Cryptanalyzing a bit-level image encryption algorithm based on chaotic maps
Recently, a bit-level image encryption algorithm based on chaotic maps (BCIEA) has been presented. BCIEA consists of diffusion and confusion, and its security performance mainly relies on the dynamic mechanisms introduced during diffusion and confusion, respectively. However, after a careful cryptan...
Saved in:
Published in | Engineering science and technology, an international journal Vol. 51; p. 101634 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
Elsevier B.V
01.03.2024
Elsevier |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Recently, a bit-level image encryption algorithm based on chaotic maps (BCIEA) has been presented. BCIEA consists of diffusion and confusion, and its security performance mainly relies on the dynamic mechanisms introduced during diffusion and confusion, respectively. However, after a careful cryptanalysis, we found that BCIEA has fatal security issues. Although the bit-level diffusion formally employs complex chaining operations, there is a defect that the chaotic sequences can be used as an equivalent key. In addition, by analyzing its confusion, it is found that the dynamic mechanism adopted has obvious statistical characteristics, and it is especially difficult to resist all zero ciphertext attack. In addition, we also found that the BCIEA description is not rigorous, resulting in algorithm details that cannot be decrypted. On the basis of slightly reasonable modification, we propose a chosen-ciphertext attack method for cracking BCIEA. The method first uses the all-zero ciphertext to degrade it into a diffusion-only algorithm, and then chooses a cipher image with the same sum value as that of the target cipher image to break the confusion module possessing a dynamic mechanism. Theoretical analyses and experimental results verify the effectiveness and efficiency of the proposed attack method. This work can provide a reference for improving the security of image encryption schemes based on bit-level techniques. |
---|---|
AbstractList | Recently, a bit-level image encryption algorithm based on chaotic maps (BCIEA) has been presented. BCIEA consists of diffusion and confusion, and its security performance mainly relies on the dynamic mechanisms introduced during diffusion and confusion, respectively. However, after a careful cryptanalysis, we found that BCIEA has fatal security issues. Although the bit-level diffusion formally employs complex chaining operations, there is a defect that the chaotic sequences can be used as an equivalent key. In addition, by analyzing its confusion, it is found that the dynamic mechanism adopted has obvious statistical characteristics, and it is especially difficult to resist all zero ciphertext attack. In addition, we also found that the BCIEA description is not rigorous, resulting in algorithm details that cannot be decrypted. On the basis of slightly reasonable modification, we propose a chosen-ciphertext attack method for cracking BCIEA. The method first uses the all-zero ciphertext to degrade it into a diffusion-only algorithm, and then chooses a cipher image with the same sum value as that of the target cipher image to break the confusion module possessing a dynamic mechanism. Theoretical analyses and experimental results verify the effectiveness and efficiency of the proposed attack method. This work can provide a reference for improving the security of image encryption schemes based on bit-level techniques. |
ArticleNumber | 101634 |
Author | Feng, Zhaoyang Wen, Heping Lin, Yiting |
Author_xml | – sequence: 1 givenname: Heping orcidid: 0000-0002-1178-4598 surname: Wen fullname: Wen, Heping email: wenheping@uestc.edu.cn – sequence: 2 givenname: Yiting orcidid: 0000-0003-4159-3132 surname: Lin fullname: Lin, Yiting email: Dr.YitingLin@gmail.com – sequence: 3 givenname: Zhaoyang orcidid: 0009-0002-2238-5311 surname: Feng fullname: Feng, Zhaoyang email: 202102021045@stu.zsc.edu.cn |
BookMark | eNqFkM1qHDEQhIVxwBvbb5DDvMBs1PqZnxwMZkmcxYZc4rPokXp2NczOLJIwbJ4-Wo8DIYf41KJQVVd_H9nlNE_E2Cfga-BQfR7WA8Vk92vBhXqVpLpgKyFAl7xtqsu_3lfsNsaBcw6tANDVij1uwumYcMLx9MtPuwKLzqdypBcaC3_AHRU02fMXP08Fjrs5-LQ_FB1GckWW7B7n5G1xwGO8YR96HCPdvs1r9vzt68_N9_Lpx8N2c_9UWgVNKqGqlei17pxoEFpU5KR2fUPOglU1yFb3Undt7Zqm4kKqCvqur3pwkrfYSHnNtkuum3Ewx5B7hpOZ0ZtXYQ47gyGXGslwYYkrpwFRKke6sZXKUbW2eUWtIWd9WbJsmGMM1BvrE56vTQH9aICbM1IzmIWyOVM2C-VsVv-Y_5R5x3a32ChDevEUTLQ-YybnA9mUr_D_D_gNrLSaYQ |
CitedBy_id | crossref_primary_10_1109_ACCESS_2024_3436558 crossref_primary_10_1109_JIOT_2024_3432494 crossref_primary_10_1088_1402_4896_ad99a0 crossref_primary_10_1016_j_eswa_2024_123748 crossref_primary_10_1155_cplx_2910833 crossref_primary_10_1109_ACCESS_2025_3525729 crossref_primary_10_1016_j_chaos_2024_115153 crossref_primary_10_1088_1402_4896_ad30ec crossref_primary_10_1371_journal_pone_0300228 crossref_primary_10_1109_ACCESS_2024_3432876 crossref_primary_10_1109_ACCESS_2025_3533611 crossref_primary_10_1016_j_eswa_2024_124891 crossref_primary_10_1088_1402_4896_ada58f |
Cites_doi | 10.1109/JLT.2022.3226768 10.1016/j.isci.2023.108610 10.1016/j.jvcir.2021.103424 10.1016/j.optcom.2023.130011 10.3390/math11143133 10.1016/j.eswa.2023.121471 10.1016/j.optlastec.2021.107316 10.1016/j.eswa.2022.118730 10.1016/j.chaos.2022.112781 10.1016/j.optlastec.2022.108071 10.1016/j.eswa.2023.121514 10.1142/S0218127423500633 10.1016/j.ins.2022.11.104 10.1038/s41598-023-41082-9 10.1016/j.ins.2022.11.089 10.1016/j.chaos.2021.111318 10.1016/j.chaos.2023.114022 10.1016/j.optlastec.2019.105777 10.1007/s11071-018-4056-x 10.1109/JLT.2023.3244202 10.1364/OL.480981 10.1016/j.ijleo.2022.168956 10.1016/j.optlaseng.2015.09.007 10.1016/j.sigpro.2014.01.020 10.1016/j.eswa.2023.122062 10.1016/j.eswa.2023.121452 10.1016/j.chaos.2023.113791 10.3390/math10152751 10.1140/epjp/s13360-023-04242-4 10.1016/j.eswa.2023.121090 10.1007/s11071-023-08859-z 10.1007/s11071-022-07942-1 10.1016/j.chaos.2023.113909 10.1109/LSP.2022.3163685 10.1109/JIOT.2022.3228781 |
ContentType | Journal Article |
Copyright | 2024 The Authors |
Copyright_xml | – notice: 2024 The Authors |
DBID | 6I. AAFTH AAYXX CITATION DOA |
DOI | 10.1016/j.jestch.2024.101634 |
DatabaseName | ScienceDirect Open Access Titles Elsevier:ScienceDirect:Open Access CrossRef DOAJ Directory of Open Access Journals |
DatabaseTitle | CrossRef |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 2215-0986 |
ExternalDocumentID | oai_doaj_org_article_02ce04d51aa34de58c64f6f75cf35751 10_1016_j_jestch_2024_101634 S221509862400020X |
GroupedDBID | 0R~ 0SF 4.4 457 5VS 6I. AACTN AAEDT AAEDW AAFTH AAIKJ AALRI AAXUO ABMAC ACGFS ADBBV ADEZE ADVLN AEXQZ AFJKZ AFTJW AGHFR AITUG ALMA_UNASSIGNED_HOLDINGS AMRAJ BCNDV EBS EJD FDB GROUPED_DOAJ HZ~ IPNFZ IXB KQ8 M41 M~E NCXOZ O9- OK1 RIG ROL SSZ AAYWO AAYXX APXCP CITATION |
ID | FETCH-LOGICAL-c418t-16742f55bd28a19a4ed35df8edc1c471395f35b97d886023461fbf6f1d309a833 |
IEDL.DBID | DOA |
ISSN | 2215-0986 |
IngestDate | Wed Aug 27 01:21:58 EDT 2025 Tue Jul 01 03:14:38 EDT 2025 Thu Apr 24 22:57:28 EDT 2025 Wed Dec 04 16:49:02 EST 2024 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Keywords | Chaos Cryptanalysis Image privacy Image encryption Multimedia security |
Language | English |
License | This is an open access article under the CC BY license. |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c418t-16742f55bd28a19a4ed35df8edc1c471395f35b97d886023461fbf6f1d309a833 |
ORCID | 0000-0002-1178-4598 0009-0002-2238-5311 0000-0003-4159-3132 |
OpenAccessLink | https://doaj.org/article/02ce04d51aa34de58c64f6f75cf35751 |
ParticipantIDs | doaj_primary_oai_doaj_org_article_02ce04d51aa34de58c64f6f75cf35751 crossref_citationtrail_10_1016_j_jestch_2024_101634 crossref_primary_10_1016_j_jestch_2024_101634 elsevier_sciencedirect_doi_10_1016_j_jestch_2024_101634 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | March 2024 2024-03-00 2024-03-01 |
PublicationDateYYYYMMDD | 2024-03-01 |
PublicationDate_xml | – month: 03 year: 2024 text: March 2024 |
PublicationDecade | 2020 |
PublicationTitle | Engineering science and technology, an international journal |
PublicationYear | 2024 |
Publisher | Elsevier B.V Elsevier |
Publisher_xml | – sequence: 0 name: Elsevier B.V – name: Elsevier |
References | Chen, Li, Li (b47) 2022; 83 Zhang, Zhou, Zhao, Zhang, Cao (b14) 2022 Feng, Zhao, Zhang, Qin, Zhang, He (b17) 2022; 10 Ding, Liu, Wang, Sun (b19) 2023; 138 Chai, Fu, Gan, Lu, Zhang, Han (b31) 2023; 10 Wen, Kang, Wu, Lin, Huang (b37) 2023; 11 Farah, Guesmi, Kachouri, Samet (b42) 2020; 121 Abuturab, Alfalou (b29) 2022; 151 Wen, Huang, Lin (b22) 2023; 35 Xu, Li, Li, Hua (b51) 2016; 78 Zhou, Cao, Chen (b52) 2014; 100 Man, Li, Di, Zhang, Li, Sun (b7) 2023; 622 Wen, Chen (b49) 2023 Lai, Yang, Liu (b20) 2022; 165 Lu, Gong, Cao, Gan, Chai, Li (b25) 2023; 35 Cao, Guo, Wang, Yao, Li, Qin (b24) 2024; 238 Ma, Li, Ou (b46) 2020; 54 Zhou, Hong, Yang, Chen, Chen (b27) 2023; 35 Chen, Li, Li (b8) 2022; 83 Wen, Xie, Wu, Lin, Feng (b16) 2024; 36 Gao, Mou, Banerjee, Cao, Xiong, Chen (b28) 2022; 34 Luo, Zhang, Wang, Liang, Qiu (b1) 2023; 41 Gul, Toprak (b21) 2023; 212 Wen, Lin (b39) 2023; 35 Ma, Chai, Gan, Zhang (b41) 2023 Liu, Teng, Zhang, Si, Liu (b18) 2024; 235 Xie, Zhang, Hu, Chen, Wang (b15) 2023; 35 Wen, Lin, Xie, Liu (b44) 2023; 13 Toktas, Erkan, Gao, Pak (b9) 2024; 462 Yang, Cao, Xu, Hong, Sun (b12) 2024; 237 Wen, Lin (b48) 2024; 237 Basha, Mathivanan, Ganesh (b26) 2022; 259 Zhou, Qiu, Qi, Zhang (b34) 2023; 175 Wang, Zhao (b36) 2021; 143 Lin, Liu, Jiang, Li, Li, Kuo (b40) 2024; 99 Zhan, Wang, Lin, Yi, Huang, Yang, Lin, Cai (b30) 2024; 550 Man, Li, Di, Sheng, Liu (b32) 2021; 152 Ma, Li, Ou (b50) 2020; 54 Liu, Sun, He, Wang (b4) 2023 Lai, Hua, Zhao, Erkan, Toktas (b38) 2023; 175 An, Hao, Zhao, Lu, Li, Zhang (b33) 2023; 35 Kocak, Erkan, Toktas, Gao (b5) 2024; 237 Wen, Lin, Kang, Zhang, Zou (b10) 2024; 27 Liang, Zhang, Luo, Wang, Qiu (b2) 2023; 41 Zhou, Wang, Zhang (b35) 2023; 621 Özkaynak (b53) 2018; 92 Erkan, Toktas, Memiş, Lai, Hu (b6) 2023; 111 Wu, Zeng, Liu, Song, Zhao, Chen, Zhang, Guo (b3) 2023; 48 Hu, Li, Di (b11) 2022; 111 Rehman, Shafique, Khan, Hazzazi (b23) 2023; 35 Lu, Xie, Li (b43) 2023; 33 Liu, Sun, Wang, He (b45) 2023; 174 The USC-SIPI Image Database (b54) 2023 Chai, Wang, Chen, Gan, Zhang (b13) 2022; 29 Yang (10.1016/j.jestch.2024.101634_b12) 2024; 237 Ma (10.1016/j.jestch.2024.101634_b46) 2020; 54 Wu (10.1016/j.jestch.2024.101634_b3) 2023; 48 Ma (10.1016/j.jestch.2024.101634_b50) 2020; 54 Gao (10.1016/j.jestch.2024.101634_b28) 2022; 34 Abuturab (10.1016/j.jestch.2024.101634_b29) 2022; 151 Chen (10.1016/j.jestch.2024.101634_b8) 2022; 83 Özkaynak (10.1016/j.jestch.2024.101634_b53) 2018; 92 Liang (10.1016/j.jestch.2024.101634_b2) 2023; 41 Chai (10.1016/j.jestch.2024.101634_b31) 2023; 10 Luo (10.1016/j.jestch.2024.101634_b1) 2023; 41 Cao (10.1016/j.jestch.2024.101634_b24) 2024; 238 Liu (10.1016/j.jestch.2024.101634_b4) 2023 Toktas (10.1016/j.jestch.2024.101634_b9) 2024; 462 Wen (10.1016/j.jestch.2024.101634_b22) 2023; 35 Ding (10.1016/j.jestch.2024.101634_b19) 2023; 138 Lin (10.1016/j.jestch.2024.101634_b40) 2024; 99 An (10.1016/j.jestch.2024.101634_b33) 2023; 35 Xie (10.1016/j.jestch.2024.101634_b15) 2023; 35 Lu (10.1016/j.jestch.2024.101634_b43) 2023; 33 Liu (10.1016/j.jestch.2024.101634_b18) 2024; 235 Lai (10.1016/j.jestch.2024.101634_b38) 2023; 175 Farah (10.1016/j.jestch.2024.101634_b42) 2020; 121 Lai (10.1016/j.jestch.2024.101634_b20) 2022; 165 Erkan (10.1016/j.jestch.2024.101634_b6) 2023; 111 Zhou (10.1016/j.jestch.2024.101634_b35) 2023; 621 Zhou (10.1016/j.jestch.2024.101634_b52) 2014; 100 Feng (10.1016/j.jestch.2024.101634_b17) 2022; 10 Basha (10.1016/j.jestch.2024.101634_b26) 2022; 259 Lu (10.1016/j.jestch.2024.101634_b25) 2023; 35 Wen (10.1016/j.jestch.2024.101634_b49) 2023 Wen (10.1016/j.jestch.2024.101634_b37) 2023; 11 Gul (10.1016/j.jestch.2024.101634_b21) 2023; 212 Ma (10.1016/j.jestch.2024.101634_b41) 2023 Wen (10.1016/j.jestch.2024.101634_b44) 2023; 13 Chen (10.1016/j.jestch.2024.101634_b47) 2022; 83 Man (10.1016/j.jestch.2024.101634_b7) 2023; 622 Zhang (10.1016/j.jestch.2024.101634_b14) 2022 Rehman (10.1016/j.jestch.2024.101634_b23) 2023; 35 Chai (10.1016/j.jestch.2024.101634_b13) 2022; 29 Xu (10.1016/j.jestch.2024.101634_b51) 2016; 78 Wang (10.1016/j.jestch.2024.101634_b36) 2021; 143 Zhan (10.1016/j.jestch.2024.101634_b30) 2024; 550 Kocak (10.1016/j.jestch.2024.101634_b5) 2024; 237 Liu (10.1016/j.jestch.2024.101634_b45) 2023; 174 Hu (10.1016/j.jestch.2024.101634_b11) 2022; 111 Wen (10.1016/j.jestch.2024.101634_b16) 2024; 36 Zhou (10.1016/j.jestch.2024.101634_b27) 2023; 35 Wen (10.1016/j.jestch.2024.101634_b39) 2023; 35 Wen (10.1016/j.jestch.2024.101634_b48) 2024; 237 The USC-SIPI Image Database (10.1016/j.jestch.2024.101634_b54) 2023 Wen (10.1016/j.jestch.2024.101634_b10) 2024; 27 Zhou (10.1016/j.jestch.2024.101634_b34) 2023; 175 Man (10.1016/j.jestch.2024.101634_b32) 2021; 152 |
References_xml | – volume: 99 year: 2024 ident: b40 article-title: Recovering sign bits of DCT coefficients in digital images as an optimization problem publication-title: J. Vis. Commun. Image Represent. – year: 2023 ident: b49 article-title: Security analysis of a color image encryption based on bit-level and chaotic map publication-title: Multimedia Tools Appl. – volume: 35 year: 2023 ident: b27 article-title: An unsolvable pixel reduced authentication method for color images with grayscale invariance publication-title: J. King Saud Univ. Comput. Inform. Sci. – volume: 152 year: 2021 ident: b32 article-title: Double image encryption algorithm based on neural network and chaos publication-title: Chaos Solitons Fractals – volume: 13 year: 2023 ident: b44 article-title: Chaos-based block permutation and dynamic sequence multiplexing for video encryption publication-title: Sci. Rep. – volume: 92 start-page: 305 year: 2018 end-page: 313 ident: b53 article-title: Brief review on application of nonlinear dynamics in image encryption publication-title: Nonlinear Dynam. – volume: 78 start-page: 17 year: 2016 end-page: 25 ident: b51 article-title: A novel bit-level image encryption algorithm based on chaotic maps publication-title: Opt. Lasers Eng. – volume: 121 year: 2020 ident: b42 article-title: A novel chaos based optical image encryption using fractional Fourier transform and DNA sequence operation publication-title: Opt. Laser Technol. – volume: 35 year: 2023 ident: b22 article-title: High-quality color image compression-encryption using chaos and block permutation publication-title: J. King Saud Univ. Comput. Inform. Sci. – volume: 175 year: 2023 ident: b38 article-title: Image encryption using fission diffusion process and a new hyperchaotic map publication-title: Chaos Solitons Fractals – volume: 10 start-page: 2751 year: 2022 ident: b17 article-title: Image encryption algorithm based on plane-level image filtering and discrete logarithmic transform publication-title: Mathematics – volume: 175 year: 2023 ident: b34 article-title: A new conservative chaotic system and its application in image encryption publication-title: Chaos Solitons Fractals – start-page: 1 year: 2022 end-page: 15 ident: b14 article-title: F-TPE: Flexible thumbnail-preserving encryption based on multi-pixel sum-preserving encryption publication-title: IEEE Trans. Multimed. – volume: 550 year: 2024 ident: b30 article-title: Image denoising and deringing for fourier single-pixel imaging based on upgraded weighted nuclear norm minimization publication-title: Opt. Commun. – volume: 237 year: 2024 ident: b5 article-title: PSO-based image encryption scheme using modular integrated logistic exponential map publication-title: Expert Syst. Appl. – volume: 212 year: 2023 ident: b21 article-title: Contourlet and discrete cosine transform based quality guaranteed robust image watermarking method using artificial bee colony algorithm publication-title: Expert Syst. Appl. – volume: 41 start-page: 4663 year: 2023 end-page: 4671 ident: b1 article-title: Robust key update with controllable accuracy using support vector machine for secure OFDMA-PON publication-title: J. Lightwave Technol. – volume: 29 start-page: 972 year: 2022 end-page: 976 ident: b13 article-title: TPE-GAN: Thumbnail preserving encryption based on GAN with key publication-title: IEEE Signal Process. Lett. – volume: 237 year: 2024 ident: b12 article-title: Applications of chaotic quantum adaptive satin bower bird optimizer algorithm in berth-tugboat-quay crane allocation optimization publication-title: Expert Syst. Appl. – volume: 54 year: 2020 ident: b50 article-title: Cryptanalysis of an image block encryption algorithm based on chaotic maps publication-title: J. Inform. Secur. Appl. – volume: 174 year: 2023 ident: b45 article-title: A class of novel discrete memristive chaotic map publication-title: Chaos Solitons Fractals – volume: 235 year: 2024 ident: b18 article-title: Mutil-medical image encryption by a new spatiotemporal chaos model and DNA new computing for information security publication-title: Expert Syst. Appl. – volume: 35 year: 2023 ident: b39 article-title: Cryptanalyzing an image cipher using multiple chaos and DNA operations publication-title: J. King Saud Univ. Comput. Inform. Sci. – volume: 34 start-page: 1535 year: 2022 end-page: 1551 ident: b28 article-title: An effective multiple-image encryption algorithm based on 3D cube and hyperchaotic map publication-title: J. King Saud Univ. Comput. Inform. Sci. – volume: 35 year: 2023 ident: b15 article-title: ESTPE: An efficient and stable thumbnail-preserving encryption scheme publication-title: J. King Saud Univ. Comput. Inform. Sci. – volume: 10 start-page: 7380 year: 2023 end-page: 7392 ident: b31 article-title: Exploiting semi-tensor product compressed sensing and hybrid cloud for secure medical image transmission publication-title: IEEE Internet Things J. – volume: 33 year: 2023 ident: b43 article-title: Periodicity analysis of logistic map over ring publication-title: Int. J. Bifurcation Chaos – start-page: 1 year: 2023 end-page: 10 ident: b4 article-title: The parallel chaotification map and its application publication-title: IEEE Trans. Circuits Syst. I. Regul. Pap. – volume: 11 start-page: 3133 year: 2023 ident: b37 article-title: Dynamic RNA coding color image cipher based on chain feedback structure publication-title: Mathematics – volume: 83 year: 2022 ident: b8 article-title: Security measurement of a medical communication scheme based on chaos and DNA coding publication-title: J. Vis. Commun. Image Represent. – volume: 165 year: 2022 ident: b20 article-title: Design and realization of discrete memristive hyperchaotic map with application in image encryption publication-title: Chaos Solitons Fractals – volume: 143 year: 2021 ident: b36 article-title: An image encryption algorithm based on hyperchaotic system and DNA coding publication-title: Opt. Laser Technol. – volume: 35 start-page: 37 year: 2023 end-page: 58 ident: b25 article-title: Exploiting 3D fractal cube and chaos for effective multi-image compression and encryption publication-title: J. King Saud Univ. Comput. Inform. Sci. – year: 2023 ident: b41 article-title: Privacy-preserving TPE-based JPEG image retrieval in cloud-assisted Internet of Things publication-title: IEEE Internet Things J. – volume: 621 start-page: 782 year: 2023 end-page: 798 ident: b35 article-title: Novel image encryption scheme based on chaotic signals with finite-precision error publication-title: Inform. Sci. – volume: 27 year: 2024 ident: b10 article-title: Secure image encryption algorithm using chaos-based block permutation and weighted bit planes chain diffusion publication-title: iScience – volume: 237 year: 2024 ident: b48 article-title: Cryptanalysis of an image encryption algorithm using quantum chaotic map and DNA coding publication-title: Expert Syst. Appl. – volume: 462 year: 2024 ident: b9 article-title: A robust bit-level image encryption based on Bessel map publication-title: Appl. Math. Comput. – volume: 54 year: 2020 ident: b46 article-title: Cryptanalysis of an image block encryption algorithm based on chaotic maps publication-title: J. Inform. Secur. Appl. – volume: 111 start-page: 2815 year: 2022 end-page: 2839 ident: b11 article-title: Quantum image encryption scheme based on 2D publication-title: Nonlinear Dynam. – volume: 100 start-page: 197 year: 2014 end-page: 207 ident: b52 article-title: Image encryption using binary bitplane publication-title: Signal Process. – volume: 111 start-page: 20377 year: 2023 end-page: 20405 ident: b6 article-title: An image encryption method based on multi-space confusion using hyperchaotic 2D vincent map derived from optimization benchmark function publication-title: Nonlinear Dynam. – volume: 36 year: 2024 ident: b16 article-title: Exploring the future application of UAVs: Face image privacy protection scheme based on chaos and DNA cryptography publication-title: J. King Saud Univ. Comput. Inform. Sci. – volume: 48 start-page: 684 year: 2023 end-page: 687 ident: b3 article-title: Secure turbulence-resistant coherent free-space optical communications via chaotic region-optimized probabilistic constellation shaping publication-title: Opt. Lett. – volume: 138 year: 2023 ident: b19 article-title: A new class of discrete modular memristors and application in chaotic systems publication-title: Eur. Phys. J. Plus – volume: 35 year: 2023 ident: b23 article-title: Efficient and secure image encryption using key substitution process with discrete wavelet transform publication-title: J. King Saud Univ. Comput. Inform. Sci. – volume: 35 start-page: 576 year: 2023 end-page: 589 ident: b33 article-title: A novel color image privacy-preserving method: Combining breadth and depth visual encryption with chaotic system publication-title: J. King Saud Univ. Comput. Inform. Sci. – year: 2023 ident: b54 article-title: Volume 3: Miscellaneous – volume: 238 year: 2024 ident: b24 article-title: Universal screen-shooting robust image watermarking with channel-attention in DCT domain publication-title: Expert Syst. Appl. – volume: 83 year: 2022 ident: b47 article-title: Security measurement of a medical communication scheme based on chaos and DNA coding publication-title: J. Vis. Commun. Image Represent. – volume: 41 start-page: 1619 year: 2023 end-page: 1625 ident: b2 article-title: Secure encryption and key management for OFDM-PON based on chaotic Hilbert motion publication-title: J. Lightwave Technol. – volume: 151 year: 2022 ident: b29 article-title: Multiple color image fusion, compression, and encryption using compressive sensing, chaotic-biometric keys, and optical fractional Fourier transform publication-title: Opt. Laser Technol. – volume: 259 year: 2022 ident: b26 article-title: Bit level color image encryption using Logistic-Sine-Tent-Chebyshev (LSTC) map publication-title: Optik – volume: 622 start-page: 629 year: 2023 end-page: 651 ident: b7 article-title: Research on cloud data encryption algorithm based on bidirectional activation neural network publication-title: Inform. Sci. – volume: 41 start-page: 1619 issue: 6 year: 2023 ident: 10.1016/j.jestch.2024.101634_b2 article-title: Secure encryption and key management for OFDM-PON based on chaotic Hilbert motion publication-title: J. Lightwave Technol. doi: 10.1109/JLT.2022.3226768 – volume: 27 issue: 1 year: 2024 ident: 10.1016/j.jestch.2024.101634_b10 article-title: Secure image encryption algorithm using chaos-based block permutation and weighted bit planes chain diffusion publication-title: iScience doi: 10.1016/j.isci.2023.108610 – volume: 83 year: 2022 ident: 10.1016/j.jestch.2024.101634_b8 article-title: Security measurement of a medical communication scheme based on chaos and DNA coding publication-title: J. Vis. Commun. Image Represent. doi: 10.1016/j.jvcir.2021.103424 – volume: 550 year: 2024 ident: 10.1016/j.jestch.2024.101634_b30 article-title: Image denoising and deringing for fourier single-pixel imaging based on upgraded weighted nuclear norm minimization publication-title: Opt. Commun. doi: 10.1016/j.optcom.2023.130011 – volume: 11 start-page: 3133 issue: 14 year: 2023 ident: 10.1016/j.jestch.2024.101634_b37 article-title: Dynamic RNA coding color image cipher based on chain feedback structure publication-title: Mathematics doi: 10.3390/math11143133 – volume: 237 year: 2024 ident: 10.1016/j.jestch.2024.101634_b12 article-title: Applications of chaotic quantum adaptive satin bower bird optimizer algorithm in berth-tugboat-quay crane allocation optimization publication-title: Expert Syst. Appl. doi: 10.1016/j.eswa.2023.121471 – volume: 143 year: 2021 ident: 10.1016/j.jestch.2024.101634_b36 article-title: An image encryption algorithm based on hyperchaotic system and DNA coding publication-title: Opt. Laser Technol. doi: 10.1016/j.optlastec.2021.107316 – volume: 35 issue: 10 year: 2023 ident: 10.1016/j.jestch.2024.101634_b15 article-title: ESTPE: An efficient and stable thumbnail-preserving encryption scheme publication-title: J. King Saud Univ. Comput. Inform. Sci. – volume: 212 year: 2023 ident: 10.1016/j.jestch.2024.101634_b21 article-title: Contourlet and discrete cosine transform based quality guaranteed robust image watermarking method using artificial bee colony algorithm publication-title: Expert Syst. Appl. doi: 10.1016/j.eswa.2022.118730 – volume: 165 year: 2022 ident: 10.1016/j.jestch.2024.101634_b20 article-title: Design and realization of discrete memristive hyperchaotic map with application in image encryption publication-title: Chaos Solitons Fractals doi: 10.1016/j.chaos.2022.112781 – volume: 151 year: 2022 ident: 10.1016/j.jestch.2024.101634_b29 article-title: Multiple color image fusion, compression, and encryption using compressive sensing, chaotic-biometric keys, and optical fractional Fourier transform publication-title: Opt. Laser Technol. doi: 10.1016/j.optlastec.2022.108071 – volume: 237 year: 2024 ident: 10.1016/j.jestch.2024.101634_b48 article-title: Cryptanalysis of an image encryption algorithm using quantum chaotic map and DNA coding publication-title: Expert Syst. Appl. doi: 10.1016/j.eswa.2023.121514 – volume: 33 issue: 5 year: 2023 ident: 10.1016/j.jestch.2024.101634_b43 article-title: Periodicity analysis of logistic map over ring Z3n publication-title: Int. J. Bifurcation Chaos doi: 10.1142/S0218127423500633 – volume: 621 start-page: 782 year: 2023 ident: 10.1016/j.jestch.2024.101634_b35 article-title: Novel image encryption scheme based on chaotic signals with finite-precision error publication-title: Inform. Sci. doi: 10.1016/j.ins.2022.11.104 – volume: 13 issue: 1 year: 2023 ident: 10.1016/j.jestch.2024.101634_b44 article-title: Chaos-based block permutation and dynamic sequence multiplexing for video encryption publication-title: Sci. Rep. doi: 10.1038/s41598-023-41082-9 – volume: 83 year: 2022 ident: 10.1016/j.jestch.2024.101634_b47 article-title: Security measurement of a medical communication scheme based on chaos and DNA coding publication-title: J. Vis. Commun. Image Represent. doi: 10.1016/j.jvcir.2021.103424 – volume: 54 year: 2020 ident: 10.1016/j.jestch.2024.101634_b50 article-title: Cryptanalysis of an image block encryption algorithm based on chaotic maps publication-title: J. Inform. Secur. Appl. – volume: 622 start-page: 629 year: 2023 ident: 10.1016/j.jestch.2024.101634_b7 article-title: Research on cloud data encryption algorithm based on bidirectional activation neural network publication-title: Inform. Sci. doi: 10.1016/j.ins.2022.11.089 – start-page: 1 year: 2023 ident: 10.1016/j.jestch.2024.101634_b4 article-title: The parallel chaotification map and its application publication-title: IEEE Trans. Circuits Syst. I. Regul. Pap. – volume: 152 year: 2021 ident: 10.1016/j.jestch.2024.101634_b32 article-title: Double image encryption algorithm based on neural network and chaos publication-title: Chaos Solitons Fractals doi: 10.1016/j.chaos.2021.111318 – volume: 99 year: 2024 ident: 10.1016/j.jestch.2024.101634_b40 article-title: Recovering sign bits of DCT coefficients in digital images as an optimization problem publication-title: J. Vis. Commun. Image Represent. – volume: 175 year: 2023 ident: 10.1016/j.jestch.2024.101634_b38 article-title: Image encryption using fission diffusion process and a new hyperchaotic map publication-title: Chaos Solitons Fractals doi: 10.1016/j.chaos.2023.114022 – volume: 121 year: 2020 ident: 10.1016/j.jestch.2024.101634_b42 article-title: A novel chaos based optical image encryption using fractional Fourier transform and DNA sequence operation publication-title: Opt. Laser Technol. doi: 10.1016/j.optlastec.2019.105777 – volume: 35 start-page: 576 issue: 2 year: 2023 ident: 10.1016/j.jestch.2024.101634_b33 article-title: A novel color image privacy-preserving method: Combining breadth and depth visual encryption with chaotic system publication-title: J. King Saud Univ. Comput. Inform. Sci. – volume: 35 issue: 9 year: 2023 ident: 10.1016/j.jestch.2024.101634_b27 article-title: An unsolvable pixel reduced authentication method for color images with grayscale invariance publication-title: J. King Saud Univ. Comput. Inform. Sci. – volume: 92 start-page: 305 issue: 2 year: 2018 ident: 10.1016/j.jestch.2024.101634_b53 article-title: Brief review on application of nonlinear dynamics in image encryption publication-title: Nonlinear Dynam. doi: 10.1007/s11071-018-4056-x – volume: 41 start-page: 4663 issue: 14 year: 2023 ident: 10.1016/j.jestch.2024.101634_b1 article-title: Robust key update with controllable accuracy using support vector machine for secure OFDMA-PON publication-title: J. Lightwave Technol. doi: 10.1109/JLT.2023.3244202 – volume: 48 start-page: 684 issue: 3 year: 2023 ident: 10.1016/j.jestch.2024.101634_b3 article-title: Secure turbulence-resistant coherent free-space optical communications via chaotic region-optimized probabilistic constellation shaping publication-title: Opt. Lett. doi: 10.1364/OL.480981 – start-page: 1 year: 2022 ident: 10.1016/j.jestch.2024.101634_b14 article-title: F-TPE: Flexible thumbnail-preserving encryption based on multi-pixel sum-preserving encryption publication-title: IEEE Trans. Multimed. – volume: 259 year: 2022 ident: 10.1016/j.jestch.2024.101634_b26 article-title: Bit level color image encryption using Logistic-Sine-Tent-Chebyshev (LSTC) map publication-title: Optik doi: 10.1016/j.ijleo.2022.168956 – volume: 78 start-page: 17 year: 2016 ident: 10.1016/j.jestch.2024.101634_b51 article-title: A novel bit-level image encryption algorithm based on chaotic maps publication-title: Opt. Lasers Eng. doi: 10.1016/j.optlaseng.2015.09.007 – volume: 100 start-page: 197 year: 2014 ident: 10.1016/j.jestch.2024.101634_b52 article-title: Image encryption using binary bitplane publication-title: Signal Process. doi: 10.1016/j.sigpro.2014.01.020 – volume: 238 year: 2024 ident: 10.1016/j.jestch.2024.101634_b24 article-title: Universal screen-shooting robust image watermarking with channel-attention in DCT domain publication-title: Expert Syst. Appl. doi: 10.1016/j.eswa.2023.122062 – volume: 237 year: 2024 ident: 10.1016/j.jestch.2024.101634_b5 article-title: PSO-based image encryption scheme using modular integrated logistic exponential map publication-title: Expert Syst. Appl. doi: 10.1016/j.eswa.2023.121452 – year: 2023 ident: 10.1016/j.jestch.2024.101634_b49 article-title: Security analysis of a color image encryption based on bit-level and chaotic map publication-title: Multimedia Tools Appl. – volume: 174 year: 2023 ident: 10.1016/j.jestch.2024.101634_b45 article-title: A class of novel discrete memristive chaotic map publication-title: Chaos Solitons Fractals doi: 10.1016/j.chaos.2023.113791 – volume: 10 start-page: 2751 issue: 15 year: 2022 ident: 10.1016/j.jestch.2024.101634_b17 article-title: Image encryption algorithm based on plane-level image filtering and discrete logarithmic transform publication-title: Mathematics doi: 10.3390/math10152751 – volume: 35 issue: 8 year: 2023 ident: 10.1016/j.jestch.2024.101634_b22 article-title: High-quality color image compression-encryption using chaos and block permutation publication-title: J. King Saud Univ. Comput. Inform. Sci. – year: 2023 ident: 10.1016/j.jestch.2024.101634_b54 – volume: 138 issue: 7 year: 2023 ident: 10.1016/j.jestch.2024.101634_b19 article-title: A new class of discrete modular memristors and application in chaotic systems publication-title: Eur. Phys. J. Plus doi: 10.1140/epjp/s13360-023-04242-4 – volume: 36 issue: 1 year: 2024 ident: 10.1016/j.jestch.2024.101634_b16 article-title: Exploring the future application of UAVs: Face image privacy protection scheme based on chaos and DNA cryptography publication-title: J. King Saud Univ. Comput. Inform. Sci. – volume: 35 issue: 7 year: 2023 ident: 10.1016/j.jestch.2024.101634_b39 article-title: Cryptanalyzing an image cipher using multiple chaos and DNA operations publication-title: J. King Saud Univ. Comput. Inform. Sci. – year: 2023 ident: 10.1016/j.jestch.2024.101634_b41 article-title: Privacy-preserving TPE-based JPEG image retrieval in cloud-assisted Internet of Things publication-title: IEEE Internet Things J. – volume: 54 year: 2020 ident: 10.1016/j.jestch.2024.101634_b46 article-title: Cryptanalysis of an image block encryption algorithm based on chaotic maps publication-title: J. Inform. Secur. Appl. – volume: 235 year: 2024 ident: 10.1016/j.jestch.2024.101634_b18 article-title: Mutil-medical image encryption by a new spatiotemporal chaos model and DNA new computing for information security publication-title: Expert Syst. Appl. doi: 10.1016/j.eswa.2023.121090 – volume: 35 issue: 7 year: 2023 ident: 10.1016/j.jestch.2024.101634_b23 article-title: Efficient and secure image encryption using key substitution process with discrete wavelet transform publication-title: J. King Saud Univ. Comput. Inform. Sci. – volume: 462 year: 2024 ident: 10.1016/j.jestch.2024.101634_b9 article-title: A robust bit-level image encryption based on Bessel map publication-title: Appl. Math. Comput. – volume: 34 start-page: 1535 issue: 4 year: 2022 ident: 10.1016/j.jestch.2024.101634_b28 article-title: An effective multiple-image encryption algorithm based on 3D cube and hyperchaotic map publication-title: J. King Saud Univ. Comput. Inform. Sci. – volume: 111 start-page: 20377 issue: 21 year: 2023 ident: 10.1016/j.jestch.2024.101634_b6 article-title: An image encryption method based on multi-space confusion using hyperchaotic 2D vincent map derived from optimization benchmark function publication-title: Nonlinear Dynam. doi: 10.1007/s11071-023-08859-z – volume: 111 start-page: 2815 issue: 3 year: 2022 ident: 10.1016/j.jestch.2024.101634_b11 article-title: Quantum image encryption scheme based on 2D Sine2 - logistic chaotic map publication-title: Nonlinear Dynam. doi: 10.1007/s11071-022-07942-1 – volume: 175 year: 2023 ident: 10.1016/j.jestch.2024.101634_b34 article-title: A new conservative chaotic system and its application in image encryption publication-title: Chaos Solitons Fractals doi: 10.1016/j.chaos.2023.113909 – volume: 29 start-page: 972 year: 2022 ident: 10.1016/j.jestch.2024.101634_b13 article-title: TPE-GAN: Thumbnail preserving encryption based on GAN with key publication-title: IEEE Signal Process. Lett. doi: 10.1109/LSP.2022.3163685 – volume: 10 start-page: 7380 issue: 8 year: 2023 ident: 10.1016/j.jestch.2024.101634_b31 article-title: Exploiting semi-tensor product compressed sensing and hybrid cloud for secure medical image transmission publication-title: IEEE Internet Things J. doi: 10.1109/JIOT.2022.3228781 – volume: 35 start-page: 37 issue: 3 year: 2023 ident: 10.1016/j.jestch.2024.101634_b25 article-title: Exploiting 3D fractal cube and chaos for effective multi-image compression and encryption publication-title: J. King Saud Univ. Comput. Inform. Sci. |
SSID | ssj0001921156 |
Score | 2.4172335 |
Snippet | Recently, a bit-level image encryption algorithm based on chaotic maps (BCIEA) has been presented. BCIEA consists of diffusion and confusion, and its security... |
SourceID | doaj crossref elsevier |
SourceType | Open Website Enrichment Source Index Database Publisher |
StartPage | 101634 |
SubjectTerms | Chaos Cryptanalysis Image encryption Image privacy Multimedia security |
SummonAdditionalLinks | – databaseName: Elsevier ScienceDirect Open Access Journals dbid: IXB link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnR3LbtswTAhy6g5F221YurbQYVchtiXZ8rENWgQdtstWIDeDeiUO8kLmHbqvLyXbbXpZgV4MmCBlkyJI2uKDkG86S53WTjAPeBHSW6atSpiSWptMF6ZtsfHjZz59EPczORuQSV8LE9IqO9vf2vRorTvIuJPmeFfX418ZequkDAUO8TxthnaYCxWL-GY3L_9ZSvzEiUNcAz4LBH0FXUzzWqLxjacSmYggLl55qNjI_8BRHTifuxNy3EWN9Lp9sVMycJsz8uGgl-BH8n2yf9xhpAerx38IoEB13bBVyAmi9RqtBkXeAgpuBIXVfLuvm8WaBi9mKYLMAra4Ol3D7s8n8nB3-3syZd2kBGZEqhoWSgkyL6W2mYK0BOEsl9YrZ01q0P3wUnoudVlYFWZOcZGnXvvcp5YnJSjOP5PhZrtxXwgtwCslcwgpUYI7KK12iAIIUQBFOSK8l05lujbiYZrFqurzxZZVK9MqyLRqZToi7Jlq17bReAP_Jgj-GTc0wY6A7X5edVpQJZlxibAyBeDCOqlMLpCpQhpktpDpiBT9tlWvdAqXqv_7-PN3U34lR-GuzVK7IMNm_9ddYtjS6Kuol09IPusT priority: 102 providerName: Elsevier |
Title | Cryptanalyzing a bit-level image encryption algorithm based on chaotic maps |
URI | https://dx.doi.org/10.1016/j.jestch.2024.101634 https://doaj.org/article/02ce04d51aa34de58c64f6f75cf35751 |
Volume | 51 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV07T8MwELZQJxgQT1Fe8sAa0cR24oy0oiogmKjULTq_aKu-VMpQfj3nOK3CQheWDKeLHX05-T7L5-8IuVNJbJWyPHKADy6ciZSRrUgKpXSiMh0kNl7f0l6fPw_EoNbqy9eEBXngANx9K9G2xY2IARg3Vkidcpe6TGjH_JmBX30x59U2U-PAW5DqpJu7cmVB1xiX2fL8IeGlifFfuaiU7K-lpFqa6R6Rw4of0ofwXcdkz85OyEFNNfCUvHSW6wVyOpisv9FAgarRKpr46h86muL6QDHyvAtCTmHyMcf9_3BKfb4yFE16CHMcnU5h8XlG-t3H904vqnoiRJrHchX5SwOJE0KZREKcA7eGCeOkNTrWmGhYLhAXlWdG-u5SjKexU4hXbFgrB8nYOWnM5jN7QWgGTkqRgi9-4sxCbpRFF0CLBMjyJmEbdApdCYb7vhWTYlMZNi4CpoXHtAiYNkm0fWsRBDN2-Lc98FtfL3ddGjAIiioIil1B0CTZ5rcVFXMIjACHGv05_eV_TH9F9v2QoTTtmjRWyy97g1xlpW7LsMTn06D9A1iV6SQ |
linkProvider | Directory of Open Access Journals |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnR27btwwTEjToc1Q9IlemrYaugpnW5Itj80hwaV5LE2A2wTqlTi4F67OkHx9KdlOL0sLdPFAk7JJySRl8UHIN1Pk3hgvWAC8CBkcM05lTEljbGEq25XYOL8op1fix0zOdshkyIWJYZW97u90etLWPWTcS3O8bprxzwKtVVbHBId0njZ7Rp6jN1DFr_NkdvjnR0uNe5zUxTUSsEgxpNClOK9b1L7pWKIQCcTFExOVKvlvWaot63P8mrzq3Ub6vXuzN2THL9-Sva1igu_I6WRzv0ZXD-b3DwigQE3TsnkMCqLNAtUGReYiCs4Ehfn1atO0NwsazZijCLI3sMLR6QLWv96Tq-Ojy8mU9a0SmBW5alnMJSiClMYVCvIahHdcuqC8s7lF-8NrGbg0deVUbDrFRZkHE8qQO57VoDj_QHaXq6X_SGgFQSlZQoyJEtxD7YxHFECIAqjqEeGDdLTt64jHdhZzPQSM3epOpjrKVHcyHRH2SLXu6mj8A_8wCv4RN1bBToDV5lr3y0BnhfWZcDIH4MJ5qWwpkKlKWmS2kvmIVMO06SeLCodq_vr4_f-m_EpeTC_Pz_TZycXpJ_Iy3ulC1g7Ibru585_Rh2nNl7RGfwMjzO4z |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Cryptanalyzing+a+bit-level+image+encryption+algorithm+based+on+chaotic+maps&rft.jtitle=Engineering+science+and+technology%2C+an+international+journal&rft.au=Wen%2C+Heping&rft.au=Lin%2C+Yiting&rft.au=Feng%2C+Zhaoyang&rft.date=2024-03-01&rft.issn=2215-0986&rft.eissn=2215-0986&rft.volume=51&rft.spage=101634&rft_id=info:doi/10.1016%2Fj.jestch.2024.101634&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_jestch_2024_101634 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2215-0986&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2215-0986&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2215-0986&client=summon |