Skip to main content
Log in

Security evaluation of bilateral-diffusion based image encryption algorithm

  • Original Paper
  • Published:
Nonlinear Dynamics Aims and scope Submit manuscript

Abstract

Recently, a novel bilateral-diffusion image encryption algorithm based on dynamical compound chaos function and LFSR was proposed. The core idea of the algorithm is to introduce the bilateral-diffusion approach. The present paper focuses mainly on security evaluation of this approach. As it is well known, the security of a cryptosystem must depend only on the secrecy of the key rather than the secrecy of the algorithm according to Kerckoff’s principle. The security of the original algorithm is determined by two initial keys. Since the keys are fixed, the chaotic keystream keeps unchanged for different images. Thus, our purpose is to reveal the keystream. The cryptanalytic results show that the whole keystream can be broken by using two images including a chosen image and a known image, with a combination of chosen-plaintext attack and known-plaintext attack.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Liu, H., Nan, H.: Color image security system using chaos-based cyclic shift and multiple-order discrete fractional cosine transform. Opt. Laser Technol. 50, 1–7 (2013)

    Google Scholar 

  2. Zhang, Y.S., Xiao, D.: Double optical image encryption using discrete Chirikov standard map and chaos-based fractional random transform. Opt. Lasers Eng. 51, 472–480 (2013)

    Article  Google Scholar 

  3. Zhang, Y.S., Xiao, D., Wen, W.Y., Tian, Y.: Edge-based lightweight image encryption using chaos-based reversible hidden transform and multiple-order discrete fractional cosine transform. Opt. Laser Technol. 54, 1–6 (2013)

    Article  Google Scholar 

  4. Refregier, P., Javidi, B.: Optical image encryption based on input plane and Fourier plane random encoding. Opt. Lett. 20, 767–769 (1995)

    Article  Google Scholar 

  5. Mirzaei, O., Yaghoobi, M., Irani, H.: A new image encryption method: parallel sub-image encryption with hyper chaos. Nonlinear Dyn. 67, 557–566 (2012)

    Article  MathSciNet  Google Scholar 

  6. Ye, G.D., Wong, K.W.: An efficient chaotic image encryption algorithm based on a generalized Arnold map. Nonlinear Dyn. 69, 2079–2087 (2012)

    Article  MathSciNet  Google Scholar 

  7. Ye, G.D., Wong, K.W.: An image encryption scheme based on time-delay and hyperchaotic system. Nonlinear Dyn. 71, 259–267 (2013)

    Article  MathSciNet  Google Scholar 

  8. Zhang, Y.S., Xiao, D., Shu, Y.L., Li, J.: A novel image encryption scheme based on a linear hyperbolic chaotic system of partial differential equations. Signal Process-Image Commun. 28, 292–300 (2013)

    Article  Google Scholar 

  9. Zhang, Y.S., Xiao, D.: An image encryption scheme based on rotation matrix bit-level permutation and block diffusion. Commun. Nonlinear Sci. Numer. Simul. 19, 74–82 (2014)

    Article  MathSciNet  Google Scholar 

  10. Wong, K.W., Kwok, B., Law, W.: A fast image encryption scheme based on chaotic standard map. Phys. Lett. A 372, 2645–2652 (2008)

    Article  MATH  Google Scholar 

  11. Xiao, D., Liao, X.F., Wei, P.C.: Analysis and improvement of a chaos-based image encryption algorithm. Chaos Solitons Fract. 40, 2191–2199 (2009)

    Article  MATH  MathSciNet  Google Scholar 

  12. Tong, X.J.: Novel bilateral-diffusion image encryption algorithm with compound chaos and LFSR. Imaging Sci. J. 60, 294–304 (2012)

    Article  Google Scholar 

  13. Tong, X.J.: The novel bilateral-diffusion image encryption algorithm with dynamical compound chaos. J. Syst. Softw. 85, 850–858 (2012)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Moting Su.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Su, M., Wen, W. & Zhang, Y. Security evaluation of bilateral-diffusion based image encryption algorithm. Nonlinear Dyn 77, 243–246 (2014). https://doi.org/10.1007/s11071-014-1287-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11071-014-1287-3

Keywords

Navigation