718 Hits in 5.2 sec

Cryptanalysis of an Image Block Encryption Algorithm Based on Chaotic Maps [article]

Yunling Ma, Chengqing Li, Bo Ou
2020 arXiv   pre-print
Recently, an image block encryption algorithm was proposed based on some well-known chaotic maps.  ...  In this paper, we give a thorough security analysis on the algorithm from the perspective of modern cryptology and report some critical security defects on the algorithm.  ...  The image block encryption algorithm based on three chaotic maps Assume that the gray-scale plain-image is denoted as a matrix I of size M × N.  ... 
arXiv:1912.12915v2 fatcat:nplu46on3vdkbcc4h5nvprfmju

Cracking a hierarchical chaotic image encryption algorithm based on permutation

Chengqing Li
2016 Signal Processing  
In year 2000, an efficient hierarchical chaotic image encryption (HCIE) algorithm was proposed, which divides a plain-image of size M× N with T possible value levels into K blocks of the same size and  ...  hierarchical permutation-only image encryption algorithms are less secure than normal (i.e., non-hierarchical) ones.  ...  Halang, "Cryptanalysis of an image encryption scheme based on a compound chaotic sequence," Image and Vision Computing, vol. 27, no. 8, pp. 1035-1039, July 2009 Elsevier doi PDF 28.  ... 
doi:10.1016/j.sigpro.2015.07.008 fatcat:ixd3yzbcy5h7fex2b3h56wldo4

Chaos and cryptography: block encryption ciphers based on chaotic maps

G. Jakimoski, L. Kocarev
2001 IEEE Transactions on Circuits and Systems I Fundamental Theory and Applications  
This paper is devoted to the analysis of the impact of chaos-based techniques on block encryption ciphers. We present several chaos based ciphers.  ...  Using the well-known principles in the cryptanalysis we show that these ciphers do not behave worse than the standard ones, opening in this way a novel approach to the design of block encryption ciphers  ...  Another encryption algorithm based on synchronized chaotic systems is proposed in [9] .  ... 
doi:10.1109/81.904880 fatcat:2pzmbswa3zgmxc5sdblx76dzmq

Image Encryption using Linear Cryptanalysis and different Fuzzy operations

Dipankar Dey
2018 International Journal of Scientific Research in Computer Sciences and Engineering  
Nowadays, the security of digital image is one of the most essential terms. In this article, a piecewise linear chaotic map based image encryption has been proposed.  ...  For implementation protection from different types of attacks, the Linear Cryptanalysis system is applied to encrypt the image.  ...  [2] proposed an image encryption algorithm based on a new shuffling process.  ... 
doi:10.26438/ijsrcse/v6i4.18 fatcat:bxpv4u3onvdz7b4mfwevxfclqi

When an attacker meets a cipher-image in 2018: A Year in Review [article]

Chengqing Li, Yun Zhang, Eric Yong Xie
2019 arXiv   pre-print
This paper aims to review the encountered technical contradictions when an attacker meets the cipher-images encrypted by the image encryption schemes (algorithms) proposed in 2018 from the viewpoint of  ...  The challenging problems on design and analysis of image encryption schemes are summarized to receive the attentions of both designers and attackers (cryptanalysts) of image encryption schemes, which may  ...  Encrypting images with compressing techniques In [72] , an image encryption scheme based on compressive sensing and chaotic map were proposed.  ... 
arXiv:1903.11764v2 fatcat:uoun46alavexflmuvcbtlinlqm

Encoding by DNA Relations and Randomization Through Chaotic Sequences for Image Encryption [article]

Chiranjoy Chattopadhyay and Bikramjit Sarkar and Debaprasad Mukherjee
2015 arXiv   pre-print
Researchers in the field of DNA-based chaotic cryptography have recently proposed a set of novel and efficient image encryption algorithms.  ...  Next, we briefly discuss the set of image encryption algorithms based on this architecture and categorized them as either encryption or cryptanalyzing techniques.  ...  However, various studies have proved that encryption algorithms based only on chaotic maps, have lower key space and not so robust against different types of statistical and image processing attacks.  ... 
arXiv:1505.01795v1 fatcat:mnejtnthzrh4zdurpsex4t6s7y

Logistic map as a block encryption algorithm

Ljupčo Kocarev, Goce Jakimoski
2001 Physics Letters A  
A systematic procedure for design of encryption algorithms based on chaotic maps is suggested. We present an example based on logistic map.  ...  We discuss the relationship between cryptography and chaos theory, and similarities of their crucial concepts such as mixing property and sensitivity to changes in initial conditions and parameters.  ...  Acknowledgement This work was supported in part by the ARO (grant DAAG55-98-1-0269, MURI Project "Digital Communication Devices Based on Nonlinear Dynamics and Chaos"), and the DOE (grant DE-FG03-95ER14516  ... 
doi:10.1016/s0375-9601(01)00609-0 fatcat:fqp3lyy53fe7jat7xwmya6r5du

Image Encryption using Simplified Data Encryption Standard (S-DES)

Sanjay Kumar, Sandeep Srivastava
2014 International Journal of Computer Applications  
In this paper a number of image encryption algorithms based on chaotic maps has been proposed.  ...  In preceding work, most researchers used to make a image using a key and then encrypt the chaotic image using the same key, but in this paper first make a chaotic map of the image using S-DES.  ...  A dual image encryption algorithm based on S-DES and Logistic map is prospected.  ... 
doi:10.5120/18178-9070 fatcat:rmp6lu7kcfccrera7kjhlbmkf4

Applied Cryptography Using Chaos Function for Fast Digital Logic-Based Systems in Ubiquitous Computing

Piyush Shukla, Ankur Khare, Murtaza Rizvi, Shalini Stalin, Sanjay Kumar
2015 Entropy  
Based on the limitations of the existing techniques, an adaptive chaos based data encryption framework of secure communication for future research is proposed.  ...  Chaotic masking and switching used for block and stream cipher in non-linear dynamic systems enhances the security, speed, accuracy and reliability of encryption systems without compromising the quality  ...  Several one-dimensional chaotic maps generate independent and approximately uniform pseudo dynamic sequences for the block encryption algorithm [40] .  ... 
doi:10.3390/e17031387 fatcat:4wc2ve5dzjexdge4hyuxbxutly

On the Security Analysis of a Hopfield Chaotic Neural Network-Based Image Encryption Algorithm

Yingchun Hu, Simin Yu, Zeqing Zhang
2020 Complexity  
In this paper, the security analysis of a color image encryption algorithm based on Hopfield chaotic neural network is given.  ...  The original chaotic image encryption algorithm includes permutation encryption and diffusion encryption.  ...  For example, in [20] , the cryptanalysis of an image encryption cryptosystem based on binary bit planes extraction and multiple chaotic maps (IEC-BPMC) proposed in [1] is given; it is pointed out that  ... 
doi:10.1155/2020/2051653 fatcat:qmbwa6n3bvbvhcioorfjelzvzu

A Novel Algorithm for Block Encryption of Digital Image Based on Chaos

Jun Peng, Du Zhang, Xiaofeng Liao
2011 International Journal of Cognitive Informatics and Natural Intelligence  
A novel image block encryption algorithm based on three-dimensional Chen chaotic dynamical system is proposed in this paper. The algorithm works on 32-bit image blocks with a 192-bit secret key.  ...  to encrypt the original image block.  ...  The work described in this paper was supported by the Natural Science Foundation Project of CQ CSTC under Grant No.2008BB2360, No.2008BB2199  ... 
doi:10.4018/jcini.2011010104 fatcat:ll4aljy42nhnvm4vsdvimq2cri

Security Problems of Chaotic Image Encryption Algorithms Based on Cryptanalysis Driven Design Technique

Zahir Muhammed Ziad Muhammad, Fatih Ozkaynak
2019 IEEE Access  
Chaos based image encryption algorithms have become increasingly popular in the recent period. However, most of these algorithms are often based on cryptanalysis driven design technique.  ...  First, the security problems of two different chaos based image encryption algorithms have been analyzed.  ...  ACKNOWLEDGMENT The authors would like to thank the Referee for the constructive comments and recommendations which definitely help to improve the readability and quality of the study.  ... 
doi:10.1109/access.2019.2930606 fatcat:swds5p5jlnfabhic52nz2kddvy

Review of Image Security approaches: Concepts, Issues, Challenges and Applications

Shashikant S. Radke, Department of Computer Engineering, MPSTME, Mumbai, NMIMS University., Dhirendra S. Mishra, Department of Computer Engineering, MPSTME, Mumbai, NMIMS University.
2021 Journal of University of Shanghai for Science and Technology  
The security of these data has become an urgent and serious problem and needs immediate attention. Traditional encryption and decryption algorithms are not sufficient to secure digital images.  ...  This article aims to comparatively study the different digital image encryption algorithms.  ...  An adaptive color image encryption algorithm [9] based on one-dimensional hybrid chaotic mapping and cross-diffusion is discussed.  ... 
doi:10.51201/jusst/21/05378 fatcat:vld2smz3svckhpjkbrdrebwy24

Image Encryption using Edge Map and Key Image

Shrija Somaraj, Mohammed Ali Hussain
2017 Indian Journal of Science and Technology  
Objective: An Image Encryption algorithm is proposed which uses an image as key and concept of Edge Map for Encryption.  ...  Method/Analysis: The proposed algorithm uses gradient operators like Sobel, Roberts, Prewitt and Canny edge detectors for generating the edge map of key image and which is used for encrypting the original  ...  Algorithm for Edge Map Based Decryption (EMBD) • Input is the Encrypted Image.  ... 
doi:10.17485/ijst/2017/v10i4/110673 fatcat:v26vslyquvf7xlemixcvceimcu

Chaotic Image Encryption: State-of-the-Art, Ecosystem, and Future Roadmap

Behrouz Zolfaghari, Takeshi Koshiba
2022 Applied System Innovation  
A comprehensive survey can highlight existing trends and shed light on less-studied topics in the area of chaotic image encryption.  ...  Recently, many researchers have been interested in the application of chaos in cryptography. Specifically, numerous research works have been focusing on chaotic image encryption.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/asi5030057 fatcat:cpnitagmdze5bpla5l6koaaiwy
« Previous Showing results 1 — 15 out of 718 results