| Literature DB >> 34945886 |
Haiju Fan1,2,3,4, Chenjiu Zhang1,2,3,4, Heng Lu1,2,3,4, Ming Li1,2,3,4, Yanfang Liu1,2,3,4.
Abstract
Recently, a new chaotic image encryption technique was proposed based on multiple discrete dynamic maps. The authors claim that the scheme can provide excellent privacy for traditional digital images. However, in order to minimize the computational cost, the encryption scheme adopts one-round encryption and a traditional permutation-diffusion structure. Through cryptanalysis, there is no strong correlation between the key and the plain image, which leads to the collapse of cryptosystem. Based on this, two methods of chosen-plaintext attacks are proposed in this paper. The two methods require 3 pairs and 258 pairs of plain and cipher images, respectively, to break the original encryption system. The simulation results show the effectiveness of the two schemes.Entities:
Keywords: chosen-plaintext attack; cryptanalysis; image encryption; multiple dynamic maps; permutation–diffusion structure
Year: 2021 PMID: 34945886 PMCID: PMC8700222 DOI: 10.3390/e23121581
Source DB: PubMed Journal: Entropy (Basel) ISSN: 1099-4300 Impact factor: 2.524
Figure 1An example of second permutation for a 1D plain image.
Figure 2The process of obtaining three diffusion matrices.
Figure 3Experiments of method 1: (a1) a plain image; (a2) the cipher image of (a1); (a3) permutation-only image of (a2); (b1–b3) permutation-only images from the three channels of (a2).
Figure 4Process of eliminating diffusion effect in method 2.
Figure 5Experiments of method 1: (a1) a plain image; (a2) the cipher image of (a1); (a3) permutation-only image of (a2); (b1–b3) are permutation-only images from the three channels of (a2).
Figure 6The flow chart to obtain this equivalent permutation mapping.
Figure 7Obtain the permutation-only images of the chosen plain image: the first column (a1,b1) is the constructed plain images A1 and A2; the second column (a2,b2) is the corresponding cipher images; the third column (a3,b3), the fourth column (a4,b4), and the fifth column (a5,b5) retrieve the second column for three channels of permutation-only images.
Execution time (seconds).
| Image | Image Size | Encryption | Deciphering | |
|---|---|---|---|---|
| Method 1 | Method 2 | |||
| Lena | 256 × 256 × 3 | 1.191755 | 9.057486 | 235.661488 |
| Pepper | 256 × 256 × 3 | 1.083255 | 8.445166 | 233.262743 |
| Sailboat | 256 × 256 × 3 | 1.058173 | 8.273460 | 233.330141 |
Figure 8Experimental results of method 1 and method 2: (a1,b1,c1) are plain images; (a2,b2,c2) are the cipher images of (a1,b1,c1); three channel images (a3–a5) are recovered from (a2); three channel images (b3–b5) are recovered from (b2); three channel images (c3–c5) are recovered from (c2); (a6,b6,c6) final deciphered image.