BREAKING A CHAOTIC IMAGE ENCRYPTION ALGORITHM BASED ON MODULO ADDITION AND XOR OPERATION

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Breaking a chaotic image encryption algorithm based on modulo addition and XOR operation

This paper re-evaluates the security of a chaotic image encryption algorithm called 13 MCKBA/HCKBA and finds that it can be broken efficiently with two known plain-images and 14 the corresponding cipher-images. In addition, it is reported that a previously proposed breaking 15 on MCKBA/HCKBA can be further improved by reducing the number of chosen plain-images 16 to two from four. The two attac...

متن کامل

Breaking a chaotic image encryption algorithm based on perceptron model

Recently, a chaotic image encryption algorithm based on perceptron model was proposed. The present paper analyzes security of the algorithm and finds that the equivalent secret key can be reconstructed with only one pair of known-plaintext/ciphertext, which is supported by both mathematical proof and experiment results. In addition, some other security defects are also reported.

متن کامل

A RGB image encryption algorithm based on DNA sequence operation and hyper-chaotic system

The proposed encryption algorithm is composed of two parts, permutation and diffusion. we firstly separate the RGB image into R, G, B components, and Generate three chaotic sequences by chaotic maps to encryption. Then, transform the R, G, B components and the chaotic sequences into DNA code, and get DNA sequences matrix. Secondly, DNA matrices of the RGB image is permutated under the Chen’s hy...

متن کامل

A stack-based chaotic algorithm for encryption of colored images

In this paper, a new method is presented for encryption of colored images. This method is based on using stack data structure and chaos which make the image encryption algorithm more efficient and robust. In the proposed algorithm, a series of data whose range is between 0 and 3 is generated using chaotic logistic system. Then, the original image is divided into four subimages, and these four i...

متن کامل

Image Encryption using Chaotic Maps and DNA Addition Operation and Noise Effects on it

In this paper, four chaotic maps are compared and noise effects are observed on image. Firstly, we use the image encryption algorithm to convert original image to encrypted image. Now we apply noise on the encrypted image and then decrypt cipher image with noise back to original image. The Simulation experimental results shows that Cross Chaotic map has got best results. Also, noise has a littl...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Bifurcation and Chaos

سال: 2013

ISSN: 0218-1274,1793-6551

DOI: 10.1142/s0218127413500752