Break an enhanced plaintext-related chaotic image encryption algorithm
This paper presents a comprehensive security analysis on an improved chaos-based image encryption algorithm. The initial algorithm, proposed by Li et al., involves permutation related to the sum of plaintext pixel values and diffusion associated with 9 specific pixel values in the permuted image. Ho...
Uložené v:
| Vydané v: | Chaos, solitons and fractals Ročník 181; s. 114623 |
|---|---|
| Hlavní autori: | , |
| Médium: | Journal Article |
| Jazyk: | English |
| Vydavateľské údaje: |
Elsevier Ltd
01.04.2024
|
| Predmet: | |
| ISSN: | 0960-0779, 1873-2887 |
| On-line prístup: | Získať plný text |
| Tagy: |
Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
|
| Abstract | This paper presents a comprehensive security analysis on an improved chaos-based image encryption algorithm. The initial algorithm, proposed by Li et al., involves permutation related to the sum of plaintext pixel values and diffusion associated with 9 specific pixel values in the permuted image. However, a thorough analysis conducted by Liu et al. reveals two major flaws in it: firstly, the 9 specific pixel values are not involved in the diffusion process; secondly, the permutation method exhibits significant vulnerabilities. In response to these shortcomings, Liu et al. proposed targeted improvements on it, which include incorporating a permutation step for the 9 specific pixels and enhancing the original permutation method. In this study, we analyze the improved algorithm and discover that it still possesses security vulnerabilities, rendering it susceptible to chosen-plaintext attack. By constructing three categories of special plaintexts, one can decipher the equivalent permutation and diffusion. Theoretical analysis and experimental results provide strong evidence for the effectiveness of our analysis in this paper. |
|---|---|
| AbstractList | This paper presents a comprehensive security analysis on an improved chaos-based image encryption algorithm. The initial algorithm, proposed by Li et al., involves permutation related to the sum of plaintext pixel values and diffusion associated with 9 specific pixel values in the permuted image. However, a thorough analysis conducted by Liu et al. reveals two major flaws in it: firstly, the 9 specific pixel values are not involved in the diffusion process; secondly, the permutation method exhibits significant vulnerabilities. In response to these shortcomings, Liu et al. proposed targeted improvements on it, which include incorporating a permutation step for the 9 specific pixels and enhancing the original permutation method. In this study, we analyze the improved algorithm and discover that it still possesses security vulnerabilities, rendering it susceptible to chosen-plaintext attack. By constructing three categories of special plaintexts, one can decipher the equivalent permutation and diffusion. Theoretical analysis and experimental results provide strong evidence for the effectiveness of our analysis in this paper. |
| ArticleNumber | 114623 |
| Author | Yu, Simin Zhou, Rong |
| Author_xml | – sequence: 1 givenname: Rong orcidid: 0000-0001-7594-6309 surname: Zhou fullname: Zhou, Rong email: hsj123@126.com – sequence: 2 givenname: Simin surname: Yu fullname: Yu, Simin email: siminyu@163.com |
| BookMark | eNqFkMtOwzAQRS1UJNrCF7DJDyT40fixYAEVBaRKbGBtTRy7dUmdyrYQ_XsSyooFrEYzmjOae2ZoEvpgEbomuCKY8JtdZbbQp4piuqgIWXDKztCUSMFKKqWYoClWHJdYCHWBZintMMYEczpFq_to4b2AUNiwhWBsWxw68CHbz1xG20EeJuPx7E3h97Cxw6KJx0P2fSig2_TR5-3-Ep076JK9-qlz9LZ6eF0-leuXx-fl3bo0DLNcOtU4QmsnuKHgMDOcNTWXrOFglCRDb2vBBIBUREHLqKwXwJtGmlYy2jg2R-p018Q-pWidNj7D-EuO4DtNsB6F6J3-FqJHIfokZGDZL_YQh0Tx-A91e6LsEOvD26iT8XYU5aM1Wbe9_5P_AhW_fgk |
| CitedBy_id | crossref_primary_10_1016_j_chaos_2024_115582 crossref_primary_10_1016_j_chaos_2024_115332 crossref_primary_10_1016_j_chaos_2024_115521 crossref_primary_10_3390_electronics13132647 crossref_primary_10_1142_S0218127425501421 crossref_primary_10_1109_TCSVT_2025_3543824 crossref_primary_10_1007_s11071_024_10053_8 crossref_primary_10_3390_e27010040 crossref_primary_10_1007_s11071_025_11582_6 |
| Cites_doi | 10.1016/j.matcom.2021.06.008 10.3390/e23020202 10.1016/j.chaos.2003.12.022 10.1007/s11554-021-01091-1 10.1103/PhysRevResearch.3.L042040 10.1142/S021812749800098X 10.1007/s11071-013-1070-x 10.1002/j.1538-7305.1949.tb00928.x 10.1016/j.optlastec.2013.05.023 10.1016/j.physa.2008.02.020 10.1109/ACCESS.2019.2938181 10.1016/j.sigpro.2010.09.014 10.1016/j.asoc.2015.08.008 10.1007/s12652-019-01500-1 10.1016/j.future.2022.01.017 10.1007/s11071-018-4426-4 10.1103/PhysRevE.83.011919 10.1016/j.optlaseng.2020.106297 10.1016/j.inffus.2020.10.008 10.1109/ACCESS.2019.2916402 10.1016/j.sigpro.2018.06.008 10.3390/e22030274 10.1142/S0218127419501037 10.1007/s11071-016-3311-2 10.1103/PhysRevLett.88.174102 10.1016/j.sigpro.2017.10.004 10.1007/s11554-019-00940-4 10.1016/j.sigpro.2019.107286 10.1007/s11071-015-2057-6 10.3390/math10203878 |
| ContentType | Journal Article |
| Copyright | 2024 Elsevier Ltd |
| Copyright_xml | – notice: 2024 Elsevier Ltd |
| DBID | AAYXX CITATION |
| DOI | 10.1016/j.chaos.2024.114623 |
| DatabaseName | CrossRef |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Sciences (General) Mathematics |
| EISSN | 1873-2887 |
| ExternalDocumentID | 10_1016_j_chaos_2024_114623 S0960077924001747 |
| GroupedDBID | --K --M -~X .~1 0R~ 1B1 1RT 1~. 1~5 29B 4.4 457 4G. 5GY 5VS 7-5 71M 8P~ 9JN AABNK AACTN AAEDT AAEDW AAIKJ AAKOC AALRI AAOAW AAQFI AAQXK AAXUO ABMAC ABNEU ABTAH ABXDB ACDAQ ACFVG ACGFS ACNNM ACRLP ADBBV ADEZE ADMUD AEBSH AEKER AENEX AFFNX AFKWA AFTJW AGHFR AGUBO AGYEJ AHHHB AIEXJ AIKHN AITUG AIVDX AJOXV AKRWK ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ ASPBG AVWKF AXJTR AZFZN BBWZM BKOJK BLXMC CS3 DU5 EBS EFJIC EJD EO8 EO9 EP2 EP3 F5P FDB FEDTE FGOYB FIRID FNPLU FYGXN G-Q GBLVA HLZ HMV HVGLF HZ~ IHE J1W KOM LG9 M38 M41 MO0 N9A NDZJH O-L O9- OAUVE OGIMB OZT P-8 P-9 P2P PC. Q38 R2- RIG RNS ROL RPZ SBC SDF SDG SDP SES SEW SPC SPCBC SPD SPG SSQ SSZ T5K WUQ XPP ZY4 ~G- 9DU AATTM AAXKI AAYWO AAYXX ABJNI ABWVN ACLOT ACRPL ACVFH ADCNI ADNMO AEIPS AEUPX AFJKZ AFPUW AGQPQ AIGII AIIUN AKBMS AKYEP ANKPU APXCP CITATION EFKBS EFLBG ~HD |
| ID | FETCH-LOGICAL-c303t-f9bf125f76c2af03c63b5683b6ac9813c6e5737aa8919ad32854a6bb8cd832bf3 |
| ISICitedReferencesCount | 10 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001206726000001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 0960-0779 |
| IngestDate | Sat Nov 29 03:19:18 EST 2025 Tue Nov 18 20:05:55 EST 2025 Sat Aug 10 15:32:01 EDT 2024 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Keywords | Chaos Image encryption Algorithm enhancement Plaintext correlation Security analysis |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-c303t-f9bf125f76c2af03c63b5683b6ac9813c6e5737aa8919ad32854a6bb8cd832bf3 |
| ORCID | 0000-0001-7594-6309 |
| ParticipantIDs | crossref_citationtrail_10_1016_j_chaos_2024_114623 crossref_primary_10_1016_j_chaos_2024_114623 elsevier_sciencedirect_doi_10_1016_j_chaos_2024_114623 |
| PublicationCentury | 2000 |
| PublicationDate | April 2024 2024-04-00 |
| PublicationDateYYYYMMDD | 2024-04-01 |
| PublicationDate_xml | – month: 04 year: 2024 text: April 2024 |
| PublicationDecade | 2020 |
| PublicationTitle | Chaos, solitons and fractals |
| PublicationYear | 2024 |
| Publisher | Elsevier Ltd |
| Publisher_xml | – name: Elsevier Ltd |
| References | Palit, Garain (b34) 2006 Li, Peng, Li, Zhu (b35) 2018 Xu, Tian (b12) 2019 Mondal, Behera, Gangopadhyay (b13) 2021 Fridrich (b4) 1998 Tian, Wang, Zhang, Sun (b32) 2021 Wu, Kan, Kurths (b9) 2015 Li, Zhang, Xie (b17) 2019 Masood, Ahmad, Shah, Jamal, Hussain (b11) 2020 Lone, Singh, Stoffová, Mishra, Mir, Kumar (b28) 2022 Huang, Liu, Liao, Dong (b25) 2021 Hu, Xiao, Wang, Li (b19) 2017 Chen, Tang, Ye (b23) 2020; 167 Chen, Mao, Chui (b29) 2004 Li, Ma, Zhang (b1) 2021 Liu, Zhang, Chen (b36) 2019 Mohanarathinam, Kamalraj, Prasanna Venkatesan, Ravi, Manikandababu (b2) 2020 Shannon CE. Communication Theory of Secrecy Systems. Bell Syst Tech J 656–715. Bandt, Pompe (b30) 2002 Martini, Kranz, Wagner, Lehnertz (b33) 2011; 83 Panwar, Purwar, Jain (b22) 2019 Li, Wang, Yue, Liu (b26) 2021 . Wu, Liao, Yang (b8) 2018 Sajitha, Shobha Rekh (b16) 2022 Li, Xu, Luo, Fan (b21) 2019 Munir, Khan, Jamal, Hazzazi, Hussain (b24) 2021 Wang, Wang (b38) 2008 Chen, Zhu, Fu, Zhang, Zhang (b7) 2015 Dawahdeh, Yaakob, Razif bin Othman (b15) 2018 Hua, Yi, Zhou (b10) 2018 Liu, Guo, Sheridan (b31) 2014; 57 Deepa, Pham, Nguyen, Bhattacharya, Prabadevi, Gadekallu, Maddikunta, Fang, Pathirana (b3) 2022 Wang, Xu (b6) 2014 Wang, Wei (b27) 2022 Li, Lo (b37) 2011 Liu, Shan, Zhong, Yu, Liu (b14) 2020 Wang, Xu (b39) 2014 Zhu, Xu, Hu, Sun (b18) 2015 Chen, Chen, Zhou (b20) 2020 Hu (10.1016/j.chaos.2024.114623_b19) 2017 Hua (10.1016/j.chaos.2024.114623_b10) 2018 Liu (10.1016/j.chaos.2024.114623_b31) 2014; 57 Li (10.1016/j.chaos.2024.114623_b35) 2018 Li (10.1016/j.chaos.2024.114623_b17) 2019 Li (10.1016/j.chaos.2024.114623_b26) 2021 10.1016/j.chaos.2024.114623_b5 Wang (10.1016/j.chaos.2024.114623_b39) 2014 Li (10.1016/j.chaos.2024.114623_b1) 2021 Sajitha (10.1016/j.chaos.2024.114623_b16) 2022 Dawahdeh (10.1016/j.chaos.2024.114623_b15) 2018 Xu (10.1016/j.chaos.2024.114623_b12) 2019 Chen (10.1016/j.chaos.2024.114623_b20) 2020 Wang (10.1016/j.chaos.2024.114623_b38) 2008 Palit (10.1016/j.chaos.2024.114623_b34) 2006 Wu (10.1016/j.chaos.2024.114623_b9) 2015 Zhu (10.1016/j.chaos.2024.114623_b18) 2015 Martini (10.1016/j.chaos.2024.114623_b33) 2011; 83 Panwar (10.1016/j.chaos.2024.114623_b22) 2019 Munir (10.1016/j.chaos.2024.114623_b24) 2021 Li (10.1016/j.chaos.2024.114623_b21) 2019 Wang (10.1016/j.chaos.2024.114623_b6) 2014 Huang (10.1016/j.chaos.2024.114623_b25) 2021 Fridrich (10.1016/j.chaos.2024.114623_b4) 1998 Chen (10.1016/j.chaos.2024.114623_b7) 2015 Masood (10.1016/j.chaos.2024.114623_b11) 2020 Mohanarathinam (10.1016/j.chaos.2024.114623_b2) 2020 Wang (10.1016/j.chaos.2024.114623_b27) 2022 Bandt (10.1016/j.chaos.2024.114623_b30) 2002 Liu (10.1016/j.chaos.2024.114623_b36) 2019 Chen (10.1016/j.chaos.2024.114623_b23) 2020; 167 Tian (10.1016/j.chaos.2024.114623_b32) 2021 Liu (10.1016/j.chaos.2024.114623_b14) 2020 Lone (10.1016/j.chaos.2024.114623_b28) 2022 Chen (10.1016/j.chaos.2024.114623_b29) 2004 Mondal (10.1016/j.chaos.2024.114623_b13) 2021 Deepa (10.1016/j.chaos.2024.114623_b3) 2022 Li (10.1016/j.chaos.2024.114623_b37) 2011 Wu (10.1016/j.chaos.2024.114623_b8) 2018 |
| References_xml | – volume: 167 year: 2020 ident: b23 article-title: Cryptanalysis and improvement of medical image encryption using high-speed scrambling and pixel adaptive diffusion publication-title: Signal Process – start-page: 274 year: 2020 ident: b11 article-title: A novel hybrid secure image encryption based on julia set of fractals and 3D lorenz chaotic map publication-title: Entropy – start-page: 1 year: 2019 end-page: 14 ident: b12 article-title: A novel image cipher based on 3D bit matrix and latin cubes publication-title: Inform Sci – start-page: 1 year: 2021 end-page: 18 ident: b13 article-title: A secure image encryption scheme based on a novel 2D sine–cosine cross-chaotic (SC3) map publication-title: J Real-Time Image Process – start-page: 529 year: 2022 end-page: 534 ident: b16 article-title: Review on various image encryption schemes publication-title: Mater Today: Proc – start-page: 1305 year: 2017 end-page: 1316 ident: b19 article-title: Cryptanalysis of a chaotic image cipher using latin square-based confusion and diffusion publication-title: Nonlinear Dynam – start-page: 3878 year: 2022 ident: b28 article-title: Cryptanalysis and improved image encryption scheme using elliptic curve and affine hill cipher publication-title: Mathematics – start-page: 134 year: 2018 end-page: 144 ident: b10 article-title: Medical image encryption using high-speed scrambling and pixel adaptive diffusion publication-title: Signal Process – year: 2002 ident: b30 article-title: Permutation entropy: A natural complexity measure for time series publication-title: Phys Rev Lett – volume: 83 year: 2011 ident: b33 article-title: Inferring directional interactions from transient signals with symbolic transfer entropy publication-title: Phys Rev E – start-page: 94 year: 2021 end-page: 115 ident: b1 article-title: Image retrieval from remote sensing big data: A survey publication-title: Inf Fusion – start-page: 24 year: 2015 end-page: 39 ident: b9 article-title: A new color image encryption scheme based on DNA sequences and multiple improved 1D chaotic maps publication-title: Appl Soft Comput – start-page: 202 year: 2021 ident: b25 article-title: On the cryptanalysis of a latin cubes-based image cryptosystem publication-title: Entropy – start-page: 130 year: 2020 end-page: 141 ident: b20 article-title: Cryptanalysis of a DNA-based image encryption scheme publication-title: Inform Sci – start-page: 949 year: 2011 end-page: 954 ident: b37 article-title: Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks publication-title: Signal Process – year: 2019 ident: b22 article-title: Cryptanalysis and improvement of a color image encryption scheme based on DNA sequences and multiple 1D chaotic maps publication-title: Int J Bifurcation Chaos – year: 2021 ident: b32 article-title: Fourier-domain transfer entropy spectrum publication-title: Phys Rev Res – start-page: 209 year: 2022 end-page: 226 ident: b3 article-title: A survey on blockchain for big data: Approaches, opportunities, and future directions publication-title: Future Gener Comput Syst – year: 2022 ident: b27 article-title: Cryptanalysis of compressive interference-based optical encryption using a U-net deep learning network publication-title: Opt Commun – start-page: 1151 year: 2015 end-page: 1166 ident: b7 article-title: An efficient image encryption scheme using lookup table-based confusion and diffusion publication-title: Nonlinear Dynam – start-page: 1259 year: 1998 end-page: 1284 ident: b4 article-title: Symmetric ciphers based on two-dimensional chaotic maps publication-title: Int J Bifurcation Chaos – year: 2019 ident: b17 article-title: When an attacker meets a cipher-image in 2018: A year in review publication-title: J Inf Secur Appl – start-page: 345 year: 2014 end-page: 353 ident: b39 article-title: A novel image encryption scheme based on Brownian motion and PWLCM chaotic system publication-title: Nonlinear Dynam – start-page: 3751 year: 2008 end-page: 3758 ident: b38 article-title: A hyperchaos generated from lorenz system publication-title: Physica A – start-page: 126450 year: 2019 end-page: 126463 ident: b36 article-title: Cryptanalysis and improvement in a plaintext-related image encryption scheme based on hyper chaos publication-title: IEEE Access – start-page: 826 year: 2021 end-page: 836 ident: b24 article-title: Cryptanalysis of hybrid secure image encryption based on julia set fractals and three-dimensional lorenz chaotic map publication-title: Math Comput Simulation – start-page: 2135 year: 2021 end-page: 2149 ident: b26 article-title: Cryptanalysis of a secure image encryption scheme based on a novel 2D sine–cosine cross-chaotic map publication-title: J Real-Time Image Process – start-page: 749 year: 2004 end-page: 761 ident: b29 article-title: A symmetric image encryption scheme based on 3D chaotic cat maps publication-title: Chaos Solitons Fractals – year: 2020 ident: b14 article-title: Compressive interference-based image encryption via sparsity constraints publication-title: Opt Lasers Eng – reference: . – start-page: 11 year: 2018 end-page: 23 ident: b8 article-title: Image encryption using 2D Hénon-Sine map and DNA approach publication-title: Signal Process – reference: Shannon CE. Communication Theory of Secrecy Systems. Bell Syst Tech J 656–715. – start-page: 63336 year: 2019 end-page: 63345 ident: b21 article-title: Cryptanalysis of an image encryption using 2D Henon-Sine map and DNA approach publication-title: IEEE Access – start-page: 349 year: 2018 end-page: 355 ident: b15 article-title: A new image encryption technique combining elliptic curve cryptosystem with hill cipher publication-title: J King Saud Univ Comput Inf Sci – year: 2006 ident: b34 article-title: A novel technique for the watermarking of symbolically compressed documents publication-title: Second international conference on document image analysis for libraries – start-page: 3221 year: 2020 end-page: 3229 ident: b2 article-title: Digital watermarking techniques for image security: a review publication-title: J Ambient Intell Humaniz Comput – volume: 57 start-page: 327 year: 2014 end-page: 342 ident: b31 article-title: A review of optical image encryption techniques publication-title: Opt Laser Technol – start-page: 345 year: 2014 end-page: 353 ident: b6 article-title: A novel image encryption scheme based on Brownian motion and PWLCM chaotic system publication-title: Nonlinear Dynam – start-page: 1511 year: 2015 end-page: 1518 ident: b18 article-title: Breaking a novel image encryption scheme based on Brownian motion and PWLCM chaotic system publication-title: Nonlinear Dynam – start-page: 1319 year: 2018 end-page: 1333 ident: b35 article-title: A novel plaintext-related image encryption scheme using hyper-chaotic system publication-title: Nonlinear Dynam – start-page: 826 year: 2021 ident: 10.1016/j.chaos.2024.114623_b24 article-title: Cryptanalysis of hybrid secure image encryption based on julia set fractals and three-dimensional lorenz chaotic map publication-title: Math Comput Simulation doi: 10.1016/j.matcom.2021.06.008 – start-page: 1 year: 2019 ident: 10.1016/j.chaos.2024.114623_b12 article-title: A novel image cipher based on 3D bit matrix and latin cubes publication-title: Inform Sci – year: 2006 ident: 10.1016/j.chaos.2024.114623_b34 article-title: A novel technique for the watermarking of symbolically compressed documents – start-page: 1511 year: 2015 ident: 10.1016/j.chaos.2024.114623_b18 article-title: Breaking a novel image encryption scheme based on Brownian motion and PWLCM chaotic system publication-title: Nonlinear Dynam – year: 2019 ident: 10.1016/j.chaos.2024.114623_b17 article-title: When an attacker meets a cipher-image in 2018: A year in review publication-title: J Inf Secur Appl – start-page: 202 year: 2021 ident: 10.1016/j.chaos.2024.114623_b25 article-title: On the cryptanalysis of a latin cubes-based image cryptosystem publication-title: Entropy doi: 10.3390/e23020202 – year: 2022 ident: 10.1016/j.chaos.2024.114623_b27 article-title: Cryptanalysis of compressive interference-based optical encryption using a U-net deep learning network publication-title: Opt Commun – start-page: 749 year: 2004 ident: 10.1016/j.chaos.2024.114623_b29 article-title: A symmetric image encryption scheme based on 3D chaotic cat maps publication-title: Chaos Solitons Fractals doi: 10.1016/j.chaos.2003.12.022 – start-page: 2135 year: 2021 ident: 10.1016/j.chaos.2024.114623_b26 article-title: Cryptanalysis of a secure image encryption scheme based on a novel 2D sine–cosine cross-chaotic map publication-title: J Real-Time Image Process doi: 10.1007/s11554-021-01091-1 – year: 2021 ident: 10.1016/j.chaos.2024.114623_b32 article-title: Fourier-domain transfer entropy spectrum publication-title: Phys Rev Res doi: 10.1103/PhysRevResearch.3.L042040 – start-page: 1259 year: 1998 ident: 10.1016/j.chaos.2024.114623_b4 article-title: Symmetric ciphers based on two-dimensional chaotic maps publication-title: Int J Bifurcation Chaos doi: 10.1142/S021812749800098X – start-page: 130 year: 2020 ident: 10.1016/j.chaos.2024.114623_b20 article-title: Cryptanalysis of a DNA-based image encryption scheme publication-title: Inform Sci – start-page: 345 year: 2014 ident: 10.1016/j.chaos.2024.114623_b39 article-title: A novel image encryption scheme based on Brownian motion and PWLCM chaotic system publication-title: Nonlinear Dynam doi: 10.1007/s11071-013-1070-x – ident: 10.1016/j.chaos.2024.114623_b5 doi: 10.1002/j.1538-7305.1949.tb00928.x – volume: 57 start-page: 327 year: 2014 ident: 10.1016/j.chaos.2024.114623_b31 article-title: A review of optical image encryption techniques publication-title: Opt Laser Technol doi: 10.1016/j.optlastec.2013.05.023 – start-page: 3751 year: 2008 ident: 10.1016/j.chaos.2024.114623_b38 article-title: A hyperchaos generated from lorenz system publication-title: Physica A doi: 10.1016/j.physa.2008.02.020 – start-page: 126450 year: 2019 ident: 10.1016/j.chaos.2024.114623_b36 article-title: Cryptanalysis and improvement in a plaintext-related image encryption scheme based on hyper chaos publication-title: IEEE Access doi: 10.1109/ACCESS.2019.2938181 – start-page: 949 year: 2011 ident: 10.1016/j.chaos.2024.114623_b37 article-title: Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks publication-title: Signal Process doi: 10.1016/j.sigpro.2010.09.014 – start-page: 24 year: 2015 ident: 10.1016/j.chaos.2024.114623_b9 article-title: A new color image encryption scheme based on DNA sequences and multiple improved 1D chaotic maps publication-title: Appl Soft Comput doi: 10.1016/j.asoc.2015.08.008 – start-page: 3221 year: 2020 ident: 10.1016/j.chaos.2024.114623_b2 article-title: Digital watermarking techniques for image security: a review publication-title: J Ambient Intell Humaniz Comput doi: 10.1007/s12652-019-01500-1 – start-page: 209 year: 2022 ident: 10.1016/j.chaos.2024.114623_b3 article-title: A survey on blockchain for big data: Approaches, opportunities, and future directions publication-title: Future Gener Comput Syst doi: 10.1016/j.future.2022.01.017 – start-page: 1319 year: 2018 ident: 10.1016/j.chaos.2024.114623_b35 article-title: A novel plaintext-related image encryption scheme using hyper-chaotic system publication-title: Nonlinear Dynam doi: 10.1007/s11071-018-4426-4 – start-page: 345 year: 2014 ident: 10.1016/j.chaos.2024.114623_b6 article-title: A novel image encryption scheme based on Brownian motion and PWLCM chaotic system publication-title: Nonlinear Dynam doi: 10.1007/s11071-013-1070-x – volume: 83 issue: 1 year: 2011 ident: 10.1016/j.chaos.2024.114623_b33 article-title: Inferring directional interactions from transient signals with symbolic transfer entropy publication-title: Phys Rev E doi: 10.1103/PhysRevE.83.011919 – year: 2020 ident: 10.1016/j.chaos.2024.114623_b14 article-title: Compressive interference-based image encryption via sparsity constraints publication-title: Opt Lasers Eng doi: 10.1016/j.optlaseng.2020.106297 – start-page: 349 year: 2018 ident: 10.1016/j.chaos.2024.114623_b15 article-title: A new image encryption technique combining elliptic curve cryptosystem with hill cipher publication-title: J King Saud Univ Comput Inf Sci – start-page: 94 year: 2021 ident: 10.1016/j.chaos.2024.114623_b1 article-title: Image retrieval from remote sensing big data: A survey publication-title: Inf Fusion doi: 10.1016/j.inffus.2020.10.008 – start-page: 63336 year: 2019 ident: 10.1016/j.chaos.2024.114623_b21 article-title: Cryptanalysis of an image encryption using 2D Henon-Sine map and DNA approach publication-title: IEEE Access doi: 10.1109/ACCESS.2019.2916402 – start-page: 11 year: 2018 ident: 10.1016/j.chaos.2024.114623_b8 article-title: Image encryption using 2D Hénon-Sine map and DNA approach publication-title: Signal Process doi: 10.1016/j.sigpro.2018.06.008 – start-page: 529 year: 2022 ident: 10.1016/j.chaos.2024.114623_b16 article-title: Review on various image encryption schemes publication-title: Mater Today: Proc – start-page: 274 year: 2020 ident: 10.1016/j.chaos.2024.114623_b11 article-title: A novel hybrid secure image encryption based on julia set of fractals and 3D lorenz chaotic map publication-title: Entropy doi: 10.3390/e22030274 – year: 2019 ident: 10.1016/j.chaos.2024.114623_b22 article-title: Cryptanalysis and improvement of a color image encryption scheme based on DNA sequences and multiple 1D chaotic maps publication-title: Int J Bifurcation Chaos doi: 10.1142/S0218127419501037 – start-page: 1305 year: 2017 ident: 10.1016/j.chaos.2024.114623_b19 article-title: Cryptanalysis of a chaotic image cipher using latin square-based confusion and diffusion publication-title: Nonlinear Dynam doi: 10.1007/s11071-016-3311-2 – year: 2002 ident: 10.1016/j.chaos.2024.114623_b30 article-title: Permutation entropy: A natural complexity measure for time series publication-title: Phys Rev Lett doi: 10.1103/PhysRevLett.88.174102 – start-page: 134 year: 2018 ident: 10.1016/j.chaos.2024.114623_b10 article-title: Medical image encryption using high-speed scrambling and pixel adaptive diffusion publication-title: Signal Process doi: 10.1016/j.sigpro.2017.10.004 – start-page: 1 year: 2021 ident: 10.1016/j.chaos.2024.114623_b13 article-title: A secure image encryption scheme based on a novel 2D sine–cosine cross-chaotic (SC3) map publication-title: J Real-Time Image Process doi: 10.1007/s11554-019-00940-4 – volume: 167 issn: 0165-1684 year: 2020 ident: 10.1016/j.chaos.2024.114623_b23 article-title: Cryptanalysis and improvement of medical image encryption using high-speed scrambling and pixel adaptive diffusion publication-title: Signal Process doi: 10.1016/j.sigpro.2019.107286 – start-page: 1151 year: 2015 ident: 10.1016/j.chaos.2024.114623_b7 article-title: An efficient image encryption scheme using lookup table-based confusion and diffusion publication-title: Nonlinear Dynam doi: 10.1007/s11071-015-2057-6 – start-page: 3878 year: 2022 ident: 10.1016/j.chaos.2024.114623_b28 article-title: Cryptanalysis and improved image encryption scheme using elliptic curve and affine hill cipher publication-title: Mathematics doi: 10.3390/math10203878 |
| SSID | ssj0001062 |
| Score | 2.4768274 |
| Snippet | This paper presents a comprehensive security analysis on an improved chaos-based image encryption algorithm. The initial algorithm, proposed by Li et al.,... |
| SourceID | crossref elsevier |
| SourceType | Enrichment Source Index Database Publisher |
| StartPage | 114623 |
| SubjectTerms | Algorithm enhancement Chaos Image encryption Plaintext correlation Security analysis |
| Title | Break an enhanced plaintext-related chaotic image encryption algorithm |
| URI | https://dx.doi.org/10.1016/j.chaos.2024.114623 |
| Volume | 181 |
| WOSCitedRecordID | wos001206726000001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVESC databaseName: Elsevier SD Freedom Collection Journals 2021 customDbUrl: eissn: 1873-2887 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0001062 issn: 0960-0779 databaseCode: AIEXJ dateStart: 19950101 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3Nb9MwFLdg4wCHiQ0Q2wD5wAEEmZq49cdxTJsAiQmJIVVcItuxaUeXVk03bf_93rOdtGLTBEhcosaK4_T9nOefX94HIa-NsVJrmLy6qFzWz73IlAVlaCvDHZfSKd0LxSbE8bEcDtXXVEquCeUERF3Ly0s1-69QQxuAjaGzfwF3d1NogN8AOhwBdjj-EfAfgAb-egevratH8fP-bKIxKwRscUPkCrTYkZ5iptbxGbrswNPPr6Lq0JOf0_l4MTpbJa0HcHWAu0FnOfStQWu7x_gqPek4-Y_R9Dz6aqfFMJT7CtZVrBy2al4oVr1Sgs2rjXtZOhkF4yHvZT0Ry8Dsuag6pWBZIdPy2enW_FY9HU0Gp3v4dzFpetEPSYtj6PFvCbC_4Wg4GLq7wgZK3CfrhRgoUMPr-58Oh5-7lRe2t-GrUft0bZap4M93Y6jbmcgKuzh5TDbStoDuRzg3yT1Xb5FHX7qcus0W2UxquKFvUq7wt0_IUUCb6pq2aNMbaNOENg1o0yXatEP7Kfl-dHhy8DFLpTEyC5xjkXllPFBTL7gttO8xy5kZcMkM11bJHM7dQDABb6HKla4Yxslqboy0Fahw49kzslZPa_ecUOELxnwuKg_sFPopJRQGkfKB9bpv_TYpWjGVNuWNx_Ilk7J1EDwtg2xLlG0ZZbtN3nedZjFtyt2X81b-ZWJ-kdGVMGHu6rjzrx13ycPlbH9B1hbzc_eSPLAXi3Ezf5Um1jXsq33o |
| linkProvider | Elsevier |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Break+an+enhanced+plaintext-related+chaotic+image+encryption+algorithm&rft.jtitle=Chaos%2C+solitons+and+fractals&rft.au=Zhou%2C+Rong&rft.au=Yu%2C+Simin&rft.date=2024-04-01&rft.pub=Elsevier+Ltd&rft.issn=0960-0779&rft.eissn=1873-2887&rft.volume=181&rft_id=info:doi/10.1016%2Fj.chaos.2024.114623&rft.externalDocID=S0960077924001747 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0960-0779&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0960-0779&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0960-0779&client=summon |