Cryptanalysis of a chaotic image encryption method

The security of digital images attracts much attention recently, and many image encryption methods have been proposed. In IS-CAS2000, a new chaotic key-based algorithm (CKBA) for image encryption was proposed. This paper points out CKBA is very weak to the chosen/known-plaintext attack with only one...

Full description

Saved in:
Bibliographic Details
Published in2002 IEEE International Symposium on Circuits and Systems Vol. 2; p. II
Main Authors Shujun Li, Xuan Zheng
Format Conference Proceeding
LanguageEnglish
Published IEEE 2002
Subjects
Online AccessGet full text
ISBN9780780374485
0780374487
DOI10.1109/ISCAS.2002.1011451

Cover

Abstract The security of digital images attracts much attention recently, and many image encryption methods have been proposed. In IS-CAS2000, a new chaotic key-based algorithm (CKBA) for image encryption was proposed. This paper points out CKBA is very weak to the chosen/known-plaintext attack with only one plain-image, and its security to brute-force ciphertext-only attack is overestimated by the authors. That is to say, CKBA is not secure at all from cryptographic viewpoint. Some experiments are made to show the feasibility of the chosen/known-plaintext attack. We also discuss some remedies to the original scheme and their performance, and we find none of them can essentially improve the security of CKBA.
AbstractList The security of digital images attracts much attention recently, and many image encryption methods have been proposed. In IS-CAS2000, a new chaotic key-based algorithm (CKBA) for image encryption was proposed. This paper points out CKBA is very weak to the chosen/known-plaintext attack with only one plain-image, and its security to brute-force ciphertext-only attack is overestimated by the authors. That is to say, CKBA is not secure at all from cryptographic viewpoint. Some experiments are made to show the feasibility of the chosen/known-plaintext attack. We also discuss some remedies to the original scheme and their performance, and we find none of them can essentially improve the security of CKBA.
Author Shujun Li
Xuan Zheng
Author_xml – sequence: 1
  surname: Shujun Li
  fullname: Shujun Li
  organization: Inst. of Image Process., Xi'an Jiaotong Univ., Shaanxi, China
– sequence: 2
  surname: Xuan Zheng
  fullname: Xuan Zheng
BookMark eNotT0tqwzAUFLSFtqkv0G50Abvv6WNLy2D6CQS6SPZBlp4blcQKlje-fV2aYWBgGIaZR3Y7pIEYe0aoEMG-bnbtelcJAFEhICqNN6ywjYGFslHK6HtW5PwDC5RWIOQDE-04XyY3uNOcY-ap5477o0tT9Dye3TdxGvxfJKaBn2k6pvDE7np3ylRcdcX272_79rPcfn1s2vW2jMZMZUO9B9eDV8YIZdAK3QdDna1tHQTUqC0SasRQo5QeGu8a23UqLOMW18sVe_mvjUR0uIzLmnE-XI_JX54xRCI
ContentType Conference Proceeding
DBID 6IE
6IH
CBEJK
RIE
RIO
DOI 10.1109/ISCAS.2002.1011451
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan (POP) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Xplore
IEEE Proceedings Order Plans (POP) 1998-present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EndPage II
ExternalDocumentID 1011451
GroupedDBID 6IE
6IH
6IK
6IL
AAJGR
AAVQY
AAWTH
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
OCL
RIE
RIL
RIO
ID FETCH-LOGICAL-i88t-7efc0af0c4882481925fd8eb9696d2061591e1511d6133c07ca79bb4d000511c3
IEDL.DBID RIE
ISBN 9780780374485
0780374487
IngestDate Wed Aug 27 02:45:04 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i88t-7efc0af0c4882481925fd8eb9696d2061591e1511d6133c07ca79bb4d000511c3
ParticipantIDs ieee_primary_1011451
PublicationCentury 2000
PublicationDate 20020000
PublicationDateYYYYMMDD 2002-01-01
PublicationDate_xml – year: 2002
  text: 20020000
PublicationDecade 2000
PublicationTitle 2002 IEEE International Symposium on Circuits and Systems
PublicationTitleAbbrev ISCAS
PublicationYear 2002
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0000454023
Score 1.7190189
Snippet The security of digital images attracts much attention recently, and many image encryption methods have been proposed. In IS-CAS2000, a new chaotic key-based...
SourceID ieee
SourceType Publisher
StartPage II
SubjectTerms Chaos
Chaotic communication
Communication system security
Cryptography
Data security
Digital images
Electronic mail
Image processing
Image storage
Information security
Title Cryptanalysis of a chaotic image encryption method
URI https://ieeexplore.ieee.org/document/1011451
Volume 2
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LS8NAEB5qT55UWvHNHjy6MZvHJjlKsVShIrRCbyWzDyxiU0p60F_v7CatKB68ZUM27PJl883OznwDcB2LNLOEK48MFjwxFjkmZcbR2rCU0mhpXXLy-EmOXpLHWTrrwM0uF8YY44PPTOAu_Vm-rtTGucpohQtXWHYP9rJcNrlaO3-Kl5KLYr8zz52oClnircDOtp1uk2bC4vZhMrib-AiFoH3rj_Iqnl2GBzDejqsJKnkLNjUG6vOXZON_B34I_e88Pva8Y6gj6JhlD6LB-mNFJmEjRsIqy0qmXsuKviC2eKffC6N-7hFCjDUFpvswHd5PByPeVk7gizyveWasCksbKlqdUeIkz1KrcwJDFlJHzogphCGqF5rIPFZhpsqsQEy0t-iEio-hu6yW5gSYpB2kxlQgCiQkLWLsVLLSOLFE_daeQs9Nd75qtDHm7UzP_r59Dvu-mop3YVxAt15vzCWReo1XHs0ve06ctg
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PT8IwFH5BPOhJDRh_24NHN9et7bajIRJQICZgwo2sXRuJkREyDvrX-9oNjMaDt3VZlzbfuu_19b3vAdxElMcGcfVCLVOPaSM9ybLYk8YEmRA6F8YmJw9HovfCHqd82oDbbS6M1toFn2nfXrqz_LxQa-sqwxVObWHZHdjljDFeZWttPSpOTC6M3N48sbIqaIvXEjubNt-kzQTpXX_cuR-7GAW_fu-PAiuOX7oHMNyMrAorefPXpfTV5y_Rxv8O_RDa35l85HnLUUfQ0IsWhJ3VxxKNwkqOhBSGZES9ZgV-Q2T-jj8Ygv3sI4gZqUpMt2HSfZh0el5dO8GbJ0npxdqoIDOBwvUZMit6xk2eIBwiFXlozZiUaiR7miOdRyqIVRanUrLc2XRURcfQXBQLfQJE4B4yl5xKSSViaaSMrE4Wj5hB8jfmFFp2urNlpY4xq2d69vfta9jrTYaD2aA_ejqHfVdbxTk0LqBZrtb6Eim-lFcO2S_qaaAD
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2002+IEEE+International+Symposium+on+Circuits+and+Systems&rft.atitle=Cryptanalysis+of+a+chaotic+image+encryption+method&rft.au=Shujun+Li&rft.au=Xuan+Zheng&rft.date=2002-01-01&rft.pub=IEEE&rft.isbn=9780780374485&rft.volume=2&rft.spage=II&rft.epage=II&rft_id=info:doi/10.1109%2FISCAS.2002.1011451&rft.externalDocID=1011451
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9780780374485/lc.gif&client=summon&freeimage=true
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9780780374485/mc.gif&client=summon&freeimage=true
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9780780374485/sc.gif&client=summon&freeimage=true