Article
Computer Science, Information Systems
Heping Wen, Ruiting Chen, Jieyi Yang, Tianle Zheng, Jiahao Wu, Wenxing Lin, Huilin Jian, Yiting Lin, Linchao Ma, Zhen Liu, Chongfu Zhang
Summary: This study conducts a cryptographic security analysis on a color image encryption algorithm, finding that the algorithm can be completely cracked by a chosen-plaintext attack method due to equivalent keys and simplified linear transformation. Experimental results confirm the effectiveness and efficiency of our method.
MULTIMEDIA TOOLS AND APPLICATIONS
(2023)
Article
Engineering, Mechanical
Wanqing Wu, Qiao Wang
Summary: Cryptanalysis plays a crucial role in the design of image cryptographic systems. In this study, a two-round image cryptographic system was analyzed and found to have vulnerabilities that allowed successful decryption of encrypted images through chosen-plaintext attacks. The encryption scheme was improved to enhance security, and the improved system demonstrated better resilience against chosen-plaintext attacks while maintaining the same encryption performance as the original scheme.
NONLINEAR DYNAMICS
(2023)
Article
Computer Science, Interdisciplinary Applications
Noor Munir, Majid Khan, Sajjad Shaukat Jamal, Mohammad Mazyad Hazzazi, Iqtadar Hussain
Summary: This study conducted a cryptanalysis of a hybrid secure image encryption scheme based on Julia set and three-dimensional Lorenz chaotic system through a chosen-plaintext attack, revealing vulnerabilities in the system's reliance on only multiplication and bitwise XOR operation.
MATHEMATICS AND COMPUTERS IN SIMULATION
(2021)
Article
Computer Science, Information Systems
Heping Wen, Yiting Lin
Summary: ICIC-DNA is an improved color image cipher based on chaotic systems and DNA operations. However, after cryptanalysis, it was found that ICIC-DNA has serious security flaws, including the existence of equivalent keys and vulnerabilities in the substitution and permutation processes.
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES
(2023)
Article
Physics, Multidisciplinary
Qinmao Jiang, Simin Yu, Qianxue Wang
Summary: This paper examines the security of an image encryption algorithm based on a two-dimensional hyperchaotic map. Despite claims by the proposer, it was found that the algorithm is vulnerable to chosen plaintext attacks. The paper presents theoretical and experimental results to support the proposed attack's efficiency and provides suggestions for improvement.
Article
Physics, Multidisciplinary
Shuqin Zhu, Congxu Zhu, Hanyu Yan
Summary: This article analyzes an image encryption algorithm and identifies its vulnerability. It is found that the equivalent key streams can be cracked through a chosen-plaintext attack, resulting in decoding the original chaotic encryption algorithm. Finally, an improved algorithm is proposed to overcome this defect, providing resistance against chosen-plaintext attacks and achieving the encryption effect of a one-time pad.
Article
Physics, Multidisciplinary
Heping Wen, Chongfu Zhang, Lan Huang, Juxin Ke, Dongqing Xiong
Summary: Fractional-order chaos is complex and has attracted attention in secure communication applications. While a color image encryption algorithm using a fractional-order hyperchaotic system was found to be cryptographically secure, it was also discovered to have inherent security flaws that can be exploited through a chosen-plaintext attack method.
Article
Computer Science, Information Systems
Hongjie He, Yuan Yuan, Yuyun Ye, Heng-Ming Tai, Fan Chen
Summary: This article proposes a JPEG image encryption scheme with adaptive key and run consistency of MCUs, and presents a chosen-plaintext attack (CPA) on this encryption scheme. The adaptive key can be reproduced from the encrypted image, enabling the construction of plaintext images with the same adaptive key. The existence of run consistency of MCUs between the original image and the encrypted image facilitates rapid estimation, and a single swap for the runs of MCUs with RCM is designed to improve estimation accuracy. Detailed cryptanalytic results indicate that this encryption scheme can only be used for perceptual encryption and does not provide content protection for digital images. Furthermore, applications of the CPA to break other encryption schemes with RCM are presented.
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION
(2023)
Article
Computer Science, Information Systems
Wei Feng, Zhentao Qin, Jing Zhang, Musheer Ahmad
Summary: This paper investigates a newly reported image encryption scheme based on Feistel network and dynamic DNA encoding. It points out some problems in the secret key design and encryption process, makes necessary improvements, and proposes a chosen-plaintext attack algorithm to enhance the scheme's security.
Article
Computer Science, Information Systems
Musheer Ahmad, Mohammad Najam Doja, Mirza Mohd Sufyan Beg
Summary: The study investigated an image cryptosystem based on permutation only cipher and hyperchaotic systems, revealing serious security defects that make it unfit for practical applications.
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES
(2021)
Article
Physics, Multidisciplinary
Haiju Fan, Chenjiu Zhang, Heng Lu, Ming Li, Yanfang Liu
Summary: A new chaotic image encryption technique based on multiple discrete dynamic maps was proposed recently, claiming to provide excellent privacy for traditional digital images. However, through cryptanalysis, it was found that there is no strong correlation between the key and the plain image, leading to the collapse of the cryptosystem. As a result, two chosen-plaintext attack methods were proposed to break the encryption system, requiring a certain number of pairs of plain and cipher images. Simulation results showed the effectiveness of these two schemes.
Article
Computer Science, Information Systems
Imad El Hanouti, Hakim El Fadili, Khalid Zenkouar
Summary: The paper describes a novel image encryption based on Arnold scrambling and Lucas series, demonstrating its robustness through various statistical tests. It also suggests the need for deep cryptanalysis of new cryptosystems to ensure their reliability in real-world applications.
MULTIMEDIA TOOLS AND APPLICATIONS
(2021)
Article
Optics
Noor Munir, Majid Khan, Iqtadar Hussain, Muhammad Amin
Summary: Wireless multimedia communications have made significant progress in recent years, leading to an increasing demand for more secure media transmission to protect multimedia information. Image encryption systems based on chaotic maps are considered the most secure and trustworthy, due to the inherent properties in such types of multimedia contents. This research performed differential cryptanalysis on a cryptosystem based on a 3D logistic map and 3D Cat map, and successfully proposed a cryptanalysis attack by exploiting vulnerabilities in the studied cryptosystem.
Article
Optics
Amit Arora, Rajendra K. Sharma
Summary: The Skew Tent Map (STM) has been enhanced for designing an image encryption scheme, but was found to be vulnerable to a known plain-text attack (KPA). By improving the scheme, it is able to resist KPA while maintaining its original properties.
Article
Optics
Noor Munir, Majid Khan, Iqtadar Hussain, Ammar S. Alanazi
Summary: The article aims to analyze the cryptography of chaos-based techniques using an anti-codifying mechanism. Chaos is considered a secure form of randomness in information security. Many cryptosystems have robust security against classical attacks but may have vulnerabilities in their structure. A recent image encryption scheme based on a compound coupled logistic chaotic map was found to have security flaws. In this study, a chosen-plaintext attack was performed on the system and an anti-codifying technique for secure data transmission was proposed. Simulation and experimental results show that the suggested improvements can resist classical attacks.
Article
Engineering, Mechanical
Wenying Wen, Kangkang Wei, Yushu Zhang, Yuming Fang, Ming Li
NONLINEAR DYNAMICS
(2020)
Article
Computer Science, Artificial Intelligence
Haiju Fan, Kanglei Zhou, En Zhang, Wenying Wen, Ming Li
NEURAL COMPUTING & APPLICATIONS
(2020)
Article
Optics
Kanglei Zhou, Jingjing Fan, Haiju Fan, Ming Li
OPTICS AND LASER TECHNOLOGY
(2020)
Article
Computer Science, Information Systems
Ming Li, Lanlan Wang, Haiju Fan
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS
(2020)
Article
Chemistry, Multidisciplinary
Yuqiang Dou, Ming Li
APPLIED SCIENCES-BASEL
(2020)
Article
Computer Science, Information Systems
En Zhang, Ming Li, Siu-Ming Yiu, Jiao Du, Jun-Zhe Zhu, Gang-Gang Jin
Summary: The study introduces a decentralized and fair hierarchical threshold secret sharing scheme using blockchain, which achieves fairness without the need for a trusted third party and ensures all participants commit to secret shares using smart contracts. Experimental results show that the scheme runs reasonably fast and is practical.
INFORMATION SCIENCES
(2021)
Article
Engineering, Electrical & Electronic
Wenying Wen, Yukun Hong, Yuming Fang, Meng Li, Ming Li
Article
Computer Science, Artificial Intelligence
Ming Li, Pengcheng Wang, Yange Yue, Yanfang Liu
Summary: A new secure image encryption scheme based on a novel 2D sine-cosine cross-chaotic map was proposed, claiming to resist all existing cryptanalytic attacks. However, vulnerabilities in the original cryptosystem were found, leading to successful cracking by chosen-plaintext attack. Two efficient attack schemes were proposed, with simulation and experimental results verifying their effectiveness.
JOURNAL OF REAL-TIME IMAGE PROCESSING
(2021)
Article
Computer Science, Information Systems
Ming Li, Hua Ren, Yong Xiang, Yushu Zhang
Summary: This paper proposes a novel data hiding method for encrypted color images, utilizing difference histogram shifting technology to increase embedding capacity and utilizing cross-channel correlations between R, G, and B channels. Experiments show that the method is secure and has superior RDH performance.
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION
(2021)
Article
Physics, Multidisciplinary
Haiju Fan, Heng Lu, Chenjiu Zhang, Ming Li, Yanfang Liu
Summary: This paper analyzes an image encryption algorithm with security holes and improves it, showing that the improved algorithm can enhance the resistance to attacks.
Article
Physics, Multidisciplinary
Haiju Fan, Chenjiu Zhang, Heng Lu, Ming Li, Yanfang Liu
Summary: A new chaotic image encryption technique based on multiple discrete dynamic maps was proposed recently, claiming to provide excellent privacy for traditional digital images. However, through cryptanalysis, it was found that there is no strong correlation between the key and the plain image, leading to the collapse of the cryptosystem. As a result, two chosen-plaintext attack methods were proposed to break the encryption system, requiring a certain number of pairs of plain and cipher images. Simulation results showed the effectiveness of these two schemes.
Article
Computer Science, Information Systems
Dandan Lu, Ming Li, Yi Liao, Guihua Tao, Hongmin Cai
Summary: The sharing and querying of personal genomic sequences have become increasingly important in the field of biomedical research due to the accumulation of large-scale data. However, institutions are often hesitant to share DNA datasets due to privacy concerns and the sensitivity of DNA. To address this issue, a secure query strategy on encrypted DNA datasets called EncGD is proposed. This method aims to achieve verifiable privacy-preserving queries and reliable updates on multi-source dynamic DNA datasets. Experimental results show that EncGD outperforms two state-of-the-art schemes in terms of time and space costs.
IEEE TRANSACTIONS ON CLOUD COMPUTING
(2023)
Article
Computer Science, Information Systems
Ming Li, Leilei Zeng, Le Zhao, Renlin Yang, Dezhi An, Haiju Fan
Summary: This paper proposes a blockchain-watermarking scheme that effectively combines multimedia watermarking, compressed sensing, IPFS, and blockchain technologies to provide all-round security protection for compressed sensed images. Experiments show that the proposed scheme is effective and feasible.
Article
Computer Science, Information Systems
Yuqiang Dou, Ming Li
Article
Engineering, Electrical & Electronic
Ming Li, Huimin Chang, Yong Xiang, Dezhi An
IEEE SIGNAL PROCESSING LETTERS
(2020)