Cryptanalysis of an Enhanced Sub-image Encryption Method

被引:1
|
作者
Ye, Ruisong [1 ]
Ma, Junming [1 ]
机构
[1] Shantou Univ, Dept Math, Shantou 515063, Guangdong, Peoples R China
基金
中国国家自然科学基金;
关键词
image encryption; cryptanalysis; chosen plaintext attack; chaotic system; SCHEME;
D O I
10.1145/3195588.3195602
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The paper presents a cryptanalysis of an enhanced sub-image encryption method recently proposed by Wang et al. in Optics and Lasers in Engineering 86(2016). Their paper shows that a parallel sub-image encryption method proposed by Mirzaei et al. in Nonlinear Dyn. 67(2012) could be attacked by chosen plaintext attack and proposed an enhanced sub-image encryption method claimed to completely resist the chosen plaintext attack. However, the enhanced sub-image encryption method also has some weakness, such as the key streams are independent with the plain-image. In this paper, one chosen plaintext attack type of cryptanalysis is presented for the enhanced sub-image encryption method and completely broken the enhanced sub-image encryption method. The experimental results indicate that the enhanced sub-image encryption method is weak against chosen plaintext attack and should be improved for practical application.
引用
收藏
页码:57 / 61
页数:5
相关论文
共 50 条
  • [21] A Defect Detection Method based on Sub-image Statistical Feature for Texture Surface
    Wu, Xiaojun
    Xiong, Huijiang
    Wen, Peizhi
    EIGHTH INTERNATIONAL CONFERENCE ON DIGITAL IMAGE PROCESSING (ICDIP 2016), 2016, 10033
  • [22] Using Data Lineage for Sub-image Processing
    Mwebaze, Johnson
    McFarland, John
    Boxhoorn, Danny
    Buddelmeijer, Hugo
    Valentijn, Edwin
    PROVENANCE AND ANNOTATION OF DATA AND PROCESSES, 2010, 6378 : 289 - +
  • [23] Iterative sub-image binarization for document images
    Dawoud, A
    Kamel, M
    2003 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOL 1, PROCEEDINGS, 2003, : 553 - 556
  • [24] Fast image registration algorithm based on sub-image features
    Zhang, Xue-Jing
    Chen, He
    Ma, Long
    Wu, Jing-Jing
    Beijing Ligong Daxue Xuebao/Transaction of Beijing Institute of Technology, 2015, 35 (07): : 744 - 749
  • [25] Block Annotation: Better Image Annotation with Sub-Image Decomposition
    Lin, Hubert
    Upchurch, Paul
    Bala, Kavita
    2019 IEEE/CVF INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV 2019), 2019, : 5289 - 5299
  • [26] Cryptanalysis and security improvement for selective image encryption
    T.M. Hoang
    D. Tran
    The European Physical Journal Special Topics, 2014, 223 : 1635 - 1646
  • [27] Cryptanalysis of image encryption with compound chaotic sequence
    Solak, Ercan
    2009 6TH INTERNATIONAL MULTI-CONFERENCE ON SYSTEMS, SIGNALS AND DEVICES, VOLS 1 AND 2, 2009, : 317 - 321
  • [28] Cryptanalysis of the RCES/RSES image encryption scheme
    Li, Shujun
    Li, Chengqing
    Chen, Guanrong
    Lo, Kwok-Tung
    JOURNAL OF SYSTEMS AND SOFTWARE, 2008, 81 (07) : 1130 - 1143
  • [29] Cryptanalysis and security improvement for selective image encryption
    Hoang, T. M.
    Tran, D.
    EUROPEAN PHYSICAL JOURNAL-SPECIAL TOPICS, 2014, 223 (08): : 1635 - 1646
  • [30] CRYPTANALYSIS OF FRIDRICH'S CHAOTIC IMAGE ENCRYPTION
    Solak, Ercan
    Cokal, Cahit
    Yildiz, Olcay Taner
    Biyikoglu, Tuerker
    INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2010, 20 (05): : 1405 - 1413