Breaking an Image Encryption Scheme Based on Chaotic Synchronization Phenomenon

被引:0
|
作者
Singh, Sushmita [1 ]
Ahmad, Musheer [1 ]
Malik, Dhruv [1 ]
机构
[1] Jamia Millia Islamia, Fac Engn & Technol, Dept Comp Engn, New Delhi 110025, India
关键词
Image encryption; security; true random bit generator; double scroll chaotic systems; synchronization; cryptanalysis; CRYPTANALYSIS;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In recent past, Volos et al. proposed an image encryption scheme based on true random bits generator in [Signal Processing 93, 1328-1340, 2013]. The TRBG uses two mutually coupled double scroll chaotic systems that are synchronized via complete chaotic synchronization and inverse pi-lag synchronization techniques. The numerical simulations demonstrated the effectiveness of chaotic true random bits generator through FIPS-140-2 randomness test suite. The proposed generator is applied with an aim to secure the digital images by framing an image encryption process based on the effective TRBG. The statistical analyses conform to the required encryption standards and quality. But, Volos et al. image encryption scheme inherently holds a number of vulnerabilities that make it possible to break the encryption scheme. This paper proposes the break of the Volos et al. image encryption scheme by exploiting these vulnerabilities to evidence that their scheme lacks security. It is practically shown by applying the chosen-plaintext and known-plaintext attacks which successfully recovers the plaintext-image from the encrypted image without knowing the secret key. The idea is to show the ineligibility of the encryption scheme for use in practical image security applications.
引用
收藏
页码:146 / 149
页数:4
相关论文
共 50 条
  • [31] Breaking a chaotic image encryption algorithm based on perceptron model
    Yu Zhang
    Chengqing Li
    Qin Li
    Dan Zhang
    Shi Shu
    Nonlinear Dynamics, 2012, 69 : 1091 - 1096
  • [32] An image encryption algorithm based on generalized synchronization chaotic systems
    School of Information and Engineering, Beijing University of Science and Technology, Beijing 100083, China
    不详
    不详
    Jisuanji Gongcheng, 2006, 6 (154-156):
  • [33] Multi image encryption and steganography based on synchronization of chaotic lasers
    Mukhopadhyay, Sumona
    Leung, Henry
    2013 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC 2013), 2013, : 4403 - 4408
  • [34] An innovative image encryption scheme based on chaotic map and Vigenere scheme
    Bansal, Ritesh
    Gupta, Shailender
    Sharma, Gaurav
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (15) : 16529 - 16562
  • [35] Breaking and improving an image encryption scheme based on total shuffling scheme
    Zhu, Congxu
    Liao, Chunlong
    Deng, Xiaoheng
    NONLINEAR DYNAMICS, 2013, 71 (1-2) : 25 - 34
  • [36] Breaking and improving an image encryption scheme based on total shuffling scheme
    Congxu Zhu
    Chunlong Liao
    Xiaoheng Deng
    Nonlinear Dynamics, 2013, 71 : 25 - 34
  • [37] An efficient chaotic image encryption scheme
    Khan, Majid
    Shah, Tariq
    NEURAL COMPUTING & APPLICATIONS, 2015, 26 (05): : 1137 - 1148
  • [38] A Probabilistic Chaotic Image Encryption Scheme
    Kanso, Ali
    Ghebleh, Mohammad
    Khuzam, Mazen Bou
    MATHEMATICS, 2022, 10 (11)
  • [39] A Feasible Chaotic Encryption Scheme for Image
    Chen, Dongming
    2009 INTERNATIONAL WORKSHOP ON CHAOS-FRACTALS THEORIES AND APPLICATIONS (IWCFTA 2009), 2009, : 172 - 176
  • [40] A Multiple Chaotic Encryption Scheme for Image
    Zhao Mingming
    Tong Xiaojun
    2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,