Signal, Image and Video Processing

, Volume 8, Issue 4, pp 641–646 | Cite as

On the security of a new image encryption scheme based on a chaotic function

Original Paper


This paper analyses the security of a recently proposed image encryption algorithm and shows a series of weaknesses that make it unusable in applications requiring medium or high levels of security. We show that the algorithm has some minor flaws, such as impractical decryption or impossibility to encrypt black images as well as a major flow, linearity, which makes it vulnerable to cryptanalysis. We present a chosen cipher text attack and show that, after the cryptanalysis, an attacker can successfully decrypt any cipher image, without knowledge of the secret key.


Image encryption Cryptanalysis  Chaotic functions  Chosen cipher text attack 



Financial support from USM Project 23.13.84 is gratefully acknowledged.


  1. 1.
    Natarahan, S., Puhan, N.B., Meher, P.K.: Special section on image and video security. Signal Image Video Process. 7(4), 607–608 (2013)Google Scholar
  2. 2.
    Alvarez, G., Li, S.: Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurcat. Chaos 16(8), 2129–2151 (2006)CrossRefMATHMathSciNetGoogle Scholar
  3. 3.
    Caragata, D., El Assad, S., Bakhache, B., Tutanescu, I.: Secure IP over satellite DVB using chaotic sequences. Eng. Lett. 18(2), 135–146 (2010)Google Scholar
  4. 4.
    Zhu, Z.-I., Zhang, W. , Wong, K.-W., Yu, H.: A chaos-based symmetric image encryption scheme using a bit-level permutation, Inf. Sci. 181(6), 1171–1186 (2011)Google Scholar
  5. 5.
    Yang, H., Wong, K.-W., Liao, X., Zhang, W., Wei, P.: A fast image encryption and authentication scheme based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 15(11), 3507–3517 (2010)Google Scholar
  6. 6.
    Wang, Y., Wong, K.-W., Liao, X., Chen, G.: A new chaos-based fast image encryption algorithm. Appl. Soft Comput. 11(1), 514–522 (2011)CrossRefGoogle Scholar
  7. 7.
    Awad, A., El Assad, S., Caragata, D.: A robust cryptosystem based chaos for secure data. In: International Symposium on Image/Video Communications Over Fixed and Mobile Networks, Bilbao, Spain (2008)Google Scholar
  8. 8.
    El-Latif, A.A.A., Niu, X.: A hybrid chaotic system and cyclic elliptic curve for image encryption. Int. J. Electron. Commun. (AEU) 67(2), 136–143 (2013)Google Scholar
  9. 9.
    Abdullah, A.H., Enayatifar, R., Lee, M.: A hybrid genetic algorithm and chaotic function model for image encryption. Int. J. Electron. Commun. (AEU) 66(10), 806–816 (2012)CrossRefGoogle Scholar
  10. 10.
    Al-Romema, N.A., Mashat, A.S., AlBidewi, I.: New chaos-based image encryption scheme for RGB components of color image. Comput. Sci. Eng. 2(5), 77–85 (2012). doi: 10.5923/ CrossRefGoogle Scholar
  11. 11.
    Xiang, T., Liao, X., Tang, G., Chen, Y., Wong, K.: A novel block cryptosystem based on iterating a chaotic map. Phys. Lett. A 349(1–4), 109–115 (2006)CrossRefMATHGoogle Scholar
  12. 12.
    Yu, W., Cao, J.: Cryptography based on delayed chaotic neural networks. Phys. Lett. A 356(4), 333–338 (2006)MATHGoogle Scholar
  13. 13.
    Pisarchik, A., Flores-Carmona, N., Carpio-Valadez, M.: Encryption and decryption of images with chaotic map lattices. Chaos Interdiscip. J. Nonlinear Sci. 16, 033118 (2006)Google Scholar
  14. 14.
    Li, C., Li, S., Alvarez, G., Chen, G., Lo, K.-T.: Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations. Phys. Lett. A 369(1–2), 23–30 (2007)CrossRefMATHGoogle Scholar
  15. 15.
    Arroyo, D., Li, C., Li, S., Alvarez, G., Hallang, W.A.: Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm. Chaos Solitons Fractals 41(5), 2613–2616 (2009)CrossRefMATHGoogle Scholar
  16. 16.
    Solak, E., Cokal, C., Yildiz, O.T.: Cryptanalysis of Fridrichs chaotic image encryption. Int. J. Bifurcat. Chaos 20(5), 1405–1413 (2010)CrossRefMATHMathSciNetGoogle Scholar
  17. 17.
    Solak, E., Rhouma, R., Belghith, S.: Cryptanalysis of a multi-chaotic systems based image cryptosystem. Opt. Commun. 283(2), 232–236 (2010)Google Scholar
  18. 18.
    Arroyo, D., Rhouma, R., Alvarez, G., Li, S., Fernandez, V.: On the security of a new image encryption scheme based on chaotic map lattices. Chaos 18, 033112 (2008) Google Scholar
  19. 19.
    Francois, M., Grosges, T., Barchiesi, D., Erra, R.: A new image encryption scheme based on chaotic function. Signal Process. Image Commun. 27, 249–259 (2012)CrossRefGoogle Scholar
  20. 20.
    Ferguson, N., Schneier, B., Kohno, T.: Cryptography Engineering: Design Principles and Practical Applications. Wiley, London (2010)Google Scholar
  21. 21.
    Schneier, B.: Applied Cryptography. Wiley, London (1996)Google Scholar
  22. 22.
    NIST Special Publication 800-57: Recommendation for key management part 1: general (revision 3) (2012)Google Scholar
  23. 23.
    ECRYPT II Network of Excellence: Yearly report on algorithms and keysizes (2009–2010) (2010)Google Scholar

Copyright information

© Springer-Verlag London 2013

Authors and Affiliations

  1. 1.Departamento de ElectronicaUniversidad Tecnica Federico Santa MariaValparaisoChile
  2. 2.University of PitestiPitestiRomania

Personalised recommendations