Skip to main content
Log in

Cryptanalysis of an image encryption cryptosystem based on binary bit planes extraction and multiple chaotic maps

  • Regular Article
  • Published:
The European Physical Journal Plus Aims and scope Submit manuscript

Abstract.

Recently, an image encryption cryptosystem based on binary bit planes extraction and multiple chaotic maps (IEC-BPMC) was proposed, which includes two main parts: bit-level permutation for high 4-bit planes and bit-wise XOR diffusion. Some security analyses and experimental simulations were presented to support it to resist various attacks. However, it is found that the diffusion and permutation parts can be cracked separately by the divide-and-conquer strategy due to its inherent pitfalls. Then the equivalent diffusion key and the equivalent permutation key can be recovered by the chosen-plaintext attack method. Both theoretical analysis and experimental results demonstrate that IEC-BPMC is insecure against chosen-plaintext attack with low data complexity and computational complexity. Moreover, some other security defects of IEC-BPMC are revealed. Finally, some suggestions for improvement are given to enhance the security.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. D. Valli, G. Kaliyaperumal, Eur. Phys. J. Plus 132, 542 (2017)

    Article  Google Scholar 

  2. A. Roy, A. Misra, Eur. Phys. J. Plus 132, 524 (2017)

    Article  Google Scholar 

  3. G. Kaliyaperumal, K. Murali, Eur. Phys. J. ST 223, 1611 (2014)

    Article  Google Scholar 

  4. R. Matthews, Cryptologia 8, 29 (1989)

    Article  Google Scholar 

  5. J. Fridrich, Int. J. Bifurc. Chaos 8, 1259 (1998)

    Article  MathSciNet  Google Scholar 

  6. G. Chen, Y. Mao, C.K. Chui, Chaos, Solitons Fractals 21, 749 (2004)

    Article  ADS  MathSciNet  Google Scholar 

  7. X. Chai, X. Fu, Z. Gan, Y. Lu, Y. Chen, Signal Process. 155, 44 (2019)

    Article  Google Scholar 

  8. A. Abdo, S. Lian, I. Ismail, M. Amin, H. Diab, Commun. Nonlinear Sci. Numer. Simul. 18, 136 (2013)

    Article  ADS  MathSciNet  Google Scholar 

  9. A. Akhshani, A. Akhavan, S.C. Lim, Z. Hassan, Commun. Nonlinear Sci. Numer. Simul. 17, 4653 (2012)

    Article  ADS  MathSciNet  Google Scholar 

  10. T.Y. Li, J.A. Yorke, Am. Math. Mon. 82, 985 (1975)

    Article  Google Scholar 

  11. E.N. Lorenz, J. Atm. Sci. 20, 130 (1963)

    Article  ADS  Google Scholar 

  12. G. Álvarez, S. Li, Int. J. Bifurc. Chaos 16, 2129 (2006)

    Article  Google Scholar 

  13. C. Chen, K. Sun, Y. Peng, O.A. Alamodi, Eur. Phys. J. Plus 134, 31 (2019)

    Article  Google Scholar 

  14. C.E. Shannon, Bell Syst. Techn. J. 28, 656 (1949)

    Article  Google Scholar 

  15. H. Liu, X. Wang, Opt. Commun. 284, 3895 (2011)

    Article  ADS  Google Scholar 

  16. L. Teng, X. Wang, J. Meng, Multimedia Tools Appl. 77, 6883 (2017)

    Article  Google Scholar 

  17. Y.Q. Zhang, X. Wang, Nonlinear Dyn. 77, 687 (2014)

    Article  Google Scholar 

  18. L.Y. Zhang, C. Li, K.W. Wong, S. Shu, G. Chen, J. Syst. Softw. 85, 2077 (2012)

    Article  Google Scholar 

  19. E.Y. Xie, C. Li, S. Yu, J. Lü, Signal Process. 132, 150 (2017)

    Article  Google Scholar 

  20. M. Preishuber, T. Hütter, S. Katzenbeisser, A. Uhl, IEEE Trans. Inf. Forens. Secur. 13, 2137 (2018)

    Article  Google Scholar 

  21. Z.l. Zhu, W. Zhang, K.w. Wong, H. Yu, Inf. Sci. 181, 1171 (2011)

    Article  Google Scholar 

  22. Y. Zhang, D. Xiao, Commun. Nonlinear Sci. Numer. Simul. 19, 74 (2014)

    Article  ADS  Google Scholar 

  23. C. Fu, J.B. Huang, N.N. Wang, Q.B. Hou, W. Lei, Entropy 16, 770 (2014)

    Article  ADS  Google Scholar 

  24. A.V. Diaconu, Inf. Sci. 355, 314 (2015)

    Google Scholar 

  25. H. Fan, M. Li, Math. Prob. Eng. 2017, 8124 (2017)

    Google Scholar 

  26. L. Xu, Z. Li, J. Li, W. Hua, Opt. Lasers Eng. 78, 17 (2016)

    Article  Google Scholar 

  27. Y. Li, C. Wang, H. Chen, Opt. Lasers Eng. 90, 238 (2017)

    Article  Google Scholar 

  28. S. Sun, IEEE Photon. J. 10, 1 (2018)

    Google Scholar 

  29. W. Feng, Y. He, IEEE Photon. J. 10, 1 (2018)

    Google Scholar 

  30. A. Shafique, J. Shahid, Eur. Phys. J. Plus 133, 331 (2018)

    Article  Google Scholar 

  31. C. Li, D. Lin, J. Lü, F. Hao, IEEE MultiMedia 25, 46 (2018)

    Article  Google Scholar 

  32. C. Li, Signal Process. 118, 203 (2016)

    Article  Google Scholar 

  33. C. Li, K.T. Lo, Signal Process. 91, 949 (2011)

    Article  Google Scholar 

  34. A. Jolfaei, X. Wu, V. Muthukkumarasamy, IEEE Trans. Inf. Forens. Secur. 11, 235 (2016)

    Article  Google Scholar 

  35. H. Wen, S. Yu, J. Lü, Entropy 21, 246 (2019)

    Article  ADS  Google Scholar 

  36. D.R. Stinson, Cryptography: Theory and Practice, Third Edition (Taylor & Francis, 2006) pp. 26--38

  37. F. Chen, K.W. Wong, X. Liao, T. Xiang, IEEE Trans. Inf. Theory 59, 3249 (2013)

    Article  Google Scholar 

  38. A. Rukhin, J. Soto, J. Nechvatal, M. Smid, E. Barker, A statistical test suite for random and pseudorandom number generators for cryptographic applications, NIST Special Publication 800-22, Gaithersburg, MD, US 800 (5), 163 (2001)

  39. P. L’Ecuyer, R. Simard, ACM Trans. Math. Softw. 33, 22:1 (2007)

    Google Scholar 

  40. C. Li, B. Feng, S. Li, J. Kurths, G. Chen, IEEE Trans. Circ. Syst. I 66, 2322 (2019)

    Google Scholar 

  41. C. Li, D. Lin, B. Feng, J. Lü, F. Hao, IEEE Access 6, 75,834 (2018)

    Article  Google Scholar 

  42. C. Li, D. Lin, J. Lü, IEEE MultiMedia 24, 64 (2017)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Heping Wen.

Additional information

Publisher’s Note

The EPJ Publishers remain neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wen, H., Yu, S. Cryptanalysis of an image encryption cryptosystem based on binary bit planes extraction and multiple chaotic maps. Eur. Phys. J. Plus 134, 337 (2019). https://doi.org/10.1140/epjp/i2019-12797-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1140/epjp/i2019-12797-4

Navigation