The Library
Cryptanalysis of a chaotic image encryption algorithm based on information entropy
Tools
Li, Chengqing, Lin, Dongdong, Feng, Bingbing, Lü, Jinhu and Hao, Feng (2018) Cryptanalysis of a chaotic image encryption algorithm based on information entropy. IEEE Access, 6 . pp. 75834-75842. doi:10.1109/ACCESS.2018.2883690 ISSN 2169-3536.
|
PDF
WRAP-cryptanalysis-chaotic-image-encryption-algorithm-based-information-entropy-Hao-2018.pdf - Accepted Version - Requires a PDF viewer. Download (2460Kb) | Preview |
Official URL: http://dx.doi.org/10.1109/ACCESS.2018.2883690
Abstract
Recently, a chaotic image encryption algorithm based on information entropy (IEAIE) was proposed. This paper scrutinizes the security properties of the algorithm and evaluates the validity of the used quantifiable security metrics. When the round number is only one, the equivalent secret key of every basic operation of IEAIE can be recovered with a differential attack separately. Some common insecurity problems in the field of chaotic image encryption are found in IEAIE, e.g. the short orbits of the digital chaotic system and the invalid sensitivity mechanism built on information entropy of the plain image. Even worse, each security metric is questionable, which undermines the security credibility of IEAIE. Hence, IEAIE can only serve as a counterexample for illustrating common pitfalls in designing secure communication method for image data.
Item Type: | Journal Article | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Subjects: | Q Science > QA Mathematics > QA76 Electronic computers. Computer science. Computer software | ||||||||||||
Divisions: | Faculty of Science, Engineering and Medicine > Science > Computer Science | ||||||||||||
Library of Congress Subject Headings (LCSH): | Cryptography, Data encryption (Computer science), Algorithms | ||||||||||||
Journal or Publication Title: | IEEE Access | ||||||||||||
Publisher: | IEEE | ||||||||||||
ISSN: | 2169-3536 | ||||||||||||
Official Date: | 27 November 2018 | ||||||||||||
Dates: |
|
||||||||||||
Volume: | 6 | ||||||||||||
Page Range: | pp. 75834-75842 | ||||||||||||
DOI: | 10.1109/ACCESS.2018.2883690 | ||||||||||||
Status: | Peer Reviewed | ||||||||||||
Publication Status: | Published | ||||||||||||
Reuse Statement (publisher, data, author rights): | © 2018 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. | ||||||||||||
Access rights to Published version: | Restricted or Subscription Access | ||||||||||||
Date of first compliant deposit: | 5 December 2018 | ||||||||||||
Date of first compliant Open Access: | 5 December 2018 | ||||||||||||
RIOXX Funder/Project Grant: |
|
Request changes or add full text files to a record
Repository staff actions (login required)
View Item |
Downloads
Downloads per month over past year