Skip to content Skip to navigation
University of Warwick
  • Study
  • |
  • Research
  • |
  • Business
  • |
  • Alumni
  • |
  • News
  • |
  • About

University of Warwick
Publications service & WRAP

Highlight your research

  • WRAP
    • Home
    • Search WRAP
    • Browse by Warwick Author
    • Browse WRAP by Year
    • Browse WRAP by Subject
    • Browse WRAP by Department
    • Browse WRAP by Funder
    • Browse Theses by Department
  • Publications Service
    • Home
    • Search Publications Service
    • Browse by Warwick Author
    • Browse Publications service by Year
    • Browse Publications service by Subject
    • Browse Publications service by Department
    • Browse Publications service by Funder
  • Help & Advice
University of Warwick

The Library

  • Login
  • Admin

Cryptanalysis of a chaotic image encryption algorithm based on information entropy

Tools
- Tools
+ Tools

Li, Chengqing, Lin, Dongdong, Feng, Bingbing, Lü, Jinhu and Hao, Feng (2018) Cryptanalysis of a chaotic image encryption algorithm based on information entropy. IEEE Access, 6 . pp. 75834-75842. doi:10.1109/ACCESS.2018.2883690

[img]
Preview
PDF
WRAP-cryptanalysis-chaotic-image-encryption-algorithm-based-information-entropy-Hao-2018.pdf - Accepted Version - Requires a PDF viewer.

Download (2460Kb) | Preview
Official URL: http://dx.doi.org/10.1109/ACCESS.2018.2883690

Request Changes to record.

Abstract

Recently, a chaotic image encryption algorithm based on information entropy (IEAIE) was proposed. This paper scrutinizes the security properties of the algorithm and evaluates the validity of the used quantifiable security metrics. When the round number is only one, the equivalent secret key of every basic operation of IEAIE can be recovered with a differential attack separately. Some common insecurity problems in the field of chaotic image encryption are found in IEAIE, e.g. the short orbits of the digital chaotic system and the invalid sensitivity mechanism built on information entropy of the plain image. Even worse, each security metric is questionable, which undermines the security credibility of IEAIE. Hence, IEAIE can only serve as a counterexample for illustrating common pitfalls in designing secure communication method for image data.

Item Type: Journal Article
Subjects: Q Science > QA Mathematics > QA76 Electronic computers. Computer science. Computer software
Divisions: Faculty of Science > Computer Science
Library of Congress Subject Headings (LCSH): Cryptography, Data encryption (Computer science), Algorithms
Journal or Publication Title: IEEE Access
Publisher: IEEE
ISSN: 2169-3536
Official Date: 27 November 2018
Dates:
DateEvent
27 November 2018Published
20 November 2018Accepted
Volume: 6
Page Range: pp. 75834-75842
DOI: 10.1109/ACCESS.2018.2883690
Status: Peer Reviewed
Publication Status: Published
Publisher Statement: © 2018 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
Access rights to Published version: Restricted or Subscription Access
RIOXX Funder/Project Grant:
Project/Grant IDRIOXX Funder NameFunder ID
61772447[NSFC] National Natural Science Foundation of Chinahttp://dx.doi.org/10.13039/501100001809
61532020[NSFC] National Natural Science Foundation of Chinahttp://dx.doi.org/10.13039/501100001809
U1736113[NSFC] National Natural Science Foundation of Chinahttp://dx.doi.org/10.13039/501100001809

Request changes or add full text files to a record

Repository staff actions (login required)

View Item View Item

Downloads

Downloads per month over past year

View more statistics

twitter

Email us: wrap@warwick.ac.uk
Contact Details
About Us