Computer Science ›› 2018, Vol. 45 ›› Issue (4): 178-181.doi: 10.11896/j.issn.1002-137X.2018.04.030

Previous Articles     Next Articles

Chosen Plaintext Attack on Chaotic Image Encryption Algorithm Based on Perceptron Model

ZHU Shu-qin, WANG Wen-hong and LI Jun-qing   

  • Online:2018-04-15 Published:2018-05-11

Abstract: This paper analyzed the security of a chaotic image encryption algorithm based on preceptron model and found that the essence of the algorithm is to change the value of bits of the plaintext image according to the equivalent key stream to get the cipher image.However,there is no relation between the equivalent key stream and the plain text image or the corresponding cipher text image.By applying chosen plaintext attacks,this paper found that the equivalent key can be cracked,which can be further exploited to decrypt the target plain image.In addition,two other security defects were also reported.Finally,the original algorithm was improved to overcome the shortcomings of the original algorithm.Both mathematical analysis and experimental results show that the feasibility of the proposed chosen plaintext attack strategies and the effectiveness of the improved algorithm are verified.

Key words: Chaotic image encryption,Cryptanalysis,Equivalent key,Chosen plaintext attack

[1] SHANNON C E.Communication theory of secrecy system[J].Bell System Technical Journal,1949,28(11):656-715.
[2] SCHIENER B.Applied cryptography:protocols,algorithms and source code in C [M].New York:John Wiley and Sons,1996:30-40.
[3] BAPTISTA M S.Cryptography with chaos[J].Physics Letters A,1998,240(1/2):50-54.
[4] LIU H J,WANG X Y.Color image encryption based on one-time keys and robust chaotic maps[J].Computers and Mathematics with Applications,2010,59(10):3320-3327.
[5] WANG X Y,TENG L,QIN X.A novel colour image encryption algorithm based on chaos[J].Signal Processing,2012,92(4):1101-1108.
[6] HAN F Y,ZHU C X.New permutation-substitution image en-cryption scheme based on chaos[J].Journal of Wuhan University(Natural Science Edition),2014,60(5):447-452.(in Chinese) 韩凤英,朱从旭.新型置换和替代结构的图像混沌加密算法[J].武汉大学学报(理学版),2014,60(5):447-452.
[7] LIU Q,LI P Y,ZHANG M C,et al.Image encryption algorithm based on chaos system having markov portion[J].Journal of Electronics & Information Technology,2014,36(6):1271-1277.(in Chinese) 刘泉,李佩玥,章明朝,等.基于可Markov分割混沌系统的图像加密算法[J].电子与信息学报,2014,36(6):1271-1277.
[8] LIU H J,WANG X Y.Color image encryption using spatial bit-level permutation and high-dimension chaotic system[J].Optics Communications,2011,284(16/17):3895-3903.
[9] LIU H J,WANG X Y.Image encryption using DNA complementary rule and chaotic maps[J].Applied Soft Computing,2012,12(5):1457-1466.
[10] ANCHAL J,NAVIN R.A robust image encryption algorithmresistant to attacks using DNA and chaotic logistic maps[J].Multimedia Tools Applications,2015,29(1):1-18.
[11] HUANG X L,YE G D.An image encryption algorithm based on hyper-chaos and DNA sequence[J].Multimedia Tools Applications,2014,72(1):57-70.
[12] KUMAR M,IQBAL A,KUMAR P.A new RGB image encryption algorithm based on DNA encoding and elliptic curve Diffie-Hellman cryptography[J].Signal Processing,2016,125(C):187-202.
[13] AHMAD J,KHAN M A,HWANG S O,et al.A compression sensing and noise-tolerant image encryption scheme based on chaotic maps and orthogonal matrices[J].Neural Computing and Applications,2017,8(1):953-967.
[14] WANG X Y,YANG L,LIU R,et al.A chaotic image encryption algorithm based on perceptron Model[J].Nonlinear Dynamics,2010,62(3):615-621.
[15] WILLIAM S,等.密码编码学与网络安全:原理与实践[M].杨明,等译.北京:电子工业出版社,2001:50-60.
[16] RHOUMA R,BELGHITH S.Cryptanalysis of a new image encryption algorithm based on hyper-chaos [J].Physics Letters A,2008,372(38):5973-5978.

No related articles found!
Full text



[1] . [J]. Computer Science, 2018, 1(1): 1 .
[2] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75 .
[3] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[4] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[5] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[6] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99 .
[7] ZHOU Yan-ping and YE Qiao-lin. L1-norm Distance Based Least Squares Twin Support Vector Machine[J]. Computer Science, 2018, 45(4): 100 -105 .
[8] LIU Bo-yi, TANG Xiang-yan and CHENG Jie-ren. Recognition Method for Corn Borer Based on Templates Matching in Muliple Growth Periods[J]. Computer Science, 2018, 45(4): 106 -111 .
[9] GENG Hai-jun, SHI Xin-gang, WANG Zhi-liang, YIN Xia and YIN Shao-ping. Energy-efficient Intra-domain Routing Algorithm Based on Directed Acyclic Graph[J]. Computer Science, 2018, 45(4): 112 -116 .
[10] CUI Qiong, LI Jian-hua, WANG Hong and NAN Ming-li. Resilience Analysis Model of Networked Command Information System Based on Node Repairability[J]. Computer Science, 2018, 45(4): 117 -121 .