Article
Computer Science, Information Systems
Heping Wen, Ruiting Chen, Jieyi Yang, Tianle Zheng, Jiahao Wu, Wenxing Lin, Huilin Jian, Yiting Lin, Linchao Ma, Zhen Liu, Chongfu Zhang
Summary: This study conducts a cryptographic security analysis on a color image encryption algorithm, finding that the algorithm can be completely cracked by a chosen-plaintext attack method due to equivalent keys and simplified linear transformation. Experimental results confirm the effectiveness and efficiency of our method.
MULTIMEDIA TOOLS AND APPLICATIONS
(2023)
Article
Computer Science, Interdisciplinary Applications
Noor Munir, Majid Khan, Sajjad Shaukat Jamal, Mohammad Mazyad Hazzazi, Iqtadar Hussain
Summary: This study conducted a cryptanalysis of a hybrid secure image encryption scheme based on Julia set and three-dimensional Lorenz chaotic system through a chosen-plaintext attack, revealing vulnerabilities in the system's reliance on only multiplication and bitwise XOR operation.
MATHEMATICS AND COMPUTERS IN SIMULATION
(2021)
Article
Engineering, Mechanical
Wanqing Wu, Qiao Wang
Summary: Cryptanalysis plays a crucial role in the design of image cryptographic systems. In this study, a two-round image cryptographic system was analyzed and found to have vulnerabilities that allowed successful decryption of encrypted images through chosen-plaintext attacks. The encryption scheme was improved to enhance security, and the improved system demonstrated better resilience against chosen-plaintext attacks while maintaining the same encryption performance as the original scheme.
NONLINEAR DYNAMICS
(2023)
Article
Optics
Noor Munir, Majid Khan, Iqtadar Hussain, Muhammad Amin
Summary: Wireless multimedia communications have made significant progress in recent years, leading to an increasing demand for more secure media transmission to protect multimedia information. Image encryption systems based on chaotic maps are considered the most secure and trustworthy, due to the inherent properties in such types of multimedia contents. This research performed differential cryptanalysis on a cryptosystem based on a 3D logistic map and 3D Cat map, and successfully proposed a cryptanalysis attack by exploiting vulnerabilities in the studied cryptosystem.
Article
Physics, Multidisciplinary
Qinmao Jiang, Simin Yu, Qianxue Wang
Summary: This paper examines the security of an image encryption algorithm based on a two-dimensional hyperchaotic map. Despite claims by the proposer, it was found that the algorithm is vulnerable to chosen plaintext attacks. The paper presents theoretical and experimental results to support the proposed attack's efficiency and provides suggestions for improvement.
Article
Physics, Multidisciplinary
Shuqin Zhu, Congxu Zhu, Hanyu Yan
Summary: This article analyzes an image encryption algorithm and identifies its vulnerability. It is found that the equivalent key streams can be cracked through a chosen-plaintext attack, resulting in decoding the original chaotic encryption algorithm. Finally, an improved algorithm is proposed to overcome this defect, providing resistance against chosen-plaintext attacks and achieving the encryption effect of a one-time pad.
Article
Optics
Amit Arora, Rajendra K. Sharma
Summary: The Skew Tent Map (STM) has been enhanced for designing an image encryption scheme, but was found to be vulnerable to a known plain-text attack (KPA). By improving the scheme, it is able to resist KPA while maintaining its original properties.
Article
Computer Science, Information Systems
Noor Munir, Majid Khan, Abd Al Karim Haj Ismail, Iqtadar Hussain
Summary: The study introduces an encryption technique based on chaotic maps and Brownian motion, claiming security through statistical analysis, but vulnerabilities were exposed through cryptographic attacks. An improved scheme is proposed using different maps and Brownian motion to enhance security levels.
MULTIMEDIA TOOLS AND APPLICATIONS
(2022)
Article
Physics, Multidisciplinary
Haiju Fan, Chenjiu Zhang, Heng Lu, Ming Li, Yanfang Liu
Summary: A new chaotic image encryption technique based on multiple discrete dynamic maps was proposed recently, claiming to provide excellent privacy for traditional digital images. However, through cryptanalysis, it was found that there is no strong correlation between the key and the plain image, leading to the collapse of the cryptosystem. As a result, two chosen-plaintext attack methods were proposed to break the encryption system, requiring a certain number of pairs of plain and cipher images. Simulation results showed the effectiveness of these two schemes.
Article
Computer Science, Information Systems
Anjali Malik, Sangeeta Dhall, Shailender Gupta
Summary: To address the increasing concerns about data/image security, companies opt for high-quality encryption technology to protect the confidentiality of information. A superior image encryption scheme should possess high Entropy, high key sensitivity, resistance against various attacks, large keyspace, high randomness, and the ability to resist differential attack. The proposed improved bit plane image encryption scheme utilizing RC4 and Quantum Chaotic behavior incorporates confusion and diffusion stages, and is evaluated using performance metrics to demonstrate its efficiency and security compared to traditional methods.
MULTIMEDIA TOOLS AND APPLICATIONS
(2021)
Article
Optics
Alireza A. Arab, Mohammad Javad B. Rostami, Behnam Ghavami
Summary: With the advancement of science and technology, users are increasingly inclined to use visual data in medical and military applications. However, unauthorized access to personal and confidential information has become a serious problem in the digital world. This paper proposes an image encryption algorithm that combines two chaos systems, which has been experimentally proven to be more secure than traditional encryption algorithms.
Article
Computer Science, Information Systems
Imad El Hanouti, Hakim El Fadili, Khalid Zenkouar
Summary: The paper describes a novel image encryption based on Arnold scrambling and Lucas series, demonstrating its robustness through various statistical tests. It also suggests the need for deep cryptanalysis of new cryptosystems to ensure their reliability in real-world applications.
MULTIMEDIA TOOLS AND APPLICATIONS
(2021)
Article
Computer Science, Artificial Intelligence
Ming Li, Pengcheng Wang, Yange Yue, Yanfang Liu
Summary: A new secure image encryption scheme based on a novel 2D sine-cosine cross-chaotic map was proposed, claiming to resist all existing cryptanalytic attacks. However, vulnerabilities in the original cryptosystem were found, leading to successful cracking by chosen-plaintext attack. Two efficient attack schemes were proposed, with simulation and experimental results verifying their effectiveness.
JOURNAL OF REAL-TIME IMAGE PROCESSING
(2021)
Article
Computer Science, Information Systems
Manish Kumar, Prateek Gupta
Summary: A new encryption algorithm for medical images based on 1D logistic map and pseudo-random numbers has been proposed, allowing for user control over security level by adjusting encryption rounds. The algorithm inserts pseudo-random rows and columns during encryption to counter attacks, and has been tested for robustness and analyzed for various types of attacks. The algorithm shows efficiency and effectiveness through testing on grayscale and RGB images, with encryption results compared to existing algorithms for practical application.
MULTIMEDIA TOOLS AND APPLICATIONS
(2021)
Article
Computer Science, Information Systems
Mustafa Kamil Khairullah, Ammar Ahmed Alkahtani, Mohd Zafri Bin Baharuddin, Ammar Mohammed Al-Jubari
Summary: Chaotic maps play a crucial role in image encryption systems, and the security of key sequences is paramount. One-dimensional chaotic maps offer simplicity in structure but may lack adequate security. To address this, new improved chaotic maps have been proposed, demonstrating higher efficiency and security in encryption processes. The proposed encryption system shows promising results in terms of security, key space, and encryption time compared to existing systems.
Article
Automation & Control Systems
Zhongyun Hua, Shuang Yi, Yicong Zhou, Chengqing Li, Yue Wu
IEEE TRANSACTIONS ON CYBERNETICS
(2018)
Article
Engineering, Electrical & Electronic
Chengqing Li, Bingbing Feng, Shujun Li, Juergen Kurths, Guanrong Chen
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS
(2019)
Review
Computer Science, Information Systems
Chengqing Li, Yun Zhang, Eric Yong Xie
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS
(2019)
Article
Engineering, Electrical & Electronic
Ning Wang, Chengqing Li, Han Bao, Mo Chen, Bocheng Bao
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS
(2019)
Article
Engineering, Mechanical
Bocheng Bao, Yongxin Zhu, Chengqing Li, Han Bao, Quan Xu
NONLINEAR DYNAMICS
(2020)
Article
Computer Science, Information Systems
Yunling Ma, Chengqing Li, Bo Ou
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS
(2020)
Article
Computer Science, Hardware & Architecture
Chengqing Li, Kai Tan, Bingbing Feng, Jinhu Lu
Summary: This article investigates the period distribution and cycle structure of the generalized Cat map in various binary arithmetic domains. The rules of how the cycles change with arithmetic precision are studied and proven. The regular and beautiful patterns of the Cat map are rigorously proved and experimentally verified using fixed-point arithmetic. The results provide a benchmark for studying the dynamics of Cat map variants in any domain and can be used to evaluate the randomness of PRBS generated by other maps.
IEEE TRANSACTIONS ON COMPUTERS
(2022)
Article
Engineering, Electrical & Electronic
Hegui Zhu, Ruoyang Xiao, Jiapeng Zhang, Jinhai Liu, Chengqing Li, Lianping Yang
Summary: Driving risk classification is crucial for improving urban traffic problems, but current methods often suffer from poor performance due to the imbalance of positive and negative samples. In this article, a novel classification method is proposed using unbalanced time series samples. The method combines clustering and feature extraction with convolutional neural networks, and incorporates a city transfer module to enhance model generalizability.
IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT
(2022)
Article
Computer Science, Information Systems
Siwang Zhou, Xiaoning Deng, Chengqing Li, Yonghe Liu, Hongbo Jiang
Summary: Many image compressive sensing (CS) algorithms have been proposed to yield recovered images with the best possible visual effect. However, improving image quality further for human eyes is challenging. Inspired by the difference in concerns between humans and machines, researchers developed a machine recognition-oriented image CS method using adversarial learning. This approach incorporates recognition accuracy as an additional optimization goal during CS reconstruction, resulting in more suited images for machine users with significantly higher recognition accuracy compared to existing algorithms.
IEEE TRANSACTIONS ON MULTIMEDIA
(2023)
Article
Computer Science, Information Systems
Lei Chen, Chengqing Li, Chao Li
Summary: This paper investigates the essential properties of MPPS and DNA coding, proposing an efficient chosen-plaintext attack to disclose its equivalent secret key. The proposed cryptanalysis results will promote the proper application of DNA encoding to protect multimedia privacy data.
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION
(2022)
Article
Mathematics, Interdisciplinary Applications
Xiaoxiong Lu, Eric Yong Xie, Chengqing Li
Summary: This paper studies the period of sequences generated by iterating the logistic map over ring DOUBLE-STRUCK CAPITAL Z3n from the perspective of its associated functional network. The complete explicit form of the period of the sequences starting from any initial value is given theoretically and verified experimentally. Conditions ensuring the corresponding sequences to achieve the maximum period over the ring are also derived.
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS
(2023)
Article
Computer Science, Information Systems
Siwang Zhou, Yan He, Yonghe Liu, Chengqing Li, Jianming Zhang
Summary: Deep neural networks have recently attracted considerable attention in multimedia technology for their ability to directly learn the inverse mapping in image compressive sensing (CS). By developing a multi-channel deep network, this paper significantly improves image CS performance by exploiting inter-block correlation and eliminating blocking artifacts.
IEEE TRANSACTIONS ON MULTIMEDIA
(2021)
Proceedings Paper
Engineering, Electrical & Electronic
Chengqing Li, Jinhu Lu, Guanrong Chen
2019 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS)
(2019)
Article
Computer Science, Information Systems
Chengqing Li, Dongdong Lin, Bingbing Feng, Jinhu Lu, Feng Hao
Article
Computer Science, Hardware & Architecture
Sheng Liu, Chengqing Li, Qiao Hu
Summary: This study conducted in-depth security analysis on an image encryption algorithm based on a first-order time-delay system, revealing security vulnerabilities and proposing an enhanced version to fix the issues. The research demonstrated that both algorithms have exploitable weaknesses that require further strengthening of security measures.