Abstract
A modeling description of Ye algorithm is first presented in this paper. Then a chosen plaintext attack is proposed aiming at the drawback of Ye algorithm that the generation procedure of permutation vectors has no relation with plain image. With the attack, the permutation vectors (keystreams equivalent to secret key) can be correctly recovered with only ceil(log2(8MN)) chosen plain images, which is proved by Proposition 1. Thirdly, an improvement of Ye algorithm is proposed. Experiments and analysis show the validity of chosen plaintext attack and the security of improved algorithm. Attack and improvement proposed in this paper provides concrete method of security analysis and “plain image related” design idea of secure permutation against chosen plaintext attack for analysis and design of chaos based image encryption algorithm.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Scharinger, J.: Fast encryption of image data using chaotic Kolmogorov flows. Electron. Imaging 7(2), 318–325 (1998)
Huang, C.K., Nien, H.H.: Multi chaotic system based pixel shuffle for image encryption. Opt. Commun. 282, 2123–2127 (2009)
Yen, J.C., Guo, J.I.: A new chaotic image encryption algorithm. In: Proceedings of (Taiwan) National Symposium on Telecommunications, pp. 358–362 (1998)
Yen, J.C., Guo, J.I.: A new hierarchical chaotic image encryption algorithm and its hardware architecture. In: Proceedings of 1998 Ninth VLSI DESIGN/CAD Symposium (1998)
Guo, J.I., Yen, J.C.: The design and realization of a new hierarchical chaotic image encryption algorithm. In: Proceedings of 1999 International Symposium on Communications, pp. 210–214 (1999)
Yen, J.C., Guo, J.I.: Efficient hierarchical chaotic image encryption algorithm and its VLSI realization. In: IEE Proceedings-Vision, Image and Signal Processing, vol. 147, no. 2, pp. 167–175 (2000)
Ye, G.D.: Image scrambling encryption algorithm of pixel bit based on chaos map. Pattern Recogn. Lett. 31(5), 347–354 (2010)
Li, C.Q., Lo, K.T.: Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Sig. Process. 91, 949–954 (2011)
Lian, S.G.: Efficient image or video encryption based on spatiotemporal chaos system. Chaos Soliton Fractals 40, 2509–2519 (2009)
Ge, X., Liu, F.L., Lu, B., Wang, W.: Cryptanalysis of a spatiotemporal chaotic image/videocryptosystem and its improved version. Phys. Lett. A 375, 908–913
Li, C.Q., Liu, Y.S., Xie, T., ChenMichael, Z.Q.: Breaking a novel image encryption scheme basedon improved hyperchaotic sequences. Nonlinear Dyn. 73, 2083–2089 (2013)
Zhu, C.: A novel image encryption scheme based on improved hyperchaotic sequences. Opt. Commun. 285(1), 29–37 (2012)
Zhang, L.Y., Hu, X.B., Liu, Y.S., Wong, K.W., Gan, J.: A chaotic image encryption scheme owning temp-value feedback. Commun. Nonlinear Sci. Numer. Simul. 19, 3653–3659 (2014)
Gao, T.G., Chen, Z.Q.: A new image encryption algorithm based on hyper-chaos. Phys. Lett. A 372, 394–400 (2008)
Rhouma, R., Belghith, S.: Cryptanalysis of a new image encryption algorithm based on hyper-chaos. Phys. Lett. A 372, 5973–5978 (2008)
Ge, X., Liu, F.L., Lu, B., Yang, C.F.: Improvement of Rhouma’s attacks on Gao algorithm. Phys. Lett. A 374, 1362–1367
Acknowledgments
The work described in this paper was partially supported by the National Natural Science Foundation of China (Grant No. 61601517, No. 60902102, No. 60970141), basic and advanced technology research project of Henan Province, China (Grant No. 2014302703).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Lu, B., Liu, F., Xu, P., Ge, X. (2018). Analysis and Improvement on an Image Encryption Algorithm Based on Bit Level Permutation. In: Sun, X., Pan, Z., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2018. Lecture Notes in Computer Science(), vol 11065. Springer, Cham. https://doi.org/10.1007/978-3-030-00012-7_46
Download citation
DOI: https://doi.org/10.1007/978-3-030-00012-7_46
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-00011-0
Online ISBN: 978-3-030-00012-7
eBook Packages: Computer ScienceComputer Science (R0)