2020
DOI: 10.18280/ts.370112
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis of a Pixel Permutation Based Image Encryption Technique Using Chaotic Map

Abstract: Recently, a new image encryption algorithm was proposed by Anwar and Meghana. This encryption scheme uses the Arnold's chaotic cat map to permute the image pixels. The resulting image is then confused with both a secret image provided as part of the secret key and a secret value selected randomly from the permuted image. Using a random image as part of the secret key, gives this algorithm an infinite key space which increases its efficiency against brute-force attacks. In order to help improving the security o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 25 publications
0
5
0
Order By: Relevance
“…The conversion of mathematical models of chaotic maps to electronic circuits regarding basic circuit rules and by using Eq. ( 1), ( 2) and (3), Figure 2 ), đť‘‹ đť‘› ≥ đť‘… 4 2đť‘… 3 (19) where, Xn1 stands for next iterative value of Tent map while Xn is actual. As the all resistor values are taken into account in Eq.…”
Section: Electronic Circuit Realizations Of Chaotic Mapsmentioning
confidence: 99%
See 1 more Smart Citation
“…The conversion of mathematical models of chaotic maps to electronic circuits regarding basic circuit rules and by using Eq. ( 1), ( 2) and (3), Figure 2 ), đť‘‹ đť‘› ≥ đť‘… 4 2đť‘… 3 (19) where, Xn1 stands for next iterative value of Tent map while Xn is actual. As the all resistor values are taken into account in Eq.…”
Section: Electronic Circuit Realizations Of Chaotic Mapsmentioning
confidence: 99%
“…Chaotic time-series obtained from a non-equilibrium system are used to construct S-boxes and develop an image encryption application by Wang et al [12] in 2019. Furthermore, researchers proposed to use different chaotic dynamical systems as entropy source; circuit realization, control design and image encryption application of their proposed system such as extended LĂĽ system [13], autonomous RLCC-Diodes-Opamp chaotic oscillator [14,15], modified Chua's circuit [16], a new chaotic jerk system [17] and chaotic one dimensional maps [18][19][20][21][22][23][24].…”
Section: Introductionmentioning
confidence: 99%
“…As a result, the chaotic system is being integrated to more and more encryption algorithms. In the past two decades, researchers have proposed various encryption methods and applied them to image encryption, drawing on the unique properties of the chaotic system (e.g., sensitivity to initial values, unpredictability, and pseudorandomness) and the natural bound between the system and cryptology [3][4][5][6][7][8][9][10]. Some scholars put forward several new chaotic systems and designed the corresponding encryption strategies [4][5][6][7][8].…”
Section: Introductionmentioning
confidence: 99%
“…In the past two decades, researchers have proposed various encryption methods and applied them to image encryption, drawing on the unique properties of the chaotic system (e.g., sensitivity to initial values, unpredictability, and pseudorandomness) and the natural bound between the system and cryptology [3][4][5][6][7][8][9][10]. Some scholars put forward several new chaotic systems and designed the corresponding encryption strategies [4][5][6][7][8]. Some scholars presented encryption algorithms based on existing chaotic systems, focusing on the design of encryption strategies [9][10][11][12][13][14][15][16].…”
Section: Introductionmentioning
confidence: 99%
“…Several Chaotic schemes were efficient in showing higher resistance to differential attacks and having higher entropy values [6]. But it takes more time to complete the encryption process.…”
Section: Introductionmentioning
confidence: 99%