Loading…
Secure image cryptosystem with unique key streams via hyper-chaotic system
•Cryptanalyzing Norouzi et al.’s scheme to demonstrate its security weaknesses.•Developing an attack scenario to break the Norouzi et al.’s cipher.•Proposing an advanced version of Norouzi et al.’s scheme to remedy its security weakness.•The proposed scheme resists several attacks such as known/chos...
Saved in:
Published in: | Signal processing 2018-01, Vol.142, p.53-68 |
---|---|
Main Authors: | , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | •Cryptanalyzing Norouzi et al.’s scheme to demonstrate its security weaknesses.•Developing an attack scenario to break the Norouzi et al.’s cipher.•Proposing an advanced version of Norouzi et al.’s scheme to remedy its security weakness.•The proposed scheme resists several attacks such as known/chosen-plain-image attacks.•Results assure the effectiveness of the proposed image encryption scheme.
This paper cryptanalyses the hyper-chaotic image encryption scheme developed by Norouzi et al. and presents a chosen-plain-image attack scenario to reveal its generated key stream. The recovered key stream can be used to decrypt any future related cipher-image without having the secret key. In addition, the paper introduces an advanced version of the underlying image encryption scheme to overcome its security shortcomings. Specifically, the proposed cipher generates a unique key stream for each distinct plain-image based on its fingerprint. This thwarts the chosen-plain-image attacks and enhances the security level of the proposed scheme. Finally, the experimental results confirm the robustness of the proposed image cipher against different types of attacks. |
---|---|
ISSN: | 0165-1684 1872-7557 |
DOI: | 10.1016/j.sigpro.2017.06.028 |