کد مقاله | کد نشریه | سال انتشار | مقاله انگلیسی | نسخه تمام متن |
---|---|---|---|---|
4977361 | 1451925 | 2018 | 16 صفحه PDF | دانلود رایگان |
- Cryptanalyzing Norouzi et al.'s scheme to demonstrate its security weaknesses.
- Developing an attack scenario to break the Norouzi et al.'s cipher.
- Proposing an advanced version of Norouzi et al.'s scheme to remedy its security weakness.
- The proposed scheme resists several attacks such as known/chosen-plain-image attacks.
- Results assure the effectiveness of the proposed image encryption scheme.
This paper cryptanalyses the hyper-chaotic image encryption scheme developed by Norouzi et al. and presents a chosen-plain-image attack scenario to reveal its generated key stream. The recovered key stream can be used to decrypt any future related cipher-image without having the secret key. In addition, the paper introduces an advanced version of the underlying image encryption scheme to overcome its security shortcomings. Specifically, the proposed cipher generates a unique key stream for each distinct plain-image based on its fingerprint. This thwarts the chosen-plain-image attacks and enhances the security level of the proposed scheme. Finally, the experimental results confirm the robustness of the proposed image cipher against different types of attacks.
Journal: Signal Processing - Volume 142, January 2018, Pages 53-68