Cryptanalysis of a Chaotic Image Encryption Algorithm Based on information Entropy

被引:192
作者
Li, Chengqing [1 ]
Lin, Dongdong [1 ]
Feng, Bingbing [2 ]
Lu, Jinhu [3 ]
Hao, Feng [4 ]
机构
[1] Hunan Univ, Sch Comp Sci & Elect Engn, Changsha 410082, Hunan, Peoples R China
[2] Xiangtan Univ, Coll Informat Engn, Xiangtan 411105, Peoples R China
[3] Beihang Univ, Sch Automat Sci & Elect Engn, Beijing 100083, Peoples R China
[4] Univ Warwick, Dept Comp Sci, Coventry CV4 7AL, W Midlands, England
来源
IEEE ACCESS | 2018年 / 6卷
基金
英国工程与自然科学研究理事会;
关键词
Chaotic cryptanalysis; multimedia cryptography; image encryption; secure communication; privacy protection; SYSTEM;
D O I
10.1109/ACCESS.2018.2883690
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, a chaotic image encryption algorithm based on information entropy (IEAIE) was proposed. This paper scrutinizes the security properties of the algorithm and evaluates the validity of the used quantifiable security metrics. When the round number is only one, the equivalent secret key of every basic operation of IEAIE can be recovered with a differential attack separately. Some common insecurity problems in the field of chaotic image encryption are found in IEAIE, e.g., the short orbits of the digital chaotic system and the invalid sensitivity mechanism built on information entropy of the plain image. Even worse, each security metric is questionable, which undermines the security credibility of IEAIE. Hence, IEAIE can only serve as a counter example for illustrating common pitfalls in designing secure communication method for image data.
引用
收藏
页码:75834 / 75842
页数:9
相关论文
共 33 条
  • [1] An adaptive observer synchronization using chaotic time-delay system for secure communication
    Abd, Mariam Hussein
    Tahir, Fadhil Rahma
    Al-Suhail, Ghaida A.
    Viet-Thanh Pham
    [J]. NONLINEAR DYNAMICS, 2017, 90 (04) : 2583 - 2598
  • [2] Some basic cryptographic requirements for chaos-based cryptosystems
    Alvarez, Gonzalo
    Li, Shujun
    [J]. INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2006, 16 (08): : 2129 - 2151
  • [3] Secure Biometric-Based Authentication Scheme Using Chebyshev Chaotic Map for Multi-Server Environment
    Chatterjee, Santanu
    Roy, Sandip
    Das, Ashok Kumar
    Chattopadhyay, Samiran
    Kumar, Neeraj
    Vasilakos, Athanasios V.
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (05) : 824 - 839
  • [4] Big Data Privacy Preserving in Multi-Access Edge Computing for Heterogeneous Internet of Things
    Du, Miao
    Wang, Kun
    Chen, Yuanfang
    Wang, Xiaoyan
    Sun, Yanfei
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2018, 56 (08) : 62 - 67
  • [5] Cryptanalyzing an image encryption algorithm with compound chaotic stream cipher based on perturbation
    Ge, Xin
    Lu, Bin
    Liu, Fenlin
    Luo, Xiangyang
    [J]. NONLINEAR DYNAMICS, 2017, 90 (02) : 1141 - 1150
  • [6] An Image Encryption Algorithm Based on Information Hiding
    Ge, Xin
    Lu, Bin
    Liu, Fenlin
    Gong, Daofu
    [J]. INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2016, 26 (11):
  • [7] 2D Logistic-Sine-coupling map for image encryption
    Hua, Zhongyun
    Jin, Fan
    Xu, Binxuan
    Huang, Hejiao
    [J]. SIGNAL PROCESSING, 2018, 149 : 148 - 161
  • [8] Sine-Transform-Based Chaotic System With FPGA Implementation
    Hua, Zhongyun
    Zhou, Binghang
    Zhou, Yicong
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2018, 65 (03) : 2557 - 2566
  • [9] Image encryption using 2D Logistic-adjusted-Sine map
    Hua, Zhongyun
    Zhou, Yicong
    [J]. INFORMATION SCIENCES, 2016, 339 : 237 - 253
  • [10] Dynamic Analysis of Digital Chaotic Maps via State-Mapping Networks
    Li, Chengqing
    Feng, Bingbing
    Li, Shujun
    Kurths, Juergen
    Chen, Guanrong
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2019, 66 (06) : 2322 - 2335