Abstract
Chaos-based cryptosystems are regarded as highly secure techniques for image encryption. However, despite the considerable enhancement of encryption robustness provided by chaotic systems, security vulnerabilities may still arise, potentially leading to drastic damage in contexts involving sensitive data such as medical or military images. Identifying these vulnerabilities and developing corresponding countermeasures are essential to prevent security breaches and achieve higher protection. From this perspective, this research thoroughly examines the security of an image encryption scheme based on the 1D sine-powered chaotic map. This analysis identifies vulnerabilities within the scheme that can reduce it to a permutation-only scheme. Exploiting the found vulnerabilities, three distinct cryptanalysis attacks are proposed in this work. These attacks enable unauthorized individuals to replicate the encryption and decryption processes without possessing the secret key, posing significant security risks. Under ciphertext-only attack, chosen-plaintext attack, and chosen-ciphertext attack conditions, the proposed attacks demonstrate their effectiveness through simulation and experimentation. Notably, the results indicate that these attacks can be executed within seconds and using only a few special plaintext or ciphertext images. An improved version of the analyzed scheme is introduced to address the identified vulnerabilities and enhance its security and speed.
Published Version
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Similar Papers
More From: ACM Transactions on Multimedia Computing, Communications, and Applications
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.