Cargando…
Chaotic Image Encryption Based on Running-Key Related to Plaintext
In the field of chaotic image encryption, the algorithm based on correlating key with plaintext has become a new developing direction. However, for this kind of algorithm, some shortcomings in resistance to reconstruction attack, efficient utilization of chaotic resource, and reducing dynamical degr...
Autores principales: | , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Hindawi Publishing Corporation
2014
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3953620/ https://www.ncbi.nlm.nih.gov/pubmed/24711727 http://dx.doi.org/10.1155/2014/490179 |
_version_ | 1782307388616867840 |
---|---|
author | Guanghui, Cao Kai, Hu Yizhi, Zhang Jun, Zhou Xing, Zhang |
author_facet | Guanghui, Cao Kai, Hu Yizhi, Zhang Jun, Zhou Xing, Zhang |
author_sort | Guanghui, Cao |
collection | PubMed |
description | In the field of chaotic image encryption, the algorithm based on correlating key with plaintext has become a new developing direction. However, for this kind of algorithm, some shortcomings in resistance to reconstruction attack, efficient utilization of chaotic resource, and reducing dynamical degradation of digital chaos are found. In order to solve these problems and further enhance the security of encryption algorithm, based on disturbance and feedback mechanism, we present a new image encryption scheme. In the running-key generation stage, by successively disturbing chaotic stream with cipher-text, the relation of running-key to plaintext is established, reconstruction attack is avoided, effective use of chaotic resource is guaranteed, and dynamical degradation of digital chaos is minimized. In the image encryption stage, by introducing random-feedback mechanism, the difficulty of breaking this scheme is increased. Comparing with the-state-of-the-art algorithms, our scheme exhibits good properties such as large key space, long key period, and extreme sensitivity to the initial key and plaintext. Therefore, it can resist brute-force, reconstruction attack, and differential attack. |
format | Online Article Text |
id | pubmed-3953620 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2014 |
publisher | Hindawi Publishing Corporation |
record_format | MEDLINE/PubMed |
spelling | pubmed-39536202014-04-07 Chaotic Image Encryption Based on Running-Key Related to Plaintext Guanghui, Cao Kai, Hu Yizhi, Zhang Jun, Zhou Xing, Zhang ScientificWorldJournal Research Article In the field of chaotic image encryption, the algorithm based on correlating key with plaintext has become a new developing direction. However, for this kind of algorithm, some shortcomings in resistance to reconstruction attack, efficient utilization of chaotic resource, and reducing dynamical degradation of digital chaos are found. In order to solve these problems and further enhance the security of encryption algorithm, based on disturbance and feedback mechanism, we present a new image encryption scheme. In the running-key generation stage, by successively disturbing chaotic stream with cipher-text, the relation of running-key to plaintext is established, reconstruction attack is avoided, effective use of chaotic resource is guaranteed, and dynamical degradation of digital chaos is minimized. In the image encryption stage, by introducing random-feedback mechanism, the difficulty of breaking this scheme is increased. Comparing with the-state-of-the-art algorithms, our scheme exhibits good properties such as large key space, long key period, and extreme sensitivity to the initial key and plaintext. Therefore, it can resist brute-force, reconstruction attack, and differential attack. Hindawi Publishing Corporation 2014-02-23 /pmc/articles/PMC3953620/ /pubmed/24711727 http://dx.doi.org/10.1155/2014/490179 Text en Copyright © 2014 Cao Guanghui et al. https://creativecommons.org/licenses/by/3.0/ This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. |
spellingShingle | Research Article Guanghui, Cao Kai, Hu Yizhi, Zhang Jun, Zhou Xing, Zhang Chaotic Image Encryption Based on Running-Key Related to Plaintext |
title | Chaotic Image Encryption Based on Running-Key Related to Plaintext |
title_full | Chaotic Image Encryption Based on Running-Key Related to Plaintext |
title_fullStr | Chaotic Image Encryption Based on Running-Key Related to Plaintext |
title_full_unstemmed | Chaotic Image Encryption Based on Running-Key Related to Plaintext |
title_short | Chaotic Image Encryption Based on Running-Key Related to Plaintext |
title_sort | chaotic image encryption based on running-key related to plaintext |
topic | Research Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3953620/ https://www.ncbi.nlm.nih.gov/pubmed/24711727 http://dx.doi.org/10.1155/2014/490179 |
work_keys_str_mv | AT guanghuicao chaoticimageencryptionbasedonrunningkeyrelatedtoplaintext AT kaihu chaoticimageencryptionbasedonrunningkeyrelatedtoplaintext AT yizhizhang chaoticimageencryptionbasedonrunningkeyrelatedtoplaintext AT junzhou chaoticimageencryptionbasedonrunningkeyrelatedtoplaintext AT xingzhang chaoticimageencryptionbasedonrunningkeyrelatedtoplaintext |