Cryptanalysis and security enhancement for a chaos-based color image encryption algorithm
- PDF / 8,914,103 Bytes
- 27 Pages / 439.642 x 666.49 pts Page_size
- 102 Downloads / 236 Views
Cryptanalysis and security enhancement for a chaos-based color image encryption algorithm Rong Huang1,2
· Xiaojuan Liao3 · Aihua Dong1,2 · Shaoyuan Sun1,2
Received: 16 June 2019 / Revised: 10 April 2020 / Accepted: 4 June 2020 / © Springer Science+Business Media, LLC, part of Springer Nature 2020
Abstract Recently, a color image encryption scheme based on the Sine-Sine chaotic system has been proposed by Wang et al. (Signal Processing 144:444–452, 2018). In their scheme, a private parameter E is defined based on global plain information in hope of resisting the chosen-plaintext attack. However, we find that the private parameter is dependent purely on average intensity of a plain image, thereby leaving an open door for cryptanalysis. In this paper, we propose a collision-based inference algorithm to effectively break Wang’s image cipher. Then, in order to enhance the security, we develop a hash-based cryptosystem under the permutation-and-diffusion architecture. We conduct experiments and perform extensive comparative studies.The qualitative and quantitative results demonstrate the effectiveness of the collision-based inference algorithm, and the superiority of the proposed image cipher especially in terms of plaintext sensitivity. Keywords Cryptanalysis · Chosen-plaintext attack · Image encryption · Chaotic cryptography · Hash function
1 Introduction In the era of big data, the amount of multimedia information transmitted over common network increases at an explosive speed. Since the public multimedia data are fully exposed to eavesdroppers, how to protect the data against unauthorized accesses has become a crucial issue for applications like remote video conference, security monitoring system, ecommerce system and tele-medicine. Encryption technology is a straightforward method to safeguard the information security. Conventional encryption standards like DES (Data Encryption Standard) or AES (Advanced Encryption Standard), however, are not directly Rong Huang
[email protected] 1
College of Information Science and Technology, Donghua University, Shanghai, China
2
Engineering Research Center of Digitized Textile & Apparel Technology, Ministry of Education, Donghua University, Shanghai, China
3
School of Cyber Security, Chengdu University of Technology, Chengdu, China
Multimedia Tools and Applications
applicable to multimedia data due to there being high redundancy and strong correlation among adjacent pixels. Since chaotic systems have several outstanding cryptography properties like simple structure, ergodicity, and high sensitivity to initial conditions and control parameters, Fridrich [7] adopted a two-dimensional chaos-based map to construct a permutation-and-diffusion cipher architecture. Fridrich’s algorithm could effectively eliminate the visual redundancy among pixels, and thus demonstrated that the chaotic systems were suitable for image encryption. This pioneering achievement has been a continuous source of inspiration for the subsequent schemes [1, 2, 4, 8, 9, 12–14, 16, 17, 22, 24–26]
Data Loading...