Abstract
This paper proposes cryptanalysis of an image encryption scheme reported in (Khan, J Vib Control 21(16):3450–3455, 2015). The encryption scheme synthesized nonlinear substitution-box using Fourier series to accomplish encryption of color images. Security investigation unveils that the scheme has inherent flaws which can be exploited by an attacker to reveal the plain-image information. We show that the encryption scheme is breakable under chosen-plaintext attack without owning secret key. The simulation analyses bring to notice that Khan’s scheme is insecure for encryption of images during secure communication. Besides, an improved image encryption scheme is proposed which is backed up by better statistical results and performance.
Similar content being viewed by others
References
Furht, B., & Kirovski, D. (2006). Multimedia encryption and authentication techniques and applications. Boca Raton: CRC Press.
Gonçalves, D. D. O., & Costa, D. G. (2015). A survey of image security in wireless sensor networks. Journal of Imaging, 1(1), 4–30.
Ye, G. (2010). Image scrambling encryption algorithm of pixel bit based on chaos map. Pattern Recognition Letters, 31(5), 347–354.
Huang, C. K., & Nien, H. H. (2009). Multi chaotic systems based pixel shuffle for image encryption. Optics Communications, 282(11), 2123–2127.
Huang, C. K., Liao, C. W., Hsu, S. L., & Jeng, Y. C. (2013). Implementation of gray image encryption with pixel shuffling and gray-level encryption by single chaotic system. Telecommunication Systems, 52(2), 563–571.
Shyu, S. J. (2007). Image encryption by random grids. Pattern Recognition, 40(3), 1014–1031.
Ahmad, M., & Ahmad, T. (2014). Securing multimedia colour imagery using multiple high dimensional chaos-based hybrid keys. International Journal of Communication Networks and Distributed Systems, 12(1), 113–128.
Xu, Y., Wang, H., Li, Y., & Pei, B. (2014). Image encryption based on synchronization of fractional chaotic systems. Communications in Nonlinear Science and Numerical Simulation, 19(10), 3735–3744.
Rhouma, R., Meherzi, S., & Belghith, S. (2009). OCML-based colour image encryption. Chaos, Solitons and Fractals, 40(1), 309–318.
Patidar, V., Pareek, N. K., Purohit, G., & Sud, K. K. (2011). A robust and secure chaotic standard map based pseudorandom permutation-substitution scheme for image encryption. Optics Communications, 284(19), 4331–4339.
Chen, J. X., Zhu, Z. L., Fu, C., & Yu, H. (2014). A fast image encryption scheme with a novel pixel swapping-based confusion approach. Nonlinear Dynamics, 77(4), 1191–1207.
Xu, L., Gou, X., Li, Z., & Li, J. (2017). A novel chaotic image encryption algorithm using block scrambling and dynamic index based diffusion. Optics and Lasers in Engineering, 91, 41–52.
Khan, J. S., ur Rehman, A., Ahmad, J., & Habib, Z. (2015). A new chaos-based secure image encryption scheme using multiple substitution boxes. In Conference on Information Assurance and Cyber Security, (pp. 16–21), IEEE.
Shah, T., & Qureshi, A. (2016). Encrypting grayscale images using S-boxes chosen by logistic map. International Journal of Computer Science and Information Security, 14(4), 440.
Gondal, M. A., & Hussain, I. (2015). An image encryption scheme based on nonlinear chaotic algorithm and substitution box transformation. Applied Mathematics and Information Sciences, 9(6), 2991.
Hussain, I. (2016). Optical image encryption based on S-box transformation and fractional Hartley transform. Journal of Vibration and Control, 22(4), 1143–1146.
Hermassi, H., Rhouma, R., & Belghith, S. (2012). Security analysis of image cryptosystems only or partially based on a chaotic permutation. Journal of Systems and Software, 85(9), 2133–2144.
Jakimoski, G., & Subbalakshmi, K. P. (2008). Cryptanalysis of some multimedia encryption schemes. IEEE Transactions on Multimedia, 10(3), 330–338.
Dooley, J. F. (2013). A brief history of cryptology and cryptographic algorithms. Springer.
Al-Kadit, I. A. (1992). Origins of cryptology: The Arab contributions. Cryptologia, 16(2), 97–126.
Biryukov, A., Daemen, J., Lucks, S., & Vaudenay, S. (2017). Topics and Research Directions for Symmetric Cryptography. In Proceedings of Early Symmetric Crypto workshop, (pp. 1–4). University of Luxembourg.
Scopus: https://www.scopus.com. Accessed 19 Aug 2017.
Schneier, B. (1996). Applied Cryptography: Protocols Algorithms and Source Code in C. New York: Wiley.
Khan, M. (2015). A novel image encryption using Fourier series. Journal of Vibration and Control, 21(16), 3450–3455.
Fourier Series: http://mathworld.wolfram.com/FourierSeries.html. Accessed 21 Aug 2017.
Folland, G. B. (1992). Fourier Analysis and Its Applications. Pacific Grove: Brooks/Cole.
Military Cryptanalysis Part I- National Security Agency: http://www.nsa.gov/public_info/_files/military_cryptanalysis/mil_crypt_I.pdf. Accessed 7 Aug 2017.
Kerckhoffs’s principle: http://crypto-it.net/eng/theory/kerckhoffs.html. Accessed 26 July 2017.
Parvin, Z., Seyedarabi, H., & Shamsi, M. (2016). A new secure and sensitive image encryption scheme based on new substitution with chaotic function. Multimedia Tools and Applications, 75(17), 10631–10648.
Chen, Z., Lu, J., Yang, P., & Luo, X. (2017). Recognizing substitution steganography of spatial domain based on the characteristics of pixels correlation. International Journal of Digital Crime and Forensics, 9(4), 48–61.
Liu, H., & Wang, X. (2011). Color image encryption using spatial bit-level permutation and high-dimension chaotic system. Optics Communications, 284(16), 3895–3903.
Anees, A., Siddiqui, A. M., & Ahmed, F. (2014). Chaotic substitution for highly autocorrelated data in encryption algorithm. Communications in Nonlinear Science and Numerical Simulation, 19(9), 3106–3118.
Khan, F. A., Ahmed, J., Khan, J. S., Ahmad, J., & Khan, M. A. (2017). A novel image encryption based on Lorenz equation, Gingerbreadman chaotic map and S 8 permutation. Journal of Intelligent and Fuzzy Systems, 33(6), 1–13. (preprint).
Wu, Y., Zhou, Y., Saveriades, G., Agaian, S., Noonan, J. P., & Natarajan, P. (2013). Local Shannon entropy measure with statistical tests for image randomness. Information Sciences, 222, 323–342.
Chen, J., Zhu, Z. L., Zhang, L. B., Zhang, Y., & Yang, B. Q. (2018). Exploiting self-adaptive permutation–diffusion and DNA random encoding for secure and efficient image encryption. Signal Processing, 142, 340–353.
Wu, Y., Noonan, J. P., & Agaian, S. (2011). NPCR and UACI randomness tests for image encryption. Cyber journals: Multidisciplinary journals in science and technology, Journal of Selected Areas in Telecommunications, April Edition, 31–38.
Fouda, J. A. E., Effa, J. Y., & Ali, M. (2014). Highly secured chaotic block cipher for fast image encryption. Applied Soft Computing, 25, 435–444.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Ahmad, M., Doja, M.N. & Beg, M.M.S. Cryptanalysis and Improvement of an Image Encryption Scheme Using Fourier Series. 3D Res 8, 40 (2017). https://doi.org/10.1007/s13319-017-0150-y
Received:
Revised:
Accepted:
Published:
DOI: https://doi.org/10.1007/s13319-017-0150-y