Skip to main content
Log in

Cryptanalysis on a permutation–rewriting– diffusion (PRD) structure image encryption scheme

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Recently, an efficient pixel-level chaotic image encryption algorithm has been proposed. In this encryption algorithm, they adopted a permutation-rewriting-diffusion (PRD) encryption structure, which enhanced the relationship between permutation and diffusion. At the same time, the generation of the keystream is related to the pixels square sum of the plaintext image. However, there are still two security risks in their encryption scheme. First, both the rewriting and the diffusion operations are performed by modular addition, which makes the two operations equivalent to one-step diffusion operation. Second, the rewriting parameters and the diffusion matrix are both independent of the plaintext. Therefore, the rewriting-diffusion process can be represented by an equivalent modular addition formula, and the PRD structure is equal to the classic PD structure. The separate attack method is used in this paper to crack the encryption scheme. At first, the equivalent diffusion process is cracked by performing the modulo subtraction operation on the target deciphered image and the cipher-text of an all-zero image. Then, the permutation rule is deciphered by constructing several images with the same square sum of pixels. In addition, some improvements for Ye’ s encryption scheme are provided to enhance the security.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

References

  1. Belazi A, Abd El-Latif AA, Belghith S (2016) A novel image encryption scheme based on substitution-permutation network and chaos. Signal Process 128:155–170

    Article  Google Scholar 

  2. Cai S, Huang L, Chen X, Xiong X (2018) A symmetric plaintext-related color image encryption system based on bit permutation. Entropy 20:282–302

    Article  Google Scholar 

  3. Cao G, Wang X (2019) Image encryption based on the combination of roulette wheel selection with linear congruence pixel transformation. Multimed Tools Appl 78:10625–10647

    Article  Google Scholar 

  4. Chai XL, Gan ZH, Yang K, Chen YR, Liu XX (2017) An image encryption algorithm based on the memristive hyperchaotic system, cellular automata and DNA sequence operations. Signal Process Image Commun 52:6–19

    Article  Google Scholar 

  5. Fan H, Li M, Liu D, An K (2017) Cryptanalysis of a plaintext-related chaotic RGB image encryption scheme using total plain image characteristics. Multimedia Tools Applications

  6. Feng W, He Y (2018) Cryptanalysis and improvement of the hyper-chaotic image encryption scheme based on DNA encoding and scrambling. IEEE Photonics Journal 10:1–15

    Google Scholar 

  7. Feng W, He Y, Li H, Li C (2019) Cryptanalysis and improvement of the image encryption scheme based on 2D logistic-adjusted-sine map. IEEE Access 7:12584–12597

    Article  Google Scholar 

  8. Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. International Journal of Bifurcation and Chaos 8:1259–1284

    Article  MathSciNet  MATH  Google Scholar 

  9. Hossam D (2018) An efficient chaotic image cryptosystem based on simultaneous permutation and diffusion operations. IEEE Access 6:42227–42244

    Article  Google Scholar 

  10. Hraoui S, Gouiouez M, Gmira F, Berrada M, Jarjar A, Jarrar AO (2020) A novel cryptosystem for color images based on chaotic maps using a random controller. Lecture Notes in Electrical Engineering, vol 745

  11. Hua Z, Zhou Y (2016) Image encryption using 2D Logistic-adjusted-Sine map. Inform Sci 339:237–253

    Article  Google Scholar 

  12. Hua Z, Zhou Y, Pun CM, Chen CLP (2015) 2D Sine Logistic modulation map for image encryption. Inform Sci 297:80–94

    Article  Google Scholar 

  13. Li S, Li C, Chen G, Bourbakis N, Lo K (2008) A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Process Image Commun 23:212–223

    Article  Google Scholar 

  14. Li C, Lin D, Feng B, Lu J, Hao F (2018) Cryptanalysis of a chaotic image encryption algorithm based on information entropy. IEEE Access 6:75834–75842

    Article  Google Scholar 

  15. Li Z, Peng C, Li L, Zhu X (2018) A novel plaintext-related image encryption scheme using hyper-chaotic system. Nonlinear Dynamics 94:1319–1333

    Article  Google Scholar 

  16. Li Y, Wang C, Chen H (2017) A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation. Optics Lasers in Engineering 90:238–246

    Article  Google Scholar 

  17. Liu L, Jiang D, An T, Guan Y (2020) A plaintext-related dynamical image encryption algorithm based on permutation-combination-diffusion architecture. IEEE Access 8:62785–62799

    Article  Google Scholar 

  18. Liu L, Lei Y, Wang D (2020) A fast chaotic image encryption scheme with simultaneous permutation-diffusion operation. IEEE Access 8:27361–27374

    Article  Google Scholar 

  19. Liu L, Wang Y, Li Y, Feng X, Song H, He Z, Guo C (2019) Noise Robust Method for Analytically Solvable Chaotic Signal Reconstruction. Circuits, Systems, and Signal Process 38:4096–4114

    Article  Google Scholar 

  20. Liu L, Wang YN, Lin H, Xiao RF (2017) Easy encoding and low bit-error-rate chaos communication system based on reverse-time chaotic oscillator. Signal Process 11:869–876

    Google Scholar 

  21. Liu L, Zhang Z, Chen R (2019) Cryptanalysis and improvement in a plaintext-related image encryption scheme based on hyper chaos. IEEE Access 7:126450–126463

    Article  Google Scholar 

  22. Liu L, Zhang L, Jiang D, Guan Y, Zhang Z (2019) A Simultaneous Scrambling and Diffusion Color Image Encryption Algorithm Based on Hopfield Chaotic Neural Network. IEEE Access 7:185796–185810

    Article  Google Scholar 

  23. Luo Y, Zhou R, Liu J, Cao Y, Ding, Xuemei (2018) A parallel image encryption algorithm based on the piecewise linear chaotic map and hyper-chaotic map. Nonlinear Dynamics 93:1165–1181

    Article  Google Scholar 

  24. Murillo-Escobar MA, Cruz-Hernandez C, Abundiz-Perez F, Lopez-Gutierrez RM, Campo ORAD (2015) A RGB image encryption algorithm based on total plain image characteristics and chaos. Signal Process 109:119–131

    Article  Google Scholar 

  25. Norouzi B, Mirzakuchaki S (2016) Breaking an image encryption algorithm based on the new substitution stage with chaotic functions. Optik 127:5695–5701

    Article  Google Scholar 

  26. Özkaynak F, Özer AB (2016) Cryptanalysis of a new image encryption algorithm based on chaos. Optik International Journal for Light Electron Optics

  27. Pak C, Huang L (2017) A new color image encryption using combination of the 1D chaotic map. Signal Process 138:129–137

    Article  Google Scholar 

  28. Wang X, Gao S (2021) A chaotic image encryption algorithm based on a counting system and the semi-tensor product. Multimedia Tools Appl 80:10301–10322

    Article  Google Scholar 

  29. Wang X, Liu L, Zhang Y (2015) A novel chaotic block image encryption algorithm based on dynamic random growth technique. Optics Lasers in Engineering 66:10–18

    Article  Google Scholar 

  30. Wang X, Teng L, Qin X (2012) A novel colour image encryption algorithm based on chaos. Signal Process 92:1101–1108

    Article  Google Scholar 

  31. Wu X, Zhu B, Hu Y, Ran Y (2017) A novel color image encryption scheme using rectangular transform-enhanced chaotic tent maps. IEEE Access 5:6429–6436

    Google Scholar 

  32. Ye G, Chen P, Huang X, Mei Q (2018) An efficient pixel-level chaotic image encryption algorithm. Nonlinear Dynamics 94:745–756

    Article  Google Scholar 

  33. Ye G, Huang X (2016) A feedback chaotic image encryption scheme based on both bit-level and pixel-level. J Vib Control 22:1171–1180

    Article  MathSciNet  Google Scholar 

  34. Ye G, Pan C, Huang X, Zhao Z, He J (2018) A chaotic image encryption algorithm based on information entropy. International Journal of Bifurcation and Chaos, 28(1)

  35. Zhang W, Wong K, Yu H, Zhu Z (2013) An image encryption scheme using reverse 2-dimensional chaotic map and dependent diffusion. Commun Nonlinear Sci Numer Simul 18:2066–2080

    Article  MathSciNet  MATH  Google Scholar 

  36. Zhou Y, Long B, Chen CLP (2013) Image encryption using a new parametric switching chaotic system. Signal Process 93:3039–3052

    Article  Google Scholar 

  37. Zhou Y, Long B, Chen CLP (2014) A new 1D chaotic system for image encryption. Signal Process 97:172–182

    Article  Google Scholar 

  38. Zhu C, Wang G, Sun K (2018) Improved cryptanalysis and enhancements of an image encryption scheme using combined 1D chaotic maps. Entropy 20:843–866

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ruijie Chen.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chen, R., Liu, L. & Zhang, Z. Cryptanalysis on a permutation–rewriting– diffusion (PRD) structure image encryption scheme. Multimed Tools Appl 82, 4289–4317 (2023). https://doi.org/10.1007/s11042-022-12515-w

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-022-12515-w

Keywords

Navigation