Skip to main content

Cryptanalysis of Image Encryption Algorithms Based on Pixels Shuffling and Bits Shuffling

  • Conference paper
  • First Online:
Proceedings of the International Congress on Information and Communication Technology

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 439))

Abstract

In this paper, cryptanalysis of a certain class of shuffling-based image encryption algorithms is presented. The class includes the image encryption algorithms which either use a combination of pixels and bits level shuffling or bits level shuffling only. The proposed chosen plaintext attack on such algorithms can recover the plaintext image without having any clue or secret key. To demonstrate the practicability and effectiveness of the attack, it is applied to break one such algorithm recently suggested by Huang et al. in [Telecommun Syst 52(2), 563–571, 2013]. The Huang et al. image encryption uses a combination of pixel-level shuffling followed by bit-level shuffling. The simulation of the attack justifies the feasibility of the proposed cryptanalysis. The attack can be easily extended to break other such image encryption algorithms as well. Further, some security issues related to these algorithms are discussed and few preferments are propounded which can make the class of encryption algorithms more robust against the proposed attack.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Menezes, A.J., Oorschot, P.C.V., Vanstone S.A.: Handbook of Applied Cryptography, CRC Press (1997).

    Google Scholar 

  2. Lian, S., Sun, J., Wang, Z.: A block cipher based on a suitable use of the chaotic standard map. Chaos, Solitons & Fractals 26(1) 117–129, (2005).

    Google Scholar 

  3. Wong, K-W., Kwok, B.S., Law, W-S.: A fast image encryption scheme based on chaotic standard map. Physics Letters A 372(15) 2645–2652, (2008).

    Google Scholar 

  4. Ahmad, M., Ahmad, T.: Securing multimedia color imagery using multiple high dimensional chaos based hybrid keys. Int. J. Commun. Netw. Distrib. Syst. 12(1), 113–128 (2014).

    Google Scholar 

  5. Huang, C. K., Liao, C.W., Hsu, S.L., Jeng, Y.C.: Implementation of gray image encryption with pixel shuffling and gray-level encryption by single chaotic system. Telecommunication Systems 52(2) 563–571, (2013).

    Google Scholar 

  6. Zhang, Y., Xiao, D.: An image encryption scheme based on rotation matrix bit-level permutation and block diffusion. Commun Nonlinear Sci Numer Simulat 19(1) 74–82, (2014).

    Google Scholar 

  7. Yang, T., Wu, C.W., Chua, L.O.: Cryptography based on chaotic systems. IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications. 44(5) 469–472, (1997).

    Google Scholar 

  8. Baptista, M. S.: Cryptography with chaos. Physics Letters A 240(1) 50–54, (1998).

    Google Scholar 

  9. Matthews R.: On the derivation of a chaotic encryption algorithm. Cryptologia 13 29–42, (1989).

    Google Scholar 

  10. Rhouma, R., Belghith, S.: Cryptanalysis of a new image encryption algorithm based on hyper-chaos. Physics Letters A 372(38), 5973–5978, (2008).

    Google Scholar 

  11. Rhouma, R., Belghith, S.: Cryptanalysis of a spatiotemporal chaotic cryptosystem. Chaos, Solitons & Fractals 41(4) 1718–1722, (2009).

    Google Scholar 

  12. Solak, E., Rhouma, R., Belghith, S.: Cryptanalysis of a multi-chaotic systems based image cryptosystem. Optics Communications 283(2), 232–236, (2010).

    Google Scholar 

  13. Özkaynak, F., Özer, A.B., Yavuz, S.: Cryptanalysis of a novel image encryption scheme based on improved hyperchaotic sequences. Optics Communications 285(2), 4946–4948, (2012).

    Google Scholar 

  14. Ahmad, M.: Cryptanalysis of chaos based secure satellite imagery cryptosystem. In: Contemporary Computing. Springer Berlin Heidelberg, 81–91, (2011).

    Google Scholar 

  15. Sharma, P.K., Ahmad, M., Khan, P.M.: Cryptanalysis of image encryption algorithm based on pixel shuffling and chaotic S-box transformation. In: Security in Computing and Communication. Springer-Verlag Berlin Heidelberg, CCIS 467, 173–181, (2014).

    Google Scholar 

  16. Ahmad, M., Ahmad, F.: Cryptanalysis of Image Encryption Based on Permutation-Substitution Using Chaotic Map and Latin Square Image Cipher. In: Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications. Springer International Publishing Switzerland, AISC 327, 481–488 (2015).

    Google Scholar 

  17. Ahmad, M., Khan, I.R., Alam, S.: Cryptanalysis of Image Encryption Algorithm Based on Fractional-Order Lorenz-Like Chaotic System. In: Emerging ICT for Bridging the Future. Springer International Publishing Switzerland, AISC 338, 381–388 (2015).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Pankaj Kumar Sharma .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer Science+Business Media Singapore

About this paper

Cite this paper

Sharma, P.K., Aditya Kumar, Musheer Ahmad (2016). Cryptanalysis of Image Encryption Algorithms Based on Pixels Shuffling and Bits Shuffling. In: Satapathy, S., Bhatt, Y., Joshi, A., Mishra, D. (eds) Proceedings of the International Congress on Information and Communication Technology. Advances in Intelligent Systems and Computing, vol 439. Springer, Singapore. https://doi.org/10.1007/978-981-10-0755-2_30

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-0755-2_30

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-0754-5

  • Online ISBN: 978-981-10-0755-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics