Abstract.
Recently, an image encryption cryptosystem based on binary bit planes extraction and multiple chaotic maps (IEC-BPMC) was proposed, which includes two main parts: bit-level permutation for high 4-bit planes and bit-wise XOR diffusion. Some security analyses and experimental simulations were presented to support it to resist various attacks. However, it is found that the diffusion and permutation parts can be cracked separately by the divide-and-conquer strategy due to its inherent pitfalls. Then the equivalent diffusion key and the equivalent permutation key can be recovered by the chosen-plaintext attack method. Both theoretical analysis and experimental results demonstrate that IEC-BPMC is insecure against chosen-plaintext attack with low data complexity and computational complexity. Moreover, some other security defects of IEC-BPMC are revealed. Finally, some suggestions for improvement are given to enhance the security.
Similar content being viewed by others
References
D. Valli, G. Kaliyaperumal, Eur. Phys. J. Plus 132, 542 (2017)
A. Roy, A. Misra, Eur. Phys. J. Plus 132, 524 (2017)
G. Kaliyaperumal, K. Murali, Eur. Phys. J. ST 223, 1611 (2014)
R. Matthews, Cryptologia 8, 29 (1989)
J. Fridrich, Int. J. Bifurc. Chaos 8, 1259 (1998)
G. Chen, Y. Mao, C.K. Chui, Chaos, Solitons Fractals 21, 749 (2004)
X. Chai, X. Fu, Z. Gan, Y. Lu, Y. Chen, Signal Process. 155, 44 (2019)
A. Abdo, S. Lian, I. Ismail, M. Amin, H. Diab, Commun. Nonlinear Sci. Numer. Simul. 18, 136 (2013)
A. Akhshani, A. Akhavan, S.C. Lim, Z. Hassan, Commun. Nonlinear Sci. Numer. Simul. 17, 4653 (2012)
T.Y. Li, J.A. Yorke, Am. Math. Mon. 82, 985 (1975)
E.N. Lorenz, J. Atm. Sci. 20, 130 (1963)
G. Álvarez, S. Li, Int. J. Bifurc. Chaos 16, 2129 (2006)
C. Chen, K. Sun, Y. Peng, O.A. Alamodi, Eur. Phys. J. Plus 134, 31 (2019)
C.E. Shannon, Bell Syst. Techn. J. 28, 656 (1949)
H. Liu, X. Wang, Opt. Commun. 284, 3895 (2011)
L. Teng, X. Wang, J. Meng, Multimedia Tools Appl. 77, 6883 (2017)
Y.Q. Zhang, X. Wang, Nonlinear Dyn. 77, 687 (2014)
L.Y. Zhang, C. Li, K.W. Wong, S. Shu, G. Chen, J. Syst. Softw. 85, 2077 (2012)
E.Y. Xie, C. Li, S. Yu, J. Lü, Signal Process. 132, 150 (2017)
M. Preishuber, T. Hütter, S. Katzenbeisser, A. Uhl, IEEE Trans. Inf. Forens. Secur. 13, 2137 (2018)
Z.l. Zhu, W. Zhang, K.w. Wong, H. Yu, Inf. Sci. 181, 1171 (2011)
Y. Zhang, D. Xiao, Commun. Nonlinear Sci. Numer. Simul. 19, 74 (2014)
C. Fu, J.B. Huang, N.N. Wang, Q.B. Hou, W. Lei, Entropy 16, 770 (2014)
A.V. Diaconu, Inf. Sci. 355, 314 (2015)
H. Fan, M. Li, Math. Prob. Eng. 2017, 8124 (2017)
L. Xu, Z. Li, J. Li, W. Hua, Opt. Lasers Eng. 78, 17 (2016)
Y. Li, C. Wang, H. Chen, Opt. Lasers Eng. 90, 238 (2017)
S. Sun, IEEE Photon. J. 10, 1 (2018)
W. Feng, Y. He, IEEE Photon. J. 10, 1 (2018)
A. Shafique, J. Shahid, Eur. Phys. J. Plus 133, 331 (2018)
C. Li, D. Lin, J. Lü, F. Hao, IEEE MultiMedia 25, 46 (2018)
C. Li, Signal Process. 118, 203 (2016)
C. Li, K.T. Lo, Signal Process. 91, 949 (2011)
A. Jolfaei, X. Wu, V. Muthukkumarasamy, IEEE Trans. Inf. Forens. Secur. 11, 235 (2016)
H. Wen, S. Yu, J. Lü, Entropy 21, 246 (2019)
D.R. Stinson, Cryptography: Theory and Practice, Third Edition (Taylor & Francis, 2006) pp. 26--38
F. Chen, K.W. Wong, X. Liao, T. Xiang, IEEE Trans. Inf. Theory 59, 3249 (2013)
A. Rukhin, J. Soto, J. Nechvatal, M. Smid, E. Barker, A statistical test suite for random and pseudorandom number generators for cryptographic applications, NIST Special Publication 800-22, Gaithersburg, MD, US 800 (5), 163 (2001)
P. L’Ecuyer, R. Simard, ACM Trans. Math. Softw. 33, 22:1 (2007)
C. Li, B. Feng, S. Li, J. Kurths, G. Chen, IEEE Trans. Circ. Syst. I 66, 2322 (2019)
C. Li, D. Lin, B. Feng, J. Lü, F. Hao, IEEE Access 6, 75,834 (2018)
C. Li, D. Lin, J. Lü, IEEE MultiMedia 24, 64 (2017)
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s Note
The EPJ Publishers remain neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Wen, H., Yu, S. Cryptanalysis of an image encryption cryptosystem based on binary bit planes extraction and multiple chaotic maps. Eur. Phys. J. Plus 134, 337 (2019). https://doi.org/10.1140/epjp/i2019-12797-4
Received:
Accepted:
Published:
DOI: https://doi.org/10.1140/epjp/i2019-12797-4