Security analysis of a chaos triggered image encryption scheme

被引:0
作者
Yong Zhang
机构
[1] Jiangxi University of Finance & Economics,School of Software & Internet
来源
Multimedia Tools and Applications | 2019年 / 78卷
关键词
Information security; Image encryption; Security analysis; Chosen plaintext attack;
D O I
暂无
中图分类号
学科分类号
摘要
A chaos triggered image encryption scheme was recently proposed [Ramalingam et al., Multimed Tools Appl, 2018, 77(10): 11669–11,692]. In this paper, this scheme was analyzed in detail, and then some shortcomings concerning the scheme were pointed out. For example, the combined chaos systems used in the scheme possess weak chaos characteristics, the scheme is insensitive with respect to cipher images, and above all, it is vulnerable to chosen plaintext attacks. After that, a well-designed chosen plaintext attack method was suggested to attack the equivalent secret keys of the scheme, and then the scheme was successfully deciphered in a short time. So, the scheme cannot be applied to actual communication systems.
引用
收藏
页码:31303 / 31318
页数:15
相关论文
共 50 条
[21]   Image encryption scheme based on Chaos and DNA plane operations [J].
Xingyuan Wang ;
Yu Wang ;
Xiaoqiang Zhu ;
Salahuddin Unar .
Multimedia Tools and Applications, 2019, 78 :26111-26128
[22]   Image encryption scheme using chaos and simulated annealing algorithm [J].
Wang, Xingyuan ;
Liu, Chuanming ;
Xu, Dahai ;
Liu, Chongxin .
NONLINEAR DYNAMICS, 2016, 84 (03) :1417-1429
[23]   A Lightweight Image Encryption Scheme Using DNA Coding and Chaos [J].
Fetteha, Marwan A. ;
Sayed, Wafaa S. ;
Said, Lobna A. .
ELECTRONICS, 2023, 12 (24)
[24]   Chaos and compressive sensing based novel image encryption scheme [J].
Khan, Jan Sher ;
Kayhan, Sema Koc .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 58
[25]   Image encryption scheme based on Chaos and DNA plane operations [J].
Wang, Xingyuan ;
Wang, Yu ;
Zhu, Xiaoqiang ;
Unar, Salahuddin .
MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (18) :26111-26128
[26]   A Color Image Encryption Scheme Based on Singular Values and Chaos [J].
Malik, Adnan ;
Ali, Muhammad ;
Alsubaei, Faisal S. ;
Ahmed, Nisar ;
Kumar, Harish .
CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES, 2023, 137 (01) :965-999
[27]   Image encryption scheme using chaos and simulated annealing algorithm [J].
Xingyuan Wang ;
Chuanming Liu ;
Dahai Xu ;
Chongxin Liu .
Nonlinear Dynamics, 2016, 84 :1417-1429
[28]   A Dynamic Triple-Image Encryption Scheme Based on Chaos, S-Box and Image Compressing [J].
Lidong, Liu ;
Jiang, Donghua ;
Wang, Xingyuan ;
Zhang, Linlin ;
Rong, Xianwei .
IEEE ACCESS, 2020, 8 (08) :210382-210399
[29]   DNA-Inspired Image Encryption: Leveraging Chaos for Enhanced Security [J].
Alawida, Moatsum ;
Aljaghbeir, Ahmad Nasser ;
Albaz, Khaled Raed ;
Alnuaimi, Rahaf Adam .
2024 20TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING IN SMART SYSTEMS AND THE INTERNET OF THINGS, DCOSS-IOT 2024, 2024, :477-482
[30]   Security Analysis of a Convertible Multiauthenticated Encryption Scheme [J].
Zhang Jian Hong ;
Liu Xue ;
Liu ChengLian .
MICRO NANO DEVICES, STRUCTURE AND COMPUTING SYSTEMS, 2011, 159 :111-+