Breaking an image encryption scheme based on chaotic synchronization phenomenon

Sushmita Singh, Musheer Ahmad, Dhruv Malik
{"title":"Breaking an image encryption scheme based on chaotic synchronization phenomenon","authors":"Sushmita Singh, Musheer Ahmad, Dhruv Malik","doi":"10.1109/IC3.2016.7880215","DOIUrl":null,"url":null,"abstract":"In recent past, Volos et al proposed an image encryption scheme based on true random bits generator in [Signal Processing 93, 1328–1340, 2013]. The TRBG uses two mutually coupled double scroll chaotic systems that are synchronized via complete chaotic synchronization and inverse π-lag synchronization techniques. The numerical simulations demonstrated the effectiveness of chaotic true random bits generator through FIPS-140-2 randomness test suite. The proposed generator is applied with an aim to secure the digital images by framing an image encryption process based on the effective TRBG. The statistical analyses conform to the required encryption standards and quality. But, Volos et al image encryption scheme inherently holds a number of vulnerabilities that make it possible to break the encryption scheme. This paper proposes the break of the Volos et al image encryption scheme by exploiting these vulnerabilities to evidence that their scheme lacks security. It is practically shown by applying the chosen-plaintext and known-plaintext attacks which successfully recovers the plaintext-image from the encrypted image without knowing the secret key. The idea is to show the ineligibility of the encryption scheme for use in practical image security applications.","PeriodicalId":294210,"journal":{"name":"2016 Ninth International Conference on Contemporary Computing (IC3)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 Ninth International Conference on Contemporary Computing (IC3)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IC3.2016.7880215","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

Abstract

In recent past, Volos et al proposed an image encryption scheme based on true random bits generator in [Signal Processing 93, 1328–1340, 2013]. The TRBG uses two mutually coupled double scroll chaotic systems that are synchronized via complete chaotic synchronization and inverse π-lag synchronization techniques. The numerical simulations demonstrated the effectiveness of chaotic true random bits generator through FIPS-140-2 randomness test suite. The proposed generator is applied with an aim to secure the digital images by framing an image encryption process based on the effective TRBG. The statistical analyses conform to the required encryption standards and quality. But, Volos et al image encryption scheme inherently holds a number of vulnerabilities that make it possible to break the encryption scheme. This paper proposes the break of the Volos et al image encryption scheme by exploiting these vulnerabilities to evidence that their scheme lacks security. It is practically shown by applying the chosen-plaintext and known-plaintext attacks which successfully recovers the plaintext-image from the encrypted image without knowing the secret key. The idea is to show the ineligibility of the encryption scheme for use in practical image security applications.
破解一种基于混沌同步现象的图像加密方案
最近,Volos等人在[Signal Processing 93, 1328 - 1340,2013]中提出了一种基于真随机比特生成器的图像加密方案。TRBG采用两个相互耦合的双涡旋混沌系统,通过完全混沌同步和逆π滞后同步技术进行同步。通过FIPS-140-2随机测试套件进行数值仿真,验证了混沌真随机比特发生器的有效性。该发生器的应用目的是通过基于有效TRBG的图像加密过程来保护数字图像。统计分析符合要求的加密标准和质量。但是,Volos等图像加密方案本身就存在许多漏洞,使得加密方案有可能被破解。本文提出通过利用这些漏洞来证明Volos等人的方案缺乏安全性来破坏其图像加密方案。应用选择明文攻击和已知明文攻击,在不知道密钥的情况下,成功地从加密图像中恢复出明文图像。这个想法是为了显示加密方案在实际图像安全应用中使用的不合格性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信