Plaintext Related Two-level Secret Key Image Encryption Scheme
نویسندگان
چکیده
Some chaos-based image encryption schemes using plain-images independent secret code streams have weak encryption security and are vulnerable to chosen plaintext and chosen cipher-text attacks. This paper proposed a two-level secret key image encryption scheme, where the first-level secret key is the private symmetric secret key, and the second-level secret key is derived from both the first-level secret key and the plain image by iterating piecewise linear map and Logistic map. Even though the first-level key is identical, the different plain images will produce different second-level secret keys and different secret code streams. The results show that the proposed has high encryption speed, and also can effectively resist the existing cryptanalytic attacks.
منابع مشابه
Plaintext Related Image Encryption Scheme Using Chaotic Map
A plaintext related image blocking encryption algorithm is proposed in this paper, which includes two kinds of operations on inner-block confusion and inter-block diffusion. Firstly, a float-point lookup table need to be generated by iterating chaotic system with the secret keys as the initial values and parameters; Secondly, choose one of the entries in the look-up table according to the pixel...
متن کاملSecret Key Awareness Security Public Key Encryption Scheme
In this paper, firstly, we introduce a new security definition called secret key awareness security which is to guarantee anyone generating the public key to know the corresponding secret key. Following, we give a concrete implementing for secret key awareness security. Secondly, we present two applications: one is in plaintext awareness security cryptosystem, and another is in certificatless p...
متن کاملCryptanalysis of an image encryption scheme based on the Hill cipher
This paper studies the security of an image encryption scheme based on the Hill cipher and reports its following problems: 1) there is a simple necessary and sufficient condition that makes a number of secret keys invalid; 2) it is insensitive to the change of the secret key; 3) it is insensitive to the change of the plain-image; 4) it can be broken with only one known/chosen-plaintext; 5) it h...
متن کاملDynamic Key Exchange Method for Image Encryption
In recent years, a variety of image encryption scheme has been proposed. A new color image encryption method based on dynamic key exchange is proposed in this paper. For real time image encryption and lesser amount of time. The algorithm lacks of the characteristic of diffusion because each pixel is operated individually and a chosen/known-plaintext attack can break the scheme. The 192-bit-long...
متن کاملBreaking a novel image encryption scheme based on improved hyperchaotic sequences
Recently, a novel image encryption scheme based on improved hyperchaotic sequences was proposed. A pseudorandom number sequence, generated by a hyper-chaos system, is used to determine two involved encryption functions, bitwise exclusive or (XOR) operation and modulo addition. It was reported that the scheme can be broken with some pairs of chosen plain-images and the corresponding cipher-image...
متن کامل