Cryptanalysis and improvement of the image cryptosystem reusing permutation matrix dynamically

被引:20
作者
Diab, Hossam [1 ,2 ]
El-semary, Aly M. [1 ,3 ]
机构
[1] Taibah Univ, Coll Comp Sci & Engn, Medina, Saudi Arabia
[2] Menoufia Univ, Math & Comp Sci Dept, Fac Sci, Menoufia, Egypt
[3] Al Azhar Univ, Syst & Comp Engn Dept, Fac Engn, Cairo, Egypt
关键词
Image encryption; Permutation matrix; Baker map; Cat map; Cryptanalysis; Chosen plain-image attacks; ENCRYPTION ALGORITHM; CHAOS; EFFICIENT; BREAKING; MAP; CIPHERS; SYSTEM;
D O I
10.1016/j.sigpro.2018.02.011
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper proposes an attack model to break the security of an image cipher entitled with "Reusing the permutation matrix dynamically for efficient image cryptographic algorithm" developed by Chen et al. The attack model uses only two chosen plain-images to recover any image of size 256 x 256 while it requires four chosen plain-images to reveal images of larger sizes. The paper also suggests an image cryptosystem to overcome the security inadequacies of the scheme under study. The proposed scheme utilizes multi-chaotic systems and a self-generation mechanism to scramble and diffuse a plain-image based on both the secret key and specific features of the plain-image. This promotes the security level of the proposed cipher as illustrated by the conducted security analysis and experimental results. (C) 2018 Elsevier B.V. All rights reserved.
引用
收藏
页码:172 / 192
页数:21
相关论文
共 65 条
[1]   Image encryption by chaos mixing [J].
Abanda, Yannick ;
Tiedeu, Alain .
IET IMAGE PROCESSING, 2016, 10 (10) :742-750
[2]   Cryptanalysis of a one round chaos-based Substitution Permutation Network [J].
Arroyo, David ;
Diaz, Jesus ;
Rodriguez, F. B. .
SIGNAL PROCESSING, 2013, 93 (05) :1358-1364
[3]   Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm [J].
Arroyo, David ;
Li, Chengqing ;
Li, Shujun ;
Alvarez, Gonzalo ;
Halang, Wolfgang A. .
CHAOS SOLITONS & FRACTALS, 2009, 41 (05) :2613-2616
[4]  
Bashir Zia, 2016, Pacific Science Review A: Natural Science and Engineering, V18, P254, DOI 10.1016/j.psra.2016.11.003
[5]   Breaking an image encryption scheme based on a spatiotemporal chaotic system [J].
Bechikh, Rabei ;
Hermassi, Houcemeddine ;
Abd El-Latif, Ahmed A. ;
Rhouma, Rhouma ;
Belghith, Safya .
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2015, 39 :151-158
[6]   A new chaos-based image encryption algorithm with dynamic key selection mechanisms [J].
Chai, Xiuli ;
Yang, Kang ;
Gan, Zhihua .
MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (07) :9907-9927
[7]   Deer Antler Extract Improves Fatigue Effect through Altering the Expression of Genes Related to Muscle Strength in Skeletal Muscle of Mice [J].
Chen, Jaw-Chyun ;
Hsiang, Chien-Yun ;
Lin, Yung-Chang ;
Ho, Tin-Yun .
EVIDENCE-BASED COMPLEMENTARY AND ALTERNATIVE MEDICINE, 2014, 2014
[8]   An efficient image encryption scheme using lookup table-based confusion and diffusion [J].
Chen, Jun-xin ;
Zhu, Zhi-liang ;
Fu, Chong ;
Zhang, Li-bo ;
Zhang, Yushu .
NONLINEAR DYNAMICS, 2015, 81 (03) :1151-1166
[9]   Reusing the permutation matrix dynamically for efficient image cryptographic algorithm [J].
Chen, Jun-xin ;
Zhu, Zhi-liang ;
Fu, Chong ;
Yu, Hai ;
Zhang, Yushu .
SIGNAL PROCESSING, 2015, 111 :294-307
[10]   Differential cryptanalysis of a medical image cryptosystem with multiple rounds [J].
Chen, Lei ;
Wang, Shihong .
COMPUTERS IN BIOLOGY AND MEDICINE, 2015, 65 :69-75