Skip to main content
Log in

Breaking a novel colour image encryption algorithm based on chaos

  • Original Paper
  • Published:
Nonlinear Dynamics Aims and scope Submit manuscript

Abstract

Recently, a colour image encryption algorithm based on chaos was proposed by cascading two position permutation operations and one substitution operation, which are all determined by some pseudo-random number sequences generated by iterating the logistic map. This paper evaluates the security level of this encryption algorithm and finds that the position permutation-only part and the substitution part can be separately broken with only ⌈(log2(3MN))/8⌉ and 2 chosen plain-images, respectively, where MN is the size of the plain-image. The effectiveness of the proposed chosen-plaintext attack is supported by concise theoretical analyses, and is verified by experimental results.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1

Similar content being viewed by others

Notes

  1. To make the presentation more concise and complete, some notations in the original paper [19] are modified under the condition that the essential form of the encryption algorithm remains unchanged.

References

  1. Álvarez, G., Li, S.: Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurc. Chaos Appl. Sci. Eng. 16(8), 2129–2151 (2006)

    Article  MATH  Google Scholar 

  2. Arroyo, D., Diaz, J., Rodriguez, F.B.: Cryptanalysis of a one round chaos-based substitution permutation network. arXiv:1203.6866 (2012)

  3. Arroyo, D., Rhouma, R., Alvarez, G., Li, S., Fernandez, V.: On the security of a new image encryption scheme based on chaotic map lattices. Chaos 18(3), 033112 (2008)

    Article  Google Scholar 

  4. Chen, F., Wong, K.W., Liao, X., Xiang, T.: Period distribution of generalized discrete Arnold cat map for N=pe. IEEE Trans. Inf. Theory 58(1), 445–452 (2012)

    Article  MathSciNet  Google Scholar 

  5. Chen, G., Mao, Y., Chui, C.K.: A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons Fractals 21(3), 749–761 (2004)

    Article  MathSciNet  MATH  Google Scholar 

  6. Chen, J., Zhou, J., Wong, K.W.: A modified chaos-based joint compression and encryption scheme. IEEE Trans. Circuits Syst. II 58(2), 110–114 (2011)

    Article  Google Scholar 

  7. Hardy, G.H., Wright, E.M.: An Introduction to the Theory of Numbers, 6th edn. Oxford University Press, Oxford (2008)

    MATH  Google Scholar 

  8. Jakimoski, G., Subbalakshmi, K.: Cryptanalysis of some multimedia encryption schemes. IEEE Trans. Multimed. 10(3), 330–338 (2008)

    Article  Google Scholar 

  9. Li, C., Li, S., Asim, M., Nunez, J., Alvarez, G., Chen, G.: On the security defects of an image encryption scheme. Image Vis. Comput. 27(9), 1371–1381 (2009)

    Article  Google Scholar 

  10. Li, C., Li, S., Chen, G., Halang, W.A.: Cryptanalysis of an image encryption scheme based on a compound chaotic sequence. Image Vis. Comput. 27(8), 1035–1039 (2009)

    Article  Google Scholar 

  11. Li, C., Li, S., Zhang, D., Chen, G.: Cryptanalysis of a data security protection scheme for VoIP. IEE Proc., Vis. Image Signal Process. 153(1), 1–10 (2006)

    Article  Google Scholar 

  12. Li, C., Lo, K.T.: Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Process. 91(4), 949–954 (2011)

    Article  MATH  Google Scholar 

  13. Li, S., Li, C., Chen, G., Bourbakis, N.G., Lo, K.T.: A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Process. Image Commun. 23(3), 212–223 (2008)

    Article  Google Scholar 

  14. Mao, Y., Wu, M.: A joint signal processing and cryptographic approach to multimedia encryption. IEEE Trans. Image Process. 15(7), 2061–2075 (2006)

    Article  Google Scholar 

  15. Seyedzadeh, S.M., Mirzakuchaki, S.: A fast color image encryption algorithm based on coupled two-dimensional piecewise chaotic map. Signal Process. 92(5), 1202–1215 (2012)

    Article  Google Scholar 

  16. Solak, E., Cokal, C., Yildiz, O.T., Biyikoglu, T.: Cryptanalysis of Fridrich’s chaotic image encryption. Int. J. Bifurc. Chaos Appl. Sci. Eng. 20(5), 1405–1413 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  17. Stutz, T., Uhl, A.: A survey of H.264 AVC/SVC encryption. IEEE Trans. Circuits Syst. Video Technol. 22(3), 325–339 (2012)

    Article  Google Scholar 

  18. Tong, X., Cui, M.: Image encryption scheme based on 3d baker with dynamical compound chaotic sequence cipher generator. Signal Process. 89(4), 480–491 (2009)

    Article  MATH  Google Scholar 

  19. Wang, X., Teng, L., Qin, X.: A novel colour image encryption algorithm based on chaos. Signal Process. 92(4), 1101–1108 (2012)

    Article  Google Scholar 

  20. Wang, X.Y., Yang, L., Liu, R., Kadir, A.: A chaotic image encryption algorithm based on perceptron mode. Nonlinear Dyn. 62(3), 615–621 (2010)

    Article  MATH  Google Scholar 

  21. Zhang, Y., Li, C., Li, Q., Zhang, D., Shu, S.: Breaking a chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn. 69(3), 1091–1096 (2012)

    Article  Google Scholar 

  22. Zhou, J., Au, O.C., Wong, P.H.W.: Adaptive chosen-ciphertext attack on secure arithmetic coding. IEEE Trans. Signal Process. 57(5), 1825–1838 (2009)

    Article  Google Scholar 

Download references

Acknowledgements

This research was supported by the National Natural Science Foundation of China (Nos. 61100216, 61202398), Scientific Research Fund of Hunan Provincial Education Department (Nos. 11B124, 2011FJ2011), and Start-up Fund of Xiangtan University (No. 10QDZ40).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chengqing Li.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Li, C., Zhang, L.Y., Ou, R. et al. Breaking a novel colour image encryption algorithm based on chaos. Nonlinear Dyn 70, 2383–2388 (2012). https://doi.org/10.1007/s11071-012-0626-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11071-012-0626-5

Keywords

Navigation