Deciphering an image cipher based on mixed transformed logistic maps
From MaRDI portal
Publication:5744121
DOI10.1142/S0218127415501886zbMATH Open1330.94042arXiv1404.3600WikidataQ123303659 ScholiaQ123303659MaRDI QIDQ5744121FDOQ5744121
Authors: Yuansheng Liu, Hua Fan, Eric Yong Xie, Ge Cheng, Cheng-Qing Li
Publication date: 17 February 2016
Published in: International Journal of Bifurcation and Chaos in Applied Sciences and Engineering (Search for Journal in Brave)
Abstract: Since John von Neumann suggested utilizing Logistic map as a random number generator in 1947, a great number of encryption schemes based on Logistic map and/or its variants have been proposed. This paper re-evaluates the security of an image cipher based on transformed logistic maps and proves that the image cipher can be deciphered efficiently under two different conditions: 1) two pairs of known plain-images and the corresponding cipher-images with computational complexity of ; 2) two pairs of chosen plain-images and the corresponding cipher-images with computational complexity of , where is the number of pixels in the plain-image. In contrast, the required condition in the previous deciphering method is eighty-seven pairs of chosen plain-images and the corresponding cipher-images with computational complexity of . In addition, three other security flaws existing in most Logistic-map-based ciphers are also reported.
Full work available at URL: https://arxiv.org/abs/1404.3600
Recommendations
- Breaking a modified substitution-diffusion image cipher based on chaotic standard and logistic maps
- An efficient image encryption scheme based on logistic maps
- An image encryption algorithm based on logistic chaos sequences
- Cryptanalysis and improvement on a cryptosystem based on a chaotic map
- An image encryption algorithm based on chaotic map and matrix decomposition
Cites Work
- A symmetric image encryption scheme based on 3D chaotic cat maps
- Symmetric Ciphers Based on Two-Dimensional Chaotic Maps
- Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations
- SOME BASIC CRYPTOGRAPHIC REQUIREMENTS FOR CHAOS-BASED CRYPTOSYSTEMS
- Cryptanalysis of Fridrich's chaotic image encryption
- Breaking a novel image encryption scheme based on improved hyperchaotic sequences
- Cryptanalysis of dynamic look-up table based chaotic cryptosystems
- A NOVEL FAST IMAGE ENCRYPTION SCHEME BASED ON 3D CHAOTIC BAKER MAPS
- Breaking a chaotic image encryption algorithm based on modulo addition and XOR operation
- Chaos and cryptography: block encryption ciphers based on chaotic maps
- Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks
- Title not available (Why is that?)
Cited In (10)
- Counteracting dynamical degradation of a class of digital chaotic systems via unscented Kalman filter and perturbation
- Finite precision logistic map between computational efficiency and accuracy with encryption applications
- Cryptanalysis of multiplicative coupled cryptosystems based on the Chebyshev polynomials
- Cryptanalysis of a classical chaos-based cryptosystem with some quantum cryptography features
- Breaking a modified substitution-diffusion image cipher based on chaotic standard and logistic maps
- Generalized smooth transition map between tent and logistic maps
- Beta Chaotic Map Based Image Encryption Using Genetic Algorithm
- Security analysis of some diffusion mechanisms used in chaotic ciphers
- Cryptanalyzing an image encryption algorithm with compound chaotic stream cipher based on perturbation
- Counteracting dynamical degradation of digital chaotic Chebyshev map via perturbation
Uses Software
This page was built for publication: Deciphering an image cipher based on mixed transformed logistic maps
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5744121)