Breaking an image encryption scheme based on a spatiotemporal chaotic system

被引:56
作者
Bechikh, Rabei [1 ]
Hermassi, Houcemeddine [1 ]
Abd El-Latif, Ahmed A. [2 ]
Rhouma, Rhouma [1 ]
Belghith, Safya [1 ]
机构
[1] ENIT, Tunis, Tunisia
[2] Menoufia Univ, Comp Sci Lab, Fac Sci, Shibin Al Kawm, Egypt
关键词
Cryptanalysis; Spatiotemporal chaos; Image encryption; CRYPTANALYSIS;
D O I
10.1016/j.image.2015.09.006
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we describe a cryptanalysis of image encryption scheme recently proposed by Chun-Yan Song, Yu-Long Qiao, and Xing-Zhou Zhang. The scheme is based on a spatiotemporal chaos with a dynamic keystream generator, and its security is claimed to rely in utilized the plainimage in the keystream generation process to obtain a different keystream for every plainimage/cipherimage pair. However, two flaws are investigated and prove that the security of the proposal against chosen plaintext attack is groundless. Simulations conducted demonstrate that the plainimage can be recovered under partial attack with an acceptable perceptual quality. Moreover, a total break is possible, but a large number of plain-image/cipher-image pairs is needed. (C) 2015 Elsevier B.V. All rights reserved.
引用
收藏
页码:151 / 158
页数:8
相关论文
共 18 条
[1]   Cryptanalysis of an ergodic chaotic cipher [J].
Alvarez, G ;
Montoya, F ;
Romera, M ;
Pastor, G .
PHYSICS LETTERS A, 2003, 311 (2-3) :172-179
[2]  
Alvarez G, 2011, STUD COMPUT INTELL, V354, P257
[3]  
Alvarez Gonzalo, INT J BIFURC CHAOS, V16
[4]   Cryptanalysis of a one round chaos-based Substitution Permutation Network [J].
Arroyo, David ;
Diaz, Jesus ;
Rodriguez, F. B. .
SIGNAL PROCESSING, 2013, 93 (05) :1358-1364
[5]   CRYPTANALYSIS OF A NEW CHAOTIC CRYPTOSYSTEM BASED ON ERGODICITY [J].
Arroyo, David ;
Alvarez, Gonzalo ;
Li, Shujun ;
Li, Chengqing ;
Fernandez, Veronica .
INTERNATIONAL JOURNAL OF MODERN PHYSICS B, 2009, 23 (05) :651-659
[6]   Improvement of an image encryption algorithm based on hyper-chaos [J].
Hermassi, Houcemeddine ;
Rhouma, Rhouma ;
Belghith, Safya .
TELECOMMUNICATION SYSTEMS, 2013, 52 (02) :539-549
[7]   Security analysis of image cryptosystems only or partially based on a chaotic permutation [J].
Hermassi, Houcemeddine ;
Rhouma, Rhouma ;
Belghith, Safya .
JOURNAL OF SYSTEMS AND SOFTWARE, 2012, 85 (09) :2133-2144
[8]   Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations [J].
Li, Chengqing ;
Li, Shujun ;
Alvarez, Gonzalo ;
Chen, Guanrong ;
Lo, Kwok-Tung .
PHYSICS LETTERS A, 2007, 369 (1-2) :23-30
[9]   Cracking a hierarchical chaotic image encryption algorithm based on permutation [J].
Li, Chengqing .
SIGNAL PROCESSING, 2016, 118 :203-210
[10]   Chaotic filter bank for computer cryptography [J].
Ling, Bingo Wing-Kuen ;
Ho, Charlotte Yuk-Fan ;
Tam, Peter Kwong-Shun .
CHAOS SOLITONS & FRACTALS, 2007, 34 (03) :817-824