Research Article  Open Access
Yingchun Hu, Simin Yu, Zeqing Zhang, "On the Cryptanalysis of a BitLevel Image Chaotic Encryption Algorithm", Mathematical Problems in Engineering, vol. 2020, Article ID 5747082, 15 pages, 2020. https://doi.org/10.1155/2020/5747082
On the Cryptanalysis of a BitLevel Image Chaotic Encryption Algorithm
Abstract
In this paper, the security analysis of a bitlevel image chaotic encryption algorithm based on the 1D chaotic map is proposed. The original image chaotic encryption algorithm includes bitlevel permutation encryption, diffusion encryption, and linear transform. Deciphering of it can be divided into two stages. First, bitlevel permutation encryption, diffusion encryption, and linear transform can be simplified into bitlevel equivalent permutation encryption and equivalent diffusion encryption, which is a key breakthrough point of cryptanalysis. Second, the chaotic sequence generated by this algorithm is independent of the plaintext image. Therefore, the equivalent diffusion key and the equivalent permutation key can be obtained by chosenplaintext attack, respectively. Theoretical analysis and numerical simulation experiment results verify the effectiveness of the analytical method. Finally, some suggestions are proposed to promote the security of the original image chaotic encryption algorithm.
1. Introduction
With the rapid development of network technology, a large amount of multimedia information, such as image, voice, text, and video, needs to be transmitted through the Internet. Therefore, the security problem becomes an important research subject and attracts more and more attention. Because of some intrinsic properties of images, for example, bulk data capacity, high redundancy, and strong correlation of two adjacent pixels, traditional text encryption algorithms such as AES and DES, which have higher time complicity, are not suitable for image encryption [1]. Because chaos is pseudorandom, ergodic, and highly sensitive to initial values and control parameters, these characteristics can achieve good confusion and diffusion effects and can meet the basic requirements of cryptography. Therefore, many image encryption algorithms have been proposed based on the chaotic map in recent years [1–20].
In 1997, the first image chaotic encryption algorithm based on the permutationdiffusion structure is proposed in [2]. Thereafter, a symmetric image encryption algorithm based on 3D chaotic cat map is presented in [1]. In 2007, a new image encryption algorithm based on the permutationdiffusion structure is proposed in [3]. In [4], a novel image encryption algorithm based on the skew tent chaotic map and classic permutationdiffusion structure is proposed. To enhance the security of the image chaotic encryption algorithm, some bitlevel image chaotic encryption algorithms are proposed in [5–8]. In addition, many image encryption schemes based on constructing new chaotic maps are also proposed in [9–13]. An image chaotic encryption algorithm based on CHHCS and LBP is proposed in [14], where CHHCS is used to scramble the plaintext image, while LBP is considered to diffuse the scrambled image in order to change the values of all pixels. In [15], a color image encryption algorithm is proposed based on cellular automata and hyperchaotic system; the main contribution is the application of the hyperchaotic system and nonuniform cellular automata for robust keys. An image encryption algorithm utilizing the principles of the Josephus problem and the filtering technology is developed in [16]. Moreover, some typical image encryption algorithms based on the chaotic Sbox are proposed in [17–20].
Note that the chaotic encryption schemes proposed in [1–4, 6–15, 20] adopt the classical permutationdiffusion twostage encryption structure; security test metrics are mainly limited to histogram, correlation analysis, differential analysis, key sensitivity test, and so on, which are not enough to guarantee cryptosystem security. In [21–32], the cryptanalysis literature studies point that many chaotic encryption algorithms have some intrinsic security weaknesses, which are not robust against chosenplaintext attack, chosenciphertext attack, and conquer attack. In addition, the chaotic encryption algorithm proposed in [5] adopts permutationonly structure; however, permutationonly is vulnerable to chosenplaintext attack given in [33–36]; for example, according to the chosenplaintext attack, one can obtain equivalent permutation keys by choosing several pairs of plaintextciphertext images and then recovering the corresponding original plaintext image.
This paper reevaluates the security of a bitlevel image encryption algorithm based on the 1D chaotic map proposed in [37]. The algorithm adopts a permutation encryptiondiffusion encryptionlinear transform structure. In the permutation encryption stage, 1D chaotic sequence is generated by the improved logistic map, and its corresponding index sequence is used to scramble the plaintext image. In the diffusion encryption stage, 1D diffusion sequence is utilized to diffuse the scrambled image. In the linear transform stage, the ciphertext encrypted by diffusion is rotated to the right. The authors also give the statistical test results of key space, histogram, correlation of two adjacent pixels, and key sensitivity and claim that the algorithm is secure. However, the cryptanalysis results in this paper show that the algorithm has three security vulnerabilities as follows:(1)The threestage structure for the permutation encryptiondiffusion encryptionlinear transform of the original encryption algorithm can be simplified to an equivalent permutation encryptionequivalent diffusion encryption twostage structure(2)The generated chaotic sequence is independent of the plaintext image(3)There is no ciphertext feedback mechanism in the algorithm
Based on the aforementioned security vulnerabilities, the equivalent permutation encryptionequivalent diffusion encryption parts of the image chaotic encryption algorithm proposed in [37] can be cracked separately by the divideandconquer strategy. Furthermore, the equivalent diffusion key and the equivalent permutation key can be obtained by chosenplaintext attack.
The rest of the paper is organized as follows. Section 2 briefly introduces the image chaotic encryption algorithm under study. Section 3 presents the security analysis. Section 4 gives the numerical simulation experiments. Section 5 proposes some suggestions for improvement. Section 6 concludes the paper.
2. Description of the Original Encryption Algorithm
In [37], the original encryption algorithm adopts the permutation encryptiondiffusion encryptionlinear transform threestage structure. It consists of secret key selection, bitplane decomposition, permutation encryption, diffusion encryption, linear transform, and bitplane composition, as shown in Figure 1. In Figure 1, are secret key parameters, is a 2D plaintext image, is a 1D bitplane decomposition sequence of , is a 1D index sequence corresponding to the improved logistic map, is a 1D diffusion sequence corresponding to the improved logistic map, is a 1D permutation encryption sequence of , is a 1D diffusion encryption sequence of , is a 1D linear transform sequence of , and the corresponding ciphertext image of is defined by . Note that , , and are denoted by a decimal number, and , , , , and are denoted by a binary number, where , , , the size of the 2D plaintext image is , is the height, and is the width, respectively.
The detailed principle of the chaotic encryption algorithm given by Figure 1 can be described as follows:(1)Choose the secret key parameters: according to Figure 1, the chaotic encryption algorithm includes six secret key parameters , where are initial values and control parameters of the improved logistic map, is a disturb parameter, and is the number of circle shifts to the right.(2)Generate the 1D index sequence and the 1D diffusion sequence by using the chaotic sequence: first, obtain the 1D chaotic sequence by adopting the improved logistic map , where , , and mod denotes module operation. Then, obtain the 1D index sequence and the 1D diffusion sequence corresponding to [37].(3)Encrypt the image by using the original encryption algorithm: the encrypted object may be a color image or a grayscale image [37]. For the sake of analysis, here, a plaintext grayscale image of size resolution is taken as an example to indicate the encryption process. Suppose that denotes the 2D plaintext grayscale image, hereinafter referred to as the 2D plaintext image. The steps for the original encryption algorithm are shown as follows: Step 1: bitplane decomposition: first, convert the 2D plaintext image into a 1D sequence by scanning it from left to right and up to down. Second, according to the bitplane decomposition method, the pixel of can be represented as 8 bit planes, and then is obtained [38]. Finally, transform into the 1D sequence with binary form. Note that the relationship between and is defined as where . Take a plaintext image of size resolution as an example, and the bitplane decomposition process is shown in Figure 2. Step 2: bitlevel permutation encryption: in Figure 1, scramble by using 1D index sequence and obtain the corresponding 1D permutation encryption sequence , given by where . Step 3: bitlevel diffusion encryption: in Figure 1, diffuse by utilizing 1D diffusion sequence and obtain the corresponding 1D diffusion encryption sequence as where and denotes the bitwise XOR operation. Step 4: linear transform: obtain 1D linear transform sequence by circle shifting to the right with step , given by where and . Step 5: bitplane composition: it is the inverse process of the bitplane decomposition. Convert the 1D linear transform sequence with binary form into a 2D ciphertext image with decimal form by utilizing the bitplane composition method.(4)Decrypt the image by using the original decryption algorithm: decryption is the inverse of encryption. The plaintext image is recovered from the 2D ciphertext image . Note that the detail relevant statistical test analysis of the original encryption algorithm can be referred from Tables 1–8 of Section 5.2 proposed in [37].








3. Cryptanalysis
3.1. Analysis of Equivalent Permutation EncryptionEquivalent Diffusion Encryption
According to Figure 1, the chaotic encryption algorithm adopts the permutation encryptiondiffusion encryptionlinear transform threestage structure, which can be simplified into its corresponding equivalent permutation encryptionequivalent diffusion encryption twostage structure. From equation (4), one gets the diagram of linear transform between and , as shown in Figure 3.
From Figure 3, one gets
According to equation (5), its general iterative form is given bywhere and .
From equation (6), one gets the relationship between coordinate before linear transform and coordinate after linear transform as
Note that when , .
In the image chaotic encryption algorithm, permutation encryptiondiffusion encryption is a general twostage encryption algorithm. However, the algorithm, as shown in Figure 1, is a permutation encryptiondiffusion encryptionlinear transform threestage structure. For the sake of cryptanalysis, according to equations (2) and (3) with equations (6) and (7), one can simplify the threestage structure of Figure 1 to its corresponding equivalent permutation encryptionequivalent diffusion encryption twostage structure, as shown in Figure 4.
In Figure 4, represents the 1D equivalent index sequence by shifting to the right of size , represents the 1D equivalent diffusion sequence through rotating to the right of size , represents the 1D sequence obtained by equivalent permutation encryption of with , represents the 1D sequence obtained by equivalent diffusion encryption of with , , , and are denoted by a decimal number, and , , , and are denoted by a binary number, where , , and .
Proposition 1. Equivalent permutation encryptionequivalent diffusion encryption twostage structure, as shown in Figure 4, is equivalent to the permutation encryptiondiffusion encryptionlinear transform threestage structure as shown in Figure 1.
Proof. The equivalence is proved by comparing the threelevel encryption as shown in Figure 1 with the twolevel encryption as shown in Figure 4.(1)From Figure 1 and equations (6) and (7), the result of the permutation encryptiondiffusion encryptionlinear transform is given by(2)According to Figure 4 and equation (2), the result of equivalent permutation encryption is given bySimilarly, from Figure 4 with equation (9), the result of diffusion encryption is given byComparing equation (8) with (10), it can be seen that the results of the permutation encryptiondiffusion encryptionlinear transformation threelevel structure are equal to those of the equivalent permutation encryptionequivalent diffusion encryption twolevel structure. The proof is completed.
According to Figure 4, is the 1D equivalent index sequence expressed in the decimal number, and is the 1D equivalent diffusion sequence expressed in the binary number. Therefore, the problem of deciphering key parameters in the original chaotic encryption algorithm can be solved by chosenplaintext attack and transforming it into solving the 1D equivalent index sequence and the 1D equivalent diffusion sequence .
3.2. Deciphering 1D Equivalent Diffusion Sequence
According to chosenplaintext attack, first, choose a full zero 2D plaintext image as , and its corresponding 2D ciphertext image is denoted by . Then, using the obtained as a known condition, one further gets the corresponding 1D equivalent diffusion sequence . In addition, the attack complexity contains data complexity and time complexity. Therefore, the data complexity of the proposed deciphering 1D equivalent diffusion sequence is .
The specific approach for deciphering the 1D equivalent diffusion sequence is as follows:(1)Choose a full zero 2D plaintext image as ; its corresponding 1D bitplane decomposition sequence is . According to chosenplaintext attack, one obtains a 2D ciphertext image corresponding to , and its corresponding 1D bitplane decomposition sequence is . Then, one further gets the 1D ciphertext sequence corresponding to such that where and are denoted by the decimal number and , , and are denoted by the binary number, respectively.(2)According to equation (10), one has where is denoted by the decimal number. Since all pixels of are zero, the corresponding 1D bitplane decomposition sequence satisfies . After performing equivalent permutation encryption operation, also holds.(3)According to equations (11) and (12) with , one gets the 1D equivalent diffusion sequence , given bywhere and is denoted by the binary number.
3.3. Deciphering 1D Equivalent Index Sequence
After deciphering the 1D equivalent diffusion sequence , the original equivalent permutation encryptionequivalent diffusion encryption twostage structure is simplified to the equivalent permutationonly encryption onestage structure. On this basis, one can further choose plaintext images as , obtain the corresponding ciphertext images as , and decipher the 1D equivalent index sequence by using both 2D plaintext images and the corresponding 2D ciphertext images . Therefore, the corresponding data complexity of deciphering the 1D equivalent index sequence is .
The specific approach for deciphering the 1D equivalent index sequence is as follows:(1)Choose 2D plaintext images , obtain the corresponding 1D bitplane decomposition sequence , and get the 2D ciphertext images corresponding to . Then, by using , the 1D ciphertext sequence can be finally determined.(2)On the basis of acquiring , , and , according to equation (10), corresponding is obtained by where denotes the inverse operation of and is denoted by the binary number.(3)According to , one gets the 1D equivalent index sequence aswhere and is denoted by the decimal number.
4. Numerical Simulation Experiments
In our numerical simulation experiments, grayscale images of Lena, Baboon, and Pepper and RGB color images of Lena, Baboon, and Pepper are taken as six examples, where the size of the images is . The secret keys are set as , , , , , and . Simulation experiments are operated on MATLAB R2017a running on the desktop computer with Intel(R) Core(TM) i77700 CPU @3.60 GHz, 16 GB RAM, and the operation system is Windows 7.
(a)
(b)
(a)
(b)
(c)
(d)
(e)
(f)
(g)
(h)
(i)
(j)
(k)
(l)
(m)
(n)
(o)
(p)
(q)
(r)
(s)
(a)
(b)
(c)
(d)
(e)
(f)
(g)
(h)
(i)
(j)
(k)
(l)
(m)
(n)
(o)
4.1. Breaking Results for Grayscale Images Using ChosenPlaintext Attack
(1)According to chosenplaintext attack, choose a full zero 2D plaintext image , and the corresponding ciphertext image is , as shown in Figure 5. Based on and , one obtains their corresponding 1D bitplane decomposition sequences and , respectively, and gets the 1D ciphertext sequence corresponding to . Then, according to equations (11)–(13), one further deciphers the 1D equivalent diffusion sequence , given by(2)Let . According to chosenplaintext attack, by choosing 19 special 2D plaintext images , one obtains the corresponding 1D bitplane decomposition sequences , 2D ciphertext images , and , respectively. Moreover, in our numerical simulation experiments, 2D images with the size of resolution are adopted to represent 1D sequences and , as shown in Figure 6. After obtaining , , and , from equation (14), the 1D sequences can be deciphered as Based on obtained , according to equation (15), the 1D equivalent diffusion sequence can also be deciphered, which is given by(3)By utilizing the deciphered 1D equivalent diffusion sequence and the 1D equivalent index sequence , the plaintext grayscale images can be recovered, as shown in Figure 7. Note that Figures 7(e), 7(j), and 7(o) show that the original plaintext grayscale images and the recovered plaintext grayscale images are equal, concluding that the proposed attack scheme is effective.
4.2. Breaking Results for RGB Color Images Using ChosenPlaintext Attack
Similarly, according to the proposed attack method in Sections 3.2 and 3.3, the breaking experiments are carried on the RGB color images of Lena, Baboon, and Pepper with the size of . Note that, as for the RGB color images of the same size, the number of plaintext images and the corresponding ciphertext images required to crack the permutationonly process is because the total size of RGB color images is . Hence, according to chosenplaintext attack, one reveals the recovered RGB color images, as shown in Figure 8. Note that Figures 8(e), 8(j), and 8(o) show that the original plaintext RGB color images and the recovered plaintext RGB color images are equal.
(a)
(b)
(c)
(d)
(e)
(f)
(g)
(h)
(i)
(j)
(k)
(l)
(m)
(n)
(o)
4.3. A Simple Numerical Example
In order to demonstrate the effectiveness of the cryptanalysis, one provides a simple numerical example.
Suppose that a plaintext grayscale image of size is set as an example, which is denoted by . Then, one obtains the corresponding ciphertext image represented by through utilizing the original encryption algorithm. Moreover, let and be
Suppose that is unknown, and represents the recovered plaintext grayscale image from the ciphertext image . The steps for obtaining by using the proposed chosenplaintext attack scheme are given as follows:(1)According to chosenplaintext attack, choose a full zero plaintext image as , and the corresponding ciphertext image is , which are given by Then, based on equations (19) and (20), one gets their corresponding 1D bitplane decomposition sequences and , respectively, and gets the 1D ciphertext sequence corresponding to . Then, according to equations (11)–(13), one further deciphers the 1D equivalent diffusion sequence , which is denoted by(2)Given . According to chosenplaintext attack, by choosing 5 special 2D plaintext images , one obtains the corresponding 1D bitplane decomposition sequences , 2D ciphertext images , and 1D ciphertext sequences , respectively. Besides, the mathematical expressions of and are represented by(3)Based on equations (21) and (22), one deciphers the 1D sequences as(4)According to equations (15) and (24), one reveals the 1D equivalent index sequence , given by(5)First, by using the obtained 1D equivalent diffusion sequence , rediffuse the 1D diffusion sequence corresponding to the ciphertext image . The 1D equivalent permutation encryption sequence is deciphered as Then, rescramble by utilizing the 1D equivalent index sequence , and the 1D bitplane decomposition sequence is given by
Finally, according to the bitplane composition principle, is converted into 2D plaintext image , that is, one recovered plaintext grayscale image from the ciphertext image is
According to equations (19) and (28), one obtains that . Therefore, the proposed chosenplaintext attack scheme has been verified through the above examples.
4.4. Attack Complexity and Time
According to above analysis, as for the grayscale images with the size of , one gets that deciphering the 1D equivalent diffusion sequence and the 1D equivalent index sequence only require plaintext images and the corresponding ciphertext images without any known keys. Therefore, the total data complexity is , which represents a logarithmic level complexity. Moreover, the breaking time is 12.18 seconds by utilizing our proposed schemes. As for the RGB color images with the size of , the total data complexity is . Besides, the breaking time is 40.3 seconds by utilizing our proposed schemes, respectively. Consequently, the experiment results show that the cracking method is both effective and efficient, where it has lower running time and attack complexity.
5. Suggestions for Improvement
According to the security defects of the original image chaotic encryption algorithm, the suggestions for improvement are given as follows:(1)In the permutation encryption structure, one can construct the combination of key stream parameters and the characters of the plaintext image, such as all pixels’ sum, average, and hash value of the plaintext information, where the equivalent permutation keys can be avoided.(2)In the diffusion encryption structure, one could add some nonlinear diffusion encryption techniques such as Sbox and ciphertext feedback mechanism to enhance the combination of plaintext, keys, and ciphertext and further promote the security of the original encryption algorithm. Moreover, one can suggest building the combination of the circle shift parameter and the diffusion encryption results to avoid the equivalent diffusion keys.(3)One can suggest that the multipleround encryption algorithm is proposed to improve the security based on the higher efficiency.(4)One can check the randomness of chaotic sequences. The periods of chaotic sequences obtained by iterating the logistic map in the digital computer are rigorously analysed in [39] and further lead to the dynamic degradation of chaotic maps. Moreover, the randomness of chaotic sequences affects the security of the encryption algorithm. Therefore, it is necessary to check the randomness of chaotic sequences from the perspective of cryptanalysis.
6. Conclusions
In this paper, the chaotic cryptosystem with the threelevel structure of permutation encryption, diffusion encryption, and linear transformation is analysed. Simplifying the threelevel encryption structure of a chaotic cipher into the twolevel encryption structure of equivalent permutation encryption and equivalent diffusion encryption is the key point to solve the security analysis problem. In addition, because the chaotic cipher algorithm belongs to an openloop structure and lacks the ciphertext feedback mechanism, the generated chaotic sequence has nothing to do with the plaintext image, so the equivalent key method can be used to decipher it. The results of theoretical analysis and numerical simulation show that, as for the grayscale images and RGB color images of size , by utilizing the chosenplaintext attack method, the equivalent diffusion key and equivalent permutation key can be obtained by choosing only and plaintext images and the corresponding ciphertext images; thus, the original algorithm can be deciphered successfully. Finally, some suggestions are presented to improve the security of the original image chaotic encryption algorithm. Furthermore, the paper sets up a good example framework for security analysis of bitlevel chaotic cryptosystems.
Data Availability
The data and code used to support the findings of this study are available from the corresponding author upon request.
Conflicts of Interest
The authors declare that there are no conflicts of interest regarding the publication of this paper.
Acknowledgments
This work was supported by the National Key Research and Development Program of China (no. 2016YFB0800401) and the National Natural Science Foundation of China (nos. 61532020 and 61671161).
References
 G. Chen, Y. Mao, and C. K. Chui, “A symmetric image encryption scheme based on 3D chaotic cat maps,” Chaos Solitons & Fractals, Solitons & Fractals, vol. 21, no. 3, pp. 749–761, 2004. View at: Publisher Site  Google Scholar
 J. Fridrich, “Image encryption based on chaotic maps,” in Proceedings of the 1997 IEEE International Conference on systems, Man, and Cybernetics. Computational Cybernetics and Simulation, vol. 2, pp. 1105–1110, Orlando, FL, USA, October 1997. View at: Publisher Site  Google Scholar
 T. Gao and Z. Chen, “A new image encryption algorithm based on hyperchaos,” Physics Letters A, vol. 372, no. 4, pp. 394–400, 2008. View at: Publisher Site  Google Scholar
 G. Zhang and Q. Liu, “A novel image encryption method based on total shuffling scheme,” Optics Communications, vol. 284, no. 12, pp. 2775–2780, 2011. View at: Publisher Site  Google Scholar
 C. Fu, B. Lin, Y.S. Miao, X. Liu, and J.J. Chen, “A novel chaosbased bitlevel permutation scheme for digital image encryption,” Optics Communications, vol. 284, no. 23, pp. 5415–5423, 2011. View at: Publisher Site  Google Scholar
 Z. Zhu, W. Zhang, K. W. Wong, and H. Yu, “A chaosbased symmetric image encryption scheme using a bitlevel permutation,” Information Sciences, vol. 181, no. 6, pp. 1171–1186, 2011. View at: Publisher Site  Google Scholar
 A. Shafique and J. Shahid, “Novel image encryption cryptosystem based on binary bit planes extraction and multiple chaotic maps,” The European Physical Journal Plus, vol. 133, no. 8, pp. 1–16, 2018. View at: Publisher Site  Google Scholar
 X. Chai, Z.H. Gan, K. Yuan, Y. Lu, and Y.R. Chen, “An image encryption scheme based on threedimensional Brownian motion and chaotic system,” Chinese Physics B, vol. 26, no. 2, Article ID 0205, 2017. View at: Publisher Site  Google Scholar
 Y. Zhou, L. Bao, and C. L. Philip Chen, “A new 1D chaotic system for image encryption,” Signal Processing, vol. 97, pp. 172–182, 2014. View at: Publisher Site  Google Scholar
 B. Norouzi, S. Mirzakuchaki, S. M. Seyedzadeh, and M. R. Mosavi, “A simple, sensitive and secure image encryption algorithm based on hyperchaotic system with only one round diffusion process,” Multimedia Tools and Applications, vol. 71, no. 3, pp. 1469–1497, 2014. View at: Publisher Site  Google Scholar
 Z. Hua and Y. Zhou, “Image encryption using 2D LogisticadjustedSine map,” Information Sciences, vol. 339, pp. 237–253, 2016. View at: Publisher Site  Google Scholar
 Z. Hua, Y. Zhou, and H. Huang, “Cosinetransformbased chaotic system for image encryption,” Information Sciences, vol. 480, pp. 403–419, 2019. View at: Publisher Site  Google Scholar
 C. Pak and L. Huang, “A new color image encryption using combination of the 1D chaotic map,” Signal Processing, vol. 138, pp. 129–137, 2017. View at: Publisher Site  Google Scholar
 H. Zhu, X. Zhang, H. Yu, C. Zhao, and Z. Zhu, “An image encryption algorithm based on compound homogeneous hyperchaotic system,” Nonlinear Dynamics, vol. 89, no. 1, pp. 61–79, 2017. View at: Publisher Site  Google Scholar
 A. Yaghouti Niyat, M. H. Moattar, and M. Niazi Torshiz, “Color image encryption based on hybrid hyperchaotic system and cellular automata,” Optics and Lasers in Engineering, vol. 90, no. 3, pp. 225–237, 2017. View at: Publisher Site  Google Scholar
 Z. Hua, B. Xu, F. Jin, and H. Huang, “Image encryption using Josephus problem and filtering diffusion,” IEEE Access, vol. 7, pp. 8660–8674, 2019. View at: Publisher Site  Google Scholar
 S. Zhu, G. Wang, and C. Zhu, “A secure and fast image encryption scheme based on double chaotic Sboxes,” Entropy, vol. 21, no. 8, p. 790, 2019. View at: Publisher Site  Google Scholar
 Q. Lu, C. Zhu, and X. Deng, “An efficient image encryption scheme based on the LSS chaotic map and single Sbox,” IEEE Access, vol. 8, pp. 25664–25678, 2020. View at: Publisher Site  Google Scholar
 B. Idrees, S. Zafar, T. Rashid, and W. Gao, “Image encryption algorithm using Sbox and dynamic Henon bit level permutation,” Multimedia Tools and Applications, vol. 79, no. 910, pp. 6135–6162, 2020. View at: Publisher Site  Google Scholar
 U. Cavusoglu, S. Kacar, I. Pehlivan, and A. Zengin, “A secure image encryption algorithm design using a novel chaos based Sbox,” Chaos Solitons Fractals, vol. 95, no. 2, pp. 92–101, 2017. View at: Publisher Site  Google Scholar
 E. Solak, C. Çokal, O. T. Yildiz, and T. Biyikoğlu, “Cryptanalysis of fridrich’s chaotic image encryption,” International Journal of Bifurcation and Chaos, vol. 20, no. 5, pp. 1405–1413, 2010. View at: Publisher Site  Google Scholar
 K. Wang, Pei, L. Zou, A. Song, and Z. He, “On the security of 3D Cat map based symmetric image encryption scheme,” Physics Letters A, vol. 343, no. 6, pp. 432–439, 2005. View at: Publisher Site  Google Scholar
 E. Y. Xie, C. Li, S. Yu, and J. Lü, “On the cryptanalysis of Fridrich’s chaotic image encryption scheme,” Signal Processing, vol. 132, no. 3, pp. 150–154, 2017. View at: Publisher Site  Google Scholar
 D. Arroyo, C. Li, S. Li, G. Alvarez, and W. A. Halang, “Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm,” Chaos Solitons & Fractals, vol. 41, no. 5, pp. 2613–2616, 2009. View at: Publisher Site  Google Scholar
 H. Wen and S. Yu, “Cryptanalysis of an image encryption cryptosystem based on binary bit planes extraction and multiple chaotic maps,” The European Physical Journal Plus, vol. 134, no. 7, p. 337, 2019. View at: Publisher Site  Google Scholar
 S. Dhall, S. K. Pal, and K. Sharma, “Cryptanalysis of image encryption scheme based on a new 1D chaotic system,” Signal Processing, vol. 146, no. 5, pp. 22–32, 2018. View at: Publisher Site  Google Scholar
 W. Feng, Y. He, H. Li, and C. Li, “Cryptanalysis and improvement of the image encryption scheme based on 2D logisticadjustedsine map,” IEEE Access, vol. 7, pp. 12584–12597, 2019. View at: Publisher Site  Google Scholar
 Z. Lin, G. Wang, X. Wang, S. Yu, and J. Lü, “Security performance analysis of a chaotic stream cipher,” Nonlinear Dynamics, vol. 94, no. 2, pp. 1003–1017, 2018. View at: Publisher Site  Google Scholar
 Y.Q. Zhang and X.Y. Wang, “Analysis and improvement of a chaosbased symmetric image encryption scheme using a bitlevel permutation,” Nonlinear Dynamics, vol. 77, no. 3, pp. 687–698, 2014. View at: Publisher Site  Google Scholar
 M. Li, D. Lu, W. Wen, H. Ren, and Y. Zhang, “Cryptanalyzing a color image encryption scheme based on hybrid hyperchaotic system and cellular automata,” IEEE Access, vol. 6, pp. 47102–47111, 2018. View at: Publisher Site  Google Scholar
 C. Zhu, G. Wang, and K. Sun, “Improved cryptanalysis and enhancements of an image encryption scheme using combined 1D chaotic maps,” Entropy, vol. 20, no. 11, p. 843, 2018. View at: Publisher Site  Google Scholar
 C. Zhu, G. Wang, and K. Sun, “Cryptanalysis and improvement on an image encryption algorithm design using a novel chaos based Sbox,” Symmetry, vol. 10, no. 9, p. 399, 2018. View at: Publisher Site  Google Scholar
 S. Li, C. Li, G. Chen, N. G. Bourbakis, and K.T. Lo, “A general quantitative cryptanalysis of permutationonly multimedia ciphers against plaintext attacks,” Signal Processing: Image Communication, vol. 23, no. 3, pp. 212–223, 2008. View at: Publisher Site  Google Scholar
 C. Li and K.T. Lo, “Optimal quantitative cryptanalysis of permutationonly multimedia ciphers against plaintext attacks,” Signal Processing, vol. 91, no. 4, pp. 949–954, 2011. View at: Publisher Site  Google Scholar
 A. Jolfaei, X.W. Wu, and V. Muthukkumarasamy, “On the security of permutationonly image encryption schemes,” IEEE Transactions on Information Forensics and Security, vol. 11, no. 2, pp. 235–246, 2016. View at: Publisher Site  Google Scholar
 C. Li, Y. Zhang, and E. Y. Xie, “When an attacker meets a cipherimage in 2018: a year in review,” Journal of Information Security and Applications, vol. 48, no. 10, Article ID 102361, 2019. View at: Publisher Site  Google Scholar
 C. Pak, K. An, P. Jang, J. Kim, and S. Kim, “A novel bitlevel color image encryption using improved 1D chaotic map,” Multimedia Tools and Applications, vol. 78, no. 9, pp. 12027–12042, 2019. View at: Publisher Site  Google Scholar
 Y. Zhou, W. Cao, and C. L. Philip Chen, “Image encryption using binary bitplane,” Signal Processing, vol. 100, pp. 197–207, 2014. View at: Publisher Site  Google Scholar
 C. Li, B. Feng, S. Li, J. Kurths, and G. Chen, “Dynamic analysis of digital chaotic maps via statemapping networks,” IEEE Transactions on Circuits and Systems I: Regular Papers, vol. 66, no. 6, pp. 2322–2335, 2019. View at: Publisher Site  Google Scholar
Copyright
Copyright © 2020 Yingchun Hu et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.