Cracking a hierarchical chaotic image encryption algorithm based on permutation
In year 2000, an efficient hierarchical chaotic image encryption (HCIE) algorithm was proposed, which divides a plain-image of size M×N with T possible value levels into K blocks of the same size and then operates position permutation on two levels: intra-block and inter-block. As a typical position...
Uloženo v:
| Vydáno v: | Signal processing Ročník 118; s. 203 - 210 |
|---|---|
| Hlavní autor: | |
| Médium: | Journal Article |
| Jazyk: | angličtina |
| Vydáno: |
Elsevier B.V
01.01.2016
|
| Témata: | |
| ISSN: | 0165-1684, 1872-7557 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | In year 2000, an efficient hierarchical chaotic image encryption (HCIE) algorithm was proposed, which divides a plain-image of size M×N with T possible value levels into K blocks of the same size and then operates position permutation on two levels: intra-block and inter-block. As a typical position permutation-only encryption algorithm, it has received intensive attention. The present paper analyzes specific security performance of HCIE against ciphertext-only attack and known/chosen-plaintext attack. It is found that onlyO(⌈logT(M·N/K)⌉)known/chosen plain-images are sufficient to achieve a good performance, and the computational complexity isO(M·N·⌈logT(M·N/K)⌉), which effectively demonstrates that hierarchical permutation-only image encryption algorithms are less secure than normal (i.e., non-hierarchical) ones. Detailed experiment results are given to verify the feasibility of the known-plaintext attack. In addition, it is pointed out that the security of HCIE against ciphertext-only attack was much overestimated.
•Security performance of an encryption algorithm called HCIE is analyzed in detail.•Hierarchical permutation-only encryption schemes are less secure than normal ones.•Security of HCIE against ciphertext-only attack was reported being overestimated. |
|---|---|
| AbstractList | In year 2000, an efficient hierarchical chaotic image encryption (HCIE) algorithm was proposed, which divides a plain-image of size M×N with T possible value levels into K blocks of the same size and then operates position permutation on two levels: intra-block and inter-block. As a typical position permutation-only encryption algorithm, it has received intensive attention. The present paper analyzes specific security performance of HCIE against ciphertext-only attack and known/chosen-plaintext attack. It is found that onlyO(⌈logT(M·N/K)⌉)known/chosen plain-images are sufficient to achieve a good performance, and the computational complexity isO(M·N·⌈logT(M·N/K)⌉), which effectively demonstrates that hierarchical permutation-only image encryption algorithms are less secure than normal (i.e., non-hierarchical) ones. Detailed experiment results are given to verify the feasibility of the known-plaintext attack. In addition, it is pointed out that the security of HCIE against ciphertext-only attack was much overestimated.
•Security performance of an encryption algorithm called HCIE is analyzed in detail.•Hierarchical permutation-only encryption schemes are less secure than normal ones.•Security of HCIE against ciphertext-only attack was reported being overestimated. |
| Author | Li, Chengqing |
| Author_xml | – sequence: 1 givenname: Chengqing orcidid: 0000-0002-5385-7644 surname: Li fullname: Li, Chengqing email: DrChengqingLi@gmail.com organization: MOE (Ministry of Education) Key Laboratory of Intelligent Computing and Information Processing, College of Information Engineering, Xiangtan University, Xiangtan 411105, Hunan, China |
| BookMark | eNqFkM1OwzAQhC0EEm3hDTj4BRLWcfxTDkio4k-q1AucLcdxEpc0iWyD1LfHVThxgNNKuzujmW-JzodxsAjdEMgJEH67z4NrJz_mBRCWg8gB5BlaECmKTDAmztEivbGMcFleomUIewAglMMC7TZemw83tFjjzlmvvemc0T02nR6jM9gddGuxHYw_TtGNA9Z9O3oXuwOudLA1TqvJ-sNn1KfzFbpodB_s9c9cofenx7fNS7bdPb9uHraZocBjJqCsuWlkvZairBi1hFBbSV7yqoa1aAoGUBU2Bdacmko2ZG2KhpeCMKBEarpCd7Ov8WMI3jbKuDlB9Nr1ioA6oVF7NaNRJzQKhEpokrj8JZ586umP_8nuZ5lNxb4SLBWMS2Rs7bw1UdWj-9vgG1Uegxo |
| CitedBy_id | crossref_primary_10_1007_s13369_018_3355_3 crossref_primary_10_1007_s11042_018_6461_z crossref_primary_10_1088_1674_1056_25_5_054201 crossref_primary_10_1016_j_sigpro_2017_12_021 crossref_primary_10_1007_s11071_016_3108_3 crossref_primary_10_3390_e21030246 crossref_primary_10_3390_s22020461 crossref_primary_10_1016_j_neucom_2017_12_048 crossref_primary_10_1007_s00500_023_09333_z crossref_primary_10_1109_TCE_2024_3481260 crossref_primary_10_1109_ACCESS_2019_2956389 crossref_primary_10_1016_j_chaos_2020_110225 crossref_primary_10_1007_s11042_021_10526_7 crossref_primary_10_1007_s11042_018_5675_4 crossref_primary_10_1155_2018_8402578 crossref_primary_10_1016_j_comnet_2020_107751 crossref_primary_10_1016_j_jfranklin_2023_10_010 crossref_primary_10_1016_j_jksuci_2018_02_002 crossref_primary_10_3390_e18080276 crossref_primary_10_1007_s11042_021_10522_x crossref_primary_10_1016_j_ins_2017_02_036 crossref_primary_10_1007_s11071_016_3094_5 crossref_primary_10_1016_j_sigpro_2017_10_004 crossref_primary_10_1016_j_ins_2018_03_055 crossref_primary_10_1007_s12652_019_01493_x crossref_primary_10_1007_s13319_017_0137_8 crossref_primary_10_1016_j_jisa_2018_03_007 crossref_primary_10_1007_s11071_017_3828_z crossref_primary_10_1007_s11071_017_3715_7 crossref_primary_10_1007_s00521_018_3577_z crossref_primary_10_3390_e23050535 crossref_primary_10_1007_s11071_016_3311_2 crossref_primary_10_1109_TIP_2017_2738561 crossref_primary_10_1109_MMUL_2017_3051512 crossref_primary_10_1140_epjp_s13360_024_05415_5 crossref_primary_10_1007_s11128_018_2097_1 crossref_primary_10_1016_j_optlaseng_2019_05_027 crossref_primary_10_1007_s11042_016_3858_4 crossref_primary_10_1016_j_sigpro_2017_06_014 crossref_primary_10_1016_j_sigpro_2017_05_002 crossref_primary_10_1007_s00521_018_3642_7 crossref_primary_10_1016_j_image_2015_09_006 crossref_primary_10_1063_5_0214794 crossref_primary_10_1007_s11042_017_5461_8 crossref_primary_10_1016_j_eswa_2024_124287 crossref_primary_10_1016_j_sigpro_2018_03_010 crossref_primary_10_1109_ACCESS_2022_3226319 crossref_primary_10_1109_ACCESS_2019_2930606 crossref_primary_10_1007_s11071_018_4056_x crossref_primary_10_1109_ACCESS_2019_2958319 crossref_primary_10_1007_s00521_018_3541_y crossref_primary_10_1007_s11071_017_3698_4 crossref_primary_10_3390_e22010112 crossref_primary_10_1016_j_ijleo_2021_167526 crossref_primary_10_1002_admt_202301055 crossref_primary_10_1016_j_sigpro_2016_10_003 crossref_primary_10_1007_s11071_024_09646_0 crossref_primary_10_1016_j_sigpro_2016_10_002 crossref_primary_10_1007_s11045_020_00739_8 crossref_primary_10_1016_j_image_2016_12_007 crossref_primary_10_1007_s11042_022_11973_6 crossref_primary_10_1109_ACCESS_2020_3025241 crossref_primary_10_1186_s13640_018_0336_0 crossref_primary_10_1007_s11042_020_10440_4 crossref_primary_10_1016_j_ins_2016_02_041 crossref_primary_10_1016_j_optlastec_2017_04_022 crossref_primary_10_1016_j_sigpro_2016_03_021 crossref_primary_10_1016_j_ijleo_2020_164925 crossref_primary_10_1007_s11042_023_15445_3 crossref_primary_10_1007_s11071_019_04771_7 crossref_primary_10_1007_s11071_018_4332_9 crossref_primary_10_1016_j_aeue_2017_12_001 crossref_primary_10_1016_j_sigpro_2016_11_016 crossref_primary_10_1016_j_jisa_2020_102622 crossref_primary_10_1109_TCSI_2022_3213268 crossref_primary_10_1007_s11042_019_08337_y crossref_primary_10_1016_j_image_2018_01_002 crossref_primary_10_1007_s00521_017_2993_9 crossref_primary_10_1088_1402_4896_ac0d2e crossref_primary_10_1002_ett_4034 crossref_primary_10_1007_s11042_021_11802_2 crossref_primary_10_1016_j_future_2019_04_005 crossref_primary_10_1016_j_patrec_2021_10_033 crossref_primary_10_1007_s11831_018_9298_8 crossref_primary_10_1088_1674_1056_26_2_020504 crossref_primary_10_1007_s00500_025_10477_3 crossref_primary_10_1007_s11042_019_07894_6 crossref_primary_10_1007_s12204_020_2224_x crossref_primary_10_1002_cta_2300 crossref_primary_10_1088_1674_1056_26_10_100504 crossref_primary_10_1109_JSTSP_2017_2714838 crossref_primary_10_1109_TSC_2023_3258144 crossref_primary_10_1016_j_sigpro_2017_11_005 crossref_primary_10_1016_j_amc_2022_127738 crossref_primary_10_1016_j_optlastec_2016_06_012 crossref_primary_10_1007_s11042_020_08742_8 crossref_primary_10_1007_s11071_017_3874_6 crossref_primary_10_1007_s11071_017_3436_y crossref_primary_10_1016_j_sigpro_2018_09_029 crossref_primary_10_1038_s41598_021_93344_z crossref_primary_10_1016_j_cosrev_2023_100586 crossref_primary_10_3390_e20120974 crossref_primary_10_1016_j_jisa_2019_05_004 crossref_primary_10_1109_ACCESS_2021_3096224 crossref_primary_10_3390_e25081178 crossref_primary_10_1007_s11042_018_6346_1 crossref_primary_10_1016_j_jisa_2020_102566 crossref_primary_10_1109_TIFS_2018_2812080 crossref_primary_10_1016_j_image_2019_08_014 crossref_primary_10_1016_j_jisa_2020_102560 crossref_primary_10_1007_s12648_019_01512_9 crossref_primary_10_3390_e21111075 crossref_primary_10_1007_s11042_018_7144_5 crossref_primary_10_1155_2022_8338508 crossref_primary_10_1016_j_jisa_2019_102361 crossref_primary_10_1080_1206212X_2019_1632003 crossref_primary_10_1155_2019_6581586 crossref_primary_10_1016_j_jisa_2018_12_003 crossref_primary_10_1109_ACCESS_2018_2883690 crossref_primary_10_1016_j_procs_2019_01_048 crossref_primary_10_1007_s11042_020_10101_6 crossref_primary_10_1007_s11071_016_2933_8 crossref_primary_10_1016_j_optcom_2017_06_014 crossref_primary_10_1088_1742_6596_1486_3_032003 crossref_primary_10_1109_TCYB_2016_2642166 crossref_primary_10_1109_ACCESS_2020_2990170 crossref_primary_10_1007_s11071_017_3714_8 crossref_primary_10_1155_2022_2532497 crossref_primary_10_1007_s00500_024_10388_9 crossref_primary_10_1140_epjp_i2019_12797_4 crossref_primary_10_32604_cmc_2022_027655 crossref_primary_10_1007_s11071_017_3563_5 crossref_primary_10_1007_s11042_020_09672_1 crossref_primary_10_1007_s11042_022_12791_6 crossref_primary_10_1016_j_sigpro_2018_02_028 |
| Cites_doi | 10.1142/S0218127406015970 10.1145/2393347.2396392 10.1109/TCSVT.2011.2106250 10.1155/ASP.2005.1277 10.1049/ip-vis:20000208 10.1038/scientificamerican1286-46 10.1007/3-540-48184-2_35 10.1016/j.sigpro.2010.09.014 10.1016/j.jss.2010.02.039 10.1109/TMM.2003.808817 10.1016/j.chaos.2003.12.022 10.1109/TMM.2013.2291968 10.1016/S0167-8655(02)00157-5 10.1142/S0218127414500497 10.1109/TCSVT.2008.918116 10.1007/s11071-014-1533-8 10.1016/S0020-0190(96)00168-8 10.1016/j.sigpro.2014.03.015 10.1109/TPAMI.2007.1058 10.1016/j.jss.2007.07.037 |
| ContentType | Journal Article |
| Copyright | 2015 Elsevier B.V. |
| Copyright_xml | – notice: 2015 Elsevier B.V. |
| DBID | AAYXX CITATION |
| DOI | 10.1016/j.sigpro.2015.07.008 |
| DatabaseName | CrossRef |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 1872-7557 |
| EndPage | 210 |
| ExternalDocumentID | 10_1016_j_sigpro_2015_07_008 S0165168415002431 |
| GroupedDBID | --K --M -~X .DC .~1 0R~ 123 1B1 1~. 1~5 4.4 457 4G. 53G 5VS 7-5 71M 8P~ 9JN AABNK AACTN AAEDT AAEDW AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAQXK AAXUO AAYFN ABBOA ABFNM ABFRF ABMAC ABXDB ABYKQ ACDAQ ACGFO ACGFS ACNNM ACRLP ACZNC ADBBV ADEZE ADJOM ADMUD ADTZH AEBSH AECPX AEFWE AEKER AENEX AFKWA AFTJW AGHFR AGUBO AGYEJ AHHHB AHJVU AHZHX AIALX AIEXJ AIKHN AITUG AJBFU AJOXV ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOUOD ASPBG AVWKF AXJTR AZFZN BJAXD BKOJK BLXMC CS3 DU5 EBS EFJIC EFLBG EJD EO8 EO9 EP2 EP3 F0J F5P FDB FEDTE FGOYB FIRID FNPLU FYGXN G-Q G8K GBLVA GBOLZ HLZ HVGLF HZ~ IHE J1W JJJVA KOM LG9 M41 MO0 N9A O-L O9- OAUVE OZT P-8 P-9 P2P PC. Q38 R2- RIG ROL RPZ SBC SDF SDG SDP SES SEW SPC SPCBC SST SSV SSZ T5K TAE TN5 WUQ XPP ZMT ~02 ~G- 9DU AATTM AAXKI AAYWO AAYXX ABDPE ABJNI ABWVN ACLOT ACRPL ACVFH ADCNI ADNMO AEIPS AEUPX AFJKZ AFPUW AGQPQ AIGII AIIUN AKBMS AKRWK AKYEP ANKPU APXCP CITATION EFKBS ~HD |
| ID | FETCH-LOGICAL-c306t-704d6cf8d9874b53e113eb8646bd097f2500b2e168a63cb8f19c2f647150318a3 |
| ISICitedReferencesCount | 149 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000362156000018&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 0165-1684 |
| IngestDate | Sat Nov 29 03:22:49 EST 2025 Tue Nov 18 22:26:50 EST 2025 Fri Feb 23 02:33:59 EST 2024 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Keywords | Histogram Permutation Known-plaintext attack Chosen-plaintext attack Chaotic cryptanalysis |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-c306t-704d6cf8d9874b53e113eb8646bd097f2500b2e168a63cb8f19c2f647150318a3 |
| ORCID | 0000-0002-5385-7644 |
| PageCount | 8 |
| ParticipantIDs | crossref_citationtrail_10_1016_j_sigpro_2015_07_008 crossref_primary_10_1016_j_sigpro_2015_07_008 elsevier_sciencedirect_doi_10_1016_j_sigpro_2015_07_008 |
| PublicationCentury | 2000 |
| PublicationDate | 2016-01-01 |
| PublicationDateYYYYMMDD | 2016-01-01 |
| PublicationDate_xml | – month: 01 year: 2016 text: 2016-01-01 day: 01 |
| PublicationDecade | 2010 |
| PublicationTitle | Signal processing |
| PublicationYear | 2016 |
| Publisher | Elsevier B.V |
| Publisher_xml | – name: Elsevier B.V |
| References | Zeng, Lei (bib6) 2003; 5 June 2003. J.-I. Guo, J.-C. Yen, J.-C. Yeh, The design and realization of a new chaotic image encryption algorithm, in: Proceedings of 1999 International Symposium on Communications, 1999, pp. 210–214. Wu, Zhou, Agaian, Noonana (bib14) 2014; 102 Álvarez, Li (bib3) 2006; 16 J.-C. Yen, J.-I. Guo, Efficient hierarchical chaotic image encryption algorithm and its VLSI realisation, IEE Proc. – Vis. Image Signal Process. 147 (2) (2000) 167–175. Li, Lo (bib11) 2011; 91 C. Li, S. Li, G. Chen, G. Chen, L. Hu, Cryptanalysis of a new signal security system for multimedia data transmission, EURASIP J. Appl. Signal Process. 2005 (8) (2005) 1277–1288. Chang, Yu (bib8) 2002; 23 Li, Xie, Liu, Cheng (bib19) 2014; 78 Graham, Knuth, Patashnik (bib25) 1989 Y. Matias, A. Shamir, A video scrambling technique based on space filling curve (extended abstract), in: Advances in Cryptology — Crypto׳87, Lecture Notes in Computer Science, vol. 293, 1987, pp. 398–417. Li, Li, Lo, Chen (bib12) 2008; 18 W. Li, Y. Yan, N. Yu, Breaking row-column shuffle based image cipher, in: Proceedings of ACM International Conference on Multimedia, 2012, p. art. no. 6011939 Ling, Okada (bib23) 2007; 29 Li, Zheng, Zhang, Cheng (bib22) 2014; 16 Li, Li, Lo, Kyamakya (bib26) 2010; 83 Li, Li, Chen, Mou (bib21) 2008; 81 Jan, Tseng (bib7) 1996; 60 Crutchfield, Farmer, Packard, Shaw (bib4) 1986; 255 H. Zheng, S. Yu, J. Lu, Design and ARM platform-based realization of digital color image encryption and decryption via single state variable feedback control, Int. J. Bifurc. Chaos 24 (4) (2014) art. no. 1450049. . Devaney (bib18) 2003 Chen, Mao, Chui (bib2) 2004; 21 S. Li, Analyses and new designs of digital chaotic ciphers (Ph.D. Thesis), School of Electronic and Information Engineering, Xi׳an Jiaotong University, Xi׳an, China, Available online at Li, Li, Chen, Bourbakis, Lo (bib10) 2008; 23 Sohn, Neve, Ro (bib13) 2011; 21 R.E. Korf, Finding optimal solutions to Rubik׳s cube using pattern databases, in: Proceedings of AAAI-97, 1997, pp. 700–705 10.1016/j.sigpro.2015.07.008_bib5 Zeng (10.1016/j.sigpro.2015.07.008_bib6) 2003; 5 Li (10.1016/j.sigpro.2015.07.008_bib10) 2008; 23 10.1016/j.sigpro.2015.07.008_bib1 Li (10.1016/j.sigpro.2015.07.008_bib21) 2008; 81 Li (10.1016/j.sigpro.2015.07.008_bib19) 2014; 78 Sohn (10.1016/j.sigpro.2015.07.008_bib13) 2011; 21 Ling (10.1016/j.sigpro.2015.07.008_bib23) 2007; 29 10.1016/j.sigpro.2015.07.008_bib15 Devaney (10.1016/j.sigpro.2015.07.008_bib18) 2003 10.1016/j.sigpro.2015.07.008_bib16 10.1016/j.sigpro.2015.07.008_bib17 Graham (10.1016/j.sigpro.2015.07.008_bib25) 1989 Li (10.1016/j.sigpro.2015.07.008_bib26) 2010; 83 10.1016/j.sigpro.2015.07.008_bib9 Chen (10.1016/j.sigpro.2015.07.008_bib2) 2004; 21 Li (10.1016/j.sigpro.2015.07.008_bib12) 2008; 18 Chang (10.1016/j.sigpro.2015.07.008_bib8) 2002; 23 Jan (10.1016/j.sigpro.2015.07.008_bib7) 1996; 60 Li (10.1016/j.sigpro.2015.07.008_bib22) 2014; 16 Wu (10.1016/j.sigpro.2015.07.008_bib14) 2014; 102 10.1016/j.sigpro.2015.07.008_bib24 Li (10.1016/j.sigpro.2015.07.008_bib11) 2011; 91 Álvarez (10.1016/j.sigpro.2015.07.008_bib3) 2006; 16 Crutchfield (10.1016/j.sigpro.2015.07.008_bib4) 1986; 255 10.1016/j.sigpro.2015.07.008_bib20 |
| References_xml | – reference: H. Zheng, S. Yu, J. Lu, Design and ARM platform-based realization of digital color image encryption and decryption via single state variable feedback control, Int. J. Bifurc. Chaos 24 (4) (2014) art. no. 1450049. – volume: 18 start-page: 338 year: 2008 end-page: 349 ident: bib12 article-title: Cryptanalysis of an image scrambling scheme without bandwidth expansion publication-title: IEEE Trans. Circuits Syst. Video Technol. – volume: 81 start-page: 1130 year: 2008 end-page: 1143 ident: bib21 article-title: Cryptanalysis of the RCES/RSES image encryption scheme publication-title: J. Syst. Softw. – volume: 16 start-page: 571 year: 2014 end-page: 578 ident: bib22 article-title: Solving a special type of jigsaw puzzles: banknote reconstruction from a large number of fragments publication-title: IEEE Trans. Multimed. – reference: Y. Matias, A. Shamir, A video scrambling technique based on space filling curve (extended abstract), in: Advances in Cryptology — Crypto׳87, Lecture Notes in Computer Science, vol. 293, 1987, pp. 398–417. – volume: 29 start-page: 840 year: 2007 end-page: 853 ident: bib23 article-title: An efficient earth mover׳s distance algorithm for robust histogram comparison publication-title: IEEE Trans. Pattern Anal. Mach. Intell. – volume: 16 start-page: 2129 year: 2006 end-page: 2151 ident: bib3 article-title: Some basic cryptographic requirements for chaos-based cryptosystems publication-title: Int. J. Bifurc. Chaos – volume: 23 start-page: 1847 year: 2002 end-page: 1852 ident: bib8 article-title: Cryptanalysis of an encryption scheme for binary images publication-title: Pattern Recognit. Lett. – volume: 83 start-page: 1443 year: 2010 end-page: 1452 ident: bib26 article-title: A differential cryptanalysis of Yen–Chen–Wu multimedia cryptography system publication-title: J. Syst. Softw. – volume: 102 start-page: 122 year: 2014 end-page: 131 ident: bib14 article-title: A symmetric image cipher using wave perturbations publication-title: Signal Process. – year: 1989 ident: bib25 publication-title: Concrete Mathematics – volume: 21 start-page: 749 year: 2004 end-page: 761 ident: bib2 article-title: A symmetric image encryption scheme based on 3D chaotic cat maps publication-title: Chaos Solitons Fractals – volume: 21 start-page: 170 year: 2011 end-page: 177 ident: bib13 article-title: Privacy protection in video surveillance systems publication-title: IEEE Trans. Circuits Syst. Video Technol. – volume: 5 start-page: 118 year: 2003 end-page: 129 ident: bib6 article-title: Efficient frequency domain selective scrambling of digital video publication-title: IEEE Trans. Multimed. – reference: J.-I. Guo, J.-C. Yen, J.-C. Yeh, The design and realization of a new chaotic image encryption algorithm, in: Proceedings of 1999 International Symposium on Communications, 1999, pp. 210–214. – volume: 255 start-page: 46 year: 1986 end-page: 57 ident: bib4 article-title: Chaos publication-title: Sci. Am. – reference: R.E. Korf, Finding optimal solutions to Rubik׳s cube using pattern databases, in: Proceedings of AAAI-97, 1997, pp. 700–705, 〈 – reference: 〉. – reference: 〉, June 2003. – volume: 91 start-page: 949 year: 2011 end-page: 954 ident: bib11 article-title: Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks publication-title: Signal Process. – reference: C. Li, S. Li, G. Chen, G. Chen, L. Hu, Cryptanalysis of a new signal security system for multimedia data transmission, EURASIP J. Appl. Signal Process. 2005 (8) (2005) 1277–1288. – reference: W. Li, Y. Yan, N. Yu, Breaking row-column shuffle based image cipher, in: Proceedings of ACM International Conference on Multimedia, 2012, p. art. no. 6011939, – volume: 78 start-page: 1545 year: 2014 end-page: 1551 ident: bib19 article-title: Cryptanalyzing image encryption using chaotic logistic map publication-title: Nonlinear Dyn. – year: 2003 ident: bib18 article-title: An Introduction to Chaotic Dynamical Systems – volume: 23 start-page: 212 year: 2008 end-page: 223 ident: bib10 article-title: A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks publication-title: Signal Process.: Image Commun. – volume: 60 start-page: 261 year: 1996 end-page: 265 ident: bib7 article-title: On the security of image encryption method publication-title: Inf. Process. Lett. – reference: S. Li, Analyses and new designs of digital chaotic ciphers (Ph.D. Thesis), School of Electronic and Information Engineering, Xi׳an Jiaotong University, Xi׳an, China, Available online at 〈 – reference: J.-C. Yen, J.-I. Guo, Efficient hierarchical chaotic image encryption algorithm and its VLSI realisation, IEE Proc. – Vis. Image Signal Process. 147 (2) (2000) 167–175. – volume: 16 start-page: 2129 issue: 8 year: 2006 ident: 10.1016/j.sigpro.2015.07.008_bib3 article-title: Some basic cryptographic requirements for chaos-based cryptosystems publication-title: Int. J. Bifurc. Chaos doi: 10.1142/S0218127406015970 – ident: 10.1016/j.sigpro.2015.07.008_bib9 doi: 10.1145/2393347.2396392 – volume: 21 start-page: 170 issue: 2 year: 2011 ident: 10.1016/j.sigpro.2015.07.008_bib13 article-title: Privacy protection in video surveillance systems publication-title: IEEE Trans. Circuits Syst. Video Technol. doi: 10.1109/TCSVT.2011.2106250 – ident: 10.1016/j.sigpro.2015.07.008_bib24 doi: 10.1155/ASP.2005.1277 – ident: 10.1016/j.sigpro.2015.07.008_bib17 – year: 2003 ident: 10.1016/j.sigpro.2015.07.008_bib18 – ident: 10.1016/j.sigpro.2015.07.008_bib16 doi: 10.1049/ip-vis:20000208 – volume: 255 start-page: 46 issue: 12 year: 1986 ident: 10.1016/j.sigpro.2015.07.008_bib4 article-title: Chaos publication-title: Sci. Am. doi: 10.1038/scientificamerican1286-46 – ident: 10.1016/j.sigpro.2015.07.008_bib5 doi: 10.1007/3-540-48184-2_35 – volume: 91 start-page: 949 issue: 4 year: 2011 ident: 10.1016/j.sigpro.2015.07.008_bib11 article-title: Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks publication-title: Signal Process. doi: 10.1016/j.sigpro.2010.09.014 – year: 1989 ident: 10.1016/j.sigpro.2015.07.008_bib25 – volume: 83 start-page: 1443 issue: 8 year: 2010 ident: 10.1016/j.sigpro.2015.07.008_bib26 article-title: A differential cryptanalysis of Yen–Chen–Wu multimedia cryptography system publication-title: J. Syst. Softw. doi: 10.1016/j.jss.2010.02.039 – volume: 5 start-page: 118 issue: 1 year: 2003 ident: 10.1016/j.sigpro.2015.07.008_bib6 article-title: Efficient frequency domain selective scrambling of digital video publication-title: IEEE Trans. Multimed. doi: 10.1109/TMM.2003.808817 – volume: 21 start-page: 749 issue: 3 year: 2004 ident: 10.1016/j.sigpro.2015.07.008_bib2 article-title: A symmetric image encryption scheme based on 3D chaotic cat maps publication-title: Chaos Solitons Fractals doi: 10.1016/j.chaos.2003.12.022 – volume: 16 start-page: 571 issue: 2 year: 2014 ident: 10.1016/j.sigpro.2015.07.008_bib22 article-title: Solving a special type of jigsaw puzzles: banknote reconstruction from a large number of fragments publication-title: IEEE Trans. Multimed. doi: 10.1109/TMM.2013.2291968 – volume: 23 start-page: 1847 issue: 14 year: 2002 ident: 10.1016/j.sigpro.2015.07.008_bib8 article-title: Cryptanalysis of an encryption scheme for binary images publication-title: Pattern Recognit. Lett. doi: 10.1016/S0167-8655(02)00157-5 – ident: 10.1016/j.sigpro.2015.07.008_bib15 doi: 10.1142/S0218127414500497 – volume: 18 start-page: 338 issue: 3 year: 2008 ident: 10.1016/j.sigpro.2015.07.008_bib12 article-title: Cryptanalysis of an image scrambling scheme without bandwidth expansion publication-title: IEEE Trans. Circuits Syst. Video Technol. doi: 10.1109/TCSVT.2008.918116 – volume: 23 start-page: 212 issue: 3 year: 2008 ident: 10.1016/j.sigpro.2015.07.008_bib10 article-title: A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks publication-title: Signal Process.: Image Commun. – volume: 78 start-page: 1545 issue: 2 year: 2014 ident: 10.1016/j.sigpro.2015.07.008_bib19 article-title: Cryptanalyzing image encryption using chaotic logistic map publication-title: Nonlinear Dyn. doi: 10.1007/s11071-014-1533-8 – volume: 60 start-page: 261 issue: 5 year: 1996 ident: 10.1016/j.sigpro.2015.07.008_bib7 article-title: On the security of image encryption method publication-title: Inf. Process. Lett. doi: 10.1016/S0020-0190(96)00168-8 – volume: 102 start-page: 122 year: 2014 ident: 10.1016/j.sigpro.2015.07.008_bib14 article-title: A symmetric image cipher using wave perturbations publication-title: Signal Process. doi: 10.1016/j.sigpro.2014.03.015 – volume: 29 start-page: 840 issue: 5 year: 2007 ident: 10.1016/j.sigpro.2015.07.008_bib23 article-title: An efficient earth mover׳s distance algorithm for robust histogram comparison publication-title: IEEE Trans. Pattern Anal. Mach. Intell. doi: 10.1109/TPAMI.2007.1058 – ident: 10.1016/j.sigpro.2015.07.008_bib1 – volume: 81 start-page: 1130 issue: 7 year: 2008 ident: 10.1016/j.sigpro.2015.07.008_bib21 article-title: Cryptanalysis of the RCES/RSES image encryption scheme publication-title: J. Syst. Softw. doi: 10.1016/j.jss.2007.07.037 – ident: 10.1016/j.sigpro.2015.07.008_bib20 |
| SSID | ssj0001360 |
| Score | 2.5288892 |
| Snippet | In year 2000, an efficient hierarchical chaotic image encryption (HCIE) algorithm was proposed, which divides a plain-image of size M×N with T possible value... |
| SourceID | crossref elsevier |
| SourceType | Enrichment Source Index Database Publisher |
| StartPage | 203 |
| SubjectTerms | Chaotic cryptanalysis Chosen-plaintext attack Histogram Known-plaintext attack Permutation |
| Title | Cracking a hierarchical chaotic image encryption algorithm based on permutation |
| URI | https://dx.doi.org/10.1016/j.sigpro.2015.07.008 |
| Volume | 118 |
| WOSCitedRecordID | wos000362156000018&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVESC databaseName: Elsevier SD Freedom Collection Journals 2021 customDbUrl: eissn: 1872-7557 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0001360 issn: 0165-1684 databaseCode: AIEXJ dateStart: 19950101 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwELbQlgMcUMtDlELlA7cqVRInsXOsqlbAoSC1SHuLHD-2KW12yW5R---ZsZ1sxCJeEpcosta7s_6Smc-eFyFvFVeAqgLtZ3UWZZzzSObcRBLbuYuSl7q2rtkEPzsT02n5KXQqXLp2Arxtxd1dufivUMMYgI2ps38B9_ClMAD3ADpcAXa4_hHwx51UX1zq4QH2uXaeAlcF5FLOsTprc4NhOiBxd-_VhbyezbtmdXlzgCZNo_tgAfr6duSkD-z1vJkheV345ILe6GE4T-Nd96adfe2Hw1FC8uNRwmaOiz9yLPIoKXwjt0Pj1aTgwMtzX1p60KNBkQZNGLORUU197OqGvvZHB1eHy2YGsmOkXe5qqcZibZ-GqMFzFAUlARKLhRRh07uV8rwUE7J19P5k-mEwwQlz6eGD6H3OpAvs2_ytn3OSEc-42CZPwgaBHnlgd8gD0z4lj0dlI5-Rjz3EVNIxxDRATB3EdA0xHSCmDmIKQyOIn5PPpycXx--i0BgjUrDDW0U8znShrNCl4FmdM5MkzNSiyIpaxyW3QGvjOjXwz2XBVC1sUqrUFsBDctThkr0gk3bempeE1sKkJkPvLvA8bZJaFTmLrYyN1UyndpewfmkqFarGY_OS66oPD7yq_IJWuKBVjOEMYpdEw6yFr5rym8_zftWrwPw8o6vgQfnlzFf_PHOPPFq_A6_JZNXdmjfkofq2apbdfniivgMpEH_c |
| linkProvider | Elsevier |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Cracking+a+hierarchical+chaotic+image+encryption+algorithm+based+on+permutation&rft.jtitle=Signal+processing&rft.au=Li%2C+Chengqing&rft.date=2016-01-01&rft.pub=Elsevier+B.V&rft.issn=0165-1684&rft.eissn=1872-7557&rft.volume=118&rft.spage=203&rft.epage=210&rft_id=info:doi/10.1016%2Fj.sigpro.2015.07.008&rft.externalDocID=S0165168415002431 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0165-1684&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0165-1684&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0165-1684&client=summon |