Vulnerability Detection and Improvements of an Image Cryptosystem for Real-Time Visual Protection

Plain text Vulnerability Ciphertext indistinguishability Watermarking attack Security Analysis
DOI: 10.1145/3708546 Publication Date: 2024-12-14T10:08:02Z
ABSTRACT
Chaos-based cryptosystems are regarded as highly secure techniques for image encryption. However, despite the considerable enhancement of encryption robustness provided by chaotic systems, security vulnerabilities may still arise, potentially leading to drastic damage in contexts involving sensitive data such medical or military images. Identifying these and developing corresponding countermeasures essential prevent breaches achieve higher protection. From this perspective, research thoroughly examines an scheme based on 1D sine-powered map. This analysis identifies within that can reduce it a permutation-only scheme. Exploiting found vulnerabilities, three distinct cryptanalysis attacks proposed work. These enable unauthorized individuals replicate decryption processes without possessing secret key, posing significant risks. Under ciphertext-only attack, chosen-plaintext chosen-ciphertext attack conditions, demonstrate their effectiveness through simulation experimentation. Notably, results indicate be executed seconds using only few special plaintext ciphertext An improved version analyzed is introduced address identified enhance its speed.
SUPPLEMENTAL MATERIAL
Coming soon ....
REFERENCES (32)
CITATIONS (0)