Abstract
This paper introduces a cryptanalysis of image encryption techniques that are using chaotic scrambling and logic gates/circuits. Chaotic scrambling, as well as general permutations are considered together with reversible and irreversible gates, including XOR, Toffoli and Fredkin gates. We also investigate ciphers based on chaotic permutations and balanced logic circuits. Except for the implementation of Fredkin’s gate, these ciphers are insecure against chosen-plaintext attacks, no matter whether a permutation is applied globally on the image or via a block-by-block basis. We introduce a new cipher based on chaotic permutations, logic circuits and randomized Fourier-type transforms. The strength of the new cipher is statistically verified with standard statistical encryption measures.
Similar content being viewed by others
References
Amigó J, Kocarev L, Szczepanski J (2007) Theory and practice of chaotic cryptography. Phys Lett A 366(3):211–216
Annaby M, Rushdi M, Nehary E (2016) Image encryption via discrete fractional Fourier-type transforms generated by random matrices. Signal Process: Image Commun 49:25–46
Benjamini I, Schramm O, Wilson DB (2005) Balanced boolean functions that can be evaluated so that every input bit is unlikely to be read. In: Proceedings of the thirty-seventh annual ACM symposium on Theory of computing. ACM, pp 244–250
Candan C, Kutay M, Ozaktas H (2000) The discrete fractional Fourier transform. IEEE Trans Signal Process 48(5):1329–1337
De Vos A (2011) Reversible computing: fundamentals, quantum computing, and applications. Wiley, Weinheim
Devaney R (2003) An introduction to chaotic dynamical systems. Westview Press, Cambridge
Gupta P, Agrawal A, Jha NK (2006) An algorithm for synthesis of reversible logic circuits. IEEE Trans Comput-Aided Des Integr Circ Syst 25(11):2317–2330
Hennelly B, Sheridan JT (2003) Optical image encryption by random shifting in fractional Fourier domains. Opt Lett 28(4):269–271
Hsue WL, Chang WC (2015) Real discrete fractional Fourier, Hartley, generalized Fourier and generalized Hsartley transforms with many parameters. IEEE Trans Circ Syst I: Reg Pap 62(10):2594–2605
Jolfaei A, Wu XW, Muthukkumarasamy V (2016) On the security of permutation-only image encryption schemes. IEEE Trans Inf Forensic Secur 11 (2):235–246
Kanso A, Smaoui N (2009) Logistic chaotic maps for binary numbers generations. Chaos, Solitons Fractals 40(5):2557–2568
Kocarev L (2001) Chaos-based cryptography: a brief overview. IEEE Circ Syst Mag 1(3):6–21
Li C, Li S, Alvarez G, Chen G, Lo KT (2007) Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations. Phys Lett A 369(1):23–30
Li S, Li C, Chen G, Bourbakis NG, Lo KT (2008) A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Process: Image Commun 23(3):212–223
Li C, Lo KT (2011) Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal process 91(4):949–954
Mao Y, Chen G, Lian S (2004) A novel fast image encryption scheme based on 3D chaotic baker maps. Int J Bifurcation Chaos 14(10):3613–3624
Mao Y, Chen G (2005) Chaos-based image encryption. In: Handbook of geometric computing. Springer, Berlin, pp 231–265
Morrison M (2014) Theory, synthesis, and application of adiabatic and reversible logic circuits for security applications. In: 2014 IEEE Computer Society Annual Symposium on VLSI. IEEE, pp 252–255
Pei SC, Yeh MH (1997) Improved discrete fractional Fourier transform. Opt Lett 22(14):1047–1049
Pei SC, Hsue WL (2006) The multiple-parameter discrete fractional Fourier transform. IEEE Signal Process Lett 13(6):329–332
Sam IS, Devaraj P, Bhuvaneswaran RS (2011) Chaos based image encryption scheme based on enhanced logistic map. In: International Conference on Distributed Computing and Internet Technology. Springer, pp 290–300
Shannon CE (2001) A mathematical theory of communication. ACM SIGMOBILE Mob Comput Commun Rev 5(1):3–55
Shende VV, Prasad AK, Markov IL, Hayes JP (2003) Synthesis of reversible logic circuits. IEEE Trans Comput-Aided Des Integr Circ Syst 22(6):710–722
Tang Z, Wang F, Zhang X (2017) Image encryption based on random projection partition and chaotic system. Multimed Tools Appl 76(6):82578283
Thapliyal H, Zwolinski M (2006) Reversible logic to cryptographic hardware: A new paradigm. In: 2006 49th IEEE International Midwest Symposium on Circuits and Systems, vol 1. IEEE, pp 342–346
Wang Y, Liao X, Xiang T, Wong KW, Yang D (2007) Cryptanalysis and improvement on a block cryptosystem based on iteration a chaotic map. Phys Lett A 363(4):277–281
Wong KW (2009) Image encryption using chaotic maps. In: Intelligent computing based on chaos. Springer, Berlin, pp 333–354
Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI color image encryption using randomness tests for image encryption. Cyber journals: multidisciplinary journals in science and technology. J Select Areas Telecommun (JSAT), April Edition:31–38
Xiang T, Liao X, Tang G, Chen Y, Wong Kw (2006) A novel block cryptosystem based on iterating a chaotic map. Phys Lett A 349(1):109–115
Xu L, Gou X, Li Z, Li J (2017) A novel chaotic image encryption algorithm using block scrambling and dynamic index based diffusion. Opt Lasers Eng 91:41–52
Ye G (2010) Image scrambling encryption algorithm of pixel bit based on chaos map. Pattern Recogn Lett 31(5):347–354
Yuan HM, Gong LH, Wang J (2017) A new image cryptosystem based on 2D hyper-chaotic system. Multimedia Tools and Applications 76(6):80878108
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Annaby, M.H., Ayad, H. & Rushdi, M.A. On security of image ciphers based on logic circuits and chaotic permutations. Multimed Tools Appl 77, 20455–20476 (2018). https://doi.org/10.1007/s11042-017-5439-6
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-017-5439-6