Skip Content
You are currently on the new version of our website. Access the old version .

99 Results Found

  • Article
  • Open Access
9 Citations
2,747 Views
13 Pages

24 June 2021

This paper proposes a more efficient attack method on an image fusion encryption algorithm based on DNA operation and hyperchaos. Although several references have reported some methods to crack the image encryption algorithm, they are not the most ef...

  • Article
  • Open Access
1,555 Views
19 Pages

An Improved Chosen Plaintext Attack on JPEG Encryption

  • Junhui He,
  • Kaitian Gu,
  • Yihan Huang,
  • Yue Li and
  • Xiang Chen

Format-compatible encryption can be used to ensure the security and privacy of JPEG images. Recently, a JPEG image encryption method proved to be secure against known plaintext attacks by employing an adaptive encryption key, which depends on the his...

  • Article
  • Open Access
22 Citations
5,929 Views
17 Pages

16 May 2019

CAPTCHA authentication has been challenged by recent technology advances in AI. However, many of the AI advances challenging CAPTCHA are either restricted by a limited amount of labeled CAPTCHA data or are constructed in an expensive or complicated w...

  • Article
  • Open Access
20 Citations
3,989 Views
14 Pages

31 January 2019

In order to meet the requirement of secure image communication in a resource-constrained network environment, a novel lightweight chaotic image encryption scheme based on permutation and diffusion has been proposed. It was claimed that this scheme ca...

  • Article
  • Open Access
26 Citations
3,365 Views
10 Pages

23 March 2020

Security of image communication is more and more important in many applications such as the transmission of military and medical images. To meet the requirement, a new color image encryption algorithm using a new one-dimension (1D) chaotic map was pr...

  • Article
  • Open Access
81 Citations
5,178 Views
20 Pages

15 July 2020

In this paper, we construct a five dimensional continuous hyperchaotic system and propose an image encryption scheme based on the hyperchaotic system, which adopts DNA dynamic coding mechanism and classical scrambling diffusion encryption structure....

  • Article
  • Open Access
17 Citations
2,802 Views
16 Pages

28 October 2022

Recently, an image encryption scheme based on a 2D hyperchaotic map is proposed. It adopts the permutation–diffusion architecture and consists of three steps, which are permutation, forward diffusion, and backward diffusion. In this paper, we b...

  • Article
  • Open Access
4 Citations
3,689 Views
12 Pages

18 September 2022

The SM4 algorithm is widely used to ensure the security of data transmission. The traditional chosen plaintext power attacks against SM4 usually need to analyze four rounds power traces in turn to recover the secret key. In this paper, we propose a n...

  • Article
  • Open Access
26 Citations
2,705 Views
13 Pages

22 April 2021

This paper analyzes the security of image encryption systems based on bit plane extraction and multi chaos. It includes a bit-level permutation for high, 4-bit planes and bit-wise XOR diffusion, and finds that the key streams in the permutation and d...

  • Article
  • Open Access
71 Citations
5,032 Views
23 Pages

3 November 2018

This paper presents an improved cryptanalysis of a chaos-based image encryption scheme, which integrated permutation, diffusion, and linear transformation process. It was found that the equivalent key streams and all the unknown parameters of the cry...

  • Article
  • Open Access
7 Citations
2,509 Views
15 Pages

An IND-CPA Analysis of a Cryptosystem Based on Bivariate Polynomial Reconstruction Problem

  • Siti Nabilah Yusof,
  • Muhammad Rezal Kamel Ariffin,
  • Terry Shue Chien Lau,
  • Nur Raidah Salim,
  • Sook-Chin Yip and
  • Timothy Tzen Vun Yap

17 March 2023

The Polynomial Reconstruction Problem (PRP) was introduced in 1999 as a new hard problem in post-quantum cryptography. Augot and Finiasz were the first to design a cryptographic system based on a univariate PRP, which was published at Eurocrypt 2003...

  • Article
  • Open Access
14 Citations
2,571 Views
17 Pages

26 November 2021

Recently, a new chaotic image encryption technique was proposed based on multiple discrete dynamic maps. The authors claim that the scheme can provide excellent privacy for traditional digital images. However, in order to minimize the computational c...

  • Article
  • Open Access
10 Citations
3,292 Views
17 Pages

22 February 2023

An image encryption algorithm for the double scrambling of the pixel position and bit was cryptanalyzed. In the original image encryption algorithm, the positions of pixels were shuffled totally with the chaotic sequence. Then, the 0 and 1-bit positi...

  • Article
  • Open Access
4 Citations
2,023 Views
19 Pages

An Efficient Encryption Scheme with Fully Hidden Access Policy for Medical Data

  • Moli Zhang,
  • Feijiao Shao,
  • Ruijuan Zheng,
  • Muhua Liu and
  • Zhihang Ji

With the development of informatization, patient medical data are generally stored in the form of electronic medical records. Hospitals store a large amount of medical data on cloud servers, which can ensure the integrity and sharing of medical data....

  • Article
  • Open Access
16 Citations
2,623 Views
26 Pages

21 February 2023

This paper analyzes the security of an image encryption algorithm based on a two-dimensional hyperchaotic map. This encryption algorithm generated chaotic sequences through a combination of two one-dimensional chaotic maps and used them as the permut...

  • Article
  • Open Access
2 Citations
2,988 Views
24 Pages

Matrix Power Function Based Block Cipher Operating in CBC Mode

  • Lina Dindiene,
  • Aleksejus Mihalkovich,
  • Kestutis Luksys and
  • Eligijus Sakalauskas

18 June 2022

In our previous study, we proposed a perfectly secure Shannon cipher based on the so-called matrix power function. There we also introduced a concept of single round symmetric encryption, i.e., we used the matrix power function together with some rat...

  • Article
  • Open Access
13 Citations
3,745 Views
18 Pages

12 September 2019

In this paper, the security analysis of an image chaotic encryption algorithm based on Latin cubes and bit cubes is given. The proposed algorithm adopts a first-scrambling-diffusion- second-scrambling three-stage encryption scheme. First, a finite fi...

  • Article
  • Open Access
3 Citations
2,050 Views
22 Pages

On the Cryptanalysis of a Latin Cubes-Based Image Cryptosystem

  • Rong Huang,
  • Hao Liu,
  • Xiaojuan Liao and
  • Aihua Dong

7 February 2021

Based on orthogonal Latin cubes, an image cryptosystem with confusion–diffusion–confusion cipher architecture has been proposed recently (Inf. Sci.2019, 478, 1–14). However, we find that there are four fatal vulnerabilities in this image cryptosystem...

  • Article
  • Open Access
59 Citations
8,837 Views
16 Pages

Learning Perfectly Secure Cryptography to Protect Communications with Adversarial Neural Cryptography

  • Murilo Coutinho,
  • Robson De Oliveira Albuquerque,
  • Fábio Borges,
  • Luis Javier García Villalba and
  • Tai-Hoon Kim

24 April 2018

Researches in Artificial Intelligence (AI) have achieved many important breakthroughs, especially in recent years. In some cases, AI learns alone from scratch and performs human tasks faster and better than humans. With the recent advances in AI, it...

  • Article
  • Open Access
28 Citations
4,324 Views
23 Pages

24 May 2020

In theory, high key and high plaintext sensitivities are a must for a cryptosystem to resist the chosen/known plaintext and the differential attacks. High plaintext sensitivity can be achieved by ensuring that each encrypted result is plaintext-depen...

  • Article
  • Open Access
1 Citations
2,702 Views
13 Pages

15 February 2023

A new class of cryptosystems called verifiable encryption (VE) that facilitates the verification of two plaintexts without decryption was proposed in our previous paper. The main contributions of our previous study include the following. (1) Certain...

  • Article
  • Open Access
22 Citations
4,297 Views
22 Pages

9 March 2023

Due to the equivalent keys revealed by a chosen-plaintext attack or a chosen-ciphertext attack, most of the existing chaotic image encryption schemes are demonstrated to be insecure. In order to improve security performance, some scholars have recent...

  • Article
  • Open Access
53 Citations
8,052 Views
20 Pages

A Symmetric Plaintext-Related Color Image Encryption System Based on Bit Permutation

  • Shuting Cai,
  • Linqing Huang,
  • Xuesong Chen and
  • Xiaoming Xiong

13 April 2018

Recently, a variety of chaos-based image encryption algorithms adopting the traditional permutation-diffusion structure have been suggested. Most of these algorithms cannot resist the powerful chosen-plaintext attack and chosen-ciphertext attack effi...

  • Article
  • Open Access
87 Citations
6,757 Views
15 Pages

14 September 2018

This article performs the cryptanalysis of an image encryption algorithm using an S-box generated by chaos. The algorithm has the advantages of simple structure, high encryption efficiency, and good encryption performance. However, an attentive inves...

  • Article
  • Open Access
94 Citations
9,691 Views
15 Pages

16 October 2015

DNA computing based image encryption is a new, promising field. In this paper, we propose a novel image encryption scheme based on DNA encoding and spatiotemporal chaos. In particular, after the plain image is primarily diffused with the bitwise Excl...

  • Article
  • Open Access
42 Citations
3,368 Views
26 Pages

27 February 2021

Digital images can be large in size and contain sensitive information that needs protection. Compression using compressed sensing performs well, but the measurement matrix directly affects the signal compression and reconstruction performance. The go...

  • Article
  • Open Access
12 Citations
3,198 Views
20 Pages

A Novel and Fast Encryption System Based on Improved Josephus Scrambling and Chaotic Mapping

  • Zhaoxiong Guan ,
  • Junxian Li,
  • Linqing Huang,
  • Xiaoming Xiong,
  • Yuan Liu and
  • Shuting Cai

9 March 2022

To address the shortcomings of weak confusion and high time complexity of the existing permutation algorithms, including the traditional Josephus ring permutation (TJRP), an improved Josephus ring-based permutation (IJRBP) algorithm is developed. The...

  • Article
  • Open Access
9 Citations
3,191 Views
19 Pages

20 July 2023

With the advent of communication networks, protecting data from security threats has become increasingly important. To address this issue, we present a new text encryption scheme that uses a combination of elliptic curve cryptography and max-plus alg...

  • Article
  • Open Access
12 Citations
3,565 Views
21 Pages

17 July 2020

Based on a logistic map and Feigenbaum map, we proposed a logistic Feigenbaum non-linear cross-coupled hyperchaotic map (LF-NCHM) model. Experimental verification showed that the system is a hyperchaotic system. Compared with the existing cross-coupl...

  • Article
  • Open Access
4 Citations
910 Views
23 Pages

Image Privacy Protection Communication Scheme by Fibonacci Interleaved Diffusion and Non-Degenerate Discrete Chaos

  • Zhiyu Xie,
  • Weihong Xie,
  • Xiyuan Cheng,
  • Zhengqin Yuan,
  • Wenbin Cheng and
  • Yiting Lin

25 July 2025

The rapid development of network communication technology has led to an increased focus on the security of image storage and transmission in multimedia information. This paper proposes an enhanced image security communication scheme based on Fibonacc...

  • Article
  • Open Access
527 Views
26 Pages

31 October 2025

The dynamic confrontation between medical image-encryption technology and cryptanalysis enhances the security of sensitive healthcare information. Recently, Lai et al. proposed a color medical image-encryption scheme (LG-IES) based on a 2D Logistic-G...

  • Article
  • Open Access
9 Citations
4,011 Views
33 Pages

3C3R, an Image Encryption Algorithm Based on BBI, 2D-CA, and SM-DNA

  • Sajid Khan,
  • Lansheng Han,
  • Ghulam Mudassir,
  • Bachira Guehguih and
  • Hidayat Ullah

2 November 2019

Color image encryption has enticed a lot of attention in recent years. Many authors proposed a chaotic system-based encryption algorithms for that purpose. However, due to the shortcomings of the low dimensional chaotic systems, similar rule structur...

  • Article
  • Open Access
5 Citations
3,753 Views
30 Pages

Chaotic Hénon–Logistic Map Integration: A Powerful Approach for Safeguarding Digital Images

  • Abeer Al-Hyari,
  • Mua’ad Abu-Faraj,
  • Charlie Obimbo and
  • Moutaz Alazab

This paper presents an integrated chaos-based algorithm for image encryption that combines the chaotic Hénon map and chaotic logistic map (CLM) to enhance the security of digital image communication. The proposed method leverages chaos theory...

  • Article
  • Open Access
117 Citations
7,377 Views
22 Pages

2 January 2023

In this paper, a new one-dimensional fractional chaotic map is proposed and an image encryption scheme based on parallel DNA coding is designed by using the chaotic map. The mathematical model of the new chaotic system combines a sine map and a fract...

  • Article
  • Open Access
5 Citations
1,901 Views
23 Pages

2 April 2025

This study presents a decentralised ciphertext-policy attribute-based encryption (CP-ABE) scheme designed for secure and efficient access control in resource-constrained Internet-of-Things (IoT) environments. By utilising multi-authority architecture...

  • Article
  • Open Access
72 Citations
5,314 Views
18 Pages

5 March 2019

Recently, an image encryption algorithm based on DNA encoding and spatiotemporal chaos (IEA-DESC) was proposed. In IEA-DESC, pixel diffusion, DNA encoding, DNA-base permutation and DNA decoding are performed successively to generate cipher-images fro...

  • Article
  • Open Access
19 Citations
2,552 Views
24 Pages

4 December 2021

In the current paper, a new conservative hyperchaotic system is proposed. We make a quantitative analysis of the complexity of the conservative hyperchaotic system from several different aspects, such as phase diagrams, bifurcation diagrams, Lyapunov...

  • Article
  • Open Access
1,060 Views
19 Pages

Weighted Color Image Encryption Algorithm Based on RNA Extended Dynamic Coding and Quantum Chaotic System

  • Xiangyu Zhang,
  • Heping Wen,
  • Wei Feng,
  • Shenghao Kang,
  • Zhiyu Xie,
  • Xuexi Zhang and
  • Yiting Lin

11 August 2025

The rapid development of Internet technology, while providing convenient services for users, has also aroused deep concern among the public about the issue of privacy leakage during image data transmission. To address this situation, this article pro...

  • Article
  • Open Access
7 Citations
2,217 Views
26 Pages

18 May 2023

Image abstraction simplifies complex images, highlights specific features, and preserves different levels of structures to achieve a desired style. This paper presents a constructive and adjustable data hiding algorithm to convey various secret messa...

  • Article
  • Open Access
6 Citations
3,296 Views
11 Pages

24 April 2023

With the development of quantum technology, quantum computing has an increasingly significant impact on cryptanalysis. Several quantum algorithms, such as Simon’s algorithm, Grover’s algorithm, the Bernstein–Vazirani algorithm, Shor...

  • Article
  • Open Access
3 Citations
2,374 Views
16 Pages

Modified SHARK Cipher and Duffing Map-Based Cryptosystem

  • Osama Rabie,
  • Jawad Ahmad and
  • Daniyal Alghazzawi

12 June 2022

Recent years have seen a lot of interest in the study of chaotic structures and their accompanying cryptography frameworks. In this research, we came up with a new way to encrypt images that used the chaos and a modified block cipher named the SHARK...

  • Article
  • Open Access
391 Views
15 Pages

Quantum Security of Nonce-Based Encryption

  • Shuping Mao,
  • Peng Wang,
  • Yan Jia,
  • Gang Liu and
  • Bing Liu

24 November 2025

We investigate the quantum security of nonce-based encryption under the indistinguishability against quantum chosen-plaintext attacks (IND-qCPA). While classical results establish that IV-based modes such as CBC, CFB, OFB, and CTR achieve IND-qCPA se...

  • Article
  • Open Access
26 Citations
3,696 Views
17 Pages

Security Analysis of a Color Image Encryption Algorithm Using a Fractional-Order Chaos

  • Heping Wen,
  • Chongfu Zhang,
  • Lan Huang,
  • Juxin Ke and
  • Dongqing Xiong

23 February 2021

Fractional-order chaos has complex dynamic behavior characteristics, so its application in secure communication has attracted much attention. Compared with the design of fractional-order chaos-based cipher, there are fewer researches on security anal...

  • Article
  • Open Access
3 Citations
1,714 Views
26 Pages

Secure Image Transmission Using Multilevel Chaotic Encryption and Video Steganography

  • Suhad Naji Alrekaby,
  • Maisa’a Abid Ali Khodher,
  • Layth Kamil Adday and
  • Reem Aljuaidi

1 July 2025

The swift advancement of information and communication technology has made it increasingly difficult to guarantee the security of transmitted data. Traditional encryption techniques, particularly in multimedia applications, frequently fail to defend...

  • Article
  • Open Access
14 Citations
3,050 Views
23 Pages

21 October 2022

Social networks have greatly expanded in the last ten years the need for sharing multimedia data. However, on open networks such as the Internet, where security is frequently compromised, it is simple for eavesdroppers to approach the actual contents...

  • Article
  • Open Access
2 Citations
2,964 Views
20 Pages

An Efficient Pairing-Free Ciphertext-Policy Attribute-Based Encryption Scheme for Internet of Things

  • Chong Guo,
  • Bei Gong,
  • Muhammad Waqas,
  • Hisham Alasmary,
  • Shanshan Tu and
  • Sheng Chen

24 October 2024

The Internet of Things (IoT) is a heterogeneous network composed of numerous dynamically connected devices. While it brings convenience, the IoT also faces serious challenges in data security. Ciphertext-policy attribute-based encryption (CP-ABE) is...

  • Article
  • Open Access
5 Citations
3,232 Views
20 Pages

An Access Control Scheme Based on Blockchain and Ciphertext Policy-Attribute Based Encryption

  • Ronglei Hu,
  • Ziwei Ma,
  • Li Li,
  • Peiliang Zuo,
  • Xiuying Li,
  • Jiaxin Wei and
  • Sihui Liu

23 September 2023

Ciphertext policy–attribute-based encryption (CP-ABE), which provides fine-grained access control and ensures data confidentiality, is widely used in data sharing. However, traditional CP-ABE schemes often choose to outsource data to untrusted...

  • Article
  • Open Access
120 Views
21 Pages

Image Encryption Using Chaotic Box Partition–Permutation and Modular Diffusion with PBKDF2 Key Derivation

  • Javier Alberto Vargas Valencia,
  • Mauricio A. Londoño-Arboleda,
  • Hernán David Salinas Jiménez,
  • Carlos Alberto Marín Arango and
  • Luis Fernando Duque Gómez

This work presents a hybrid chaotic–cryptographic image encryption method that integrates a physical two-dimensional delta-kicked oscillator with a PBKDF2-HMAC-SHA256 key derivation function (KDF). The user-provided key material—a 12-char...

  • Article
  • Open Access
66 Citations
8,210 Views
20 Pages

18 July 2018

Recently, to conquer most non-plain related chaos-based image cryptosystems’ security flaws that cannot resist the powerful chosen/knownn plain-text attacks or differential attacks efficiently for less plaintext sensitivity, many plain related...

of 2