Log in

Cryptanalysis and improvement of an image encryption algorithm based on hyper-chaotic system and dynamic S-box

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Recently, an image encryption algorithm based on hyper-chaotic system and dynamic S-box has been proposed by Liu et al. The main idea of the encryption algorithm is utilizing key-streams generated by hyper-chaotic system to permute and substitute plain-image pixels. In this paper, we analyze the potential security problems of the encryption algorithm in detail and propose a chosen-plaintext attack to break the encryption algorithm. The proposed chosen-plaintext attack indicates that the encryption scheme is insecure and not suitable for image secure communication. Based on the result of cryptanalysis, an improved algorithm is proposed to eliminate the potential security problem in Liu’s algorithm. Experimental results show that improved algorithm not only inherits the merits of the original scheme, but also has better cryptographic performances in statistical characteristics, plaintext sensitivity and key sensitivity.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Adams C, Tavares S (1990) The structured design of cryptographically good S-boxes. J Cryptol 3(1):27–41

    Article  MathSciNet  MATH  Google Scholar 

  2. Alvarez G, Amigo JM, Arroyo D, Li S (2011) Lessons learnt from the cryptanalysis of chaos-based ciphers. In: Chaos-Based Cryptography 257–295

  3. Cai GL, Tan ZM, Zhou WH, Tu WT (2007) Dynamical analysis of a new chaotic system and its chaotic control. Acta Phys Sin 56:6230–6237

    MATH  Google Scholar 

  4. Cui C, Niu XM (2016) A robust DIBR 3D image watermarking algorithm based on histogram shape. J Inf Hiding Multimed Signal Process 7(3):543–557

    Google Scholar 

  5. El-Latif AAA, Li L, Niu X (2014) A new image encryption scheme based on cyclic elliptic curve and chaotic system. Multimedia Tools Appl 70(3):1559–1584

    Article  Google Scholar 

  6. Eslami Z, Bakhshandeh A (2013) An improvement over an image encryption method based on total shuffling. Opt Commun 286:51–55

    Article  Google Scholar 

  7. Fridrich J (1997) Image encryption based on chaotic maps. In: Systems, Man, and Cybernetics. Computational Cybernetics and Simulation, IEEE International Conference 2:1105–1110

  8. Fu C, Chen J, Zou H et al (2012) A chaos-based digital image encryption scheme with an improved diffusion strategy. Opt Express 20(3):2363–2378

    Article  Google Scholar 

  9. Huang X (2012) Image encryption algorithm using chaotic Chebyshev generator. Nonlinear Dyn 67(4):2411–2417

    Article  MathSciNet  Google Scholar 

  10. Huang HC, Chang FC, Fang WC (2011) Reversible data hiding with histogram-based difference expansion for QR code applications. IEEE Trans Consum Electron 57(2):779–787

    Article  Google Scholar 

  11. Huang X, Ye G (2014) An image encryption algorithm based on hyper-chaos and DNA sequence. Multimedia Tools Appl 72(1):57–70

    Article  Google Scholar 

  12. Katz J, Lindell Y (2007) Introduction to modern cryptography: principles and protocols. CRC press

  13. Li S, Li C, Chen G, Bourbakis NG, Lo KT (2008) A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Process Image Commun 23(3):212–223

    Article  Google Scholar 

  14. Li SJ, Mou XQ, Cai YL (2001) Pseudo-random bit generator based on couple chaotic systems and its application in stream-ciphers cryptography. INDOCRYPT 2001: Second International Conference on Cryptology in India Chennai, India, December 16 C20 2001 Proceedings 316–329

  15. Liu Y, Tong X, Ma J (2015) Image encryption algorithm based on hyper-chaotic system and dynamic S-box. Multimedia Tools Appl 1–21

  16. Matthews R (1989) On the derivation of a “chaotic” encryption algorithm. Cryptologia 13(1):29–42

    Article  MathSciNet  Google Scholar 

  17. Özkaynak F, Özer AB, Yavuz S (2012) Cryptanalysis of a novel image encryption scheme based on improved hyperchaotic sequences. Opt Commun 285(24):4946–4948

    Article  Google Scholar 

  18. Özkaynak F, Özer AB, Yavuz S (2012) Cryptanalysis of Bigdeli algorithm using Çokal’s attack. Int J Inf Secur Sci 1(3):79–81

    Google Scholar 

  19. Özkaynak F, Yavuz S (2013) Security problems for a pseudorandom sequence generator based on the Chen chaotic system. Comput Phys Commun 184(9):2178–2181

    Article  MATH  Google Scholar 

  20. Pareek N, Patidar V, Sud K (2006) Image encryption using chaotic logistic map. Image Vis Comput 24(9):926–934

    Article  Google Scholar 

  21. Qin C, Zhang X (2015) Effective reversible data hiding in encrypted image with privacy protection for image content. J Vis Commun Image Represent 31:154–164

    Article  Google Scholar 

  22. Rhouma R, Belghith S (2008) Cryptanalysis of a new image encryption algorithm based on hyper-chaos. Phys Lett A 372(38):5973–5978

    Article  MATH  Google Scholar 

  23. Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28(4):656–715

    Article  MathSciNet  MATH  Google Scholar 

  24. Stinson DR (1995) Cryptography: theory and practice. CRC Press, Boca Raton

    MATH  Google Scholar 

  25. Tong X (2012) The novel bilateral–diffusion image encryption algorithm with dynamical compound chaos. J Syst Softw 85(4):850–858

    Article  Google Scholar 

  26. Wei X, Guo L, Zhang Q et al (2012) A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system. J Syst Softw 85(2):290–299

    Article  Google Scholar 

  27. Ye G, Wong KW (2013) An image encryption scheme based on time-delay and hyperchaotic system. Nonlinear Dyn 71(1–2):259–267

    Article  MathSciNet  Google Scholar 

  28. Yoon JW, Kim H (2010) An image encryption scheme with a pseudorandom permutation based on chaotic maps. Commun Nonlinear Sci Numer Simul 15(12):3998–4006

    Article  MathSciNet  MATH  Google Scholar 

  29. Zeng L, Liu R, Zhang L, Liu Y, Wong K (2014) Cryptanalyzing an image encryption algorithm based on scrambling and Veginere cipher. Multimedia Tools Appl

  30. Zhang X, Sun G, Shen L et al (2014) Compression of encrypted images with multi-layer decomposition. Multimedia Tools Appl 72(1):489–502

    Article  Google Scholar 

  31. Zhu C (2012) A novel image encryption scheme based on improved hyper-chaotic sequences. Opt Commun 285(1):29–37

    Article  Google Scholar 

Download references

Acknowledgments

This work is supported by the National Natural Science Foundation of China (Grant No: 61100239), the Ph.D. Programs Foundation of Ministry of Education of China (Grant No: 20100201110063), the Shaanxi Provincial Natural Science Foundation of China (Grant No: 2014JM8322, 2014JM8350).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xuan** Zhang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhang, X., Nie, W., Ma, Y. et al. Cryptanalysis and improvement of an image encryption algorithm based on hyper-chaotic system and dynamic S-box. Multimed Tools Appl 76, 15641–15659 (2017). https://doi.org/10.1007/s11042-016-3861-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-016-3861-9

Keywords

Navigation