Break an enhanced plaintext-related chaotic image encryption algorithm

This paper presents a comprehensive security analysis on an improved chaos-based image encryption algorithm. The initial algorithm, proposed by Li et al., involves permutation related to the sum of plaintext pixel values and diffusion associated with 9 specific pixel values in the permuted image. Ho...

Celý popis

Uložené v:
Podrobná bibliografia
Vydané v:Chaos, solitons and fractals Ročník 181; s. 114623
Hlavní autori: Zhou, Rong, Yu, Simin
Médium: Journal Article
Jazyk:English
Vydavateľské údaje: Elsevier Ltd 01.04.2024
Predmet:
ISSN:0960-0779, 1873-2887
On-line prístup:Získať plný text
Tagy: Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
Abstract This paper presents a comprehensive security analysis on an improved chaos-based image encryption algorithm. The initial algorithm, proposed by Li et al., involves permutation related to the sum of plaintext pixel values and diffusion associated with 9 specific pixel values in the permuted image. However, a thorough analysis conducted by Liu et al. reveals two major flaws in it: firstly, the 9 specific pixel values are not involved in the diffusion process; secondly, the permutation method exhibits significant vulnerabilities. In response to these shortcomings, Liu et al. proposed targeted improvements on it, which include incorporating a permutation step for the 9 specific pixels and enhancing the original permutation method. In this study, we analyze the improved algorithm and discover that it still possesses security vulnerabilities, rendering it susceptible to chosen-plaintext attack. By constructing three categories of special plaintexts, one can decipher the equivalent permutation and diffusion. Theoretical analysis and experimental results provide strong evidence for the effectiveness of our analysis in this paper.
AbstractList This paper presents a comprehensive security analysis on an improved chaos-based image encryption algorithm. The initial algorithm, proposed by Li et al., involves permutation related to the sum of plaintext pixel values and diffusion associated with 9 specific pixel values in the permuted image. However, a thorough analysis conducted by Liu et al. reveals two major flaws in it: firstly, the 9 specific pixel values are not involved in the diffusion process; secondly, the permutation method exhibits significant vulnerabilities. In response to these shortcomings, Liu et al. proposed targeted improvements on it, which include incorporating a permutation step for the 9 specific pixels and enhancing the original permutation method. In this study, we analyze the improved algorithm and discover that it still possesses security vulnerabilities, rendering it susceptible to chosen-plaintext attack. By constructing three categories of special plaintexts, one can decipher the equivalent permutation and diffusion. Theoretical analysis and experimental results provide strong evidence for the effectiveness of our analysis in this paper.
ArticleNumber 114623
Author Yu, Simin
Zhou, Rong
Author_xml – sequence: 1
  givenname: Rong
  orcidid: 0000-0001-7594-6309
  surname: Zhou
  fullname: Zhou, Rong
  email: hsj123@126.com
– sequence: 2
  givenname: Simin
  surname: Yu
  fullname: Yu, Simin
  email: siminyu@163.com
BookMark eNqFkMtOwzAQRS1UJNrCF7DJDyT40fixYAEVBaRKbGBtTRy7dUmdyrYQ_XsSyooFrEYzmjOae2ZoEvpgEbomuCKY8JtdZbbQp4piuqgIWXDKztCUSMFKKqWYoClWHJdYCHWBZintMMYEczpFq_to4b2AUNiwhWBsWxw68CHbz1xG20EeJuPx7E3h97Cxw6KJx0P2fSig2_TR5-3-Ep076JK9-qlz9LZ6eF0-leuXx-fl3bo0DLNcOtU4QmsnuKHgMDOcNTWXrOFglCRDb2vBBIBUREHLqKwXwJtGmlYy2jg2R-p018Q-pWidNj7D-EuO4DtNsB6F6J3-FqJHIfokZGDZL_YQh0Tx-A91e6LsEOvD26iT8XYU5aM1Wbe9_5P_AhW_fgk
CitedBy_id crossref_primary_10_1016_j_chaos_2024_115582
crossref_primary_10_1016_j_chaos_2024_115332
crossref_primary_10_1016_j_chaos_2024_115521
crossref_primary_10_3390_electronics13132647
crossref_primary_10_1142_S0218127425501421
crossref_primary_10_1109_TCSVT_2025_3543824
crossref_primary_10_1007_s11071_024_10053_8
crossref_primary_10_3390_e27010040
crossref_primary_10_1007_s11071_025_11582_6
Cites_doi 10.1016/j.matcom.2021.06.008
10.3390/e23020202
10.1016/j.chaos.2003.12.022
10.1007/s11554-021-01091-1
10.1103/PhysRevResearch.3.L042040
10.1142/S021812749800098X
10.1007/s11071-013-1070-x
10.1002/j.1538-7305.1949.tb00928.x
10.1016/j.optlastec.2013.05.023
10.1016/j.physa.2008.02.020
10.1109/ACCESS.2019.2938181
10.1016/j.sigpro.2010.09.014
10.1016/j.asoc.2015.08.008
10.1007/s12652-019-01500-1
10.1016/j.future.2022.01.017
10.1007/s11071-018-4426-4
10.1103/PhysRevE.83.011919
10.1016/j.optlaseng.2020.106297
10.1016/j.inffus.2020.10.008
10.1109/ACCESS.2019.2916402
10.1016/j.sigpro.2018.06.008
10.3390/e22030274
10.1142/S0218127419501037
10.1007/s11071-016-3311-2
10.1103/PhysRevLett.88.174102
10.1016/j.sigpro.2017.10.004
10.1007/s11554-019-00940-4
10.1016/j.sigpro.2019.107286
10.1007/s11071-015-2057-6
10.3390/math10203878
ContentType Journal Article
Copyright 2024 Elsevier Ltd
Copyright_xml – notice: 2024 Elsevier Ltd
DBID AAYXX
CITATION
DOI 10.1016/j.chaos.2024.114623
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Sciences (General)
Mathematics
EISSN 1873-2887
ExternalDocumentID 10_1016_j_chaos_2024_114623
S0960077924001747
GroupedDBID --K
--M
-~X
.~1
0R~
1B1
1RT
1~.
1~5
29B
4.4
457
4G.
5GY
5VS
7-5
71M
8P~
9JN
AABNK
AACTN
AAEDT
AAEDW
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAQXK
AAXUO
ABMAC
ABNEU
ABTAH
ABXDB
ACDAQ
ACFVG
ACGFS
ACNNM
ACRLP
ADBBV
ADEZE
ADMUD
AEBSH
AEKER
AENEX
AFFNX
AFKWA
AFTJW
AGHFR
AGUBO
AGYEJ
AHHHB
AIEXJ
AIKHN
AITUG
AIVDX
AJOXV
AKRWK
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
ASPBG
AVWKF
AXJTR
AZFZN
BBWZM
BKOJK
BLXMC
CS3
DU5
EBS
EFJIC
EJD
EO8
EO9
EP2
EP3
F5P
FDB
FEDTE
FGOYB
FIRID
FNPLU
FYGXN
G-Q
GBLVA
HLZ
HMV
HVGLF
HZ~
IHE
J1W
KOM
LG9
M38
M41
MO0
N9A
NDZJH
O-L
O9-
OAUVE
OGIMB
OZT
P-8
P-9
P2P
PC.
Q38
R2-
RIG
RNS
ROL
RPZ
SBC
SDF
SDG
SDP
SES
SEW
SPC
SPCBC
SPD
SPG
SSQ
SSZ
T5K
WUQ
XPP
ZY4
~G-
9DU
AATTM
AAXKI
AAYWO
AAYXX
ABJNI
ABWVN
ACLOT
ACRPL
ACVFH
ADCNI
ADNMO
AEIPS
AEUPX
AFJKZ
AFPUW
AGQPQ
AIGII
AIIUN
AKBMS
AKYEP
ANKPU
APXCP
CITATION
EFKBS
EFLBG
~HD
ID FETCH-LOGICAL-c303t-f9bf125f76c2af03c63b5683b6ac9813c6e5737aa8919ad32854a6bb8cd832bf3
ISICitedReferencesCount 10
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001206726000001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 0960-0779
IngestDate Sat Nov 29 03:19:18 EST 2025
Tue Nov 18 20:05:55 EST 2025
Sat Aug 10 15:32:01 EDT 2024
IsPeerReviewed true
IsScholarly true
Keywords Chaos
Image encryption
Algorithm enhancement
Plaintext correlation
Security analysis
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c303t-f9bf125f76c2af03c63b5683b6ac9813c6e5737aa8919ad32854a6bb8cd832bf3
ORCID 0000-0001-7594-6309
ParticipantIDs crossref_citationtrail_10_1016_j_chaos_2024_114623
crossref_primary_10_1016_j_chaos_2024_114623
elsevier_sciencedirect_doi_10_1016_j_chaos_2024_114623
PublicationCentury 2000
PublicationDate April 2024
2024-04-00
PublicationDateYYYYMMDD 2024-04-01
PublicationDate_xml – month: 04
  year: 2024
  text: April 2024
PublicationDecade 2020
PublicationTitle Chaos, solitons and fractals
PublicationYear 2024
Publisher Elsevier Ltd
Publisher_xml – name: Elsevier Ltd
References Palit, Garain (b34) 2006
Li, Peng, Li, Zhu (b35) 2018
Xu, Tian (b12) 2019
Mondal, Behera, Gangopadhyay (b13) 2021
Fridrich (b4) 1998
Tian, Wang, Zhang, Sun (b32) 2021
Wu, Kan, Kurths (b9) 2015
Li, Zhang, Xie (b17) 2019
Masood, Ahmad, Shah, Jamal, Hussain (b11) 2020
Lone, Singh, Stoffová, Mishra, Mir, Kumar (b28) 2022
Huang, Liu, Liao, Dong (b25) 2021
Hu, Xiao, Wang, Li (b19) 2017
Chen, Tang, Ye (b23) 2020; 167
Chen, Mao, Chui (b29) 2004
Li, Ma, Zhang (b1) 2021
Liu, Zhang, Chen (b36) 2019
Mohanarathinam, Kamalraj, Prasanna Venkatesan, Ravi, Manikandababu (b2) 2020
Shannon CE. Communication Theory of Secrecy Systems. Bell Syst Tech J 656–715.
Bandt, Pompe (b30) 2002
Martini, Kranz, Wagner, Lehnertz (b33) 2011; 83
Panwar, Purwar, Jain (b22) 2019
Li, Wang, Yue, Liu (b26) 2021
.
Wu, Liao, Yang (b8) 2018
Sajitha, Shobha Rekh (b16) 2022
Li, Xu, Luo, Fan (b21) 2019
Munir, Khan, Jamal, Hazzazi, Hussain (b24) 2021
Wang, Wang (b38) 2008
Chen, Zhu, Fu, Zhang, Zhang (b7) 2015
Dawahdeh, Yaakob, Razif bin Othman (b15) 2018
Hua, Yi, Zhou (b10) 2018
Liu, Guo, Sheridan (b31) 2014; 57
Deepa, Pham, Nguyen, Bhattacharya, Prabadevi, Gadekallu, Maddikunta, Fang, Pathirana (b3) 2022
Wang, Xu (b6) 2014
Wang, Wei (b27) 2022
Li, Lo (b37) 2011
Liu, Shan, Zhong, Yu, Liu (b14) 2020
Wang, Xu (b39) 2014
Zhu, Xu, Hu, Sun (b18) 2015
Chen, Chen, Zhou (b20) 2020
Hu (10.1016/j.chaos.2024.114623_b19) 2017
Hua (10.1016/j.chaos.2024.114623_b10) 2018
Liu (10.1016/j.chaos.2024.114623_b31) 2014; 57
Li (10.1016/j.chaos.2024.114623_b35) 2018
Li (10.1016/j.chaos.2024.114623_b17) 2019
Li (10.1016/j.chaos.2024.114623_b26) 2021
10.1016/j.chaos.2024.114623_b5
Wang (10.1016/j.chaos.2024.114623_b39) 2014
Li (10.1016/j.chaos.2024.114623_b1) 2021
Sajitha (10.1016/j.chaos.2024.114623_b16) 2022
Dawahdeh (10.1016/j.chaos.2024.114623_b15) 2018
Xu (10.1016/j.chaos.2024.114623_b12) 2019
Chen (10.1016/j.chaos.2024.114623_b20) 2020
Wang (10.1016/j.chaos.2024.114623_b38) 2008
Palit (10.1016/j.chaos.2024.114623_b34) 2006
Wu (10.1016/j.chaos.2024.114623_b9) 2015
Zhu (10.1016/j.chaos.2024.114623_b18) 2015
Martini (10.1016/j.chaos.2024.114623_b33) 2011; 83
Panwar (10.1016/j.chaos.2024.114623_b22) 2019
Munir (10.1016/j.chaos.2024.114623_b24) 2021
Li (10.1016/j.chaos.2024.114623_b21) 2019
Wang (10.1016/j.chaos.2024.114623_b6) 2014
Huang (10.1016/j.chaos.2024.114623_b25) 2021
Fridrich (10.1016/j.chaos.2024.114623_b4) 1998
Chen (10.1016/j.chaos.2024.114623_b7) 2015
Masood (10.1016/j.chaos.2024.114623_b11) 2020
Mohanarathinam (10.1016/j.chaos.2024.114623_b2) 2020
Wang (10.1016/j.chaos.2024.114623_b27) 2022
Bandt (10.1016/j.chaos.2024.114623_b30) 2002
Liu (10.1016/j.chaos.2024.114623_b36) 2019
Chen (10.1016/j.chaos.2024.114623_b23) 2020; 167
Tian (10.1016/j.chaos.2024.114623_b32) 2021
Liu (10.1016/j.chaos.2024.114623_b14) 2020
Lone (10.1016/j.chaos.2024.114623_b28) 2022
Chen (10.1016/j.chaos.2024.114623_b29) 2004
Mondal (10.1016/j.chaos.2024.114623_b13) 2021
Deepa (10.1016/j.chaos.2024.114623_b3) 2022
Li (10.1016/j.chaos.2024.114623_b37) 2011
Wu (10.1016/j.chaos.2024.114623_b8) 2018
References_xml – volume: 167
  year: 2020
  ident: b23
  article-title: Cryptanalysis and improvement of medical image encryption using high-speed scrambling and pixel adaptive diffusion
  publication-title: Signal Process
– start-page: 274
  year: 2020
  ident: b11
  article-title: A novel hybrid secure image encryption based on julia set of fractals and 3D lorenz chaotic map
  publication-title: Entropy
– start-page: 1
  year: 2019
  end-page: 14
  ident: b12
  article-title: A novel image cipher based on 3D bit matrix and latin cubes
  publication-title: Inform Sci
– start-page: 1
  year: 2021
  end-page: 18
  ident: b13
  article-title: A secure image encryption scheme based on a novel 2D sine–cosine cross-chaotic (SC3) map
  publication-title: J Real-Time Image Process
– start-page: 529
  year: 2022
  end-page: 534
  ident: b16
  article-title: Review on various image encryption schemes
  publication-title: Mater Today: Proc
– start-page: 1305
  year: 2017
  end-page: 1316
  ident: b19
  article-title: Cryptanalysis of a chaotic image cipher using latin square-based confusion and diffusion
  publication-title: Nonlinear Dynam
– start-page: 3878
  year: 2022
  ident: b28
  article-title: Cryptanalysis and improved image encryption scheme using elliptic curve and affine hill cipher
  publication-title: Mathematics
– start-page: 134
  year: 2018
  end-page: 144
  ident: b10
  article-title: Medical image encryption using high-speed scrambling and pixel adaptive diffusion
  publication-title: Signal Process
– year: 2002
  ident: b30
  article-title: Permutation entropy: A natural complexity measure for time series
  publication-title: Phys Rev Lett
– volume: 83
  year: 2011
  ident: b33
  article-title: Inferring directional interactions from transient signals with symbolic transfer entropy
  publication-title: Phys Rev E
– start-page: 94
  year: 2021
  end-page: 115
  ident: b1
  article-title: Image retrieval from remote sensing big data: A survey
  publication-title: Inf Fusion
– start-page: 24
  year: 2015
  end-page: 39
  ident: b9
  article-title: A new color image encryption scheme based on DNA sequences and multiple improved 1D chaotic maps
  publication-title: Appl Soft Comput
– start-page: 202
  year: 2021
  ident: b25
  article-title: On the cryptanalysis of a latin cubes-based image cryptosystem
  publication-title: Entropy
– start-page: 130
  year: 2020
  end-page: 141
  ident: b20
  article-title: Cryptanalysis of a DNA-based image encryption scheme
  publication-title: Inform Sci
– start-page: 949
  year: 2011
  end-page: 954
  ident: b37
  article-title: Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks
  publication-title: Signal Process
– year: 2019
  ident: b22
  article-title: Cryptanalysis and improvement of a color image encryption scheme based on DNA sequences and multiple 1D chaotic maps
  publication-title: Int J Bifurcation Chaos
– year: 2021
  ident: b32
  article-title: Fourier-domain transfer entropy spectrum
  publication-title: Phys Rev Res
– start-page: 209
  year: 2022
  end-page: 226
  ident: b3
  article-title: A survey on blockchain for big data: Approaches, opportunities, and future directions
  publication-title: Future Gener Comput Syst
– year: 2022
  ident: b27
  article-title: Cryptanalysis of compressive interference-based optical encryption using a U-net deep learning network
  publication-title: Opt Commun
– start-page: 1151
  year: 2015
  end-page: 1166
  ident: b7
  article-title: An efficient image encryption scheme using lookup table-based confusion and diffusion
  publication-title: Nonlinear Dynam
– start-page: 1259
  year: 1998
  end-page: 1284
  ident: b4
  article-title: Symmetric ciphers based on two-dimensional chaotic maps
  publication-title: Int J Bifurcation Chaos
– year: 2019
  ident: b17
  article-title: When an attacker meets a cipher-image in 2018: A year in review
  publication-title: J Inf Secur Appl
– start-page: 345
  year: 2014
  end-page: 353
  ident: b39
  article-title: A novel image encryption scheme based on Brownian motion and PWLCM chaotic system
  publication-title: Nonlinear Dynam
– start-page: 3751
  year: 2008
  end-page: 3758
  ident: b38
  article-title: A hyperchaos generated from lorenz system
  publication-title: Physica A
– start-page: 126450
  year: 2019
  end-page: 126463
  ident: b36
  article-title: Cryptanalysis and improvement in a plaintext-related image encryption scheme based on hyper chaos
  publication-title: IEEE Access
– start-page: 826
  year: 2021
  end-page: 836
  ident: b24
  article-title: Cryptanalysis of hybrid secure image encryption based on julia set fractals and three-dimensional lorenz chaotic map
  publication-title: Math Comput Simulation
– start-page: 2135
  year: 2021
  end-page: 2149
  ident: b26
  article-title: Cryptanalysis of a secure image encryption scheme based on a novel 2D sine–cosine cross-chaotic map
  publication-title: J Real-Time Image Process
– start-page: 749
  year: 2004
  end-page: 761
  ident: b29
  article-title: A symmetric image encryption scheme based on 3D chaotic cat maps
  publication-title: Chaos Solitons Fractals
– year: 2020
  ident: b14
  article-title: Compressive interference-based image encryption via sparsity constraints
  publication-title: Opt Lasers Eng
– reference: .
– start-page: 11
  year: 2018
  end-page: 23
  ident: b8
  article-title: Image encryption using 2D Hénon-Sine map and DNA approach
  publication-title: Signal Process
– reference: Shannon CE. Communication Theory of Secrecy Systems. Bell Syst Tech J 656–715.
– start-page: 63336
  year: 2019
  end-page: 63345
  ident: b21
  article-title: Cryptanalysis of an image encryption using 2D Henon-Sine map and DNA approach
  publication-title: IEEE Access
– start-page: 349
  year: 2018
  end-page: 355
  ident: b15
  article-title: A new image encryption technique combining elliptic curve cryptosystem with hill cipher
  publication-title: J King Saud Univ Comput Inf Sci
– year: 2006
  ident: b34
  article-title: A novel technique for the watermarking of symbolically compressed documents
  publication-title: Second international conference on document image analysis for libraries
– start-page: 3221
  year: 2020
  end-page: 3229
  ident: b2
  article-title: Digital watermarking techniques for image security: a review
  publication-title: J Ambient Intell Humaniz Comput
– volume: 57
  start-page: 327
  year: 2014
  end-page: 342
  ident: b31
  article-title: A review of optical image encryption techniques
  publication-title: Opt Laser Technol
– start-page: 345
  year: 2014
  end-page: 353
  ident: b6
  article-title: A novel image encryption scheme based on Brownian motion and PWLCM chaotic system
  publication-title: Nonlinear Dynam
– start-page: 1511
  year: 2015
  end-page: 1518
  ident: b18
  article-title: Breaking a novel image encryption scheme based on Brownian motion and PWLCM chaotic system
  publication-title: Nonlinear Dynam
– start-page: 1319
  year: 2018
  end-page: 1333
  ident: b35
  article-title: A novel plaintext-related image encryption scheme using hyper-chaotic system
  publication-title: Nonlinear Dynam
– start-page: 826
  year: 2021
  ident: 10.1016/j.chaos.2024.114623_b24
  article-title: Cryptanalysis of hybrid secure image encryption based on julia set fractals and three-dimensional lorenz chaotic map
  publication-title: Math Comput Simulation
  doi: 10.1016/j.matcom.2021.06.008
– start-page: 1
  year: 2019
  ident: 10.1016/j.chaos.2024.114623_b12
  article-title: A novel image cipher based on 3D bit matrix and latin cubes
  publication-title: Inform Sci
– year: 2006
  ident: 10.1016/j.chaos.2024.114623_b34
  article-title: A novel technique for the watermarking of symbolically compressed documents
– start-page: 1511
  year: 2015
  ident: 10.1016/j.chaos.2024.114623_b18
  article-title: Breaking a novel image encryption scheme based on Brownian motion and PWLCM chaotic system
  publication-title: Nonlinear Dynam
– year: 2019
  ident: 10.1016/j.chaos.2024.114623_b17
  article-title: When an attacker meets a cipher-image in 2018: A year in review
  publication-title: J Inf Secur Appl
– start-page: 202
  year: 2021
  ident: 10.1016/j.chaos.2024.114623_b25
  article-title: On the cryptanalysis of a latin cubes-based image cryptosystem
  publication-title: Entropy
  doi: 10.3390/e23020202
– year: 2022
  ident: 10.1016/j.chaos.2024.114623_b27
  article-title: Cryptanalysis of compressive interference-based optical encryption using a U-net deep learning network
  publication-title: Opt Commun
– start-page: 749
  year: 2004
  ident: 10.1016/j.chaos.2024.114623_b29
  article-title: A symmetric image encryption scheme based on 3D chaotic cat maps
  publication-title: Chaos Solitons Fractals
  doi: 10.1016/j.chaos.2003.12.022
– start-page: 2135
  year: 2021
  ident: 10.1016/j.chaos.2024.114623_b26
  article-title: Cryptanalysis of a secure image encryption scheme based on a novel 2D sine–cosine cross-chaotic map
  publication-title: J Real-Time Image Process
  doi: 10.1007/s11554-021-01091-1
– year: 2021
  ident: 10.1016/j.chaos.2024.114623_b32
  article-title: Fourier-domain transfer entropy spectrum
  publication-title: Phys Rev Res
  doi: 10.1103/PhysRevResearch.3.L042040
– start-page: 1259
  year: 1998
  ident: 10.1016/j.chaos.2024.114623_b4
  article-title: Symmetric ciphers based on two-dimensional chaotic maps
  publication-title: Int J Bifurcation Chaos
  doi: 10.1142/S021812749800098X
– start-page: 130
  year: 2020
  ident: 10.1016/j.chaos.2024.114623_b20
  article-title: Cryptanalysis of a DNA-based image encryption scheme
  publication-title: Inform Sci
– start-page: 345
  year: 2014
  ident: 10.1016/j.chaos.2024.114623_b39
  article-title: A novel image encryption scheme based on Brownian motion and PWLCM chaotic system
  publication-title: Nonlinear Dynam
  doi: 10.1007/s11071-013-1070-x
– ident: 10.1016/j.chaos.2024.114623_b5
  doi: 10.1002/j.1538-7305.1949.tb00928.x
– volume: 57
  start-page: 327
  year: 2014
  ident: 10.1016/j.chaos.2024.114623_b31
  article-title: A review of optical image encryption techniques
  publication-title: Opt Laser Technol
  doi: 10.1016/j.optlastec.2013.05.023
– start-page: 3751
  year: 2008
  ident: 10.1016/j.chaos.2024.114623_b38
  article-title: A hyperchaos generated from lorenz system
  publication-title: Physica A
  doi: 10.1016/j.physa.2008.02.020
– start-page: 126450
  year: 2019
  ident: 10.1016/j.chaos.2024.114623_b36
  article-title: Cryptanalysis and improvement in a plaintext-related image encryption scheme based on hyper chaos
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2019.2938181
– start-page: 949
  year: 2011
  ident: 10.1016/j.chaos.2024.114623_b37
  article-title: Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks
  publication-title: Signal Process
  doi: 10.1016/j.sigpro.2010.09.014
– start-page: 24
  year: 2015
  ident: 10.1016/j.chaos.2024.114623_b9
  article-title: A new color image encryption scheme based on DNA sequences and multiple improved 1D chaotic maps
  publication-title: Appl Soft Comput
  doi: 10.1016/j.asoc.2015.08.008
– start-page: 3221
  year: 2020
  ident: 10.1016/j.chaos.2024.114623_b2
  article-title: Digital watermarking techniques for image security: a review
  publication-title: J Ambient Intell Humaniz Comput
  doi: 10.1007/s12652-019-01500-1
– start-page: 209
  year: 2022
  ident: 10.1016/j.chaos.2024.114623_b3
  article-title: A survey on blockchain for big data: Approaches, opportunities, and future directions
  publication-title: Future Gener Comput Syst
  doi: 10.1016/j.future.2022.01.017
– start-page: 1319
  year: 2018
  ident: 10.1016/j.chaos.2024.114623_b35
  article-title: A novel plaintext-related image encryption scheme using hyper-chaotic system
  publication-title: Nonlinear Dynam
  doi: 10.1007/s11071-018-4426-4
– start-page: 345
  year: 2014
  ident: 10.1016/j.chaos.2024.114623_b6
  article-title: A novel image encryption scheme based on Brownian motion and PWLCM chaotic system
  publication-title: Nonlinear Dynam
  doi: 10.1007/s11071-013-1070-x
– volume: 83
  issue: 1
  year: 2011
  ident: 10.1016/j.chaos.2024.114623_b33
  article-title: Inferring directional interactions from transient signals with symbolic transfer entropy
  publication-title: Phys Rev E
  doi: 10.1103/PhysRevE.83.011919
– year: 2020
  ident: 10.1016/j.chaos.2024.114623_b14
  article-title: Compressive interference-based image encryption via sparsity constraints
  publication-title: Opt Lasers Eng
  doi: 10.1016/j.optlaseng.2020.106297
– start-page: 349
  year: 2018
  ident: 10.1016/j.chaos.2024.114623_b15
  article-title: A new image encryption technique combining elliptic curve cryptosystem with hill cipher
  publication-title: J King Saud Univ Comput Inf Sci
– start-page: 94
  year: 2021
  ident: 10.1016/j.chaos.2024.114623_b1
  article-title: Image retrieval from remote sensing big data: A survey
  publication-title: Inf Fusion
  doi: 10.1016/j.inffus.2020.10.008
– start-page: 63336
  year: 2019
  ident: 10.1016/j.chaos.2024.114623_b21
  article-title: Cryptanalysis of an image encryption using 2D Henon-Sine map and DNA approach
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2019.2916402
– start-page: 11
  year: 2018
  ident: 10.1016/j.chaos.2024.114623_b8
  article-title: Image encryption using 2D Hénon-Sine map and DNA approach
  publication-title: Signal Process
  doi: 10.1016/j.sigpro.2018.06.008
– start-page: 529
  year: 2022
  ident: 10.1016/j.chaos.2024.114623_b16
  article-title: Review on various image encryption schemes
  publication-title: Mater Today: Proc
– start-page: 274
  year: 2020
  ident: 10.1016/j.chaos.2024.114623_b11
  article-title: A novel hybrid secure image encryption based on julia set of fractals and 3D lorenz chaotic map
  publication-title: Entropy
  doi: 10.3390/e22030274
– year: 2019
  ident: 10.1016/j.chaos.2024.114623_b22
  article-title: Cryptanalysis and improvement of a color image encryption scheme based on DNA sequences and multiple 1D chaotic maps
  publication-title: Int J Bifurcation Chaos
  doi: 10.1142/S0218127419501037
– start-page: 1305
  year: 2017
  ident: 10.1016/j.chaos.2024.114623_b19
  article-title: Cryptanalysis of a chaotic image cipher using latin square-based confusion and diffusion
  publication-title: Nonlinear Dynam
  doi: 10.1007/s11071-016-3311-2
– year: 2002
  ident: 10.1016/j.chaos.2024.114623_b30
  article-title: Permutation entropy: A natural complexity measure for time series
  publication-title: Phys Rev Lett
  doi: 10.1103/PhysRevLett.88.174102
– start-page: 134
  year: 2018
  ident: 10.1016/j.chaos.2024.114623_b10
  article-title: Medical image encryption using high-speed scrambling and pixel adaptive diffusion
  publication-title: Signal Process
  doi: 10.1016/j.sigpro.2017.10.004
– start-page: 1
  year: 2021
  ident: 10.1016/j.chaos.2024.114623_b13
  article-title: A secure image encryption scheme based on a novel 2D sine–cosine cross-chaotic (SC3) map
  publication-title: J Real-Time Image Process
  doi: 10.1007/s11554-019-00940-4
– volume: 167
  issn: 0165-1684
  year: 2020
  ident: 10.1016/j.chaos.2024.114623_b23
  article-title: Cryptanalysis and improvement of medical image encryption using high-speed scrambling and pixel adaptive diffusion
  publication-title: Signal Process
  doi: 10.1016/j.sigpro.2019.107286
– start-page: 1151
  year: 2015
  ident: 10.1016/j.chaos.2024.114623_b7
  article-title: An efficient image encryption scheme using lookup table-based confusion and diffusion
  publication-title: Nonlinear Dynam
  doi: 10.1007/s11071-015-2057-6
– start-page: 3878
  year: 2022
  ident: 10.1016/j.chaos.2024.114623_b28
  article-title: Cryptanalysis and improved image encryption scheme using elliptic curve and affine hill cipher
  publication-title: Mathematics
  doi: 10.3390/math10203878
SSID ssj0001062
Score 2.4768274
Snippet This paper presents a comprehensive security analysis on an improved chaos-based image encryption algorithm. The initial algorithm, proposed by Li et al.,...
SourceID crossref
elsevier
SourceType Enrichment Source
Index Database
Publisher
StartPage 114623
SubjectTerms Algorithm enhancement
Chaos
Image encryption
Plaintext correlation
Security analysis
Title Break an enhanced plaintext-related chaotic image encryption algorithm
URI https://dx.doi.org/10.1016/j.chaos.2024.114623
Volume 181
WOSCitedRecordID wos001206726000001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVESC
  databaseName: Elsevier SD Freedom Collection Journals 2021
  customDbUrl:
  eissn: 1873-2887
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0001062
  issn: 0960-0779
  databaseCode: AIEXJ
  dateStart: 19950101
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3Nb9MwFLdg4wCHiQ0Q2wD5wAEEmZq49cdxTJsAiQmJIVVcItuxaUeXVk03bf_93rOdtGLTBEhcosaK4_T9nOefX94HIa-NsVJrmLy6qFzWz73IlAVlaCvDHZfSKd0LxSbE8bEcDtXXVEquCeUERF3Ly0s1-69QQxuAjaGzfwF3d1NogN8AOhwBdjj-EfAfgAb-egevratH8fP-bKIxKwRscUPkCrTYkZ5iptbxGbrswNPPr6Lq0JOf0_l4MTpbJa0HcHWAu0FnOfStQWu7x_gqPek4-Y_R9Dz6aqfFMJT7CtZVrBy2al4oVr1Sgs2rjXtZOhkF4yHvZT0Ry8Dsuag6pWBZIdPy2enW_FY9HU0Gp3v4dzFpetEPSYtj6PFvCbC_4Wg4GLq7wgZK3CfrhRgoUMPr-58Oh5-7lRe2t-GrUft0bZap4M93Y6jbmcgKuzh5TDbStoDuRzg3yT1Xb5FHX7qcus0W2UxquKFvUq7wt0_IUUCb6pq2aNMbaNOENg1o0yXatEP7Kfl-dHhy8DFLpTEyC5xjkXllPFBTL7gttO8xy5kZcMkM11bJHM7dQDABb6HKla4Yxslqboy0Fahw49kzslZPa_ecUOELxnwuKg_sFPopJRQGkfKB9bpv_TYpWjGVNuWNx_Ilk7J1EDwtg2xLlG0ZZbtN3nedZjFtyt2X81b-ZWJ-kdGVMGHu6rjzrx13ycPlbH9B1hbzc_eSPLAXi3Ezf5Um1jXsq33o
linkProvider Elsevier
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Break+an+enhanced+plaintext-related+chaotic+image+encryption+algorithm&rft.jtitle=Chaos%2C+solitons+and+fractals&rft.au=Zhou%2C+Rong&rft.au=Yu%2C+Simin&rft.date=2024-04-01&rft.pub=Elsevier+Ltd&rft.issn=0960-0779&rft.eissn=1873-2887&rft.volume=181&rft_id=info:doi/10.1016%2Fj.chaos.2024.114623&rft.externalDocID=S0960077924001747
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0960-0779&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0960-0779&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0960-0779&client=summon