2023
DOI: 10.3390/e25030476
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Chaotic Image Encryption Scheme Armed with Global Dynamic Selection

Abstract: Due to the equivalent keys revealed by a chosen-plaintext attack or a chosen-ciphertext attack, most of the existing chaotic image encryption schemes are demonstrated to be insecure. In order to improve security performance, some scholars have recently proposed the plaintext-related chaotic image encryption scheme. Although the equivalent effect of a one-time pad is achieved, an additional secure channel is required to transmit the hash values or other parameters related to the plaintext before the ciphertext … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(4 citation statements)
references
References 39 publications
0
4
0
Order By: Relevance
“…In addition, the correlation coefficient between adjacent pixels is close to 0. Differential attack analysis [83][84][85] is considered another type of widely used cryptanalysis technique for evaluating the security of image encryption schemes. It is based on the idea that small changes in the plaintext should result in large changes in the ciphertext.…”
Section: Correlation Distribution Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…In addition, the correlation coefficient between adjacent pixels is close to 0. Differential attack analysis [83][84][85] is considered another type of widely used cryptanalysis technique for evaluating the security of image encryption schemes. It is based on the idea that small changes in the plaintext should result in large changes in the ciphertext.…”
Section: Correlation Distribution Analysismentioning
confidence: 99%
“…Assuming an original image ๐ผ with dimension ๐‘€ ๐‘ is available, along with a set of encryption keys, the encrypted images ๐ถ and ๐ถ can be generated either with a slight modification to one of the encryption keys in the set or a single pixel in one of the intensity Differential attack analysis [83][84][85] is considered another type of widely used cryptanalysis technique for evaluating the security of image encryption schemes. It is based on the idea that small changes in the plaintext should result in large changes in the ciphertext.…”
Section: Correlation Distribution Analysismentioning
confidence: 99%
“…This feature ensures the security of encrypted images [27][28][29]. Although certain nonlinear hyperchaotic systems are recognized for their robust chaotic behavior and superior performance [30], one-dimensional (1D) chaotic maps, although simpler to implement and with lower time complexity, are generally unsuitable for protecting images containing sensitive data. Existing 1D chaotic maps face limitations such as uneven distribution and restricted control parameters [31].…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, it is very important to protect the information in transmitted images. To ensure the security of digital images [16,17], there are different types of algorithms used in cryptographic systems. Among them are Advanced Encryption Standard (AES) and Data Encryption Standard (DES).…”
Section: Introductionmentioning
confidence: 99%