Abstract
Security of multimedia data is a major concern due to its widespread transmission over various communication channels. Hence, design and study of good image encryption schemes has become a major research topic. During the last few decades, there has been an increase in chaos-based cryptography. This paper proposes an attack on a recently proposed chaos-based image encryption scheme. The cryptosystem under study proceeded by first shuffling the original image to disturb the arrangement of pixels by applying a chaotic map several times. Second, a key stream is generated using Chen’s chaotic system to mix it with the shuffled pixels to finally obtain the cipher image. A chosen-ciphertext attack can be done to recover the system without any knowledge of the key. It simply demands two pairs of plaintext–ciphertext to completely break the cryptosystem.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Al-Maadeed, S., Al-Ali, A., Abdalla, T.: A new chaos-based image-encryption and compression algorithm. J. Electr. Comput. Eng. 2012, Article ID 179693
Chen, G., Ueta, T.: Int. J. Bifur. Chaos 9(7), 1465 (1999)
Alvarez, G., Li, S.J.: Int. J. Bifurcat. Chaos 16, 2129 (2006)
Çokal, C., Solak, E.: Cryptanalysis of a chaos-based image encryption algorithm. Phys. Lett. A 373, 1357–1360 (2009)
http://pages.physics.cornell.edu/~sethna/teaching/562_S03/HW/pset02_dir/catmap.pdf
Maniccam, S.S., Bourbakis, N.G.: Pattern Recogn. 37, 725 (2004)
Fridrich, J.: Int. J. Bifur. Chaos 8(6), 1259 (1998)
Rhouma, R.: Cryptanalysis of a spatiotemporal chaotic cryptosystem. Chaos Solitons Fractals 41, 1718–1722, (Aug 2009). https://doi.org/10.1016/j.chaos.2008.07.016
Scharinger, J.: J. Electron. Imaging 7, 318 (1998)
Huang, C.K., Nien, H.H.: Opt. Commun. 282, 2123 (2009)
Hu, J.K., Han, F.L.: J. Netw. Comput. Appl. 32, 788 (2009)
Gao, T.G., Chen, Z.Q.: Chaos Solitons Fractals 38, 213 (2008)
Gao, T.G., Chen, Z.Q.: Phys. Lett. A 372, 394 (2008)
Mazloom, S., Eftekhari-Moghadam, A.M.: Chaos, Solitons Fractals 42, 1745 (2009)
Arrifin, M.R.K., Noorani, M.S.M.: Phys. Lett. A 372, 5427 (2008)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Mukherjee, P., Rarhi, K., Mishra, A., Bhattacharya, A. (2019). Cryptanalysis of a Chaotic Key-Based Image Encryption Scheme. In: Abraham, A., Dutta, P., Mandal, J., Bhattacharya, A., Dutta, S. (eds) Emerging Technologies in Data Mining and Information Security. Advances in Intelligent Systems and Computing, vol 814. Springer, Singapore. https://doi.org/10.1007/978-981-13-1501-5_14
Download citation
DOI: https://doi.org/10.1007/978-981-13-1501-5_14
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-1500-8
Online ISBN: 978-981-13-1501-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)