Cryptanalyzing an image cipher using multiple chaos and DNA operations
Recently, an improved color image cipher (ICIC-DNA) based on multiple deoxyribonucleic acid (DNA) sequence operations with DNA synthetic image and chaos was proposed. ICIC-DNA features the use of multiple chaotic systems and diverse DNA operations. However, after our careful cryptanalysis, we found...
Saved in:
Published in | Journal of King Saud University. Computer and information sciences Vol. 35; no. 7; p. 101612 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
Elsevier B.V
01.07.2023
Springer |
Subjects | |
Online Access | Get full text |
ISSN | 1319-1578 2213-1248 |
DOI | 10.1016/j.jksuci.2023.101612 |
Cover
Loading…
Abstract | Recently, an improved color image cipher (ICIC-DNA) based on multiple deoxyribonucleic acid (DNA) sequence operations with DNA synthetic image and chaos was proposed. ICIC-DNA features the use of multiple chaotic systems and diverse DNA operations. However, after our careful cryptanalysis, we found that ICIC-DNA has several fatal security flaws. First, despite the use of multiple chaotic systems, the corresponding encryption sequences are independent of the plaintext, such that equivalent keys exist. Second, the diverse DNA operation is essentially a 2-bit data substitution process, and thus can be equivalently simplified. Third, ICIC-DNA includes substitution and permutation of DNA domains, and based on the equivalent simplification operation, the substitution and permutation can be attacked separately. Based on these, we propose a chosen-plaintext attack method to attack ICIC-DNA. Differential analysis is firstly adopted to break the DNA-base permutation process, and then the DNA domain encryption is eliminated, and finally the equivalent key is used to achieve complete cracking. Theoretical analysis and experimental results show that the proposed attack method is effective and has low computational complexity and data complexity. |
---|---|
AbstractList | Recently, an improved color image cipher (ICIC-DNA) based on multiple deoxyribonucleic acid (DNA) sequence operations with DNA synthetic image and chaos was proposed. ICIC-DNA features the use of multiple chaotic systems and diverse DNA operations. However, after our careful cryptanalysis, we found that ICIC-DNA has several fatal security flaws. First, despite the use of multiple chaotic systems, the corresponding encryption sequences are independent of the plaintext, such that equivalent keys exist. Second, the diverse DNA operation is essentially a 2-bit data substitution process, and thus can be equivalently simplified. Third, ICIC-DNA includes substitution and permutation of DNA domains, and based on the equivalent simplification operation, the substitution and permutation can be attacked separately. Based on these, we propose a chosen-plaintext attack method to attack ICIC-DNA. Differential analysis is firstly adopted to break the DNA-base permutation process, and then the DNA domain encryption is eliminated, and finally the equivalent key is used to achieve complete cracking. Theoretical analysis and experimental results show that the proposed attack method is effective and has low computational complexity and data complexity. |
ArticleNumber | 101612 |
Author | Wen, Heping Lin, Yiting |
Author_xml | – sequence: 1 givenname: Heping orcidid: 0000-0002-1178-4598 surname: Wen fullname: Wen, Heping email: wenheping@uestc.edu.cn – sequence: 2 givenname: Yiting orcidid: 0000-0003-4159-3132 surname: Lin fullname: Lin, Yiting email: Dr.YitingLin@gmail.com |
BookMark | eNqFkMtOwzAQRS0EEqXwByzyAyl-xXFYIKHylBBsYG2NnWnrkCaRnSKVrydtEAsWsBrpau7RzDkhh03bICHnjM4YZeqimlXvceP8jFMu9hHjB2TCORMp41IfkgkTrEhZlutjchZjRSllucqkUBNyNw_brocG6u2nb5YJNIlfwxIT57sVhmQTd-l6U_e-q4d0BW0clsrk5vk6aTsM0Pu2iafkaAF1xLPvOSVvd7ev84f06eX-cX79lDrJdJ8KoaUVCNbaXDGAfKE1SAma2YIKJRhmQHNlpeKaSo7WKWVzdJAVssgcF1PyOHLLFirTheHWsDUteLMP2rA0EHrvajSy0LxktOSca0lRQylooWABVpfaOTmw5MhyoY0x4OKHx6jZeTSVGdWanVozqh1ql79qzvd7C30AX_9XvhrLOEj68BhMdB4bh6UP6PrhC_834Aun6JhR |
CitedBy_id | crossref_primary_10_1038_s41598_024_62260_3 crossref_primary_10_1038_s41598_023_41082_9 crossref_primary_10_1007_s11071_024_10726_4 crossref_primary_10_1109_ACCESS_2024_3377665 crossref_primary_10_1088_1402_4896_ad9869 crossref_primary_10_1155_cplx_2910833 crossref_primary_10_1088_1402_4896_ad935b crossref_primary_10_3389_fphy_2024_1469418 crossref_primary_10_1142_S021812742450175X crossref_primary_10_1016_j_eswa_2023_121514 crossref_primary_10_1088_1402_4896_ad5ed1 crossref_primary_10_1088_1402_4896_adaa39 crossref_primary_10_1371_journal_pone_0300228 crossref_primary_10_1080_09540091_2024_2312108 crossref_primary_10_1007_s11571_025_10217_1 crossref_primary_10_1109_ACCESS_2024_3436558 crossref_primary_10_1109_ACCESS_2024_3454562 crossref_primary_10_1109_TII_2024_3395631 crossref_primary_10_1088_1402_4896_ad99a0 crossref_primary_10_1049_ipr2_13171 crossref_primary_10_1016_j_eswa_2024_123748 crossref_primary_10_1109_ACCESS_2025_3525729 crossref_primary_10_1088_1402_4896_ad7c8f crossref_primary_10_1088_1402_4896_ad30ec crossref_primary_10_1038_s41598_024_53325_4 crossref_primary_10_1007_s00530_024_01449_y crossref_primary_10_1080_09500340_2024_2395982 crossref_primary_10_1145_3708546 crossref_primary_10_1109_ACCESS_2024_3412681 crossref_primary_10_1088_1402_4896_ad87c5 crossref_primary_10_1109_ACCESS_2024_3432876 crossref_primary_10_1088_1402_4896_ad6062 crossref_primary_10_1088_1402_4896_ad6f48 crossref_primary_10_1007_s11071_025_10979_7 crossref_primary_10_1016_j_eswa_2024_123583 crossref_primary_10_1016_j_eswa_2024_124891 crossref_primary_10_1109_ACCESS_2024_3354170 |
Cites_doi | 10.1016/j.ijleo.2021.167286 10.1007/s11042-013-1533-6 10.1142/S0218127420501734 10.1364/OE.416154 10.1016/j.optlastec.2014.01.015 10.3390/e23081000 10.1016/j.ins.2020.10.007 10.1007/s11071-021-06472-6 10.1016/j.ijleo.2012.11.018 10.1109/TCSVT.2022.3140974 10.1007/s11042-022-12268-6 10.3390/e17106954 10.1016/j.compeleceng.2012.02.007 10.1142/S0218127419501682 10.3390/math10173180 10.1016/j.mcm.2010.06.005 10.1016/j.ijleo.2013.05.009 10.1109/TC.2021.3051387 10.1016/j.optlastec.2019.105777 10.1142/S021812742150142X 10.3390/e21030246 10.1109/MMUL.2021.3114589 10.1016/j.ijleo.2015.09.091 10.1016/j.jss.2011.08.017 10.3390/e24081023 10.3390/e23020258 10.3390/e24101332 10.1109/LSP.2022.3163685 10.1016/j.ijleo.2013.09.018 10.1016/j.optlastec.2021.107316 |
ContentType | Journal Article |
Copyright | 2023 The Author(s) |
Copyright_xml | – notice: 2023 The Author(s) |
DBID | 6I. AAFTH AAYXX CITATION DOA |
DOI | 10.1016/j.jksuci.2023.101612 |
DatabaseName | ScienceDirect Open Access Titles Elsevier:ScienceDirect:Open Access CrossRef DOAJ Directory of Open Access Journals |
DatabaseTitle | CrossRef |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISSN | 2213-1248 |
ExternalDocumentID | oai_doaj_org_article_4982d10d222840e8ad3096afab8d8cc4 10_1016_j_jksuci_2023_101612 S1319157823001660 |
GroupedDBID | --K 0R~ 0SF 4.4 457 5VS 6I. AACTN AAEDT AAEDW AAFTH AAIKJ AALRI AAQXK AAXUO ABMAC ACGFS ADBBV ADEZE AEXQZ AFTJW AGHFR AITUG ALMA_UNASSIGNED_HOLDINGS AMRAJ ASPBG AVWKF AZFZN BCNDV EBS EJD FDB FEDTE FGOYB GROUPED_DOAJ HVGLF HZ~ IPNFZ IXB KQ8 M41 NCXOZ O-L O9- OK1 R2- RIG ROL SES SSZ XH2 AAJSJ AASML AAYWO AAYXX ABEEZ ABWVN ACULB ADVLN AFGXO AFJKZ AGQPQ APXCP C6C CITATION SOJ |
ID | FETCH-LOGICAL-c418t-3384b3eabbb761aa7f88a44a81b903631e5a076b4628042ebc66b7eca59495c23 |
IEDL.DBID | IXB |
ISSN | 1319-1578 |
IngestDate | Wed Aug 27 01:23:28 EDT 2025 Thu Apr 24 23:10:17 EDT 2025 Tue Jul 01 04:25:22 EDT 2025 Fri Feb 23 02:36:45 EST 2024 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 7 |
Keywords | Chaos Cryptanalysis Image encryption DNA coding |
Language | English |
License | This is an open access article under the CC BY-NC-ND license. |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c418t-3384b3eabbb761aa7f88a44a81b903631e5a076b4628042ebc66b7eca59495c23 |
ORCID | 0000-0002-1178-4598 0000-0003-4159-3132 |
OpenAccessLink | https://www.sciencedirect.com/science/article/pii/S1319157823001660 |
ParticipantIDs | doaj_primary_oai_doaj_org_article_4982d10d222840e8ad3096afab8d8cc4 crossref_primary_10_1016_j_jksuci_2023_101612 crossref_citationtrail_10_1016_j_jksuci_2023_101612 elsevier_sciencedirect_doi_10_1016_j_jksuci_2023_101612 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | July 2023 2023-07-00 2023-07-01 |
PublicationDateYYYYMMDD | 2023-07-01 |
PublicationDate_xml | – month: 07 year: 2023 text: July 2023 |
PublicationDecade | 2020 |
PublicationTitle | Journal of King Saud University. Computer and information sciences |
PublicationYear | 2023 |
Publisher | Elsevier B.V Springer |
Publisher_xml | – name: Elsevier B.V – name: Springer |
References | Ali, Ali (b0005) 2022; 81 Wen, Wu, Ma, Liu, Lin, Zhou, Jian, Lin, Liu, Zheng, Zhang (b0135) 2023; 15 Liu, Kadir, Xu (b0075) 2020; 30 Wen, Xu, Liao, Chen, Shen, Wen, Shi, Lin, Liang, Zhang, Liu, Huo, Li, Cai, Wen, Zhang (b0115) 2021; 23 Farah, Guesmi, Kachouri, Samet (b0035) 2020; 121 Cun, Tong, Wang, Zhang (b0030) 2021; 243 Song, Qiao (b0090) 2015; 17 Wang, Su (b0095) 2021; 95 Hua, Wang, Yi, Zhou, Jia (b0050) 2022; 32 Wang, Zhao (b0100) 2021; 143 Kalpana, Murali (b0055) 2015; 126 Liu, Zhang, Wei (b0065) 2012; 38 Chai, Wu, Gan, Han, Zhang, Chen (b0015) 2021; 556 Hua, Zhu, Chen, Li (b0045) 2021; 104 Liu, Li, Hu (b0080) 2022; 29 Wei, Guo, Zhang, Zhang, Lian (b0105) 2012; 85 Chai, Wang, Chen, Gan, Zhang (b0020) 2022; 29 Wen, Chen, Zheng, Huang, Li, Ma, Lin, Liu, Li, Liu, Lin, Yang, Zhang, Yang (b0125) 2022; 24 Zhang, Wen, Su, Li (b0155) 2019; 125 Bao, Luo, Bao, Chen, Wu, Xu (b0010) 2019; 29 Zhang, Guo, Wei (b0150) 2010; 52 Wen, Zhang, Huang, Ke, Xiong (b0120) 2021; 23 Chen, Yu, Li, Lü (b0025) 2021; 31 Zhang, Wei (b0145) 2019; 124 Hermassi, Belazi, Rhouma, Belghith (b0040) 2014; 72 Liu, Tang, Xie (b0070) 2014; 60 Zhang, Guo, Wei (b0160) 2019; 124 Shi, Yu, Wang (b0085) 2022; 24 Wu, Zhang, Chen, Cui, Huang, Zhang, Wen, Zhao, Qiu (b0140) 2021; 29 Wen, Yu, Lü (b0110) 2019; 21 Wen, Liu, Lai, Zhang, Liu, Yang, Lin, Li, Liao, Ma, Chen, Li (b0130) 2022; 10 Li, Tan, Feng, Lü (b0060) 2022; 71 Shi (10.1016/j.jksuci.2023.101612_b0085) 2022; 24 Ali (10.1016/j.jksuci.2023.101612_b0005) 2022; 81 Hua (10.1016/j.jksuci.2023.101612_b0050) 2022; 32 Li (10.1016/j.jksuci.2023.101612_b0060) 2022; 71 Song (10.1016/j.jksuci.2023.101612_b0090) 2015; 17 Zhang (10.1016/j.jksuci.2023.101612_b0145) 2019; 124 Zhang (10.1016/j.jksuci.2023.101612_b0150) 2010; 52 Wu (10.1016/j.jksuci.2023.101612_b0140) 2021; 29 Hua (10.1016/j.jksuci.2023.101612_b0045) 2021; 104 Zhang (10.1016/j.jksuci.2023.101612_b0155) 2019; 125 Kalpana (10.1016/j.jksuci.2023.101612_b0055) 2015; 126 Wang (10.1016/j.jksuci.2023.101612_b0100) 2021; 143 Liu (10.1016/j.jksuci.2023.101612_b0075) 2020; 30 Wen (10.1016/j.jksuci.2023.101612_b0115) 2021; 23 Liu (10.1016/j.jksuci.2023.101612_b0065) 2012; 38 Wei (10.1016/j.jksuci.2023.101612_b0105) 2012; 85 Liu (10.1016/j.jksuci.2023.101612_b0080) 2022; 29 Liu (10.1016/j.jksuci.2023.101612_b0070) 2014; 60 Zhang (10.1016/j.jksuci.2023.101612_b0160) 2019; 124 Chai (10.1016/j.jksuci.2023.101612_b0020) 2022; 29 Wang (10.1016/j.jksuci.2023.101612_b0095) 2021; 95 Wen (10.1016/j.jksuci.2023.101612_b0130) 2022; 10 Farah (10.1016/j.jksuci.2023.101612_b0035) 2020; 121 Wen (10.1016/j.jksuci.2023.101612_b0120) 2021; 23 Chai (10.1016/j.jksuci.2023.101612_b0015) 2021; 556 Cun (10.1016/j.jksuci.2023.101612_b0030) 2021; 243 Wen (10.1016/j.jksuci.2023.101612_b0110) 2019; 21 Wen (10.1016/j.jksuci.2023.101612_b0135) 2023; 15 Hermassi (10.1016/j.jksuci.2023.101612_b0040) 2014; 72 Bao (10.1016/j.jksuci.2023.101612_b0010) 2019; 29 Chen (10.1016/j.jksuci.2023.101612_b0025) 2021; 31 Wen (10.1016/j.jksuci.2023.101612_b0125) 2022; 24 |
References_xml | – volume: 29 start-page: 3669 year: 2021 end-page: 3684 ident: b0140 article-title: Compressive sensing chaotic encryption algorithms for OFDM-PON data transmission publication-title: Opt. Express – volume: 17 start-page: 6954 year: 2015 end-page: 6968 ident: b0090 article-title: A novel image encryption algorithm based on DNA encoding and spatiotemporal chaos publication-title: Entropy – volume: 121 start-page: 105777 year: 2020 ident: b0035 article-title: A novel chaos based optical image encryption using fractional fourier transform and dna sequence operation publication-title: Opt. Laser Technol. – volume: 71 start-page: 364 year: 2022 end-page: 377 ident: b0060 article-title: The graph structure of the generalized discrete Arnold’s Cat Map publication-title: IEEE Trans. Comput. – volume: 60 start-page: 111 year: 2014 end-page: 115 ident: b0070 article-title: Cryptanalyzing a RGB image encryption algorithm based on DNA encoding and chaos map publication-title: Opt. Laser Technol. – volume: 243 start-page: 167286 year: 2021 ident: b0030 article-title: Selective image encryption method based on dynamic dna coding and new chaotic map publication-title: Optik – volume: 24 start-page: 1332 year: 2022 ident: b0125 article-title: Design and embedded implementation of secure image encryption scheme using DWT and 2D-LASM publication-title: Entropy – volume: 29 start-page: 74 year: 2022 end-page: 84 ident: b0080 article-title: Cryptanalyzing two image encryption algorithms based on a First-Order Time-Delay system publication-title: IEEE MultiMedia – volume: 124 start-page: 3596 year: 2019 end-page: 3600 ident: b0160 article-title: A novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system publication-title: Optik - Int. J. Light Electron Opt. – volume: 21 start-page: 246 year: 2019 ident: b0110 article-title: Breaking an Image Encryption Algorithm Based on DNA Encoding and Spatiotemporal Chaos publication-title: Entropy – volume: 72 start-page: 2211 year: 2014 end-page: 2224 ident: b0040 article-title: Security analysis of an image encryption algorithm based on a DNA addition combining with chaotic maps publication-title: Multimedia Tools Appl. – volume: 52 start-page: 2028 year: 2010 end-page: 2035 ident: b0150 article-title: Image encryption using DNA addition combining with chaotic maps publication-title: Mathe. Comput. Modell. – volume: 24 start-page: 1023 year: 2022 ident: b0085 article-title: Security analysis of the image encryption algorithm based on a two-dimensional infinite collapse map publication-title: Entropy – volume: 15 start-page: 1 year: 2023 end-page: 11 ident: b0135 article-title: Secure optical image communication using double random transformation and memristive chaos publication-title: IEEE Photonics J. – volume: 85 start-page: 290 year: 2012 end-page: 299 ident: b0105 article-title: A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system publication-title: J. Syst. Softw. – volume: 29 start-page: 1950168 year: 2019 ident: b0010 article-title: A simple nonautonomous hidden chaotic system with a switchable stable node-focus publication-title: Int. J. Bifurcat. Chaos – volume: 124 start-page: 6276 year: 2019 end-page: 6281 ident: b0145 article-title: A novel couple images encryption algorithm based on DNA subsequence operation and chaotic system publication-title: Optik – volume: 81 start-page: 20585 year: 2022 end-page: 20609 ident: b0005 article-title: A novel color image encryption scheme based on a new dynamic compound chaotic map and s-box publication-title: Multimedia Tools Appl. – volume: 556 start-page: 305 year: 2021 end-page: 340 ident: b0015 article-title: An efficient approach for encrypting double color images into a visually meaningful cipher image using 2D compressive sensing publication-title: Inf. Sci. – volume: 23 start-page: 1000 year: 2021 ident: b0115 article-title: A security-enhanced image communication scheme using cellular neural network publication-title: Entropy – volume: 95 start-page: 116246 year: 2021 ident: b0095 article-title: Image encryption based on compressed sensing and DNA encoding publication-title: Signal Process.: Image Commun. – volume: 126 start-page: 5703 year: 2015 end-page: 5709 ident: b0055 article-title: An improved color image encryption based on multiple DNA sequence operations with DNA synthetic image and chaos publication-title: Optik – volume: 23 start-page: 258 year: 2021 ident: b0120 article-title: Security Analysis of a Color Image Encryption Algorithm Using a Fractional-Order Chaos publication-title: Entropy – volume: 29 start-page: 972 year: 2022 end-page: 976 ident: b0020 article-title: TPE-GAN: Thumbnail Preserving Encryption Based on GAN With Key publication-title: IEEE Signal Process. Lett. – volume: 32 start-page: 4968 year: 2022 end-page: 4982 ident: b0050 article-title: Reversible data hiding in encrypted images using cipher-feedback secret sharing publication-title: IEEE Trans. Circuits Syst. Video Technol. – volume: 143 start-page: 107316 year: 2021 ident: b0100 article-title: An image encryption algorithm based on hyperchaotic system and dna coding publication-title: Opt. Laser Technol. – volume: 104 start-page: 4505 year: 2021 end-page: 4522 ident: b0045 article-title: Color image encryption using orthogonal latin squares and a new 2D chaotic system publication-title: Nonlinear Dyn. – volume: 38 start-page: 1240 year: 2012 end-page: 1248 ident: b0065 article-title: A RGB image encryption algorithm based on DNA encoding and chaos map publication-title: Comput. Electr. Eng. – volume: 125 start-page: 1562 year: 2019 end-page: 1564 ident: b0155 article-title: Cryptanalyzing a novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system publication-title: Optik – volume: 30 start-page: 2050173 year: 2020 ident: b0075 article-title: Color image encryption with cipher feedback and coupling chaotic map publication-title: Int. J. Bifurcat. Chaos – volume: 10 start-page: 3180 year: 2022 ident: b0130 article-title: Secure DNA-Coding image optical communication using non-degenerate hyperchaos and dynamic secret-key publication-title: Mathematics – volume: 31 start-page: 2150142 year: 2021 ident: b0025 article-title: Cryptanalysis of some self-synchronous chaotic stream ciphers and their improved schemes publication-title: Int. J. Bifurcat. Chaos – volume: 243 start-page: 167286 year: 2021 ident: 10.1016/j.jksuci.2023.101612_b0030 article-title: Selective image encryption method based on dynamic dna coding and new chaotic map publication-title: Optik doi: 10.1016/j.ijleo.2021.167286 – volume: 72 start-page: 2211 year: 2014 ident: 10.1016/j.jksuci.2023.101612_b0040 article-title: Security analysis of an image encryption algorithm based on a DNA addition combining with chaotic maps publication-title: Multimedia Tools Appl. doi: 10.1007/s11042-013-1533-6 – volume: 30 start-page: 2050173 year: 2020 ident: 10.1016/j.jksuci.2023.101612_b0075 article-title: Color image encryption with cipher feedback and coupling chaotic map publication-title: Int. J. Bifurcat. Chaos doi: 10.1142/S0218127420501734 – volume: 29 start-page: 3669 year: 2021 ident: 10.1016/j.jksuci.2023.101612_b0140 article-title: Compressive sensing chaotic encryption algorithms for OFDM-PON data transmission publication-title: Opt. Express doi: 10.1364/OE.416154 – volume: 60 start-page: 111 year: 2014 ident: 10.1016/j.jksuci.2023.101612_b0070 article-title: Cryptanalyzing a RGB image encryption algorithm based on DNA encoding and chaos map publication-title: Opt. Laser Technol. doi: 10.1016/j.optlastec.2014.01.015 – volume: 23 start-page: 1000 year: 2021 ident: 10.1016/j.jksuci.2023.101612_b0115 article-title: A security-enhanced image communication scheme using cellular neural network publication-title: Entropy doi: 10.3390/e23081000 – volume: 556 start-page: 305 year: 2021 ident: 10.1016/j.jksuci.2023.101612_b0015 article-title: An efficient approach for encrypting double color images into a visually meaningful cipher image using 2D compressive sensing publication-title: Inf. Sci. doi: 10.1016/j.ins.2020.10.007 – volume: 104 start-page: 4505 year: 2021 ident: 10.1016/j.jksuci.2023.101612_b0045 article-title: Color image encryption using orthogonal latin squares and a new 2D chaotic system publication-title: Nonlinear Dyn. doi: 10.1007/s11071-021-06472-6 – volume: 124 start-page: 3596 year: 2019 ident: 10.1016/j.jksuci.2023.101612_b0160 article-title: A novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system publication-title: Optik - Int. J. Light Electron Opt. doi: 10.1016/j.ijleo.2012.11.018 – volume: 32 start-page: 4968 year: 2022 ident: 10.1016/j.jksuci.2023.101612_b0050 article-title: Reversible data hiding in encrypted images using cipher-feedback secret sharing publication-title: IEEE Trans. Circuits Syst. Video Technol. doi: 10.1109/TCSVT.2022.3140974 – volume: 81 start-page: 20585 year: 2022 ident: 10.1016/j.jksuci.2023.101612_b0005 article-title: A novel color image encryption scheme based on a new dynamic compound chaotic map and s-box publication-title: Multimedia Tools Appl. doi: 10.1007/s11042-022-12268-6 – volume: 17 start-page: 6954 year: 2015 ident: 10.1016/j.jksuci.2023.101612_b0090 article-title: A novel image encryption algorithm based on DNA encoding and spatiotemporal chaos publication-title: Entropy doi: 10.3390/e17106954 – volume: 38 start-page: 1240 year: 2012 ident: 10.1016/j.jksuci.2023.101612_b0065 article-title: A RGB image encryption algorithm based on DNA encoding and chaos map publication-title: Comput. Electr. Eng. doi: 10.1016/j.compeleceng.2012.02.007 – volume: 29 start-page: 1950168 year: 2019 ident: 10.1016/j.jksuci.2023.101612_b0010 article-title: A simple nonautonomous hidden chaotic system with a switchable stable node-focus publication-title: Int. J. Bifurcat. Chaos doi: 10.1142/S0218127419501682 – volume: 10 start-page: 3180 year: 2022 ident: 10.1016/j.jksuci.2023.101612_b0130 article-title: Secure DNA-Coding image optical communication using non-degenerate hyperchaos and dynamic secret-key publication-title: Mathematics doi: 10.3390/math10173180 – volume: 52 start-page: 2028 year: 2010 ident: 10.1016/j.jksuci.2023.101612_b0150 article-title: Image encryption using DNA addition combining with chaotic maps publication-title: Mathe. Comput. Modell. doi: 10.1016/j.mcm.2010.06.005 – volume: 124 start-page: 6276 year: 2019 ident: 10.1016/j.jksuci.2023.101612_b0145 article-title: A novel couple images encryption algorithm based on DNA subsequence operation and chaotic system publication-title: Optik doi: 10.1016/j.ijleo.2013.05.009 – volume: 71 start-page: 364 year: 2022 ident: 10.1016/j.jksuci.2023.101612_b0060 article-title: The graph structure of the generalized discrete Arnold’s Cat Map publication-title: IEEE Trans. Comput. doi: 10.1109/TC.2021.3051387 – volume: 15 start-page: 1 year: 2023 ident: 10.1016/j.jksuci.2023.101612_b0135 article-title: Secure optical image communication using double random transformation and memristive chaos publication-title: IEEE Photonics J. – volume: 121 start-page: 105777 year: 2020 ident: 10.1016/j.jksuci.2023.101612_b0035 article-title: A novel chaos based optical image encryption using fractional fourier transform and dna sequence operation publication-title: Opt. Laser Technol. doi: 10.1016/j.optlastec.2019.105777 – volume: 31 start-page: 2150142 year: 2021 ident: 10.1016/j.jksuci.2023.101612_b0025 article-title: Cryptanalysis of some self-synchronous chaotic stream ciphers and their improved schemes publication-title: Int. J. Bifurcat. Chaos doi: 10.1142/S021812742150142X – volume: 21 start-page: 246 year: 2019 ident: 10.1016/j.jksuci.2023.101612_b0110 article-title: Breaking an Image Encryption Algorithm Based on DNA Encoding and Spatiotemporal Chaos publication-title: Entropy doi: 10.3390/e21030246 – volume: 29 start-page: 74 year: 2022 ident: 10.1016/j.jksuci.2023.101612_b0080 article-title: Cryptanalyzing two image encryption algorithms based on a First-Order Time-Delay system publication-title: IEEE MultiMedia doi: 10.1109/MMUL.2021.3114589 – volume: 126 start-page: 5703 year: 2015 ident: 10.1016/j.jksuci.2023.101612_b0055 article-title: An improved color image encryption based on multiple DNA sequence operations with DNA synthetic image and chaos publication-title: Optik doi: 10.1016/j.ijleo.2015.09.091 – volume: 85 start-page: 290 year: 2012 ident: 10.1016/j.jksuci.2023.101612_b0105 article-title: A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system publication-title: J. Syst. Softw. doi: 10.1016/j.jss.2011.08.017 – volume: 24 start-page: 1023 year: 2022 ident: 10.1016/j.jksuci.2023.101612_b0085 article-title: Security analysis of the image encryption algorithm based on a two-dimensional infinite collapse map publication-title: Entropy doi: 10.3390/e24081023 – volume: 23 start-page: 258 year: 2021 ident: 10.1016/j.jksuci.2023.101612_b0120 article-title: Security Analysis of a Color Image Encryption Algorithm Using a Fractional-Order Chaos publication-title: Entropy doi: 10.3390/e23020258 – volume: 24 start-page: 1332 year: 2022 ident: 10.1016/j.jksuci.2023.101612_b0125 article-title: Design and embedded implementation of secure image encryption scheme using DWT and 2D-LASM publication-title: Entropy doi: 10.3390/e24101332 – volume: 95 start-page: 116246 year: 2021 ident: 10.1016/j.jksuci.2023.101612_b0095 article-title: Image encryption based on compressed sensing and DNA encoding publication-title: Signal Process.: Image Commun. – volume: 29 start-page: 972 year: 2022 ident: 10.1016/j.jksuci.2023.101612_b0020 article-title: TPE-GAN: Thumbnail Preserving Encryption Based on GAN With Key publication-title: IEEE Signal Process. Lett. doi: 10.1109/LSP.2022.3163685 – volume: 125 start-page: 1562 year: 2019 ident: 10.1016/j.jksuci.2023.101612_b0155 article-title: Cryptanalyzing a novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system publication-title: Optik doi: 10.1016/j.ijleo.2013.09.018 – volume: 143 start-page: 107316 year: 2021 ident: 10.1016/j.jksuci.2023.101612_b0100 article-title: An image encryption algorithm based on hyperchaotic system and dna coding publication-title: Opt. Laser Technol. doi: 10.1016/j.optlastec.2021.107316 |
SSID | ssj0001765436 |
Score | 2.5254972 |
Snippet | Recently, an improved color image cipher (ICIC-DNA) based on multiple deoxyribonucleic acid (DNA) sequence operations with DNA synthetic image and chaos was... |
SourceID | doaj crossref elsevier |
SourceType | Open Website Enrichment Source Index Database Publisher |
StartPage | 101612 |
SubjectTerms | Chaos Cryptanalysis DNA coding Image encryption |
SummonAdditionalLinks | – databaseName: DOAJ Directory of Open Access Journals dbid: DOA link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV07T8MwELZQJxbeiPKSB9ZAnTiJM5ZCVSHRiUrdorPjQEpJqz6G8uvx2UkVFrqwWo4dXc6575LvviPkTiCdRgeJp2I_NwlKHnrAcu0FPNIMtEq01dJ7HUaDEX8Zh-NGqy_khDl5YGe4B54IP2OdDL9U8I4WkAUGdUMOUmRCKasEamJeI5myX1dirJm0pUVYpcOMX9Z1c5bcNflcrlVxj73D7RDzf8UlK9_fCE-NkNM_IgcVVqRdd4_HZE-XJ-Sw7sNAq2N5Svq9xWZuQB5MN98mElEoafFl3hNUFSgaQJHb_k5r6iBVHzBbmkkZfRp26WyunRMsz8io__zWG3hVfwRPcSZWnskuuQw0SCnjiAHEuRDAORgkmuD_WaZD6MSRxPJTcza1VFEkY60gTExapPzgnLTKWakvCA05ZAmKsUcooYbq44kfs0z4EOYJKNYmQW2dVFXi4djDYprWLLFJ6myaok1TZ9M28bZXzZ14xo75j2j47VyUvrYDxiHSyiHSXQ7RJnH92NIKRTh0YJYq_tz-8j-2vyL7uKRj9F6T1mqx1jcGt6zkrXXRHzI_57o priority: 102 providerName: Directory of Open Access Journals |
Title | Cryptanalyzing an image cipher using multiple chaos and DNA operations |
URI | https://dx.doi.org/10.1016/j.jksuci.2023.101612 https://doaj.org/article/4982d10d222840e8ad3096afab8d8cc4 |
Volume | 35 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV07b8IwELZQu3Tpuyp9IA9dU3DiJM4ItAghlYUisUVnx6GhLSAeA_319TkJhaWVOsayk-hyvofz3XeEPAiE02gvclTopiZBSX0HWKodjweagVaRtlx6L_2gO-S9kT-qkHZZC4OwysL25zbdWutipF5Isz7PsvqAGe1hyMbuYdwSYN7ucWGL-Eatn3OWEKsnbZER1uvggrKCzsK8Ju_LtcoesYu4HWLunoeyRP47jmrH-XROyXERNdJm_mJnpKKn5-Sk7MhAiw16QTrtxWZuwj342HwZn0RhSrNPYzGoypA-gCLKfUxLECFVbzBbmkkJfeo36Wyuc3VYXpJh5_m13XWKTgmO4kysHJNnculpkFKGAQMIUyGAczAxaYR_apn2oREGEgtRzS7VUgWBDLUCPzIJknK9K3IwnU31NaE-hyRCWvYAydSQhzxyQ5YIF_w0AsWqxCulE6uCRhy7WXzEJV5sEucyjVGmcS7TKnG2q-Y5jcYf81so-O1cJMG2A7PFOC60IOaRcBPWSPAQize0gMQzCRmkIEUilOJVEpafLd7TKXOr7NfH3_x75S05wqsc0HtHDlaLtb43YctK1shhs9kb9Go27a9ZLf0GzmDrPA |
linkProvider | Elsevier |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV07T8MwELYQDLDwRpSnB9bQOnEcZ4RC1fLoQit1s86OAynQVm0Z4NfjywPKAhKrYyfR5XwP57vvCDmTCKexQeyZyE9dgpKGHrDUegEXloE1sc259O67ot3nN4NwsESaVS0MwipL21_Y9NxalyP1Upr1SZbVH5jTHoZs7AHGLcLl7SsuGhCo2p3B5fdBS4Tlk3mVERbs4IqqhC7HeQ2fZ28mO8c24vkQ83-4qJzJf8FTLXif1iZZL8NGelG82RZZsqNtslG1ZKDlDt0hreb0feLiPXh5_3BOicKIZq_OZFCTIX8ARZj7I61QhNQ8wXjmJiX0qntBxxNb6MNsl_Rb171m2ytbJXiGMzn3XKLJdWBBax0JBhClUgLn4ILSGH_VMhtCIxIaK1HdNrXaCKEjayCMXYZk_GCPLI_GI7tPaMghiZGXXSCbGhKRx37EEulDmMZgWI0ElXSUKXnEsZ3Fi6oAY0NVyFShTFUh0xrxvlZNCh6NP-ZfouC_5iILdj4wnj6qUg0Uj6WfsEaCp1i8YSUkgcvIIAUtE2kMr5Go-mzqh1K5W2W_Pv7g3ytPyWq7d3-n7jrd20OyhlcKdO8RWZ5P3-yxi2Hm-iTX0U_Skuvi |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Cryptanalyzing+an+image+cipher+using+multiple+chaos+and+DNA+operations&rft.jtitle=Journal+of+King+Saud+University.+Computer+and+information+sciences&rft.au=Wen%2C+Heping&rft.au=Lin%2C+Yiting&rft.date=2023-07-01&rft.issn=1319-1578&rft.volume=35&rft.issue=7&rft.spage=101612&rft_id=info:doi/10.1016%2Fj.jksuci.2023.101612&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_jksuci_2023_101612 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1319-1578&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1319-1578&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1319-1578&client=summon |