Advertisement

Multimedia Tools and Applications

, Volume 76, Issue 12, pp 14021–14033 | Cite as

Cryptanalysis of a chaos-based image encryption scheme combining DNA coding and entropy

  • Xin Su
  • Weihai LiEmail author
  • Honggang Hu
Article

Abstract

An image encryption scheme based on chaos system combining with DNA coding and information entropy has been proposed recently, in which chaos system and DNA operation are used to perform substitution, and entropy driven chaos system is used to perform permutation. However, two vulnerabilities are found and presented in this paper, which make the encryption fail under chosen-plaintext attack. A complete chosen-plaintext attack algorithm is given to rebuild chaos systems’ outputs and recover plain image, and its efficiency is demonstrated by analysis and experiments. Further, some improvements are proposed to make up these vulnerabilities and enhance the security.

Keywords

Image encryption Chosen-plaintext cryptanalysis Chaotic system DNA encoding Information entropy 

References

  1. 1.
    Chen GR, Mao YB, Chui CK (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Soliton Frac 21(3):749–761. doi: 10.1016/j.chaos.2003.12.022 MathSciNetCrossRefzbMATHGoogle Scholar
  2. 2.
    Guan ZH, Huang FJ, Guan WJ (2005) Chaos-based image encryption algorithm. Phys Lett A 346(1-3):153–157. doi: 10.1016/j.physleta.2005.08.006 CrossRefzbMATHGoogle Scholar
  3. 3.
    Halvorsen K, Wong WP (2012) Binary DNA nanostructures for data encryption. Plos One 7(9). ARTN e44212 doi: 10.1371/journal.pone.0044212
  4. 4.
    Li SJ, Li CQ, Chen GR, Lo KT (2008) Cryptanalysis of the RCES/RSES image encryption scheme. J Syst Softw 81(7):1130–1143. doi: 10.1016/j.jss.2007.07.037 CrossRefGoogle Scholar
  5. 5.
    Masuda N, Jakimoski G, Aihara K, Kocarev L (2006) Chaotic block ciphers: from theory to practical algorithms. IEEE T Circuits-I 53(6):1341–1352. doi: 10.1109/Tcsi.2006.874186 MathSciNetCrossRefGoogle Scholar
  6. 6.
    Mirzaei O, Yaghoobi M, Irani H (2012) A new image encryption method: parallel sub-image encryption with hyper chaos. Nonlinear Dynam 67(1):557–566. doi: 10.1007/s11071-011-0006-6 MathSciNetCrossRefGoogle Scholar
  7. 7.
    Mousa H, Moustafa K, Abdel-Wahed W, Hadhoud M (2011) Data hiding based on contrast mapping using DNA medium. Int Arab J Inf Techn 8(2):147–154Google Scholar
  8. 8.
    O’Driscoll C (2009) DNA encryption On The Origin of Species could be archived in bacteria. Chem Ind-London 6:10–10Google Scholar
  9. 9.
    Rhouma R, Belghith S (2008) Cryptanalysis of a new image encryption algorithm based on hyper-chaos. Phys Lett A 372(38):5973–5978. doi: 10.1016/j.physleta.2008.07.057 CrossRefzbMATHGoogle Scholar
  10. 10.
    Shoshani S, Piran R, Arava Y, Keinan E (2012) A molecular cryptosystem for images by DNA computing. Angew Chem Int Edit 51(12):2883–2887. doi: 10.1002/anie.201107156 CrossRefGoogle Scholar
  11. 11.
    Solak E (2009) Cryptanalysis of image encryption with compound chaotic sequence. In: 2009 6th international multi-conference on systems, signals and devices, vol 1 and 2, pp 317–321Google Scholar
  12. 12.
    Solak E, Cokal C, Yildiz OT, Biyikoglu T (2010) Cryptanalysis of Fridrich’s chaotic image encryption. Int J Bifurcat Chaos 20(5):1405–1413. doi: 10.1142/S0218127410026563 MathSciNetCrossRefzbMATHGoogle Scholar
  13. 13.
    Xiao GZ, Lu MX, Lei Q, Lai XJ (2006) New field of cryptography: DNA cryptography. Chinese Sci Bull 51(12):1413–1420. doi: 10.1007/s11434-006-2012-5 MathSciNetzbMATHGoogle Scholar
  14. 14.
    Xiao D, Liao XF, Wei PC (2009) Analysis and improvement of a chaos-based image encryption algorithm. Chaos Soliton Frac 40(5):2191–2199. doi: 10.1016/j.chaos.2007.10.009 MathSciNetCrossRefzbMATHGoogle Scholar
  15. 15.
    Zhen P, Zhao G, Min LQ, Jin X (2015) Chaos-based image encryption scheme combining DNA coding and entropy. Multimed Tools Appl:1–17. doi: 10.1007/s11042-015-2573-x

Copyright information

© Springer Science+Business Media New York 2016

Authors and Affiliations

  1. 1.CAS Key Laboratory of Electromagnetic Space Information, School of Information Science and TechnologyUniversity of Science and Technology of ChinaHefeiChina

Personalised recommendations