Cryptanalysis of hybrid secure image encryption based on Julia set fractals and three-dimensional Lorenz chaotic map

被引:26
作者
Munir, Noor [1 ]
Khan, Majid [1 ]
Jamal, Sajjad Shaukat [2 ]
Hazzazi, Mohammad Mazyad [2 ]
Hussain, Iqtadar [3 ]
机构
[1] Inst Space Technol, Dept Appl Math & Stat, Islamabad, Pakistan
[2] King Khalid Univ, Coll Sci, Dept Math, Abha, Saudi Arabia
[3] Qatar Univ, Dept Math Stat & Phys, Doha 2713, Qatar
关键词
Cryptanalysis; Chosen-plaintext attack; Shuffling; Image encryption; Chaotic encryption;
D O I
10.1016/j.matcom.2021.06.008
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Recently a hybrid secure image encryption scheme based on Julia set and three-dimensional Lorenz chaotic system was suggested. The offered scheme was based on the multiplicative operation carried out by Julia set fractals and bitwise XOR which was implemented by the trajectories obtained from the Lorenz chaotic system. This paper presents the cryptanalysis of the scheme through a chosen-plaintext attack by taking three different chosen images. In this work, a practical chosen-plaintext attack is performed which reveals that the cryptosystem depending on only multiplication and bitwise XOR operation can be effortlessly attacked. The results of the analysis performed on the retrieved image reflect the effectiveness of the chosen-plaintext attack which fruitfully produces the original image. (C) 2021 International Association for Mathematics and Computers in Simulation (IMACS). Published by Elsevier B.V. All rights reserved.
引用
收藏
页码:826 / 836
页数:11
相关论文
共 25 条
  • [1] Cryptanalysis of an Image Encryption Algorithm Based on Combined Chaos for a BAN System, and Improved Scheme Using SHA-512 and Hyperchaos
    Ahmad, Musheer
    Al Solami, Eesa
    Wang, Xing-Yuan
    Doja, M. N.
    Beg, M. M. Sufyan
    Alzaidi, Amer Awad
    [J]. SYMMETRY-BASEL, 2018, 10 (07):
  • [2] Cryptanalysis of an image encryption algorithm based on PWLCM and inertial delayed neural network
    Ahmad, Musheer
    Alam, Mohammad Zaiyan
    Ansari, Subia
    Lambic, Dragan
    AlSharari, Hamed D.
    [J]. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2018, 34 (03) : 1323 - 1332
  • [3] An encryption scheme based on chaotic Rabinovich-Fabrikant system and S8 confusion component
    Alghafis, Abdullah
    Munir, Noor
    Khan, Majid
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (05) : 7967 - 7985
  • [4] An Encryption Scheme Based on Discrete Quantum Map and Continuous Chaotic System
    Alghafis, Abdullah
    Munir, Noor
    Khan, Majid
    Hussain, Iqtadar
    [J]. INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2020, 59 (04) : 1227 - 1240
  • [5] An Efficient Cryptosystem for Video Surveillance in the Internet of Things Environment
    Hamza, Rafik
    Hassan, Alzubair
    Huang, Teng
    Ke, Lishan
    Yan, Hongyang
    [J]. COMPLEXITY, 2019, 2019
  • [6] A privacy-preserving cryptosystem for IoT E-healthcare
    Hamza, Rafik
    Yan, Zheng
    Muhammad, Khan
    Bellavista, Paolo
    Titouna, Faiza
    [J]. INFORMATION SCIENCES, 2020, 527 (527) : 493 - 510
  • [7] A Novel Image Encryption Technique Based on Generalized Advanced Encryption Standard Based on Field of Any Characteristic
    Khan, Majid
    Munir, Noor
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2019, 109 (02) : 849 - 867
  • [8] A Novel Digital Contents Privacy Scheme Based on Kramer's Arbitrary Spin
    Khan, Majid
    Waseem, Hafiz Muhammad
    [J]. INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2019, 58 (08) : 2720 - 2743
  • [9] A novel image encryption scheme based on quantum dynamical spinning and rotations
    Khan, Majid
    Waseem, Hafiz Muhammad
    [J]. PLOS ONE, 2018, 13 (11):
  • [10] Cryptanalysis of a new signal security system for multimedia data transmission
    Li, CQ
    Li, SJ
    Chen, GR
    Chen, G
    Hu, L
    [J]. EURASIP JOURNAL ON APPLIED SIGNAL PROCESSING, 2005, 2005 (08) : 1277 - 1288