Breaking an Image Encryption Scheme Based on Chaotic Synchronization Phenomenon

被引:0
|
作者
Singh, Sushmita [1 ]
Ahmad, Musheer [1 ]
Malik, Dhruv [1 ]
机构
[1] Jamia Millia Islamia, Fac Engn & Technol, Dept Comp Engn, New Delhi 110025, India
关键词
Image encryption; security; true random bit generator; double scroll chaotic systems; synchronization; cryptanalysis; CRYPTANALYSIS;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In recent past, Volos et al. proposed an image encryption scheme based on true random bits generator in [Signal Processing 93, 1328-1340, 2013]. The TRBG uses two mutually coupled double scroll chaotic systems that are synchronized via complete chaotic synchronization and inverse pi-lag synchronization techniques. The numerical simulations demonstrated the effectiveness of chaotic true random bits generator through FIPS-140-2 randomness test suite. The proposed generator is applied with an aim to secure the digital images by framing an image encryption process based on the effective TRBG. The statistical analyses conform to the required encryption standards and quality. But, Volos et al. image encryption scheme inherently holds a number of vulnerabilities that make it possible to break the encryption scheme. This paper proposes the break of the Volos et al. image encryption scheme by exploiting these vulnerabilities to evidence that their scheme lacks security. It is practically shown by applying the chosen-plaintext and known-plaintext attacks which successfully recovers the plaintext-image from the encrypted image without knowing the secret key. The idea is to show the ineligibility of the encryption scheme for use in practical image security applications.
引用
下载
收藏
页码:146 / 149
页数:4
相关论文
共 50 条
  • [11] Cryptanalyzing an Image Encryption Scheme Using Synchronization of Memristor Chaotic Systems
    He, Shaoxuan
    Yang, Hongjiao
    Li, Chengqing
    Shen, Xianhui
    INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2024, 34 (11):
  • [12] Image encryption based on synchronization of fractional chaotic systems
    Xu, Yong
    Wang, Hua
    Li, Yongge
    Pei, Bin
    COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2014, 19 (10) : 3735 - 3744
  • [13] Image encryption process based on chaotic synchronization phenomena
    Volos, Ch. K.
    Kyprianidis, I. M.
    Stouboulos, I. N.
    SIGNAL PROCESSING, 2013, 93 (05) : 1328 - 1340
  • [14] Breaking a chaotic image encryption algorithm
    Noshadian, Saeed
    Ebrahimzade, Ata
    Kazemitabar, Seyed Javad
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (35-36) : 25635 - 25655
  • [15] Breaking a chaotic image encryption algorithm
    Saeed Noshadian
    Ata Ebrahimzade
    Seyed Javad Kazemitabar
    Multimedia Tools and Applications, 2020, 79 : 25635 - 25655
  • [16] Color image encryption scheme based on chaotic systems
    Xiangshen M.
    Jiulun F.
    Xuefeng Z.
    Fang R.
    Journal of China Universities of Posts and Telecommunications, 2018, 25 (02): : 39 - 48
  • [17] Color image encryption scheme based on chaotic systems
    Min Xiangshen
    Fan Jiulun
    Zhang Xuefeng
    Ren Fang
    The Journal of China Universities of Posts and Telecommunications, 2018, 25 (02) : 39 - 48
  • [18] An intertwining chaotic maps based image encryption scheme
    Sam, I. Shatheesh
    Devaraj, P.
    Bhuvaneswaran, R. S.
    NONLINEAR DYNAMICS, 2012, 69 (04) : 1995 - 2007
  • [19] An image encryption scheme based on cross chaotic map
    Wang, Ling
    Ye, Qun
    Xiao, Yaoqiang
    Zou, Yongxing
    Zhang, Bo
    CISP 2008: FIRST INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING, VOL 3, PROCEEDINGS, 2008, : 22 - +
  • [20] A Novel Image Encryption Scheme Based on Chaotic Maps
    Xu Shu-Jiang
    Wang Ying-Long
    Wang Ji-Zhi
    Tian Min
    ICSP: 2008 9TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, VOLS 1-5, PROCEEDINGS, 2008, : 1014 - 1018