Cracking a hierarchical chaotic image encryption algorithm based on permutation

In year 2000, an efficient hierarchical chaotic image encryption (HCIE) algorithm was proposed, which divides a plain-image of size M×N with T possible value levels into K blocks of the same size and then operates position permutation on two levels: intra-block and inter-block. As a typical position...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:Signal processing Ročník 118; s. 203 - 210
Hlavní autor: Li, Chengqing
Médium: Journal Article
Jazyk:angličtina
Vydáno: Elsevier B.V 01.01.2016
Témata:
ISSN:0165-1684, 1872-7557
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract In year 2000, an efficient hierarchical chaotic image encryption (HCIE) algorithm was proposed, which divides a plain-image of size M×N with T possible value levels into K blocks of the same size and then operates position permutation on two levels: intra-block and inter-block. As a typical position permutation-only encryption algorithm, it has received intensive attention. The present paper analyzes specific security performance of HCIE against ciphertext-only attack and known/chosen-plaintext attack. It is found that onlyO(⌈logT(M·N/K)⌉)known/chosen plain-images are sufficient to achieve a good performance, and the computational complexity isO(M·N·⌈logT(M·N/K)⌉), which effectively demonstrates that hierarchical permutation-only image encryption algorithms are less secure than normal (i.e., non-hierarchical) ones. Detailed experiment results are given to verify the feasibility of the known-plaintext attack. In addition, it is pointed out that the security of HCIE against ciphertext-only attack was much overestimated. •Security performance of an encryption algorithm called HCIE is analyzed in detail.•Hierarchical permutation-only encryption schemes are less secure than normal ones.•Security of HCIE against ciphertext-only attack was reported being overestimated.
AbstractList In year 2000, an efficient hierarchical chaotic image encryption (HCIE) algorithm was proposed, which divides a plain-image of size M×N with T possible value levels into K blocks of the same size and then operates position permutation on two levels: intra-block and inter-block. As a typical position permutation-only encryption algorithm, it has received intensive attention. The present paper analyzes specific security performance of HCIE against ciphertext-only attack and known/chosen-plaintext attack. It is found that onlyO(⌈logT(M·N/K)⌉)known/chosen plain-images are sufficient to achieve a good performance, and the computational complexity isO(M·N·⌈logT(M·N/K)⌉), which effectively demonstrates that hierarchical permutation-only image encryption algorithms are less secure than normal (i.e., non-hierarchical) ones. Detailed experiment results are given to verify the feasibility of the known-plaintext attack. In addition, it is pointed out that the security of HCIE against ciphertext-only attack was much overestimated. •Security performance of an encryption algorithm called HCIE is analyzed in detail.•Hierarchical permutation-only encryption schemes are less secure than normal ones.•Security of HCIE against ciphertext-only attack was reported being overestimated.
Author Li, Chengqing
Author_xml – sequence: 1
  givenname: Chengqing
  orcidid: 0000-0002-5385-7644
  surname: Li
  fullname: Li, Chengqing
  email: DrChengqingLi@gmail.com
  organization: MOE (Ministry of Education) Key Laboratory of Intelligent Computing and Information Processing, College of Information Engineering, Xiangtan University, Xiangtan 411105, Hunan, China
BookMark eNqFkM1OwzAQhC0EEm3hDTj4BRLWcfxTDkio4k-q1AucLcdxEpc0iWyD1LfHVThxgNNKuzujmW-JzodxsAjdEMgJEH67z4NrJz_mBRCWg8gB5BlaECmKTDAmztEivbGMcFleomUIewAglMMC7TZemw83tFjjzlmvvemc0T02nR6jM9gddGuxHYw_TtGNA9Z9O3oXuwOudLA1TqvJ-sNn1KfzFbpodB_s9c9cofenx7fNS7bdPb9uHraZocBjJqCsuWlkvZairBi1hFBbSV7yqoa1aAoGUBU2Bdacmko2ZG2KhpeCMKBEarpCd7Ov8WMI3jbKuDlB9Nr1ioA6oVF7NaNRJzQKhEpokrj8JZ586umP_8nuZ5lNxb4SLBWMS2Rs7bw1UdWj-9vgG1Uegxo
CitedBy_id crossref_primary_10_1007_s13369_018_3355_3
crossref_primary_10_1007_s11042_018_6461_z
crossref_primary_10_1088_1674_1056_25_5_054201
crossref_primary_10_1016_j_sigpro_2017_12_021
crossref_primary_10_1007_s11071_016_3108_3
crossref_primary_10_3390_e21030246
crossref_primary_10_3390_s22020461
crossref_primary_10_1016_j_neucom_2017_12_048
crossref_primary_10_1007_s00500_023_09333_z
crossref_primary_10_1109_TCE_2024_3481260
crossref_primary_10_1109_ACCESS_2019_2956389
crossref_primary_10_1016_j_chaos_2020_110225
crossref_primary_10_1007_s11042_021_10526_7
crossref_primary_10_1007_s11042_018_5675_4
crossref_primary_10_1155_2018_8402578
crossref_primary_10_1016_j_comnet_2020_107751
crossref_primary_10_1016_j_jfranklin_2023_10_010
crossref_primary_10_1016_j_jksuci_2018_02_002
crossref_primary_10_3390_e18080276
crossref_primary_10_1007_s11042_021_10522_x
crossref_primary_10_1016_j_ins_2017_02_036
crossref_primary_10_1007_s11071_016_3094_5
crossref_primary_10_1016_j_sigpro_2017_10_004
crossref_primary_10_1016_j_ins_2018_03_055
crossref_primary_10_1007_s12652_019_01493_x
crossref_primary_10_1007_s13319_017_0137_8
crossref_primary_10_1016_j_jisa_2018_03_007
crossref_primary_10_1007_s11071_017_3828_z
crossref_primary_10_1007_s11071_017_3715_7
crossref_primary_10_1007_s00521_018_3577_z
crossref_primary_10_3390_e23050535
crossref_primary_10_1007_s11071_016_3311_2
crossref_primary_10_1109_TIP_2017_2738561
crossref_primary_10_1109_MMUL_2017_3051512
crossref_primary_10_1140_epjp_s13360_024_05415_5
crossref_primary_10_1007_s11128_018_2097_1
crossref_primary_10_1016_j_optlaseng_2019_05_027
crossref_primary_10_1007_s11042_016_3858_4
crossref_primary_10_1016_j_sigpro_2017_06_014
crossref_primary_10_1016_j_sigpro_2017_05_002
crossref_primary_10_1007_s00521_018_3642_7
crossref_primary_10_1016_j_image_2015_09_006
crossref_primary_10_1063_5_0214794
crossref_primary_10_1007_s11042_017_5461_8
crossref_primary_10_1016_j_eswa_2024_124287
crossref_primary_10_1016_j_sigpro_2018_03_010
crossref_primary_10_1109_ACCESS_2022_3226319
crossref_primary_10_1109_ACCESS_2019_2930606
crossref_primary_10_1007_s11071_018_4056_x
crossref_primary_10_1109_ACCESS_2019_2958319
crossref_primary_10_1007_s00521_018_3541_y
crossref_primary_10_1007_s11071_017_3698_4
crossref_primary_10_3390_e22010112
crossref_primary_10_1016_j_ijleo_2021_167526
crossref_primary_10_1002_admt_202301055
crossref_primary_10_1016_j_sigpro_2016_10_003
crossref_primary_10_1007_s11071_024_09646_0
crossref_primary_10_1016_j_sigpro_2016_10_002
crossref_primary_10_1007_s11045_020_00739_8
crossref_primary_10_1016_j_image_2016_12_007
crossref_primary_10_1007_s11042_022_11973_6
crossref_primary_10_1109_ACCESS_2020_3025241
crossref_primary_10_1186_s13640_018_0336_0
crossref_primary_10_1007_s11042_020_10440_4
crossref_primary_10_1016_j_ins_2016_02_041
crossref_primary_10_1016_j_optlastec_2017_04_022
crossref_primary_10_1016_j_sigpro_2016_03_021
crossref_primary_10_1016_j_ijleo_2020_164925
crossref_primary_10_1007_s11042_023_15445_3
crossref_primary_10_1007_s11071_019_04771_7
crossref_primary_10_1007_s11071_018_4332_9
crossref_primary_10_1016_j_aeue_2017_12_001
crossref_primary_10_1016_j_sigpro_2016_11_016
crossref_primary_10_1016_j_jisa_2020_102622
crossref_primary_10_1109_TCSI_2022_3213268
crossref_primary_10_1007_s11042_019_08337_y
crossref_primary_10_1016_j_image_2018_01_002
crossref_primary_10_1007_s00521_017_2993_9
crossref_primary_10_1088_1402_4896_ac0d2e
crossref_primary_10_1002_ett_4034
crossref_primary_10_1007_s11042_021_11802_2
crossref_primary_10_1016_j_future_2019_04_005
crossref_primary_10_1016_j_patrec_2021_10_033
crossref_primary_10_1007_s11831_018_9298_8
crossref_primary_10_1088_1674_1056_26_2_020504
crossref_primary_10_1007_s00500_025_10477_3
crossref_primary_10_1007_s11042_019_07894_6
crossref_primary_10_1007_s12204_020_2224_x
crossref_primary_10_1002_cta_2300
crossref_primary_10_1088_1674_1056_26_10_100504
crossref_primary_10_1109_JSTSP_2017_2714838
crossref_primary_10_1109_TSC_2023_3258144
crossref_primary_10_1016_j_sigpro_2017_11_005
crossref_primary_10_1016_j_amc_2022_127738
crossref_primary_10_1016_j_optlastec_2016_06_012
crossref_primary_10_1007_s11042_020_08742_8
crossref_primary_10_1007_s11071_017_3874_6
crossref_primary_10_1007_s11071_017_3436_y
crossref_primary_10_1016_j_sigpro_2018_09_029
crossref_primary_10_1038_s41598_021_93344_z
crossref_primary_10_1016_j_cosrev_2023_100586
crossref_primary_10_3390_e20120974
crossref_primary_10_1016_j_jisa_2019_05_004
crossref_primary_10_1109_ACCESS_2021_3096224
crossref_primary_10_3390_e25081178
crossref_primary_10_1007_s11042_018_6346_1
crossref_primary_10_1016_j_jisa_2020_102566
crossref_primary_10_1109_TIFS_2018_2812080
crossref_primary_10_1016_j_image_2019_08_014
crossref_primary_10_1016_j_jisa_2020_102560
crossref_primary_10_1007_s12648_019_01512_9
crossref_primary_10_3390_e21111075
crossref_primary_10_1007_s11042_018_7144_5
crossref_primary_10_1155_2022_8338508
crossref_primary_10_1016_j_jisa_2019_102361
crossref_primary_10_1080_1206212X_2019_1632003
crossref_primary_10_1155_2019_6581586
crossref_primary_10_1016_j_jisa_2018_12_003
crossref_primary_10_1109_ACCESS_2018_2883690
crossref_primary_10_1016_j_procs_2019_01_048
crossref_primary_10_1007_s11042_020_10101_6
crossref_primary_10_1007_s11071_016_2933_8
crossref_primary_10_1016_j_optcom_2017_06_014
crossref_primary_10_1088_1742_6596_1486_3_032003
crossref_primary_10_1109_TCYB_2016_2642166
crossref_primary_10_1109_ACCESS_2020_2990170
crossref_primary_10_1007_s11071_017_3714_8
crossref_primary_10_1155_2022_2532497
crossref_primary_10_1007_s00500_024_10388_9
crossref_primary_10_1140_epjp_i2019_12797_4
crossref_primary_10_32604_cmc_2022_027655
crossref_primary_10_1007_s11071_017_3563_5
crossref_primary_10_1007_s11042_020_09672_1
crossref_primary_10_1007_s11042_022_12791_6
crossref_primary_10_1016_j_sigpro_2018_02_028
Cites_doi 10.1142/S0218127406015970
10.1145/2393347.2396392
10.1109/TCSVT.2011.2106250
10.1155/ASP.2005.1277
10.1049/ip-vis:20000208
10.1038/scientificamerican1286-46
10.1007/3-540-48184-2_35
10.1016/j.sigpro.2010.09.014
10.1016/j.jss.2010.02.039
10.1109/TMM.2003.808817
10.1016/j.chaos.2003.12.022
10.1109/TMM.2013.2291968
10.1016/S0167-8655(02)00157-5
10.1142/S0218127414500497
10.1109/TCSVT.2008.918116
10.1007/s11071-014-1533-8
10.1016/S0020-0190(96)00168-8
10.1016/j.sigpro.2014.03.015
10.1109/TPAMI.2007.1058
10.1016/j.jss.2007.07.037
ContentType Journal Article
Copyright 2015 Elsevier B.V.
Copyright_xml – notice: 2015 Elsevier B.V.
DBID AAYXX
CITATION
DOI 10.1016/j.sigpro.2015.07.008
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1872-7557
EndPage 210
ExternalDocumentID 10_1016_j_sigpro_2015_07_008
S0165168415002431
GroupedDBID --K
--M
-~X
.DC
.~1
0R~
123
1B1
1~.
1~5
4.4
457
4G.
53G
5VS
7-5
71M
8P~
9JN
AABNK
AACTN
AAEDT
AAEDW
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAQXK
AAXUO
AAYFN
ABBOA
ABFNM
ABFRF
ABMAC
ABXDB
ABYKQ
ACDAQ
ACGFO
ACGFS
ACNNM
ACRLP
ACZNC
ADBBV
ADEZE
ADJOM
ADMUD
ADTZH
AEBSH
AECPX
AEFWE
AEKER
AENEX
AFKWA
AFTJW
AGHFR
AGUBO
AGYEJ
AHHHB
AHJVU
AHZHX
AIALX
AIEXJ
AIKHN
AITUG
AJBFU
AJOXV
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
AOUOD
ASPBG
AVWKF
AXJTR
AZFZN
BJAXD
BKOJK
BLXMC
CS3
DU5
EBS
EFJIC
EFLBG
EJD
EO8
EO9
EP2
EP3
F0J
F5P
FDB
FEDTE
FGOYB
FIRID
FNPLU
FYGXN
G-Q
G8K
GBLVA
GBOLZ
HLZ
HVGLF
HZ~
IHE
J1W
JJJVA
KOM
LG9
M41
MO0
N9A
O-L
O9-
OAUVE
OZT
P-8
P-9
P2P
PC.
Q38
R2-
RIG
ROL
RPZ
SBC
SDF
SDG
SDP
SES
SEW
SPC
SPCBC
SST
SSV
SSZ
T5K
TAE
TN5
WUQ
XPP
ZMT
~02
~G-
9DU
AATTM
AAXKI
AAYWO
AAYXX
ABDPE
ABJNI
ABWVN
ACLOT
ACRPL
ACVFH
ADCNI
ADNMO
AEIPS
AEUPX
AFJKZ
AFPUW
AGQPQ
AIGII
AIIUN
AKBMS
AKRWK
AKYEP
ANKPU
APXCP
CITATION
EFKBS
~HD
ID FETCH-LOGICAL-c306t-704d6cf8d9874b53e113eb8646bd097f2500b2e168a63cb8f19c2f647150318a3
ISICitedReferencesCount 149
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000362156000018&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 0165-1684
IngestDate Sat Nov 29 03:22:49 EST 2025
Tue Nov 18 22:26:50 EST 2025
Fri Feb 23 02:33:59 EST 2024
IsPeerReviewed true
IsScholarly true
Keywords Histogram
Permutation
Known-plaintext attack
Chosen-plaintext attack
Chaotic cryptanalysis
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c306t-704d6cf8d9874b53e113eb8646bd097f2500b2e168a63cb8f19c2f647150318a3
ORCID 0000-0002-5385-7644
PageCount 8
ParticipantIDs crossref_citationtrail_10_1016_j_sigpro_2015_07_008
crossref_primary_10_1016_j_sigpro_2015_07_008
elsevier_sciencedirect_doi_10_1016_j_sigpro_2015_07_008
PublicationCentury 2000
PublicationDate 2016-01-01
PublicationDateYYYYMMDD 2016-01-01
PublicationDate_xml – month: 01
  year: 2016
  text: 2016-01-01
  day: 01
PublicationDecade 2010
PublicationTitle Signal processing
PublicationYear 2016
Publisher Elsevier B.V
Publisher_xml – name: Elsevier B.V
References Zeng, Lei (bib6) 2003; 5
June 2003.
J.-I. Guo, J.-C. Yen, J.-C. Yeh, The design and realization of a new chaotic image encryption algorithm, in: Proceedings of 1999 International Symposium on Communications, 1999, pp. 210–214.
Wu, Zhou, Agaian, Noonana (bib14) 2014; 102
Álvarez, Li (bib3) 2006; 16
J.-C. Yen, J.-I. Guo, Efficient hierarchical chaotic image encryption algorithm and its VLSI realisation, IEE Proc. – Vis. Image Signal Process. 147 (2) (2000) 167–175.
Li, Lo (bib11) 2011; 91
C. Li, S. Li, G. Chen, G. Chen, L. Hu, Cryptanalysis of a new signal security system for multimedia data transmission, EURASIP J. Appl. Signal Process. 2005 (8) (2005) 1277–1288.
Chang, Yu (bib8) 2002; 23
Li, Xie, Liu, Cheng (bib19) 2014; 78
Graham, Knuth, Patashnik (bib25) 1989
Y. Matias, A. Shamir, A video scrambling technique based on space filling curve (extended abstract), in: Advances in Cryptology — Crypto׳87, Lecture Notes in Computer Science, vol. 293, 1987, pp. 398–417.
Li, Li, Lo, Chen (bib12) 2008; 18
W. Li, Y. Yan, N. Yu, Breaking row-column shuffle based image cipher, in: Proceedings of ACM International Conference on Multimedia, 2012, p. art. no. 6011939
Ling, Okada (bib23) 2007; 29
Li, Zheng, Zhang, Cheng (bib22) 2014; 16
Li, Li, Lo, Kyamakya (bib26) 2010; 83
Li, Li, Chen, Mou (bib21) 2008; 81
Jan, Tseng (bib7) 1996; 60
Crutchfield, Farmer, Packard, Shaw (bib4) 1986; 255
H. Zheng, S. Yu, J. Lu, Design and ARM platform-based realization of digital color image encryption and decryption via single state variable feedback control, Int. J. Bifurc. Chaos 24 (4) (2014) art. no. 1450049.
.
Devaney (bib18) 2003
Chen, Mao, Chui (bib2) 2004; 21
S. Li, Analyses and new designs of digital chaotic ciphers (Ph.D. Thesis), School of Electronic and Information Engineering, Xi׳an Jiaotong University, Xi׳an, China, Available online at
Li, Li, Chen, Bourbakis, Lo (bib10) 2008; 23
Sohn, Neve, Ro (bib13) 2011; 21
R.E. Korf, Finding optimal solutions to Rubik׳s cube using pattern databases, in: Proceedings of AAAI-97, 1997, pp. 700–705
10.1016/j.sigpro.2015.07.008_bib5
Zeng (10.1016/j.sigpro.2015.07.008_bib6) 2003; 5
Li (10.1016/j.sigpro.2015.07.008_bib10) 2008; 23
10.1016/j.sigpro.2015.07.008_bib1
Li (10.1016/j.sigpro.2015.07.008_bib21) 2008; 81
Li (10.1016/j.sigpro.2015.07.008_bib19) 2014; 78
Sohn (10.1016/j.sigpro.2015.07.008_bib13) 2011; 21
Ling (10.1016/j.sigpro.2015.07.008_bib23) 2007; 29
10.1016/j.sigpro.2015.07.008_bib15
Devaney (10.1016/j.sigpro.2015.07.008_bib18) 2003
10.1016/j.sigpro.2015.07.008_bib16
10.1016/j.sigpro.2015.07.008_bib17
Graham (10.1016/j.sigpro.2015.07.008_bib25) 1989
Li (10.1016/j.sigpro.2015.07.008_bib26) 2010; 83
10.1016/j.sigpro.2015.07.008_bib9
Chen (10.1016/j.sigpro.2015.07.008_bib2) 2004; 21
Li (10.1016/j.sigpro.2015.07.008_bib12) 2008; 18
Chang (10.1016/j.sigpro.2015.07.008_bib8) 2002; 23
Jan (10.1016/j.sigpro.2015.07.008_bib7) 1996; 60
Li (10.1016/j.sigpro.2015.07.008_bib22) 2014; 16
Wu (10.1016/j.sigpro.2015.07.008_bib14) 2014; 102
10.1016/j.sigpro.2015.07.008_bib24
Li (10.1016/j.sigpro.2015.07.008_bib11) 2011; 91
Álvarez (10.1016/j.sigpro.2015.07.008_bib3) 2006; 16
Crutchfield (10.1016/j.sigpro.2015.07.008_bib4) 1986; 255
10.1016/j.sigpro.2015.07.008_bib20
References_xml – reference: H. Zheng, S. Yu, J. Lu, Design and ARM platform-based realization of digital color image encryption and decryption via single state variable feedback control, Int. J. Bifurc. Chaos 24 (4) (2014) art. no. 1450049.
– volume: 18
  start-page: 338
  year: 2008
  end-page: 349
  ident: bib12
  article-title: Cryptanalysis of an image scrambling scheme without bandwidth expansion
  publication-title: IEEE Trans. Circuits Syst. Video Technol.
– volume: 81
  start-page: 1130
  year: 2008
  end-page: 1143
  ident: bib21
  article-title: Cryptanalysis of the RCES/RSES image encryption scheme
  publication-title: J. Syst. Softw.
– volume: 16
  start-page: 571
  year: 2014
  end-page: 578
  ident: bib22
  article-title: Solving a special type of jigsaw puzzles: banknote reconstruction from a large number of fragments
  publication-title: IEEE Trans. Multimed.
– reference: Y. Matias, A. Shamir, A video scrambling technique based on space filling curve (extended abstract), in: Advances in Cryptology — Crypto׳87, Lecture Notes in Computer Science, vol. 293, 1987, pp. 398–417.
– volume: 29
  start-page: 840
  year: 2007
  end-page: 853
  ident: bib23
  article-title: An efficient earth mover׳s distance algorithm for robust histogram comparison
  publication-title: IEEE Trans. Pattern Anal. Mach. Intell.
– volume: 16
  start-page: 2129
  year: 2006
  end-page: 2151
  ident: bib3
  article-title: Some basic cryptographic requirements for chaos-based cryptosystems
  publication-title: Int. J. Bifurc. Chaos
– volume: 23
  start-page: 1847
  year: 2002
  end-page: 1852
  ident: bib8
  article-title: Cryptanalysis of an encryption scheme for binary images
  publication-title: Pattern Recognit. Lett.
– volume: 83
  start-page: 1443
  year: 2010
  end-page: 1452
  ident: bib26
  article-title: A differential cryptanalysis of Yen–Chen–Wu multimedia cryptography system
  publication-title: J. Syst. Softw.
– volume: 102
  start-page: 122
  year: 2014
  end-page: 131
  ident: bib14
  article-title: A symmetric image cipher using wave perturbations
  publication-title: Signal Process.
– year: 1989
  ident: bib25
  publication-title: Concrete Mathematics
– volume: 21
  start-page: 749
  year: 2004
  end-page: 761
  ident: bib2
  article-title: A symmetric image encryption scheme based on 3D chaotic cat maps
  publication-title: Chaos Solitons Fractals
– volume: 21
  start-page: 170
  year: 2011
  end-page: 177
  ident: bib13
  article-title: Privacy protection in video surveillance systems
  publication-title: IEEE Trans. Circuits Syst. Video Technol.
– volume: 5
  start-page: 118
  year: 2003
  end-page: 129
  ident: bib6
  article-title: Efficient frequency domain selective scrambling of digital video
  publication-title: IEEE Trans. Multimed.
– reference: J.-I. Guo, J.-C. Yen, J.-C. Yeh, The design and realization of a new chaotic image encryption algorithm, in: Proceedings of 1999 International Symposium on Communications, 1999, pp. 210–214.
– volume: 255
  start-page: 46
  year: 1986
  end-page: 57
  ident: bib4
  article-title: Chaos
  publication-title: Sci. Am.
– reference: R.E. Korf, Finding optimal solutions to Rubik׳s cube using pattern databases, in: Proceedings of AAAI-97, 1997, pp. 700–705, 〈
– reference: 〉.
– reference: 〉, June 2003.
– volume: 91
  start-page: 949
  year: 2011
  end-page: 954
  ident: bib11
  article-title: Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks
  publication-title: Signal Process.
– reference: C. Li, S. Li, G. Chen, G. Chen, L. Hu, Cryptanalysis of a new signal security system for multimedia data transmission, EURASIP J. Appl. Signal Process. 2005 (8) (2005) 1277–1288.
– reference: W. Li, Y. Yan, N. Yu, Breaking row-column shuffle based image cipher, in: Proceedings of ACM International Conference on Multimedia, 2012, p. art. no. 6011939,
– volume: 78
  start-page: 1545
  year: 2014
  end-page: 1551
  ident: bib19
  article-title: Cryptanalyzing image encryption using chaotic logistic map
  publication-title: Nonlinear Dyn.
– year: 2003
  ident: bib18
  article-title: An Introduction to Chaotic Dynamical Systems
– volume: 23
  start-page: 212
  year: 2008
  end-page: 223
  ident: bib10
  article-title: A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks
  publication-title: Signal Process.: Image Commun.
– volume: 60
  start-page: 261
  year: 1996
  end-page: 265
  ident: bib7
  article-title: On the security of image encryption method
  publication-title: Inf. Process. Lett.
– reference: S. Li, Analyses and new designs of digital chaotic ciphers (Ph.D. Thesis), School of Electronic and Information Engineering, Xi׳an Jiaotong University, Xi׳an, China, Available online at 〈
– reference: J.-C. Yen, J.-I. Guo, Efficient hierarchical chaotic image encryption algorithm and its VLSI realisation, IEE Proc. – Vis. Image Signal Process. 147 (2) (2000) 167–175.
– volume: 16
  start-page: 2129
  issue: 8
  year: 2006
  ident: 10.1016/j.sigpro.2015.07.008_bib3
  article-title: Some basic cryptographic requirements for chaos-based cryptosystems
  publication-title: Int. J. Bifurc. Chaos
  doi: 10.1142/S0218127406015970
– ident: 10.1016/j.sigpro.2015.07.008_bib9
  doi: 10.1145/2393347.2396392
– volume: 21
  start-page: 170
  issue: 2
  year: 2011
  ident: 10.1016/j.sigpro.2015.07.008_bib13
  article-title: Privacy protection in video surveillance systems
  publication-title: IEEE Trans. Circuits Syst. Video Technol.
  doi: 10.1109/TCSVT.2011.2106250
– ident: 10.1016/j.sigpro.2015.07.008_bib24
  doi: 10.1155/ASP.2005.1277
– ident: 10.1016/j.sigpro.2015.07.008_bib17
– year: 2003
  ident: 10.1016/j.sigpro.2015.07.008_bib18
– ident: 10.1016/j.sigpro.2015.07.008_bib16
  doi: 10.1049/ip-vis:20000208
– volume: 255
  start-page: 46
  issue: 12
  year: 1986
  ident: 10.1016/j.sigpro.2015.07.008_bib4
  article-title: Chaos
  publication-title: Sci. Am.
  doi: 10.1038/scientificamerican1286-46
– ident: 10.1016/j.sigpro.2015.07.008_bib5
  doi: 10.1007/3-540-48184-2_35
– volume: 91
  start-page: 949
  issue: 4
  year: 2011
  ident: 10.1016/j.sigpro.2015.07.008_bib11
  article-title: Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks
  publication-title: Signal Process.
  doi: 10.1016/j.sigpro.2010.09.014
– year: 1989
  ident: 10.1016/j.sigpro.2015.07.008_bib25
– volume: 83
  start-page: 1443
  issue: 8
  year: 2010
  ident: 10.1016/j.sigpro.2015.07.008_bib26
  article-title: A differential cryptanalysis of Yen–Chen–Wu multimedia cryptography system
  publication-title: J. Syst. Softw.
  doi: 10.1016/j.jss.2010.02.039
– volume: 5
  start-page: 118
  issue: 1
  year: 2003
  ident: 10.1016/j.sigpro.2015.07.008_bib6
  article-title: Efficient frequency domain selective scrambling of digital video
  publication-title: IEEE Trans. Multimed.
  doi: 10.1109/TMM.2003.808817
– volume: 21
  start-page: 749
  issue: 3
  year: 2004
  ident: 10.1016/j.sigpro.2015.07.008_bib2
  article-title: A symmetric image encryption scheme based on 3D chaotic cat maps
  publication-title: Chaos Solitons Fractals
  doi: 10.1016/j.chaos.2003.12.022
– volume: 16
  start-page: 571
  issue: 2
  year: 2014
  ident: 10.1016/j.sigpro.2015.07.008_bib22
  article-title: Solving a special type of jigsaw puzzles: banknote reconstruction from a large number of fragments
  publication-title: IEEE Trans. Multimed.
  doi: 10.1109/TMM.2013.2291968
– volume: 23
  start-page: 1847
  issue: 14
  year: 2002
  ident: 10.1016/j.sigpro.2015.07.008_bib8
  article-title: Cryptanalysis of an encryption scheme for binary images
  publication-title: Pattern Recognit. Lett.
  doi: 10.1016/S0167-8655(02)00157-5
– ident: 10.1016/j.sigpro.2015.07.008_bib15
  doi: 10.1142/S0218127414500497
– volume: 18
  start-page: 338
  issue: 3
  year: 2008
  ident: 10.1016/j.sigpro.2015.07.008_bib12
  article-title: Cryptanalysis of an image scrambling scheme without bandwidth expansion
  publication-title: IEEE Trans. Circuits Syst. Video Technol.
  doi: 10.1109/TCSVT.2008.918116
– volume: 23
  start-page: 212
  issue: 3
  year: 2008
  ident: 10.1016/j.sigpro.2015.07.008_bib10
  article-title: A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks
  publication-title: Signal Process.: Image Commun.
– volume: 78
  start-page: 1545
  issue: 2
  year: 2014
  ident: 10.1016/j.sigpro.2015.07.008_bib19
  article-title: Cryptanalyzing image encryption using chaotic logistic map
  publication-title: Nonlinear Dyn.
  doi: 10.1007/s11071-014-1533-8
– volume: 60
  start-page: 261
  issue: 5
  year: 1996
  ident: 10.1016/j.sigpro.2015.07.008_bib7
  article-title: On the security of image encryption method
  publication-title: Inf. Process. Lett.
  doi: 10.1016/S0020-0190(96)00168-8
– volume: 102
  start-page: 122
  year: 2014
  ident: 10.1016/j.sigpro.2015.07.008_bib14
  article-title: A symmetric image cipher using wave perturbations
  publication-title: Signal Process.
  doi: 10.1016/j.sigpro.2014.03.015
– volume: 29
  start-page: 840
  issue: 5
  year: 2007
  ident: 10.1016/j.sigpro.2015.07.008_bib23
  article-title: An efficient earth mover׳s distance algorithm for robust histogram comparison
  publication-title: IEEE Trans. Pattern Anal. Mach. Intell.
  doi: 10.1109/TPAMI.2007.1058
– ident: 10.1016/j.sigpro.2015.07.008_bib1
– volume: 81
  start-page: 1130
  issue: 7
  year: 2008
  ident: 10.1016/j.sigpro.2015.07.008_bib21
  article-title: Cryptanalysis of the RCES/RSES image encryption scheme
  publication-title: J. Syst. Softw.
  doi: 10.1016/j.jss.2007.07.037
– ident: 10.1016/j.sigpro.2015.07.008_bib20
SSID ssj0001360
Score 2.5288892
Snippet In year 2000, an efficient hierarchical chaotic image encryption (HCIE) algorithm was proposed, which divides a plain-image of size M×N with T possible value...
SourceID crossref
elsevier
SourceType Enrichment Source
Index Database
Publisher
StartPage 203
SubjectTerms Chaotic cryptanalysis
Chosen-plaintext attack
Histogram
Known-plaintext attack
Permutation
Title Cracking a hierarchical chaotic image encryption algorithm based on permutation
URI https://dx.doi.org/10.1016/j.sigpro.2015.07.008
Volume 118
WOSCitedRecordID wos000362156000018&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVESC
  databaseName: Elsevier SD Freedom Collection Journals 2021
  customDbUrl:
  eissn: 1872-7557
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0001360
  issn: 0165-1684
  databaseCode: AIEXJ
  dateStart: 19950101
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwELbQlgMcUMtDlELlA7cqVRInsXOsqlbAoSC1SHuLHD-2KW12yW5R---ZsZ1sxCJeEpcosta7s_6Smc-eFyFvFVeAqgLtZ3UWZZzzSObcRBLbuYuSl7q2rtkEPzsT02n5KXQqXLp2Arxtxd1dufivUMMYgI2ps38B9_ClMAD3ADpcAXa4_hHwx51UX1zq4QH2uXaeAlcF5FLOsTprc4NhOiBxd-_VhbyezbtmdXlzgCZNo_tgAfr6duSkD-z1vJkheV345ILe6GE4T-Nd96adfe2Hw1FC8uNRwmaOiz9yLPIoKXwjt0Pj1aTgwMtzX1p60KNBkQZNGLORUU197OqGvvZHB1eHy2YGsmOkXe5qqcZibZ-GqMFzFAUlARKLhRRh07uV8rwUE7J19P5k-mEwwQlz6eGD6H3OpAvs2_ytn3OSEc-42CZPwgaBHnlgd8gD0z4lj0dlI5-Rjz3EVNIxxDRATB3EdA0xHSCmDmIKQyOIn5PPpycXx--i0BgjUrDDW0U8znShrNCl4FmdM5MkzNSiyIpaxyW3QGvjOjXwz2XBVC1sUqrUFsBDctThkr0gk3bempeE1sKkJkPvLvA8bZJaFTmLrYyN1UyndpewfmkqFarGY_OS66oPD7yq_IJWuKBVjOEMYpdEw6yFr5rym8_zftWrwPw8o6vgQfnlzFf_PHOPPFq_A6_JZNXdmjfkofq2apbdfniivgMpEH_c
linkProvider Elsevier
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Cracking+a+hierarchical+chaotic+image+encryption+algorithm+based+on+permutation&rft.jtitle=Signal+processing&rft.au=Li%2C+Chengqing&rft.date=2016-01-01&rft.pub=Elsevier+B.V&rft.issn=0165-1684&rft.eissn=1872-7557&rft.volume=118&rft.spage=203&rft.epage=210&rft_id=info:doi/10.1016%2Fj.sigpro.2015.07.008&rft.externalDocID=S0165168415002431
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0165-1684&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0165-1684&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0165-1684&client=summon