4.6 Article

Cryptanalysis and enhancements of image encryption using combination of the 1D chaotic map

Journal

SIGNAL PROCESSING
Volume 144, Issue -, Pages 444-452

Publisher

ELSEVIER SCIENCE BV
DOI: 10.1016/j.sigpro.2017.11.005

Keywords

Chaos; Cryptanalysis; Chosen plaintext attack; Color image encryption; Chaotic cryptography

Funding

  1. National Natural Science Foundation of China [61572089, 61472464, 61633005]
  2. Natural Science Foundation of Chongqing Science and Technology Commission [cstc2017jcyjBX0008, cstc2014jcyjA40030, cstc2015jcyjA40039]
  3. Chongqing Higher Education Reform Projects [153012]
  4. Chongqing Scientific AMP
  5. Technological Talents Program [KJXX2017004]
  6. Fundamental Research Funds for the Central Universities [106112017CDJQJ188830, 106112017CDJXY180005, 106112014CDJZR185501]
  7. National Natural Science Foundation of China [61572089, 61472464, 61633005]
  8. Natural Science Foundation of Chongqing Science and Technology Commission [cstc2017jcyjBX0008, cstc2014jcyjA40030, cstc2015jcyjA40039]
  9. Chongqing Higher Education Reform Projects [153012]
  10. Chongqing Scientific AMP
  11. Technological Talents Program [KJXX2017004]
  12. Fundamental Research Funds for the Central Universities [106112017CDJQJ188830, 106112017CDJXY180005, 106112014CDJZR185501]

Ask authors/readers for more resources

Recently, a color image encryption using combination of the 1D chaotic map has been proposed by Pak et al. The encryption scheme has defined the new chaotic system structure, combined two Sine maps in the permutation stage, and utilized the key-streams generated by the Sine-Sine-map to confuse the permuted image. Then, linear transformation has been employed to permute the diffused image to obtain the encrypted image. However, by using Chosen-plaintext attack, we have found that the encrypted image can be completely cracked and this scheme is not applicable to secure communications. In this paper, the defects of the original algorithm have been analyzed and a Chosen plaintext attack has been proposed to crack the scheme. In addition, we propose an improved algorithm to overcome the defects in the above original algorithm. Experimental results show that the improved scheme can not only maintain the merits of the original one, but also resist the attacks. (C) 2017 Elsevier B.V. All rights reserved.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available