Cryptanalysis and Improvement of Novel Image Encryption Technique Using Hybrid Method of Discrete Dynamical Chaotic Maps and Brownian Motion

被引:12
作者
Munir, Noor [1 ,2 ]
Khan, Majid [1 ,2 ]
Ismail, Abd Al Karim Haj [2 ,3 ]
Hussain, Iqtadar [4 ]
机构
[1] Inst Space Technol, Dept Appl Math & Stat, Islamabad, Pakistan
[2] Ajman Univ, Dept Math & Sci, POB 346, Ajman, U Arab Emirates
[3] Ajman Univ, Nonlinear Dynam Res Ctr NDRC, Ajman, U Arab Emirates
[4] Qatar Univ, Math Program, Dept Math Stat & Phys, Coll Arts & Sci, Doha 2713, Qatar
关键词
Cryptanalysis; Chosen-ciphertext attack; Known-plaintext attack; Chosen-plaintext attack; Chaotic map; SYSTEM;
D O I
10.1007/s11042-021-11810-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, an encryption technique depending on discrete dynamical chaotic maps and Brownian motion was offered. The authors of the understudy cryptosystem claim the security of encryption structure by some statistical analysis. We report cryptanalysis of a recently proposed scheme by using some cryptographic attacks. The attacks performed in this work are chosen-plaintext attack, known-plaintext attack, and chosen-ciphertext attack. The offered procedure is cryptanalyzed by taking just one chosen-plain image, one chosen-cipher image, and only one pair of plaintext and ciphertext, which shows the scheme's vulnerability. Moreover, we have offered an improved cryptosystem depending on the Basin chaotic map, Gingerbread man map, and Brownian motion, providing a robust security level.
引用
收藏
页码:6571 / 6584
页数:14
相关论文
共 34 条
[1]  
Abdulla AA, 2014, LECT NOTES COMPUTER, V8893, DOI [10.1007/978-3-319-14054-4_10, DOI 10.1007/978-3-319-14054-4_10]
[2]   Improving embedding efficiency for digital steganography by exploiting similarities between secret and cover images [J].
Abdulla, Alan A. ;
Sellahewa, Harin ;
Jassim, Sabah A. .
MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (13) :17799-17823
[3]  
Advanced Encryption Standard (AES), 2001, FED INF PROC STAND, DOI [10.6028/NIST.FIPS.197.197, DOI 10.6028/NIST.FIPS.197.197]
[4]   Cryptanalysis of an image encryption algorithm based on PWLCM and inertial delayed neural network [J].
Ahmad, Musheer ;
Alam, Mohammad Zaiyan ;
Ansari, Subia ;
Lambic, Dragan ;
AlSharari, Hamed D. .
JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2018, 34 (03) :1323-1332
[5]   An encryption scheme based on chaotic Rabinovich-Fabrikant system and S8 confusion component [J].
Alghafis, Abdullah ;
Munir, Noor ;
Khan, Majid .
MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (05) :7967-7985
[6]   An Encryption Scheme Based on Discrete Quantum Map and Continuous Chaotic System [J].
Alghafis, Abdullah ;
Munir, Noor ;
Khan, Majid ;
Hussain, Iqtadar .
INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2020, 59 (04) :1227-1240
[7]   Robust uncertainty principles:: Exact signal reconstruction from highly incomplete frequency information [J].
Candès, EJ ;
Romberg, J ;
Tao, T .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2006, 52 (02) :489-509
[8]   A Novel Color Image Encryption Algorithm Based on Hyperchaotic System and Permutation-Diffusion Architecture [J].
Cheng, Guangfeng ;
Wang, Chunhua ;
Chen, Hua .
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2019, 29 (09)
[9]   Cryptanalysis of image encryption scheme based on a new 1D chaotic system [J].
Dhall, Sakshi ;
Pal, Saibal K. ;
Sharma, Kapil .
SIGNAL PROCESSING, 2018, 146 :22-32
[10]   Cryptanalysis of an embedded systems' image encryption [J].
El Hanouti, Imad ;
El Fadili, Hakim ;
Zenkouar, Khalid .
MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (09) :13801-13820