Skip to main content
Log in

Breaking an image encryption algorithm based on hyper-chaotic system with only one round diffusion process

  • Original Paper
  • Published:
Nonlinear Dynamics Aims and scope Submit manuscript

Abstract

A chaos-based cryptosystem has exhibited some unconventionally excellent properties. At the same time, it is of vital significance for its advancement to give a mathematically rigorous cryptanalysis. In this study, we analyze the security of an image encryption algorithm, whose main idea is to use the sum of image data for encryption. By applying known plaintext and chosen plaintext attacks, we show that all the secret keys can be revealed.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

References

  1. Zhang, Y.S., Xiao, D., Shu, Y.L., Li, J.: A novel image encryption scheme based on a linear hyperbolic chaotic system of partial differential equations. Signal Process-Image Commun. 28(3), 292–300 (2013)

    Google Scholar 

  2. Zhang, Y.S., Xiao, D.: Double optical image encryption using discrete Chirikov standard map and chaos-based fractional random transform. Opt. Lasers Eng. 51(4), 472–480 (2013)

    Article  Google Scholar 

  3. Ye, G.D., Wong, K.W.: An efficient chaotic image encryption algorithm based on a generalized Arnold map. Nonlinear Dyn. 69(4), 2079–2087 (2012)

    Article  MathSciNet  Google Scholar 

  4. Mirzaei, O., Yaghoobi, M., Irani, H.: A new image encryption method: parallel sub-image encryption with hyper chaos. Nonlinear Dyn. 67(1), 557–566 (2011)

    Google Scholar 

  5. Liu, Y.B., Tian, S.M., Hu, W.P., Xing, C.C.: Design and statistical analysis of a new chaotic block cipher for wireless sensor networks. Commun. Nonlinear Sci. Numer. Simul. 17(8), 3267–3278 (2012)

    Article  MathSciNet  Google Scholar 

  6. Wong, K.W., Kwok, B., Law, W.: A fast image encryption scheme based on chaotic standard map. Phys. Lett. A 372(15), 2645–2652 (2008)

    Article  MATH  Google Scholar 

  7. Xiao, D., Liao, X.F., Wei, P.C.: Analysis and improvement of a chaos-based image encryption algorithm. Chaos Solitons Fract. 40(15), 2191–2199 (2009)

    Article  MATH  MathSciNet  Google Scholar 

  8. Zhang, Y.S., Xiao, D., Wen, W.Y., Tian, Y.: Edge-based lightweight image encryption using chaos-based reversible hidden transform and multiple-order discrete fractional cosine transform. Opt. Laser Technol. 54(30), 1–6 (2013)

    Article  Google Scholar 

  9. Zhang, Y.S., Xiao, D.: Cryptanalysis of S-box-only chaotic image ciphers against chosen plaintext attack. Nonlinear Dyn. 72(4), 751–756 (2013)

    Article  MathSciNet  Google Scholar 

  10. Li, C.Q., Zhang, L.Y., Ou, R., Wong, K.W., Shu, S.: Breaking a novel colour image encryption algorithm based on chaos. Nonlinear Dyn. 70(4), 2383–2388 (2012)

    Google Scholar 

  11. Zhang, Y., Li, C.Q., Li, Q., Zhang, D., Shu, S.: Breaking a chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn. 69(3), 1091–1096 (2012)

    Article  MATH  MathSciNet  Google Scholar 

  12. Li, S.J., Li, C.Q., Chen, G.R., Bourbakis, N.G., Lo, K.T.: A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Process-Image Commun. 23(3), 212–223 (2008)

    Article  Google Scholar 

  13. Li, C.Q., Lo, K.T.: Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Process. 91(4), 949–954 (2011)

    Article  MATH  Google Scholar 

  14. Norouzi, B., Mirzakuchaki, S., Seyedzadeh, S.M., Mosavi, M.R.: A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion. Multimed. Tools Appl. doi:10.1007/s11042-012-1292-9.

Download references

Acknowledgments

The work was funded by the Natural Science Foundation Project of CQ CSTC (Grant No. 2011jjjq40001).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Di Xiao.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Zhang, Y., Xiao, D., Wen, W. et al. Breaking an image encryption algorithm based on hyper-chaotic system with only one round diffusion process. Nonlinear Dyn 76, 1645–1650 (2014). https://doi.org/10.1007/s11071-014-1235-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11071-014-1235-2

Keywords

Navigation