Skip to main content
Log in

Cryptanalysis and improvement in a chaotic image cipher using two-round permutation and diffusion

  • Original Paper
  • Published:
Nonlinear Dynamics Aims and scope Submit manuscript

Abstract

Cryptanalysis is significant for the design of secure image cryptosystem. Recently, a chaotic image encryption scheme using two rounds of Latin square-based permutation and diffusion was proposed. Although two-round encryption is used, the cryptosystem has still been cracked successfully by the combined attack using both chosen-plaintext attack (CPA) and chosen-ciphertext attack due to the inherent flaw that the same key was used in both permutation and diffusion phases of each round. Therefore, different keys are used in each encryption phase of the improved cryptosystem. However, in this paper, we further attacked the two-round encryption with different keys using only CPA. By counting the number of the diffused pixels in the first diffusion phase from the processed encrypted image, the first permutation of one pixel is confirmed, and then the whole equivalent key stream of the first permutation can be obtained by limited CPA. Based on this, the key stream of the third permutation phase is obtained in a similar way. Meanwhile, all the mappings of the fourth diffusion are collected by 256 CPA, and 17 possible mappings in average are selected by verification. Finally, the key stream of the second diffusion is obtained using two pairs of chosen images. Experiments show that the encrypted image can be cracked successfully by the proposed attack. This work is instructive to the cryptanalysis of multi-round encryption. In order to remedy the security weakness, an improved cryptosystem is also proposed, followed by thorough security analysis.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Özkaynak, F.: Brief review on application of nonlinear dynamics in image encryption. Nonlinear Dyn. 92(2), 305–313 (2018)

    Article  Google Scholar 

  2. Li, C.Q., Xie, T., Liu, Q., Cheng, G.: Cryptanalyzing image encryption using chaotic logistic map. Nonlinear Dyn. 78(2), 1545–1551 (2014)

    Article  Google Scholar 

  3. Li, X., Wang, Y., Wang, Q.H., Liu, Y., Zhou, X.: Modified integral imaging reconstruction and encryption using an improved SR reconstruction algorithm. Opt. Lasers Eng. 112, 162–169 (2019)

    Article  Google Scholar 

  4. Li, C.Q., Lin, D.D., Feng, B.B., Lü, J.H., Hao, F.: Cryptanalysis of a chaotic image encryption algorithm based on information entropy. IEEE Access 6, 75834–75842 (2018)

    Article  Google Scholar 

  5. Fridrich, J.: Symmetric ciphers based on two-dimensional chaotic maps. Int. J. Bifurcat. Chaos 8(6), 1259–1284 (1998)

    Article  MathSciNet  MATH  Google Scholar 

  6. Zhang, W., Yu, H., Zhao, Y.L., Zhu, Z.L.: Image encryption based on three-dimensional bit matrix permutation. Signal Process. 118, 36–50 (2016)

    Article  Google Scholar 

  7. Chen, J.X., Zhu, Z.L., Yu, H.: A fast chaos-based symmetric image cryptosystem with an improved diffusion scheme. Optik 125(11), 2472–2478 (2014)

    Article  Google Scholar 

  8. Zhang, W., Wong, K.W., Yu, H., Zhu, Z.L.: A symmetric color image encryption algorithm using the intrinsic features of bit distributions. Commun. Nonlinear Sci. Numer. Simul. 18(3), 584–600 (2013)

    Article  MathSciNet  MATH  Google Scholar 

  9. Chen, G.R., Mao, Y.B., Chui, C.K.: A symmetric image encryption scheme based on 3D chaotic cat maps. J. Chaos Solitons Fractals 21(3), 749–761 (2004)

    Article  MathSciNet  MATH  Google Scholar 

  10. Parvin, Z., Seyedarabi, H., Shamsi, M.: A new secure and sensitive image encryption scheme based on new substitution with chaotic function. Multimed. Tools Appl. 75(17), 10631–10648 (2016)

    Article  Google Scholar 

  11. He, X.P., Zhu, Q.S., Gu, P.: A new chaos-based encryption method for color image. In: Proceedings of the International Conference on Rough Sets and Knowledge Technology, Chongquing, China, pp. 671–678 (2006)

  12. Yang, Y.G., Pan, Q.X., Sun, S.J., Xu, P.: Novel image encryption based on quantum walks. Sci. Rep. 5, 7784 (2015)

    Article  Google Scholar 

  13. Liu, H.J., Kadir, A., Sun, X.B.: Chaos-based fast colour image encryption scheme with true random number keys from environmental noise. IET Image Process. 11(5), 324–332 (2017)

    Article  Google Scholar 

  14. Liu, H.J., Kadir, A., Sun, X.B., Li, Y.L.: Chaos based adaptive double-image encryption scheme using hash function and S-boxes. Multimed. Tools Appl. 77(1), 1391–1407 (2018)

    Article  Google Scholar 

  15. Norouzi, B., Mirzakuchaki, S., Seyedzadeh, S.M., Mosavi, M.R.: A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process. Multimed. Tools Appl. 71(3), 1469–1497 (2014)

    Article  Google Scholar 

  16. Zhu, H.G., Zhao, C., Zhang, X.D., Yang, L.P.: An image encryption scheme using generalized Arnold map and affine cipher. Optik 125(22), 6672–6677 (2014)

    Article  Google Scholar 

  17. Liu, H.J., Kadir, A.: Asymmetric color image encryption scheme using 2D discrete-time map. Signal Process. 113, 104–112 (2015)

    Article  Google Scholar 

  18. Li, M., Guo, Y.Z., Huang, J., Li, Y.: Cryptanalysis of a chaotic image encryption scheme based on permutation–diffusion structure. Signal Process. Image Commun. 62, 164–172 (2018)

    Article  Google Scholar 

  19. Li, C.Q., Lin, D.D., Lü, J.H., Hao, F.: Cryptanalyzing an image encryption algorithm based on autoblocking and electrocardiography. IEEE Multimed. 25(4) (2018). https://doi.org/10.1109/MMUL.2018.2873472

  20. Zhang, L.Y., Liu, Y.S., Pareschi, F., Zhang, Y.S., Wong, K.W., Rovatti, R., Setti, G.: On the security of a class of diffusion mechanisms for image encryption. IEEE Trans. Cybern. 48(4), 1–13 (2018)

    Article  Google Scholar 

  21. Li, C.Q., Lin, D.D., Lü, J.H.: Cryptanalyzing an image scrambling encryption algorithm of pixel bits. IEEE Multimed. 24(3), 64–71 (2017)

    Article  Google Scholar 

  22. Solak, E., Yildiz, O.T.: Cryptanalysis of Fridrich’s chaotic image encryption. Int. J. Bifurcat. Chaos 20, 1405–1413 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  23. Li, C.Q.: Cracking a hierarchical chaotic image encryption algorithm based on permutation. Signal Process. 118(C), 203–210 (2016)

    Article  Google Scholar 

  24. Li, C.Q., Lo, K.T.: Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Process. 91(4), 949–954 (2011)

    Article  MATH  Google Scholar 

  25. Liu, Y.S., Zhang, L.Y., Wang, J., Zhang, Y.S., Wong, K.W.: Chosen-plaintext attack of an image encryption scheme based on modified permutation–diffusion structure. Nonlinear Dyn. 84(4), 1–10 (2015)

    MATH  Google Scholar 

  26. Xie, E.Y., Li, C.Q., Yu, S.M., Lü, J.H.: On the cryptanalysis of Fridrich’s chaotic image encryption scheme. Signal Process. 132, 150–154 (2016)

    Article  Google Scholar 

  27. Zhang, Y.S., Xiao, D., Wen, W.Y., Li, M.: Breaking an image encryption algorithm based on hyper-chaotic system with only one round diffusion process. Nonlinear Dyn. 76(3), 1645–1650 (2014)

    Article  Google Scholar 

  28. Li, C.Q., Liu, Y.S., Zhang, L.Y., Wong, K.W.: Cryptanalyzing a class of image encryption schemes based on Chinese remainder theorem. Signal Process. Image Commun. 29(8), 914–920 (2014)

    Article  Google Scholar 

  29. Li, C.Q., Liu, Y.S., Xie, T., Chen, M.Z.Q.: Breaking a novel image encryption scheme based on improved hyperchaotic sequences. Nonlinear Dyn. 73(3), 2083–2089 (2013)

    Article  MathSciNet  MATH  Google Scholar 

  30. Chai, X., Fu, X., Gan, Z., Lu, Y., Chen, Y.: A color image cryptosystem based on dynamic DNA encryption and chaos. Signal Process. 155, 44–62 (2019)

    Article  Google Scholar 

  31. Zhu, C.X., Wang, G.J., Sun, K.H.: Improved cryptanalysis and enhancements of an image encryption scheme using combined 1D chaotic maps. Entropy 20(11), 843 (2018)

    Article  Google Scholar 

  32. Wang, M.X., Wang, X.Y., Zhang, Y.Q., Gao, Z.G.: A novel chaotic encryption scheme based on image segmentation and multiple diffusion models. Opt. Laser Tecnnol. 108, 558–573 (2018)

    Article  Google Scholar 

  33. Hua, Z., Yi, S., Zhou, Y.: Medical image encryption using high-speed scrambling and pixel adaptive diffusion. Signal Process. 144, 134–144 (2018)

    Article  Google Scholar 

  34. Hu, G.Q., Xiao, D., Wang, Y., Li, X.Y.: Cryptanalysis of a chaotic image cipher using Latin square-based confusion and diffusion. Nonlinear Dyn. 88(2), 1305–1316 (2017)

    Article  MATH  Google Scholar 

  35. Chen, J.X., Zhu, Z.L., Fu, C., Zhang, L.B., Zhang, Y.S.: An efficient image encryption scheme using lookup table-based confusion and diffusion. Nonlinear Dyn. 81(3), 1151–1166 (2015)

    Article  Google Scholar 

  36. Belazi, A., Abd Ellatif, A.A., Belghith, S.: A novel image encryption scheme based on substitution–permutation network and chaos. Signal Process. 128, 155–170 (2016)

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported by the National Natural Science Foundation of China (Grant Nos. 61602158, U1604156, U1604154), the Science Foundation for the Excellent Youth Scholars of Henan Normal University (Grant No. YQ201607), and the Science and Technology Research Project of Henan Province (Grant No. 182102210374).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yushu Zhang.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Li, M., Lu, D., Xiang, Y. et al. Cryptanalysis and improvement in a chaotic image cipher using two-round permutation and diffusion. Nonlinear Dyn 96, 31–47 (2019). https://doi.org/10.1007/s11071-019-04771-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11071-019-04771-7

Keywords

Navigation