Abstract
Image encryption is an important issue in information security. Due to sensitivity to initial values, randomness and simple computation, chaos-based image encryption algorithms efficiently provide security. In a recent paper a chaos-based image encryption was proposed that employs genetic algorithm to optimize correlation between adjacent pixels. We show via simulations a security exploit that can find the key and decrypt the image. To fix the the aforementioned vulnerability we harness Knuth shuffle where we replace the rand function with the logistic map. We then evaluate the security of our proposed algorithm by testing the impact of several attacks on it. We show that while improving the security, our algorithm keeps the same level of pixel entropy as the previous method. Moreover, the correlation coefficient among adjacent pixels of the cipher image was reduced by an order of magnitude.
Similar content being viewed by others
References
Abdullah AH, Enayatifar R, Lee M (2012) A hybrid genetic algorithm and chaotic function model for image encryption. AEU Int J Electron Commun 66(10):806–16
Alvarez E, Fernandez A, Garcıa P, Jiménez J, Marcano A (1999) New approach to chaotic encryption. Phys Lett A 263(4):373–5
Alvarez G, Montoya F, Romera M, Pastor G (2000) Cryptanalysis of a chaotic encryption system. Phys Lett A 276(1):191–6
Amin M, Faragallah OS, El-Latif AA (2010) A chaotic block cipher algorithm for image cryptosystems. Commun Nonlinear Sci Numer Simul 15(11):3484–97
Behnia S, Akhshani A, Mahmodi H, Akhavan A (2008) Novel algorithm for image encryption based on mixture of chaotic maps. Chaos, Solitons & Fractals 35(2):408–19
Belkhouche F, Qidwai U (2003) Binary image encoding using 1D chaotic maps. In: IEEE region 5, 2003 annual technical conference. IEEE, pp 39–43
Bouvry P, Seredyński F, Zomaya AY (2003) Application of cellular automata for cryptography. In: International conference on parallel processing and applied mathematics, pp 447–454
Chen G, Mao Y, Chui CKA (2004) Symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons & Fractals 21(3):749–61
Chen RJ, Lu WK, Lai JL (2005) Image encryption using progressive cellular automata substitution and SCAN. IEEE International Symposium on Circuits and Systems, pp 1690–1693
Chen RJ, Lai JL (2007) Image security system using recursive cellular automata substitution. Pattern Recogn 40(5):1621–31
Cheng H, Li X (2000) Partial encryption of compressed images and videos. IEEE Transactions on Signal Processing 48(8):2439–51
Enayatifar R (2011) Image encryption via logistic map function and heap tree. Int J Phys Sci 6(2):221–8
Encinas LH, Domínguez AP (2006) Comment on ’A technique for image encryption using digital signature’. Optics Commun 268(2):261–5
Gao T, Chen Z (2008) A new image encryption algorithm based on hyper-chaos. Phys Lett A 372(4):394–400
Ge X, Liu F, Lu B, Yang C (2010) Improvement of Rhouma’s attacks on Gao algorithm. Phys Lett A 374(11):1362–7
Guo JI (2000) A new chaotic key-based design for image encryption and decryption. In: The 2000 IEEE international symposium on circuits and systems, 2000. Proceedings. ISCAS, vol 4, pp 49–52
Jolfaei A, Mirghadri A (2010) A new approach to measure quality of image encryption. Int J Comput Netw Secur 2(8):38–44
Knuth DE (1998) The art of computer programming, sorting and searching. International Monetary Fund 3
Lafe O (1996) Data compression and encryption using cellular automata transforms. In: IEEE international joint symposia, intelligence and systems, pp 234–241
Li S, Zheng X (2002) Cryptanalysis of a chaotic image encryption method. In: IEEE international symposium, circuits and systems, ISCAS 2002, vol 2, pp II–708
Li C, Li S, Chen G, Chen G, Hu L (2005) Cryptanalysis of a new signal security system for multimedia data transmission, vol 2005, p 962703
Lian S, Sun J, Wang ZA (2005) Block cipher based on a suitable use of the chaotic standard map. Chaos, Solitons & Fractals 26(1):117–29
Liao X, Lai S, Zhou Q (2010) A novel image encryption algorithm based on self-adaptive wave transmission. Signal Processing 90(9):2714–2722
Lian S (2009) Efficient image or video encryption based on spatiotemporal chaos system. Chaos, Solitons & Fractals 40(5):2509–19
Liu Z, Xu L, Lin C, Dai J, Liu S (2011) Image encryption scheme by using iterative random phase encoding in gyrator transform domains. Opt Lasers Eng 49(4):542–6
Malan DJ, Welsh M, Smith MDA (2004) Public-key infrastructure for key distribution in tinyOS based on elliptic curve cryptography. In: Sensor and Ad Hoc Communications and Networks, IEEE SECON 2004. 2004 First Annual IEEE Communications Society Conference, pp 71–80
Mazloom S, Eftekhari-Moghadam AM (2009) Color image encryption based on coupled nonlinear chaotic map. Chaos, Solitons & Fractals 42(3):1745–54
Norouzi B, Mirzakuchaki S, Seyedzadeh SM, Mosavi MR (2014) A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process. Multimed Tools Appl 71(3):1469–97
Rhouma R, Belghith S (2008) Cryptanalysis of a new image encryption algorithm based on hyper-chaos. Phys Lett A 372(38):5973–8
Sivakumar T, Venkatesan R (2014) A novel approach for image encryption using dynamic SCAN pattern. IAENG Int J Comput Sci 41(2):91–101
Sun F, Liu S, Li Z, Lü ZA (2008) Novel image encryption scheme based on spatial chaos map. Chaos, Solitons & Fractals 38(3):631–40
Wang Y, Wong KW, Liao X, Chen G (2011) A new chaos-based fast image encryption algorithm. Applied Soft Computing 11(1):514–22
Wong KW, Kwok BS, Law WS (2008) A fast image encryption scheme based on chaotic standard map. Phys Lett A 372(15):2645–52
Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for image encryption. Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT) 1(2):31–38
Zhang Q, Guo L, Wei X (2010) Image encryption using DNA addition combining with chaotic maps. Mathematical and Computer Modelling 52 (11):2028–35
Zhang G, Liu Q (2011) A novel image encryption method based on total shuffling scheme. Opt Commun 284(12):2775–80
Zhu Z-L, Zhang W, Wong K-W, Yu H (2011) A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf Sci 181(6):1171–1186
Zhu C (2012) A novel image encryption scheme based on improved hyperchaotic sequences. Opt Commun 285(1):29–37
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Noshadian, S., Ebrahimzade, A. & Kazemitabar, S.J. Breaking a chaotic image encryption algorithm. Multimed Tools Appl 79, 25635–25655 (2020). https://doi.org/10.1007/s11042-020-09233-6
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-020-09233-6