A chaos triggered image encryption scheme was recently proposed [Ramalingam et al., Multimed Tools Appl, 2018, 77(10): 11669–11,692]. In this paper, this scheme was analyzed in detail, and then some shortcomings concerning the scheme were pointed out. For example, the combined chaos systems used in the scheme possess weak chaos characteristics, the scheme is insensitive with respect to cipher images, and above all, it is vulnerable to chosen plaintext attacks. After that, a well-designed chosen plaintext attack method was suggested to attack the equivalent secret keys of the scheme, and then the scheme was successfully deciphered in a short time. So, the scheme cannot be applied to actual communication systems.
Information security Image encryption Security analysis Chosen plaintext attack
This is a preview of subscription content, log in to check access.
This work was fully supported by the National Natural Science Foundation of China (Grant Nos. 61762043, 61562035, 61702238), and the Science and Technology Project of Education Department of Jiangxi Province, China (Grant No. GJJ160426).
Çavuşoğlu Ü, Kaçar S, Pehlivan I, Zengin A (2017) Secure image encryption algorithm design using a novel chaos based S-box. Chaos Solitons Fractals 95:92–101CrossRefGoogle Scholar
Cheng P, Yang H, Wei P, Zhang W (2015) A fast image encryption algorithm based on chaotic and lookup table. Nonlinear Dyn 79(3):2121–2131CrossRefGoogle Scholar
Fan H, Li M, Liu D, Zhang E Cryptanalysis of a colour image encryption using chaotic APFM nonlinear adaptive filter. Signal Process 143:28–41CrossRefGoogle Scholar
Gan Z, Chai X, Yuan K, Lu Y (2018) A novel image encryption algorithm based on LFT based S-boxes and chaos. Multimed Tools Appl 77:8759–8783CrossRefGoogle Scholar
Ghebleh M, Kanso A, Stevanovic D (2018) A novel image encryption algorithm based on piecewise linear chaotic maps and least squares approximation. Multimed Tools Appl 77:7305–7326CrossRefGoogle Scholar
Hanis S, Amutha R (2018) Double image compression and encryption scheme using logistic mapped convolution and cellular automata. Multimed Tools Appl 77:6897–6912CrossRefGoogle Scholar
Hu G, Xiao D, Wang Y, Li X (2017) Cryptanalysis of a chaotic image cipher using Latin square-based confusion and diffusion. Nonlinear Dyn 88(2):1305–1316CrossRefGoogle Scholar
Hua Z, Zhou Y (2016) Image encryption using 2D logistic-adjusted-sine map. Inf Sci 339:237–253CrossRefGoogle Scholar
Huang X, Ye G (2018) An image encryption algorithm based on irregular wave representation. Multimed Tools Appl 77(2):2611–2628CrossRefGoogle Scholar
Laiphrakpam DS, Khumanthem MS (2018) A robust image encryption scheme based on chaotic system and elliptic curve over finite field. Multimed Tools Appl 77:8629–8652CrossRefGoogle Scholar
Li C (2016) Cracking a hierarchical chaotic image encryption algorithm based on permutation. Signal Process 118:203–210CrossRefGoogle Scholar
Li B, Liao X, Jiang Y (2018) A novel image encryption scheme based on logistic map and dynatomic modular curve. Multimed Tools Appl 77:8911–8938CrossRefGoogle Scholar
Liu J, Yang D, Zhou H, Chen S (2018) A digital image encryption algorithm based on bit-planes and an improved logistic map. Multimed Tools Appl 77:10217–10233CrossRefGoogle Scholar
Noura H, Sleem L, Noura M, Mansour MM, Chehab A, Couturier R (2018) A new efficient lightweight and secure image cipher scheme. Multimed Tools Appl 77:15457–15484CrossRefGoogle Scholar
Ogiela L, Ogiela MR (2017) Insider threats and cryptographic techniques in secure information management. IEEE Syst J 11(2):405–414CrossRefGoogle Scholar
Ogiela U, Takizawa M, Ogiela L (2018) Visual CAPTCHA application in linguistic cryptography. Concurrency and Computation: Practice and Experience 30(2):1–8Google Scholar
Zhang Y, Tang Y (2018) A plaintext-related image encryption algorithm based on chaos. Multimed Tools Appl 77(6):6647–6669CrossRefGoogle Scholar
Zhang Y, Xiao D (2014) An image encryption scheme based on rotation matrix bit-level permutation and block diffusion. Commun Nonlinear Sci Numer Simulat 19(1):74–82CrossRefGoogle Scholar
Zhang D, Liao X, Yang B, Zhang Y (2017) A fast and efficient approach to color-image encryption based on compressive sensing and fractional Fourier transform. Multimed Tools Appl 77:2191–2208CrossRefGoogle Scholar