2018
DOI: 10.1016/j.sigpro.2018.02.011
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis and improvement of the image cryptosystem reusing permutation matrix dynamically

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
12
0

Year Published

2019
2019
2025
2025

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 20 publications
(12 citation statements)
references
References 61 publications
0
12
0
Order By: Relevance
“…Sometimes, decoders [16, 37–39] use known encryption algorithms to encrypt special images, such as all‐black and all‐white images, and then expose key by obtained cipher image data. some scholars [40, 41] conclude that the main reason for the chosen‐plaintext attack is that the encryption process is not related to plaintext, different plain images use the same chaotic sequence, which leads to the leakage of key information.…”
Section: Performance Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…Sometimes, decoders [16, 37–39] use known encryption algorithms to encrypt special images, such as all‐black and all‐white images, and then expose key by obtained cipher image data. some scholars [40, 41] conclude that the main reason for the chosen‐plaintext attack is that the encryption process is not related to plaintext, different plain images use the same chaotic sequence, which leads to the leakage of key information.…”
Section: Performance Analysismentioning
confidence: 99%
“…Since chaotic systems have some good properties, such as ergodicity, pseudo‐randomness, non‐periodicity, boundedness and so on, image encryption based on chaos has been paying most attention. However, some works on cryptanalysis show that many chaos‐based encryption schemes are insecure [12–16], mainly because the encryption scheme is not related to plaintext in the encryption process.…”
Section: Introductionmentioning
confidence: 99%
“…There are some papers focusing on designing S-box with chaotic maps [9,10,11,12]. In [6,13,14,15,16,17,18,19,20], the analyzed image encryption schemes are fixed to withstand the proposed attacking methods. Due to the seemingly similar properties of a chaotic system and a secure pseudo-random number generator (PRNG), a large number of image encryption schemes use various chaotic maps to generate PRNS, which is used to control combination of some basic encryption operations, e.g.…”
Section: Introductionmentioning
confidence: 99%
“…The algorithm can be cracked by merely low computational complexity and data complexity. Therefore, it is particularly critical to improve the security performance to resist cryptographic attacks, which is also one of the important factors that determines the technology from theoretical research to practical application [20].…”
mentioning
confidence: 99%