scispace - formally typeset
Open AccessJournal ArticleDOI

Cracking a hierarchical chaotic image encryption algorithm based on permutation

Chengqing Li
- 01 Jan 2016 - 
- Vol. 118, pp 203-210
TLDR
It is found that only known/chosen plain-images are sufficient to achieve a good performance, and the computational complexity is O, which effectively demonstrates that hierarchical permutation-only image encryption algorithms are less secure than normal (i.e., non-hierarchical) ones.
About
This article is published in Signal Processing.The article was published on 2016-01-01 and is currently open access. It has received 163 citations till now. The article focuses on the topics: 40-bit encryption & Probabilistic encryption.

read more

Citations
More filters
Journal ArticleDOI

A color image cryptosystem based on dynamic DNA encryption and chaos

TL;DR: A four-wing hyperchaotic system is used to provide pseudo-random chaotic sequences, SHA 384 hash function of the plain image and external parameters are combined to compute its initial values, and one-time-pad encryption policy makes the proposed encryption effectively resist plaintext attacks.
Journal ArticleDOI

A novel image encryption scheme based on substitution-permutation network and chaos

TL;DR: A novel image encryption approach based on permutation-substitution (SP) network and chaotic systems that shows superior performance than previous schemes.
Journal ArticleDOI

2D Logistic-Sine-coupling map for image encryption

TL;DR: A two-dimensional (2D) Logistic-Sine-coupling map (LSCM) is presented and performance estimations demonstrate that it has better ergodicity, more complex behavior and larger chaotic range than several newly developed 2D chaotic maps.
Journal ArticleDOI

Medical image encryption using high-speed scrambling and pixel adaptive diffusion

TL;DR: Simulations and evaluations show that both encryption schemes using bitwise XOR and modulo arithmetic have high security levels, can achieve much faster speeds, and can better adapt to impulse noise and data loss interference than several typical and state-of-the-art encryption schemes.
Journal ArticleDOI

On the cryptanalysis of Fridrich's chaotic image encryption scheme

TL;DR: The work provides some bases for further optimizing attack on the Fridrich's chaotic image encryption scheme and its variants and extension of the attack idea to Chen's scheme andIts variants is briefly evaluated.
References
More filters
Book

An introduction to chaotic dynamical systems

TL;DR: In this article, the quadratic family has been used to define hyperbolicity in linear algebra and advanced calculus, including the Julia set and the Mandelbrot set.
Journal ArticleDOI

Concrete Mathematics: A Foundation for Computer Science.

TL;DR: Concrete Mathematics as discussed by the authors is a collection of techniques for solving problems in computer science, and it is an indispensable text and reference not only for computer scientists - the authors themselves rely heavily on it! - but for serious users of mathematics in virtually every discipline.
Journal ArticleDOI

A symmetric image encryption scheme based on 3D chaotic cat maps

TL;DR: The two-dimensional chaotic cat map is generalized to 3D for designing a real-time secure symmetric encryption scheme that uses the 3D cat map to shuffle the positions of image pixels and uses another chaotic map to confuse the relationship between the cipher-image and the plain-image, thereby significantly increasing the resistance to statistical and differential attacks.
Journal ArticleDOI

Some basic cryptographic requirements for chaos-based cryptosystems

TL;DR: The suggested guidelines address three main issues: implementation, key management and security analysis, aiming at assisting designers of new cryptosystems to present their work in a more systematic and rigorous way to fulfill some basic cryptographic requirements.
Journal ArticleDOI

Cryptographic requirements for chaotic secure communications

TL;DR: In this paper, the authors provide a set of guidelines that new cryptosystems would benefit from adhering to, such as correct key management and security analysis, and some practical aspects of communications such as channel noise, limited bandwith, and attenuation.
Related Papers (5)