Analysis and Improvement on an Image Encryption Algorithm Based on Bit Level Permutation

  • Bin Lu
  • Fenlin Liu
  • Ping Xu
  • Xin GeEmail author
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11065)


A modeling description of Ye algorithm is first presented in this paper. Then a chosen plaintext attack is proposed aiming at the drawback of Ye algorithm that the generation procedure of permutation vectors has no relation with plain image. With the attack, the permutation vectors (keystreams equivalent to secret key) can be correctly recovered with only ceil(log2(8MN)) chosen plain images, which is proved by Proposition 1. Thirdly, an improvement of Ye algorithm is proposed. Experiments and analysis show the validity of chosen plaintext attack and the security of improved algorithm. Attack and improvement proposed in this paper provides concrete method of security analysis and “plain image related” design idea of secure permutation against chosen plaintext attack for analysis and design of chaos based image encryption algorithm.


Image encryption Bit level permutation Chaos 



The work described in this paper was partially supported by the National Natural Science Foundation of China (Grant No. 61601517, No. 60902102, No. 60970141), basic and advanced technology research project of Henan Province, China (Grant No. 2014302703).


  1. 1.
    Scharinger, J.: Fast encryption of image data using chaotic Kolmogorov flows. Electron. Imaging 7(2), 318–325 (1998)CrossRefGoogle Scholar
  2. 2.
    Huang, C.K., Nien, H.H.: Multi chaotic system based pixel shuffle for image encryption. Opt. Commun. 282, 2123–2127 (2009)CrossRefGoogle Scholar
  3. 3.
    Yen, J.C., Guo, J.I.: A new chaotic image encryption algorithm. In: Proceedings of (Taiwan) National Symposium on Telecommunications, pp. 358–362 (1998)Google Scholar
  4. 4.
    Yen, J.C., Guo, J.I.: A new hierarchical chaotic image encryption algorithm and its hardware architecture. In: Proceedings of 1998 Ninth VLSI DESIGN/CAD Symposium (1998)Google Scholar
  5. 5.
    Guo, J.I., Yen, J.C.: The design and realization of a new hierarchical chaotic image encryption algorithm. In: Proceedings of 1999 International Symposium on Communications, pp. 210–214 (1999)Google Scholar
  6. 6.
    Yen, J.C., Guo, J.I.: Efficient hierarchical chaotic image encryption algorithm and its VLSI realization. In: IEE Proceedings-Vision, Image and Signal Processing, vol. 147, no. 2, pp. 167–175 (2000)Google Scholar
  7. 7.
    Ye, G.D.: Image scrambling encryption algorithm of pixel bit based on chaos map. Pattern Recogn. Lett. 31(5), 347–354 (2010)CrossRefGoogle Scholar
  8. 8.
    Li, C.Q., Lo, K.T.: Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Sig. Process. 91, 949–954 (2011)CrossRefGoogle Scholar
  9. 9.
    Lian, S.G.: Efficient image or video encryption based on spatiotemporal chaos system. Chaos Soliton Fractals 40, 2509–2519 (2009)CrossRefGoogle Scholar
  10. 10.
    Ge, X., Liu, F.L., Lu, B., Wang, W.: Cryptanalysis of a spatiotemporal chaotic image/videocryptosystem and its improved version. Phys. Lett. A 375, 908–913Google Scholar
  11. 11.
    Li, C.Q., Liu, Y.S., Xie, T., ChenMichael, Z.Q.: Breaking a novel image encryption scheme basedon improved hyperchaotic sequences. Nonlinear Dyn. 73, 2083–2089 (2013)CrossRefGoogle Scholar
  12. 12.
    Zhu, C.: A novel image encryption scheme based on improved hyperchaotic sequences. Opt. Commun. 285(1), 29–37 (2012)CrossRefGoogle Scholar
  13. 13.
    Zhang, L.Y., Hu, X.B., Liu, Y.S., Wong, K.W., Gan, J.: A chaotic image encryption scheme owning temp-value feedback. Commun. Nonlinear Sci. Numer. Simul. 19, 3653–3659 (2014)MathSciNetCrossRefGoogle Scholar
  14. 14.
    Gao, T.G., Chen, Z.Q.: A new image encryption algorithm based on hyper-chaos. Phys. Lett. A 372, 394–400 (2008)CrossRefGoogle Scholar
  15. 15.
    Rhouma, R., Belghith, S.: Cryptanalysis of a new image encryption algorithm based on hyper-chaos. Phys. Lett. A 372, 5973–5978 (2008)CrossRefGoogle Scholar
  16. 16.
    Ge, X., Liu, F.L., Lu, B., Yang, C.F.: Improvement of Rhouma’s attacks on Gao algorithm. Phys. Lett. A 374, 1362–1367Google Scholar

Copyright information

© Springer Nature Switzerland AG 2018

Authors and Affiliations

  1. 1.China National Digital Switching System Engineering Technology Research CenterZhengzhouChina

Personalised recommendations