Skip to main content
Log in

Security analysis of a color image encryption scheme based on skew tent map and hyper chaotic system of 6th-order CNN against chosen-plaintext attack

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Recently, a color image encryption scheme based on skew tent map and hyper chaotic system of 6th-order CNN was proposed. It consists of two phases including one-time confusion and many times diffusion, which are controlled by skew tent map and hyper chaotic system of 6th-order CNN, respectively. It was claimed that the scheme can resist common attacks. However, this scheme is found to be insecure against chosen-plaintext attack. In this paper, we analyze the security weakness of the scheme. Although many keys were utilized, they keep fixed so that the corresponding chaotic keystreams are also consistent when encrypting different color images. All the keystreams used for each encryption can be wholly revealed through the derivation. In spite of many times of iterations in the diffusion phase, cryptanalytic results show that it is the same as only once. Experiment also verifies the proposed assertion.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

References

  1. Benrhouma O, Hermassi H, Belghith S (2013) Security analysis and improvement of a partial encryption scheme. Multimed Tools Appl. doi:10.1007/s11042-013-1790-4

    Google Scholar 

  2. Chen J, Zhu Z, Fu C, Zhang L, Zhang Y (2014) An image encryption scheme using nonlinear inter-pixel computing and swapping based permutation approach. Commun Nonlinear Sci Numer Simul. doi:10.1016/j.cnsns.2014.11.021

    MathSciNet  Google Scholar 

  3. Chen J, Zhu Z, Fu C, Zhang L, Zhang Y (2014) Cryptanalysis and improvement of an optical image encryption scheme using a chaotic Baker map and double random phase encoding. J Opt 16:125403

    Article  Google Scholar 

  4. Hermassi H, Belazi A, Rhouma R, Belghith SM (2014) Security analysis of an image encryption algorithm based on a DNA addition combining with chaotic maps. Multimed Tools Appl 72(3):2211–2224

    Article  MATH  Google Scholar 

  5. Kadir A, Hamdulla A, Guo WQ (2014) Color image encryption using skew tent map and hyper chaotic system of 6th-order CNN. Optik 125:1671–1675

    Article  Google Scholar 

  6. Kong DZ, Shen XJ (2014) Multiple-image encryption based on optical wavelet transform and multichannel fractional Fourier transform. Opt Laser Technol 57:343–349

    Article  Google Scholar 

  7. Li SJ, Li CQ, Chen GR, Bourbakis NG, Lo KT (2008) A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Process Image Commun 23:212–223

    Article  Google Scholar 

  8. Li CQ, Lo KT (2011) Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Process 91:949–54

    Article  MATH  Google Scholar 

  9. Liu H, Liu YB (2014) Cryptanalyzing an image encryption scheme based on hybrid chaotic system and cyclic elliptic curve. Opt Laser Technol 56:15–9

    Article  Google Scholar 

  10. Liu H, Liu YB (2014) Security assessment on block-Cat-map based permutation applied to image encryption scheme. Opt Laser Technol 56:313–316

    Article  Google Scholar 

  11. Liu HJ, Wang XY, Kadir A (2013) Color image encryption using Choquet fuzzy integral and hyper chaotic system. Optik 124:3527–3533

    Article  Google Scholar 

  12. Norouzi B, Mirzakuchaki S, Seyedzadeh SM, Mosavi MR (2014) A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process. Multimed Tools Appl 71(3):1469–1497

    Article  Google Scholar 

  13. Norouzi B, Seyedzadeh SM, Mirzakuchaki S, Mosavi MR (2013) A novel image encryption based on row-column, masking and main diffusion processes with hyper chaos. Multimed Tools Appl. doi:10.1007/s11042-013-1699-y

    Google Scholar 

  14. Parvin Z, Seyedarabi H, Shamsi M (2014) A new secure and sensitive image encryption scheme based on new substitution with chaotic function. Multimed Tools Appl. doi:10.1007/s11042-014-2115-y

    Google Scholar 

  15. Wen WY, Zhang Y, Fang ZJ, Chen J (2015) Infrared target-based selective encryption by chaotic maps. Opt Commun 241:131–139

    Article  Google Scholar 

  16. You SP, Wu L, Cai BX (2013) Image double encryption based on iteration Fourier and chaos system. Optik 124:4197–4200

    Article  Google Scholar 

  17. Zhang LY, Hu X, Liu Y, Wong KW, Gan J (2014) A chaotic image encryption scheme owning temp-value feedback. Commun Nonlinear Sci Numer Simul 19(10):3653–3659

    Article  MathSciNet  Google Scholar 

  18. Zhang L, Li C, Wong KW, Shu S, Chen G (2012) Cryptanalyzing a chaos-based image encryption algorithm using alternate structure. J Syst Softw 85(9):2077–2085

    Article  Google Scholar 

  19. Zhang YS, Wen WY, Su MT, Li M (2014) Cryptanalyzing a novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system. Optik 125:1562–1564

    Article  Google Scholar 

  20. Zhang Y, Xiao D (2013) Double optical image encryption using discrete Chirikov standard map and chaos-based fractional random transform. Opt Laser Eng 51(4):472–480

    Article  Google Scholar 

  21. Zhang YS, Xiao D (2013) Cryptanalysis of S-box-only chaotic image ciphers against chosen plaintext attack. Nonlinear Dyn 72:751–756

    Article  MathSciNet  Google Scholar 

  22. Zhang YS, Xiao D (2014) Self-adaptive permutation and combined global diffusion for chaotic color image encryption. AEU-Int J Electron Commun 68(4):361–368

    Article  Google Scholar 

  23. Zhang Y, Xiao D (2014) An image encryption scheme based on rotation matrix bit-level permutation and block diffusion. Commun Nonlinear Sci Numer Simul 19(1):74–82

    Article  MathSciNet  Google Scholar 

  24. Zhang YS, Xiao D, Shu YL, Li J (2013) A novel image encryption scheme based on a linear hyperbolic chaotic system of partial differential equations. Signal Process Image Commun 28:292–300

    Article  Google Scholar 

  25. Zhang YS, Xiao D, Wen WY, Li M (2014) Cryptanalyzing a novel image cipher based on mixed transformed logistic maps. Multimed Tools Appl 73(3):1885–1896

    Article  Google Scholar 

  26. Zhang YS, Xiao D, Wen WY, Liu H (2013) Vulnerability to chosen-plaintext attack of a general optical encryption model with the architecture of scrambling-then-double random phase encoding. Opt Lett 38:4506–4509

    Article  Google Scholar 

  27. Zhang YS, Xiao D, Wen WY, Tian Y (2013) Edge-based lightweight image encryption using chaos-based reversible hidden transform and multiple-order discrete fractional cosine transform. Opt Laser Technol 54:1–6

    Article  Google Scholar 

  28. Zhang Y, Xiao D, Wen W, Wong KW (2014) On the security of symmetric ciphers based on DNA coding. Inf Sci 289:254–261

    Article  Google Scholar 

  29. Zheng YF, Jin JX (2014) A novel image encryption scheme based on Hénon map and compound spatiotemporal chaos. Multimed Tools Appl. doi:10.1007/s11042-014-2024-0

    Google Scholar 

Download references

Acknowledgments

This work was supported by the National Natural Science Foundation of China (Grant nos. 61462032 and 61461021), the Natural Science Foundation of Jiangxi Province (Grant no. 20142BAB217012).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wenying Wen.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wen, W. Security analysis of a color image encryption scheme based on skew tent map and hyper chaotic system of 6th-order CNN against chosen-plaintext attack. Multimed Tools Appl 75, 3553–3560 (2016). https://doi.org/10.1007/s11042-015-2464-1

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-015-2464-1

Keywords

Navigation