4.6 Article

Cryptanalysis and enhancements of image encryption using combination of the 1D chaotic map

期刊

SIGNAL PROCESSING
卷 144, 期 -, 页码 444-452

出版社

ELSEVIER SCIENCE BV
DOI: 10.1016/j.sigpro.2017.11.005

关键词

Chaos; Cryptanalysis; Chosen plaintext attack; Color image encryption; Chaotic cryptography

资金

  1. National Natural Science Foundation of China [61572089, 61472464, 61633005]
  2. Natural Science Foundation of Chongqing Science and Technology Commission [cstc2017jcyjBX0008, cstc2014jcyjA40030, cstc2015jcyjA40039]
  3. Chongqing Higher Education Reform Projects [153012]
  4. Chongqing Scientific AMP
  5. Technological Talents Program [KJXX2017004]
  6. Fundamental Research Funds for the Central Universities [106112017CDJQJ188830, 106112017CDJXY180005, 106112014CDJZR185501]
  7. National Natural Science Foundation of China [61572089, 61472464, 61633005]
  8. Natural Science Foundation of Chongqing Science and Technology Commission [cstc2017jcyjBX0008, cstc2014jcyjA40030, cstc2015jcyjA40039]
  9. Chongqing Higher Education Reform Projects [153012]
  10. Chongqing Scientific AMP
  11. Technological Talents Program [KJXX2017004]
  12. Fundamental Research Funds for the Central Universities [106112017CDJQJ188830, 106112017CDJXY180005, 106112014CDJZR185501]

向作者/读者索取更多资源

Recently, a color image encryption using combination of the 1D chaotic map has been proposed by Pak et al. The encryption scheme has defined the new chaotic system structure, combined two Sine maps in the permutation stage, and utilized the key-streams generated by the Sine-Sine-map to confuse the permuted image. Then, linear transformation has been employed to permute the diffused image to obtain the encrypted image. However, by using Chosen-plaintext attack, we have found that the encrypted image can be completely cracked and this scheme is not applicable to secure communications. In this paper, the defects of the original algorithm have been analyzed and a Chosen plaintext attack has been proposed to crack the scheme. In addition, we propose an improved algorithm to overcome the defects in the above original algorithm. Experimental results show that the improved scheme can not only maintain the merits of the original one, but also resist the attacks. (C) 2017 Elsevier B.V. All rights reserved.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据