A chaos-based image encryption scheme with a plaintext related diffusion

In recent years, chaos-based image encryption technology has been extensively studied to meet the increasing demand for online secure image transmission over open networks. However, many of them suffer from known/chosen plaintext attacks as the diffusion key stream used in those schemes is solely de...

Full description

Saved in:
Bibliographic Details
Published in2013 9th International Conference on Information, Communications and Signal Processing (ICICS) pp. 1 - 5
Main Authors Chong Fu, Shuai Hou, Wei Zhou, Wen-qi Liu, Dong-liang Wang
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.12.2013
Subjects
Online AccessGet full text
DOI10.1109/ICICS.2013.6782914

Cover

Abstract In recent years, chaos-based image encryption technology has been extensively studied to meet the increasing demand for online secure image transmission over open networks. However, many of them suffer from known/chosen plaintext attacks as the diffusion key stream used in those schemes is solely determined by the key. To address this problem, a plaintext-related diffusion strategy is presented in this paper. In the diffusion stage, the key stream elements produced by Chen's chaotic system are circularly shifted under the control of plain pixel. As a result, the key stream is related not only to the key but also to the plain image, which effectively promotes the ability against known/chosen plaintext attack. Moreover, compared with 1-dimensional chaotic maps, the Chen's chaotic system has more complicated dynamical property and number of state variables, which further enhance the security of the cryptosystem. Thorough security analysis is carried out with detailed analysis, demonstrating the satisfactory security of the proposed scheme.
AbstractList In recent years, chaos-based image encryption technology has been extensively studied to meet the increasing demand for online secure image transmission over open networks. However, many of them suffer from known/chosen plaintext attacks as the diffusion key stream used in those schemes is solely determined by the key. To address this problem, a plaintext-related diffusion strategy is presented in this paper. In the diffusion stage, the key stream elements produced by Chen's chaotic system are circularly shifted under the control of plain pixel. As a result, the key stream is related not only to the key but also to the plain image, which effectively promotes the ability against known/chosen plaintext attack. Moreover, compared with 1-dimensional chaotic maps, the Chen's chaotic system has more complicated dynamical property and number of state variables, which further enhance the security of the cryptosystem. Thorough security analysis is carried out with detailed analysis, demonstrating the satisfactory security of the proposed scheme.
Author Chong Fu
Wen-qi Liu
Wei Zhou
Shuai Hou
Dong-liang Wang
Author_xml – sequence: 1
  surname: Chong Fu
  fullname: Chong Fu
  email: fuchong@ise.neu.edu.cn
  organization: Sch. of Inf. Sci. & Eng., Northeastern Univ., Shenyang, China
– sequence: 2
  surname: Shuai Hou
  fullname: Shuai Hou
  organization: Sch. of Inf. Sci. & Eng., Northeastern Univ., Shenyang, China
– sequence: 3
  surname: Wei Zhou
  fullname: Wei Zhou
  email: toweringzhou@126.com
  organization: Gen. Hosp. of Shenyang Mil. Command, Shenyang, China
– sequence: 4
  surname: Wen-qi Liu
  fullname: Wen-qi Liu
  organization: Gen. Hosp. of Shenyang Mil. Command, Shenyang, China
– sequence: 5
  surname: Dong-liang Wang
  fullname: Dong-liang Wang
  organization: Gen. Hosp. of Shenyang Mil. Command, Shenyang, China
BookMark eNotj8FOwzAQRI0EErT0B-DiH0jYtR2nOVYR0EiVOADnyo7XxChNqtgI-vdEak9zmTd6s2DXwzgQYw8IOSJUT03d1O-5AJS5LteiQnXFFqjKqgIlpbxlqxi_AQDLUqCAO7bd8LYzY8ysieR4OJgv4jS00-mYwjjw2HZ0IP4bUscNP_YmDIn-Ep-oN2kGXPD-J87Ne3bjTR9pdckl-3x5_qi32e7ttak3uywgFCmz1joDYD0I47Ek67VEpZwHkmtAXRXWO-edKQTatpKFk1qD046EUtaTXLLH824gov1xmo2n0_5yVv4D6zhNwg
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ICICS.2013.6782914
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 1479904333
1479904341
9781479904341
9781479904334
EndPage 5
ExternalDocumentID 6782914
Genre orig-research
GroupedDBID 6IE
6IF
6IK
6IL
6IN
AAJGR
AAWTH
ADFMO
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
IEGSK
IERZE
OCL
RIE
RIL
ID FETCH-LOGICAL-i105t-bbbda00bf02af17ebf63144df0e3801695bfddfda521bc935d3660d6de244bfe3
IEDL.DBID RIE
IngestDate Wed Aug 27 04:26:03 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i105t-bbbda00bf02af17ebf63144df0e3801695bfddfda521bc935d3660d6de244bfe3
PageCount 5
ParticipantIDs ieee_primary_6782914
PublicationCentury 2000
PublicationDate 2013-Dec.
PublicationDateYYYYMMDD 2013-12-01
PublicationDate_xml – month: 12
  year: 2013
  text: 2013-Dec.
PublicationDecade 2010
PublicationTitle 2013 9th International Conference on Information, Communications and Signal Processing (ICICS)
PublicationTitleAbbrev ICICS
PublicationYear 2013
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0001772120
Score 1.5344566
Snippet In recent years, chaos-based image encryption technology has been extensively studied to meet the increasing demand for online secure image transmission over...
SourceID ieee
SourceType Publisher
StartPage 1
SubjectTerms Chaotic communication
Chen's chaotic system
Ciphers
confusion-diffusion
Correlation
Encryption
image encryption
standard map
Title A chaos-based image encryption scheme with a plaintext related diffusion
URI https://ieeexplore.ieee.org/document/6782914
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LSwMxEA61J08qrfgmB49mm92k6e5RiqUVKoIWeit5TLBoH9RdUH-9k90-UDx4CyEhIQnzzUzmmyHkOtVZBxXxhEnrgEmEUJYJ5VhHGi2kQwPCBjby8EH1R_J-3B7XyM2WCwMAZfAZRKFZ_uW7hS2Cq6yFgjXJQtXqPXxmFVdr509BNTFO-IYXw7PWoDvoPoXgLRGtJ_6ooFICSO-ADDdLV3Ejr1GRm8h-_crK-N-9HZLmjqpHH7cgdERqMG-Q_i21L3rxzgJGOTqdodCgOHT1WQoIihYtzIAGHyzVdPmmQ9KIj5yWxBacEKqmFMGN1iSj3t1zt8_WJRPYFBWlnBljnObceJ5oH3fAeCXQZHKeg0hD4pW28c55pxG1jc1E2wmluFMOEOaNB3FM6vPFHE4I9UnKrddxivglY-lRUfTcS-VjsClabqekEU5hsqyyYkzWB3D2d_c52Q83UQWCXJB6virgEuE8N1flPX4DLYGgxA
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjZ1LS8NAEMeXUg96UmlFrY89eHTTTXaTJkcpllTbIthCb2WfWLQPagLqp3c26QPFg7cQsiTswvxmJvOfQegmFkkLHPGAcKUN4YBQkrBIkxaXgnENAYRyauT-IEpH_GEcjivodquFMcYUxWfGc5fFv3y9ULlLlTXBsAaJm1q9B9znYanW2mVUwFH0A7pRxtCk2W1328-ufIt566U_ZqgUCOkcov7m5WXlyKuXZ9JTX7_6Mv73645QfSfWw09bDB2jipnXUHqH1YtYvBNHKY2nMzAbGB5dfRYmAkNMa2YGuywsFnj5JlzbiI8MF9IWWODmpuQukVZHo879sJ2S9dAEMgVXKSNSSi0olZYGwvotI23EIGjSlhoWu9YrobRaWy2A21IlLNQsiqiOtAHQS2vYCarOF3NzirANYqqs8GMgGPe5BVfRUssj6xsVQ-x2hmpuFybLsi_GZL0B53_fvkb76bDfm_S6g8cGOnCnUpaFXKBqtsrNJcA9k1fFmX4DyLSkEQ
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2013+9th+International+Conference+on+Information%2C+Communications+and+Signal+Processing+%28ICICS%29&rft.atitle=A+chaos-based+image+encryption+scheme+with+a+plaintext+related+diffusion&rft.au=Chong+Fu&rft.au=Shuai+Hou&rft.au=Wei+Zhou&rft.au=Wen-qi+Liu&rft.date=2013-12-01&rft.pub=IEEE&rft.spage=1&rft.epage=5&rft_id=info:doi/10.1109%2FICICS.2013.6782914&rft.externalDocID=6782914