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Weihai Li.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Su, X., Li, W. & Hu, H. Cryptanalysis of a chaos-based image encryption scheme combining DNA coding and entropy. Multimed Tools Appl 76, 14021–14033 (2017). https://doi.org/10.1007/s11042-016-3800-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-016-3800-9

Keywords

Navigation