Skip to main content
Log in

Breaking a chaotic image encryption algorithm based on perceptron model

  • Original Paper
  • Published:
Nonlinear Dynamics Aims and scope Submit manuscript

Abstract

Recently, a chaotic image encryption algorithm based on the perceptron model was proposed. The present paper analyzes the security of the algorithm and finds that the equivalent secret key can be reconstructed with only one pair of known-plaintext/ciphertext, which is supported by both mathematical proof and experiment results. In addition, two other security defects are also reported.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

Notes

  1. To make the presentation more concise and complete, some notations in the original paper [23] are modified, and some details of the algorithm are also amended under the condition that its security property is not influenced.

References

  1. Álvarez, G., Li, S.: Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurc. Chaos 16(8), 2129–2151 (2006)

    Article  MATH  Google Scholar 

  2. Álvarez, G., Li, S.: Cryptanalyzing a nonlinear chaotic algorithm (NCA) for image encryption. Commun. Nonlinear Sci. Numer. Simul. 14(11), 3743–3749 (2009)

    Article  Google Scholar 

  3. Atkinson, K.E.: An Introduction to Numerical Analysis. Wiley, New York (1989)

    MATH  Google Scholar 

  4. Chen, G., Mao, Y., Chui, C.K.: A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons Fractals 21(3), 749–761 (2004)

    Article  MathSciNet  MATH  Google Scholar 

  5. Chen, J., Zhou, J., Wong, K.W.: A modified chaos-based joint compression and encryption scheme. IEEE Trans. Circuits Syst. II 58(2), 110–114 (2011)

    Article  Google Scholar 

  6. Chen, Z., Ip, W.H., Chan, C.Y., Yung, K.L.: Two-level chaos-based video cryptosystem on H.263 codec. Nonlinear Dyn. 62(3), 647–664 (2010)

    Article  Google Scholar 

  7. Fridrich, J.: Symmetric ciphers based on two-dimensional chaotic maps. Int. J. Bifurc. Chaos 8(6), 1259–1284 (1998)

    Article  MathSciNet  MATH  Google Scholar 

  8. Guo, D.H.: A new symmetric probabilistic encryption scheme based on chaotic attractors of neural networks. Appl. Intell. 10(1), 71–84 (1999)

    Article  Google Scholar 

  9. Kerckhoffs, A.: La cryptographie militaire. J. Sci. Mil. 9(1), 5–38 (1883)

    Google Scholar 

  10. Leung, K.C., Li, S.L., Cheng, L.M., Chan, C.K.: A symmetric probabilistic encryption scheme based on CHNN without data expansion. Neural Process. Lett. 24(2), 93–105 (2006)

    Article  Google Scholar 

  11. Li, C., Chen, M.Z.Q., Lo, K.T.: Breaking an image encryption algorithm based on chaos. Int. J. Bifurc. Chaos 21(7), 2067–2076 (2011)

    Article  Google Scholar 

  12. Li, C., Li, S., Álvarez, G., Chen, G., Lo, K.T.: Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations. Phys. Lett. A 369(1–2), 23–30 (2007)

    Article  MATH  Google Scholar 

  13. Li, C., Li, S., Zhang, D., Chen, G.: Cryptanalysis of a chaotic neural network based multimedia encryption scheme. In: Lecture Notes in Computer Science, vol. 3333, pp. 418–425 (2004)

    Google Scholar 

  14. Li, C., Li, S., Zhang, D., Chen, G.: Chosen-plaintext cryptanalysis of a clipped-neural-network-based chaotic cipher. In: Lecture Notes in Computer Science, vol. 3497, pp. 630–636 (2005)

    Google Scholar 

  15. Li, S., Chen, G., Mou, X.: On the dynamical degradation of digital piecewise linear chaotic maps. Int. J. Bifurc. Chaos 15(10), 3119–3151 (2005)

    Article  MathSciNet  MATH  Google Scholar 

  16. Lian, S.: A block cipher based on chaotic neural networks. Neurocomputing 72(4–6), 1296–1301 (2009)

    Article  Google Scholar 

  17. Mislovaty, R., Klein, E., Kanter, I., Kinzel, W.: Public channel cryptography by synchronization of neural networks and chaotic maps. Phys. Rev. Lett. 91(11), 110401 (2003)

    Article  Google Scholar 

  18. Rhouma, R., Belghith, S.: Cryptanalysis of a spatiotemporal chaotic image/video cryptosystem. Phys. Lett. A 372(36), 5790–5794 (2008)

    Article  MATH  Google Scholar 

  19. Rukhin, A., Soto, J., Nechvatal, J., Smid, M., Barker, E., Leigh, S., Levenson, M., Vangel, M., Banks, D., Heckert, A., Dray, J., Vo, S.: A statistical test suite for random and pseudorandom number generators for cryptographic applications. NIST Special Publication 800-22rev1a (2010). Available online at http://csrc.nist.gov/groups/ST/toolkit/rng/documentation_software.html

  20. Shannon, C.E.: Communication theory of secrecy systems. Bell Syst. Tech. J. 28(4), 656–715 (1949)

    MathSciNet  MATH  Google Scholar 

  21. Sheu, L.J.: A speech encryption using fractional chaotic systems. Nonlinear Dyn. 65(1–2), 103–108 (2011)

    Article  MathSciNet  MATH  Google Scholar 

  22. Solak, E.: Partial identification of Lorenz system and its application to key space reduction of chaotic cryptosystems. IEEE Trans. Circuits Syst. II, Express Briefs 51(10), 557–560 (2004)

    Article  Google Scholar 

  23. Wang, X.Y., Yang, L., Liu, R., Kadir, A.: A chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn. 62(3), 615–621 (2010)

    Article  MATH  Google Scholar 

  24. Zhou, J., Au, O.C.: On the security of chaotic convolutional coder. IEEE Trans. Circuits Syst. I 58(3), 595–606 (2011)

    Article  MathSciNet  Google Scholar 

  25. Zhou, T., Liao, X., Chen, Y.: A novel symmetric cryptography based on chaotic signal generator and a clipped neural network. In: Lecture Notes in Computer Science, vol. 3174, pp. 639–644 (2004)

    Google Scholar 

Download references

Acknowledgements

This research was supported by the National Natural Science Foundation of China (No. 61100216), Scientific Research Fund of Hunan Provincial Education Department (Nos. 11B124, 2011FJ2011), and Ningbo Natural Science Foundation (No. 2011A610194).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chengqing Li.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Zhang, Y., Li, C., Li, Q. et al. Breaking a chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn 69, 1091–1096 (2012). https://doi.org/10.1007/s11071-012-0329-y

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11071-012-0329-y

Keywords

Navigation