Multimedia Tools and Applications

, Volume 78, Issue 22, pp 31303–31318 | Cite as

Security analysis of a chaos triggered image encryption scheme

  • Yong ZhangEmail author


A chaos triggered image encryption scheme was recently proposed [Ramalingam et al., Multimed Tools Appl, 2018, 77(10): 11669–11,692]. In this paper, this scheme was analyzed in detail, and then some shortcomings concerning the scheme were pointed out. For example, the combined chaos systems used in the scheme possess weak chaos characteristics, the scheme is insensitive with respect to cipher images, and above all, it is vulnerable to chosen plaintext attacks. After that, a well-designed chosen plaintext attack method was suggested to attack the equivalent secret keys of the scheme, and then the scheme was successfully deciphered in a short time. So, the scheme cannot be applied to actual communication systems.


Information security Image encryption Security analysis Chosen plaintext attack 



This work was fully supported by the National Natural Science Foundation of China (Grant Nos. 61762043, 61562035, 61702238), and the Science and Technology Project of Education Department of Jiangxi Province, China (Grant No. GJJ160426).


  1. 1.
    Çavuşoğlu Ü, Kaçar S, Pehlivan I, Zengin A (2017) Secure image encryption algorithm design using a novel chaos based S-box. Chaos Solitons Fractals 95:92–101CrossRefGoogle Scholar
  2. 2.
    Cheng P, Yang H, Wei P, Zhang W (2015) A fast image encryption algorithm based on chaotic and lookup table. Nonlinear Dyn 79(3):2121–2131CrossRefGoogle Scholar
  3. 3.
    Fan H, Li M, Liu D, Zhang E Cryptanalysis of a colour image encryption using chaotic APFM nonlinear adaptive filter. Signal Process 143:28–41CrossRefGoogle Scholar
  4. 4.
    Gan Z, Chai X, Yuan K, Lu Y (2018) A novel image encryption algorithm based on LFT based S-boxes and chaos. Multimed Tools Appl 77:8759–8783CrossRefGoogle Scholar
  5. 5.
    Ghebleh M, Kanso A, Stevanovic D (2018) A novel image encryption algorithm based on piecewise linear chaotic maps and least squares approximation. Multimed Tools Appl 77:7305–7326CrossRefGoogle Scholar
  6. 6.
    Hanis S, Amutha R (2018) Double image compression and encryption scheme using logistic mapped convolution and cellular automata. Multimed Tools Appl 77:6897–6912CrossRefGoogle Scholar
  7. 7.
    Hu G, Xiao D, Wang Y, Li X (2017) Cryptanalysis of a chaotic image cipher using Latin square-based confusion and diffusion. Nonlinear Dyn 88(2):1305–1316CrossRefGoogle Scholar
  8. 8.
    Hua Z, Zhou Y (2016) Image encryption using 2D logistic-adjusted-sine map. Inf Sci 339:237–253CrossRefGoogle Scholar
  9. 9.
    Huang X, Ye G (2018) An image encryption algorithm based on irregular wave representation. Multimed Tools Appl 77(2):2611–2628CrossRefGoogle Scholar
  10. 10.
    Laiphrakpam DS, Khumanthem MS (2018) A robust image encryption scheme based on chaotic system and elliptic curve over finite field. Multimed Tools Appl 77:8629–8652CrossRefGoogle Scholar
  11. 11.
    Li C (2016) Cracking a hierarchical chaotic image encryption algorithm based on permutation. Signal Process 118:203–210CrossRefGoogle Scholar
  12. 12.
    Li B, Liao X, Jiang Y (2018) A novel image encryption scheme based on logistic map and dynatomic modular curve. Multimed Tools Appl 77:8911–8938CrossRefGoogle Scholar
  13. 13.
    Liu J, Yang D, Zhou H, Chen S (2018) A digital image encryption algorithm based on bit-planes and an improved logistic map. Multimed Tools Appl 77:10217–10233CrossRefGoogle Scholar
  14. 14.
    Noura H, Sleem L, Noura M, Mansour MM, Chehab A, Couturier R (2018) A new efficient lightweight and secure image cipher scheme. Multimed Tools Appl 77:15457–15484CrossRefGoogle Scholar
  15. 15.
    Ogiela L, Ogiela MR (2017) Insider threats and cryptographic techniques in secure information management. IEEE Syst J 11(2):405–414CrossRefGoogle Scholar
  16. 16.
    Ogiela U, Takizawa M, Ogiela L (2018) Visual CAPTCHA application in linguistic cryptography. Concurrency and Computation: Practice and Experience 30(2):1–8Google Scholar
  17. 17.
    Ramalingam B, Ravichandran D, Annadurai AA, Rengarajan A, Rayappan JBB (2018) Chaos triggered image encryption – a reconfigurable security solution. Multimed Tools Appl 77(10):11669–11692CrossRefGoogle Scholar
  18. 18.
    Su X, Li W, Hu H (2017) Cryptanalysis of a chaos-based image encryption scheme combining DNA coding and entropy. Multimed Tools Appl 76(12):14021–14033CrossRefGoogle Scholar
  19. 19.
    Teng L, Wang X, Meng J (2018) A chaotic color image encryption using integrated bit-level permutation. Multimed Tools Appl 77:6883–6896CrossRefGoogle Scholar
  20. 20.
    Wang X, Luan D (2013) A novel image encryption algorithm using chaos and reversible cellular automata. Commun Nonlinear Sci Numer Simulat 18(11):3075–3085MathSciNetCrossRefGoogle Scholar
  21. 21.
    Wu J, Liao X, Yang B (2018) Cryptanalysis and enhancements of image encryption based on three-dimensional bit matrix permutation. Signal Process 142:292–300CrossRefGoogle Scholar
  22. 22.
    Wu X, Kurths J, Kan H (2018) A robust and lossless DNA encryption scheme for color images. Multimed Tools Appl 77(10):12349–12376CrossRefGoogle Scholar
  23. 23.
    Xie EY, Li C, Yu S, Lu J (2017) On the cryptanalysis of Fridrich's chaotic image encryption scheme. Singal Processing 132:150–154CrossRefGoogle Scholar
  24. 24.
    Ye G, Zhao H, Chai H (2016) Chaotic image encryption algorithm using wave-line permutation and block diffusion. Nonlinear Dyn 83(4):2067–2077MathSciNetCrossRefGoogle Scholar
  25. 25.
    Zhang Y (2018) The image encryption algorithm based on chaos and DNA computing. Multimed Tools Appl 77(16):21589–21615CrossRefGoogle Scholar
  26. 26.
    Zhang Y (2018) The unified image encryption algorithm based on chaos and cubic S-box. Inf Sci 450:361–377MathSciNetCrossRefGoogle Scholar
  27. 27.
    Zhang Y, Tang Y (2018) A plaintext-related image encryption algorithm based on chaos. Multimed Tools Appl 77(6):6647–6669CrossRefGoogle Scholar
  28. 28.
    Zhang Y, Xiao D (2014) An image encryption scheme based on rotation matrix bit-level permutation and block diffusion. Commun Nonlinear Sci Numer Simulat 19(1):74–82CrossRefGoogle Scholar
  29. 29.
    Zhang D, Liao X, Yang B, Zhang Y (2017) A fast and efficient approach to color-image encryption based on compressive sensing and fractional Fourier transform. Multimed Tools Appl 77:2191–2208CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.School of Software & Internet-of-Things EngineeringJiangxi University of Finance & EconomicsNanchangPeople’s Republic of China

Personalised recommendations