4.5 Article

Cryptanalysis and improvement of two hyper-chaos-based image encryption schemes

期刊

SIGNAL PROCESSING-IMAGE COMMUNICATION
卷 34, 期 -, 页码 45-51

出版社

ELSEVIER
DOI: 10.1016/j.image.2015.03.003

关键词

Cryptanalysis; Chaotic system; Image encryption; Hyper-chaos

资金

  1. National Science Council, Taiwan, R.O.C. [NSC 102-2221-E-415-014, NSC 102-2221-E-415-007]

向作者/读者索取更多资源

As chaos-based image encryption developed, its security relies on two operations, permutation and diffusion. Some existing schemes in the literature are broken due to the failed design of either permutation or diffusion. An image encryption scheme based on hyper-chaos, proposed by Gao and Chen has undergone the scrutiny from research community and security weaknesses found. Its improvement by Rhouma and Belghith needs to be carefully examined. This paper points out that both of them suffer from the problem of low security-sensitivity to plain-image change. Thus, attackers can predict the order of permutation and the security of the cryptosystem only relies on the diffusion operation. This implies that security level is potentially degraded. In this paper, an improvement of the hyper-chaos-based image encryption scheme is proposed to fix the weakness in not only Gao and Chen's but also that in Rhouma and Belghith's modified approaches. (C) 2015 Elsevier B.V. All rights reserved.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.5
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Computer Science, Hardware & Architecture

Visual multiple-secret sharing for flexible general access structure by random grids

Kai-Hsiang Tsao, Shyong-Jian Shyu, Chih-Hung Lin, Yao-Sheng Lee, Tzung-Her Chen

DISPLAYS (2015)

Article Computer Science, Information Systems

Friendly progressive random-grid-based visual secret sharing with adaptive contrast

Chih-Hung Lin, Yao-Sheng Lee, Tzung-Her Chen

JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION (2015)

Article Computer Science, Information Systems

A multi-watermarking protocol for health information management

Fuh-Gwo Jeng, Yan-Ting Wu, Tzung-Her Chen

MULTIMEDIA TOOLS AND APPLICATIONS (2016)

Article Computer Science, Information Systems

A new buyer-seller watermarking protocol without multiple watermarks insertion

Jyun-Ci Huang, Fuh-Gwo Jeng, Tzung-Her Chen

MULTIMEDIA TOOLS AND APPLICATIONS (2017)

Article Engineering, Electrical & Electronic

On the difficulty of aligning VSS random grids

Tzung-Her Chen, Yao-Sheng Lee, Chih-Hung Lin

SIGNAL PROCESSING-IMAGE COMMUNICATION (2016)

Article Computer Science, Information Systems

On the design of a two-decoding-option image secret sharing scheme

Tzung-Her Chen, Kai-Siang Lin, Chih-Hung Lin

MULTIMEDIA TOOLS AND APPLICATIONS (2018)

Article Computer Science, Information Systems

On the security of a BTC-based-compression image authentication scheme

Tzung-Her Chen, Tzu-Ching Chang

MULTIMEDIA TOOLS AND APPLICATIONS (2018)

Article Computer Science, Information Systems

A novel DRM scheme for accommodating expectations of personal use

Hsing-Bai Chen, Wei-Bin Lee, Tzung-Her Chen

MULTIMEDIA TOOLS AND APPLICATIONS (2018)

Article Computer Science, Information Systems

On the security of threshold random grid-based visual secret sharing

Bing-Jian Wang, Tzer-Shyong Chen, Fuh-Gwo Jeng, Tzung-Her Chen

MULTIMEDIA TOOLS AND APPLICATIONS (2019)

Article Engineering, Electrical & Electronic

Secure and efficient protection for HTTP cookies with self-verification

Wei-Bin Lee, Hsing-Bai Chen, Shun-Shyan Chang, Tzung-Her Chen

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2019)

Article Computer Science, Information Systems

Multiple secret image sharing with general access structure

Tzung-Her Chen, Xi-Wen Wu

MULTIMEDIA TOOLS AND APPLICATIONS (2020)

Article Computer Science, Information Systems

Security-enhanced cloud-based image secret sharing and authentication using POB number system

Tzung-Her Chen, Tzu-Ching Chang, Ting-Le Zhu

Summary: The newly proposed image secret sharing scheme based on the POB number system offers advantages including high security, lossless reconstruction, high integrity protection, high detection accuracy, and low time complexity.

MULTIMEDIA TOOLS AND APPLICATIONS (2021)

Article Computer Science, Information Systems

Commutative encryption and authentication for OpenEXR high dynamic range images

Tzung-Her Chen, Jing-Ya Yan

Summary: The paper proposes a commutative HDR image encryption and authentication scheme to protect OpenEXR HDR images. By dividing HDR pixel values into confidentiality and integrity parts, the scheme ensures the security and integrity of the images. Experimental results and theoretical analyses confirm the effectiveness and feasibility of the proposed scheme.

MULTIMEDIA TOOLS AND APPLICATIONS (2021)

Article Computer Science, Information Systems

Security enhancement of an (n, n) threshold non-expansible XOR-based visual cryptography with unique meaningful shares

Xi-Wen Wu, Tzung-Her Chen

Summary: More and more VC schemes are incorporating computational operations like XOR in the secret decoding phase. This paper identifies shortcomings in Singh et al.'s XOR-based VC scheme and proposes security enhancements.

MULTIMEDIA TOOLS AND APPLICATIONS (2023)

Article Computer Science, Information Systems

A Blockchain-Enabled Authentication and Conserved Data Aggregation Scheme for Secure Smart Grids

Chien-Ding Lee, Jhih-Hong Li, Tzung-Her Chen

Summary: In this paper, a blockchain-enabled authenticated conserved data aggregation scheme is proposed to balance security concerns and the computational cost of the smart grid. The scheme integrates efficient cryptographic algorithms, incorporates a blockchain system for decentralization, is scalable, combines power data and signature in aggregational operations, and enhances the privacy protection of blockchain applications in the smart grid.

IEEE ACCESS (2023)

Article Engineering, Electrical & Electronic

Image tone mapping based on clustering and human visual system models

Xueyu Han, Ishtiaq Rasool Khan, Susanto Rahardja

Summary: This paper proposes a clustering-based TMO method by embedding human visual system models to adapt to different HDR scenes. The method reduces computational complexity using a hierarchical scheme for clustering and enhances local contrast by superimposing details and controlling color saturation by limiting the adaptive saturation parameter. Experimental results show that the proposed method achieves improvements in generating high quality tone-mapped images compared to competing methods.

SIGNAL PROCESSING-IMAGE COMMUNICATION (2024)

Article Engineering, Electrical & Electronic

YOLO-PAI: Real-time handheld call behavior detection algorithm and embedded application

Zuopeng Zhao, Tianci Zheng, Kai Hao, Junjie Xu, Shuya Cui, Xiaofeng Liu, Guangming Zhao, Jie Zhou, Chen He

Summary: The research team developed a handheld phone detection network called YOLO-PAI, which successfully achieved real-time detection and underwent testing under various conditions. Experimental results show that YOLO-PAI reduces network structure parameters and computational costs while maintaining accuracy, outperforming other popular networks in terms of speed and accuracy.

SIGNAL PROCESSING-IMAGE COMMUNICATION (2024)

Article Engineering, Electrical & Electronic

ClGanNet: A novel method for maize leaf disease identification using ClGan and deep CNN

Vivek Sharma, Ashish Kumar Tripathi, Purva Daga, M. Nidhi, Himanshu Mittal

Summary: In this study, a novel ClGan method is proposed for automated plant disease detection. The method reduces the number of parameters and addresses the issues of vanishing gradients, training instability, and non-convergence by using an encoder-decoder network. Additionally, an improved loss function is introduced to stabilize the learning process and optimize weights effectively. Furthermore, a new plant leaf classification method called ClGanNet is introduced, achieving 99.97% training accuracy and 99.04% testing accuracy using the least number of parameters.

SIGNAL PROCESSING-IMAGE COMMUNICATION (2024)

Article Engineering, Electrical & Electronic

Individual tooth segmentation in human teeth images using pseudo edge-region obtained by deep neural networks

Seongeun Kim, Chang-Ock Lee

Summary: This article introduces a method for segmenting individual teeth in human teeth images by using deep neural networks to obtain pseudo edge-regions and applying active contour models for segmentation.

SIGNAL PROCESSING-IMAGE COMMUNICATION (2024)