Cryptanalysis of Image Ciphers With Permutation-Substitution Network and Chaos

In recent decades, the introduction of chaos to image encryption has drawn worldwide attention. The permutationsubstitution architecture has been widely applied, and chaotic systems are generally employed to produce the required encryption elements. Although many security assessment tests have been conducted, some chaotic image ciphers are being cryptanalyzed. In this paper, we evaluate the security of a family of image ciphers whose encryption kernel consists of a bit-level or pixellevel permutation and a bit-wise exclusive OR substitution. After investigating the intrinsic linearity inside the outfitted structures and encryption techniques, we find that each ciphertext-plaintext pair can be represented as a combination of a set of ciphertextplaintext bases. A chosen-ciphertext attack is proposed to construct the ciphertext-plaintext bases rather than the traditional solution to retrieve equivalent encryption elements. We further reveal that such weakness cannot be remedied by common enhancements such as more chaotic dynamics, complex permutation methods, and random pixel insertion during encryption. In addition, applications of the proposed attack to break 12 ciphers are theoretically presented and experimentally verified.

[1]  Darko Kirovski,et al.  Multimedia Security Handbook , 2004 .

[2]  Zhiliang Zhu,et al.  Efficient and Secure Image Encryption Algorithm Using a Novel Key-Substitution Architecture , 2019, IEEE Access.

[3]  Jinhu Lu,et al.  On Cryptanalysis of Fridrich's chaotic image encryption scheme , 2016, ArXiv.

[4]  吕金虎,et al.  Design and ARM-Embedded Implementation of A Chaotic Map-Based Real-Time Secure Video Communication System , 2015 .

[5]  Adrian-Viorel Diaconu,et al.  Circular inter-intra pixels bit-level permutation and chaos-based image encryption , 2016, Inf. Sci..

[6]  Di Xiao,et al.  Cryptanalysis of S-box-only chaotic image ciphers against chosen plaintext attack , 2013, Nonlinear Dynamics.

[7]  Xiaojun Tong,et al.  Image encryption with compound chaotic sequence cipher shifting dynamically , 2008, Image Vis. Comput..

[8]  Di Xiao,et al.  Quantum Image Encryption Using Intra and Inter Bit Permutation Based on Logistic Map , 2019, IEEE Access.

[9]  Dongdong Lin,et al.  Cryptanalyzing an Image Encryption Algorithm Based on Autoblocking and Electrocardiography , 2017, IEEE MultiMedia.

[10]  Shuliang Sun,et al.  A Novel Hyperchaotic Image Encryption Scheme Based on DNA Encoding, Pixel-Level Scrambling and Bit-Level Scrambling , 2018, IEEE Photonics Journal.

[11]  Olcay Taner Yildiz,et al.  Cryptanalysis of Fridrich's Chaotic Image Encryption , 2010, Int. J. Bifurc. Chaos.

[12]  Yin Dai,et al.  Chaotic Medical Image Encryption Algorithm Based on Bit-Plane Decomposition , 2016, Int. J. Pattern Recognit. Artif. Intell..

[13]  Zhiliang Zhu,et al.  Exploiting self-adaptive permutation-diffusion and DNA random encoding for secure and efficient image encryption , 2018, Signal Process..

[14]  Ruisong Ye,et al.  A Permutation-substitution Based Image Encryption Scheme with Bit-plane Exchanging Strategy , 2015 .

[15]  Guanrong Chen,et al.  Chaos-Based Encryption for Digital Images and Videos , 2004 .

[16]  Kwok-Tung Lo,et al.  Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks , 2011, Signal Process..

[17]  J. Fridrich Symmetric Ciphers Based on Two-Dimensional Chaotic Maps , 1998 .

[18]  Bo Li,et al.  A novel image encryption scheme based on logistic map and dynatomic modular curve , 2017, Multimedia Tools and Applications.

[19]  Xiao-jun Tong The novel bilateral - Diffusion image encryption algorithm with dynamical compound chaos , 2012, J. Syst. Softw..

[20]  Fatih Özkaynak,et al.  Brief review on application of nonlinear dynamics in image encryption , 2018, Nonlinear Dynamics.

[21]  Yicong Zhou,et al.  Cascade Chaotic System With Applications , 2015, IEEE Transactions on Cybernetics.

[22]  Guanrong Chen,et al.  A Novel Fast Image Encryption Scheme Based on 3D Chaotic Baker Maps , 2004, Int. J. Bifurc. Chaos.

[23]  M. Yaghoobi,et al.  A new image encryption method: parallel sub-image encryption with hyper chaos , 2011, Nonlinear Dynamics.

[24]  Shun Zhang,et al.  A coding and substitution frame based on hyper-chaotic systems for secure communication , 2015, Nonlinear Dynamics.

[25]  Wei Zhang,et al.  A chaos-based symmetric image encryption scheme using a bit-level permutation , 2011, Inf. Sci..

[26]  Nikolaos G. Bourbakis,et al.  A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks , 2008, Signal Process. Image Commun..

[27]  Guanrong Chen,et al.  Design and FPGA-Based Realization of a Chaotic Secure Video Communication System , 2018, IEEE Transactions on Circuits and Systems for Video Technology.

[28]  Yicong Zhou,et al.  A new 1D chaotic system for image encryption , 2014, Signal Process..

[29]  Yushu Zhang,et al.  Security evaluation of bilateral-diffusion based image encryption algorithm , 2014, Nonlinear Dynamics.

[30]  Zhenjun Tang,et al.  Efficient image encryption with block shuffling and chaotic map , 2014, Multimedia Tools and Applications.

[31]  José Manuel López-Guede,et al.  A new bit-level permutation image encryption algorithm , 2016, 2016 International Conference on Communications (COMM).

[32]  Anlong Ming,et al.  Reality-Preserving Multiple Parameter Discrete Fractional Angular Transform and Its Application to Color Image Encryption , 2019, IEEE Transactions on Circuits and Systems for Video Technology.

[33]  Kwok-Wo Wong,et al.  On the Security of a Class of Diffusion Mechanisms for Image Encryption , 2015, IEEE Transactions on Cybernetics.

[34]  Yicong Zhou,et al.  Image encryption using 2D Logistic-adjusted-Sine map , 2016, Inf. Sci..

[35]  Qiang Liu,et al.  A novel image encryption algorithm based on chaos and Line map , 2015, Neurocomputing.

[36]  Xin-Wen Wu,et al.  On the Security of Permutation-Only Image Encryption Schemes , 2016, IEEE Transactions on Information Forensics and Security.

[37]  Zhenjun Tang,et al.  Multiple-image encryption with bit-plane decomposition and chaotic maps , 2016 .

[38]  Xuejing Kang,et al.  Color Image Encryption Using Pixel Scrambling Operator and Reality-Preserving MPFRHT , 2019, IEEE Transactions on Circuits and Systems for Video Technology.

[39]  C. Chui,et al.  A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .

[40]  Kwok-Wo Wong,et al.  Cryptanalyzing a class of image encryption schemes based on Chinese remainder theorem , 2013, Signal Process. Image Commun..

[41]  Xiangde Zhang,et al.  A novel image encryption-compression scheme using hyper-chaos and Chinese remainder theorem , 2013, Signal Process. Image Commun..

[42]  Yehuda Lindell,et al.  Introduction to Modern Cryptography , 2004 .

[43]  Yicong Zhou,et al.  Universal Chosen-Ciphertext Attack for a Family of Image Encryption Schemes , 2019, IEEE Transactions on Multimedia.

[44]  Gonzalo Álvarez,et al.  Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.

[45]  C. K. Michael Tse,et al.  An efficient and secure medical image protection scheme based on chaotic maps , 2013, Comput. Biol. Medicine.

[46]  Stefan Katzenbeisser,et al.  Depreciating Motivation and Empirical Security Analysis of Chaos-Based Image and Video Encryption , 2018, IEEE Transactions on Information Forensics and Security.

[47]  Xing-yuan Wang,et al.  A novel image encryption algorithm based on genetic recombination and hyper-chaotic systems , 2015, Nonlinear Dynamics.

[48]  Yicong Zhou,et al.  Medical image encryption using high-speed scrambling and pixel adaptive diffusion , 2018, Signal Process..