Cracking a hierarchical chaotic image encryption algorithm based on permutation
TLDR
It is found that only known/chosen plain-images are sufficient to achieve a good performance, and the computational complexity is O, which effectively demonstrates that hierarchical permutation-only image encryption algorithms are less secure than normal (i.e., non-hierarchical) ones.About:
This article is published in Signal Processing.The article was published on 2016-01-01 and is currently open access. It has received 163 citations till now. The article focuses on the topics: 40-bit encryption & Probabilistic encryption.read more
Citations
More filters
Journal ArticleDOI
A color image cryptosystem based on dynamic DNA encryption and chaos
TL;DR: A four-wing hyperchaotic system is used to provide pseudo-random chaotic sequences, SHA 384 hash function of the plain image and external parameters are combined to compute its initial values, and one-time-pad encryption policy makes the proposed encryption effectively resist plaintext attacks.
Journal ArticleDOI
A novel image encryption scheme based on substitution-permutation network and chaos
TL;DR: A novel image encryption approach based on permutation-substitution (SP) network and chaotic systems that shows superior performance than previous schemes.
Journal ArticleDOI
2D Logistic-Sine-coupling map for image encryption
TL;DR: A two-dimensional (2D) Logistic-Sine-coupling map (LSCM) is presented and performance estimations demonstrate that it has better ergodicity, more complex behavior and larger chaotic range than several newly developed 2D chaotic maps.
Journal ArticleDOI
Medical image encryption using high-speed scrambling and pixel adaptive diffusion
TL;DR: Simulations and evaluations show that both encryption schemes using bitwise XOR and modulo arithmetic have high security levels, can achieve much faster speeds, and can better adapt to impulse noise and data loss interference than several typical and state-of-the-art encryption schemes.
Journal ArticleDOI
On the cryptanalysis of Fridrich's chaotic image encryption scheme
TL;DR: The work provides some bases for further optimizing attack on the Fridrich's chaotic image encryption scheme and its variants and extension of the attack idea to Chen's scheme andIts variants is briefly evaluated.
References
More filters
Book
An introduction to chaotic dynamical systems
TL;DR: In this article, the quadratic family has been used to define hyperbolicity in linear algebra and advanced calculus, including the Julia set and the Mandelbrot set.
Journal ArticleDOI
Concrete Mathematics: A Foundation for Computer Science.
TL;DR: Concrete Mathematics as discussed by the authors is a collection of techniques for solving problems in computer science, and it is an indispensable text and reference not only for computer scientists - the authors themselves rely heavily on it! - but for serious users of mathematics in virtually every discipline.
Journal ArticleDOI
A symmetric image encryption scheme based on 3D chaotic cat maps
TL;DR: The two-dimensional chaotic cat map is generalized to 3D for designing a real-time secure symmetric encryption scheme that uses the 3D cat map to shuffle the positions of image pixels and uses another chaotic map to confuse the relationship between the cipher-image and the plain-image, thereby significantly increasing the resistance to statistical and differential attacks.
Journal ArticleDOI
Some basic cryptographic requirements for chaos-based cryptosystems
Gonzalo Alvarez,Shujun Li +1 more
TL;DR: The suggested guidelines address three main issues: implementation, key management and security analysis, aiming at assisting designers of new cryptosystems to present their work in a more systematic and rigorous way to fulfill some basic cryptographic requirements.
Journal ArticleDOI
Cryptographic requirements for chaotic secure communications
Gonzalo Alvarez,Shujun Li +1 more
TL;DR: In this paper, the authors provide a set of guidelines that new cryptosystems would benefit from adhering to, such as correct key management and security analysis, and some practical aspects of communications such as channel noise, limited bandwith, and attenuation.
Related Papers (5)
Some basic cryptographic requirements for chaos-based cryptosystems
Gonzalo Alvarez,Shujun Li +1 more