Security analysis of a chaos triggered image encryption scheme

被引:0
|
作者
Yong Zhang
机构
[1] Jiangxi University of Finance & Economics,School of Software & Internet
来源
Multimedia Tools and Applications | 2019年 / 78卷
关键词
Information security; Image encryption; Security analysis; Chosen plaintext attack;
D O I
暂无
中图分类号
学科分类号
摘要
A chaos triggered image encryption scheme was recently proposed [Ramalingam et al., Multimed Tools Appl, 2018, 77(10): 11669–11,692]. In this paper, this scheme was analyzed in detail, and then some shortcomings concerning the scheme were pointed out. For example, the combined chaos systems used in the scheme possess weak chaos characteristics, the scheme is insensitive with respect to cipher images, and above all, it is vulnerable to chosen plaintext attacks. After that, a well-designed chosen plaintext attack method was suggested to attack the equivalent secret keys of the scheme, and then the scheme was successfully deciphered in a short time. So, the scheme cannot be applied to actual communication systems.
引用
收藏
页码:31303 / 31318
页数:15
相关论文
共 50 条
  • [1] Security analysis of a chaos triggered image encryption scheme
    Zhang, Yong
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (22) : 31303 - 31318
  • [2] Chaos triggered image encryption - a reconfigurable security solution
    Ramalingam, Balakrishnan
    Ravichandran, Dhivya
    Annadurai, Arun Adhithiya
    Rengarajan, Amirtharajan
    Rayappan, John Bosco Balaguru
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (10) : 11669 - 11692
  • [3] Chaos triggered image encryption - a reconfigurable security solution
    Balakrishnan Ramalingam
    Dhivya Ravichandran
    Arun Adhithiya Annadurai
    Amirtharajan Rengarajan
    John Bosco Balaguru Rayappan
    Multimedia Tools and Applications, 2018, 77 : 11669 - 11692
  • [4] Security Analysis and Improvement of an Image Encryption Cryptosystem Based on Bit Plane Extraction and Multi Chaos
    Zhu, Shuqin
    Zhu, Congxu
    ENTROPY, 2021, 23 (05)
  • [5] Chaos Based Image Encryption Scheme
    Shyamala, P.
    CONTROL, COMPUTATION AND INFORMATION SYSTEMS, 2011, 140 : 312 - 317
  • [6] The fast image encryption algorithm based on lifting scheme and chaos
    Zhang, Yong
    INFORMATION SCIENCES, 2020, 520 (520) : 177 - 194
  • [7] On the security defects of an image encryption scheme
    Li, Chengqing
    Li, Shujun
    Asim, Muhammad
    Nunez, Juana
    Alvarez, Gonzalo
    Chen, Guanrong
    IMAGE AND VISION COMPUTING, 2009, 27 (09) : 1371 - 1381
  • [8] A ROBUST CHAOS-BASED IMAGE ENCRYPTION SCHEME
    Li, Weihai
    Yu, Nenghai
    ICME: 2009 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOLS 1-3, 2009, : 1034 - 1037
  • [9] A Novel Image Cascaded Encryption Algorithm Based on Chaos with Related Security Evaluation Scheme
    Zheng, Yifeng
    Wang, Chen
    PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, 2012, : 768 - 772
  • [10] Cryptanalysis of an image encryption scheme using variant Hill cipher and chaos
    Wen, Heping
    Lin, Yiting
    Yang, Lincheng
    Chen, Ruiting
    EXPERT SYSTEMS WITH APPLICATIONS, 2024, 250