Cargando…

Chaotic Image Encryption Based on Running-Key Related to Plaintext

In the field of chaotic image encryption, the algorithm based on correlating key with plaintext has become a new developing direction. However, for this kind of algorithm, some shortcomings in resistance to reconstruction attack, efficient utilization of chaotic resource, and reducing dynamical degr...

Descripción completa

Detalles Bibliográficos
Autores principales: Guanghui, Cao, Kai, Hu, Yizhi, Zhang, Jun, Zhou, Xing, Zhang
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Hindawi Publishing Corporation 2014
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3953620/
https://www.ncbi.nlm.nih.gov/pubmed/24711727
http://dx.doi.org/10.1155/2014/490179
_version_ 1782307388616867840
author Guanghui, Cao
Kai, Hu
Yizhi, Zhang
Jun, Zhou
Xing, Zhang
author_facet Guanghui, Cao
Kai, Hu
Yizhi, Zhang
Jun, Zhou
Xing, Zhang
author_sort Guanghui, Cao
collection PubMed
description In the field of chaotic image encryption, the algorithm based on correlating key with plaintext has become a new developing direction. However, for this kind of algorithm, some shortcomings in resistance to reconstruction attack, efficient utilization of chaotic resource, and reducing dynamical degradation of digital chaos are found. In order to solve these problems and further enhance the security of encryption algorithm, based on disturbance and feedback mechanism, we present a new image encryption scheme. In the running-key generation stage, by successively disturbing chaotic stream with cipher-text, the relation of running-key to plaintext is established, reconstruction attack is avoided, effective use of chaotic resource is guaranteed, and dynamical degradation of digital chaos is minimized. In the image encryption stage, by introducing random-feedback mechanism, the difficulty of breaking this scheme is increased. Comparing with the-state-of-the-art algorithms, our scheme exhibits good properties such as large key space, long key period, and extreme sensitivity to the initial key and plaintext. Therefore, it can resist brute-force, reconstruction attack, and differential attack.
format Online
Article
Text
id pubmed-3953620
institution National Center for Biotechnology Information
language English
publishDate 2014
publisher Hindawi Publishing Corporation
record_format MEDLINE/PubMed
spelling pubmed-39536202014-04-07 Chaotic Image Encryption Based on Running-Key Related to Plaintext Guanghui, Cao Kai, Hu Yizhi, Zhang Jun, Zhou Xing, Zhang ScientificWorldJournal Research Article In the field of chaotic image encryption, the algorithm based on correlating key with plaintext has become a new developing direction. However, for this kind of algorithm, some shortcomings in resistance to reconstruction attack, efficient utilization of chaotic resource, and reducing dynamical degradation of digital chaos are found. In order to solve these problems and further enhance the security of encryption algorithm, based on disturbance and feedback mechanism, we present a new image encryption scheme. In the running-key generation stage, by successively disturbing chaotic stream with cipher-text, the relation of running-key to plaintext is established, reconstruction attack is avoided, effective use of chaotic resource is guaranteed, and dynamical degradation of digital chaos is minimized. In the image encryption stage, by introducing random-feedback mechanism, the difficulty of breaking this scheme is increased. Comparing with the-state-of-the-art algorithms, our scheme exhibits good properties such as large key space, long key period, and extreme sensitivity to the initial key and plaintext. Therefore, it can resist brute-force, reconstruction attack, and differential attack. Hindawi Publishing Corporation 2014-02-23 /pmc/articles/PMC3953620/ /pubmed/24711727 http://dx.doi.org/10.1155/2014/490179 Text en Copyright © 2014 Cao Guanghui et al. https://creativecommons.org/licenses/by/3.0/ This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
spellingShingle Research Article
Guanghui, Cao
Kai, Hu
Yizhi, Zhang
Jun, Zhou
Xing, Zhang
Chaotic Image Encryption Based on Running-Key Related to Plaintext
title Chaotic Image Encryption Based on Running-Key Related to Plaintext
title_full Chaotic Image Encryption Based on Running-Key Related to Plaintext
title_fullStr Chaotic Image Encryption Based on Running-Key Related to Plaintext
title_full_unstemmed Chaotic Image Encryption Based on Running-Key Related to Plaintext
title_short Chaotic Image Encryption Based on Running-Key Related to Plaintext
title_sort chaotic image encryption based on running-key related to plaintext
topic Research Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3953620/
https://www.ncbi.nlm.nih.gov/pubmed/24711727
http://dx.doi.org/10.1155/2014/490179
work_keys_str_mv AT guanghuicao chaoticimageencryptionbasedonrunningkeyrelatedtoplaintext
AT kaihu chaoticimageencryptionbasedonrunningkeyrelatedtoplaintext
AT yizhizhang chaoticimageencryptionbasedonrunningkeyrelatedtoplaintext
AT junzhou chaoticimageencryptionbasedonrunningkeyrelatedtoplaintext
AT xingzhang chaoticimageencryptionbasedonrunningkeyrelatedtoplaintext