Skip to main content
Log in

Cryptanalysis and security improvement for selective image encryption

  • Regular Article
  • Chaos Based Image Encryption, Stream Cipher and Authentication
  • Published:
The European Physical Journal Special Topics Aims and scope Submit manuscript

Abstract

Selective image encryption has been considered as an effective method to improve the encryption speed and computation resource by reducing considerable amount of data. In the present paper, the weaknesses of recent method of selective image encryption are presented analytically and the method of security improvement is proposed. The security for selective image encryption is improved in a way that number of selectively significant bits for encryption vary from pixel to pixel. This leads to be uncertain data for encryption and decryption. The examples are to demonstrate and verify for security weaknesses of the recent method and the effectiveness of the proposed method.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. A. Medio, M. Lines, Nonlinear Dynamics: A Primer (Cambridge University Press, 2001)

  2. C. Shannon, Bell Syst. Tech. J. 28, 656 (1949)

    Article  MATH  MathSciNet  Google Scholar 

  3. G. Alvarez, S. Li, Int. J. Bifur. Chaos 16, 2129 (2006)

    Article  MATH  MathSciNet  Google Scholar 

  4. D.R. Stinson, Cryptography: Theory and Practice (CRC Press, 1995)

  5. L. Kocarev, S. Lian, Chaos-based Cryptography (Springer, 2011)

  6. T. Xiang, K.-W. Wong, X. Liao, Chaos 17, 023115 (2007)

    Article  ADS  Google Scholar 

  7. G. Bhatnagar, Q.M.J. Wu, Digital Signal Proc. 22, 648 (2012)

    Article  MathSciNet  Google Scholar 

  8. X. Wang, L. Teng, X. Qin, Signal Proc. 92, 1101 (2012)

    Article  Google Scholar 

  9. C. Song, Y. Qiao, X. Zhang, ICIC Expr. Lett. Part B: Appl. 3, 831 (2012)

    Google Scholar 

  10. H.T. Panduranga, S.K. NaveenKumar, Int. J. Eng. Technol., 5, 112 (2013)

    Google Scholar 

  11. G.-Q. Chen, Q.-L. Zhang, H.-W. Wang, L.-Q. Wang, Lect. Notes Electr. Eng. 238, 1169 (2014)

    Article  ADS  Google Scholar 

  12. X. Zhang, Z. Zhao, Nonlinear Dyn. 75, 319 (2014)

    Article  Google Scholar 

  13. C.-Y. Song, Y.-L. Qiao, X.-Z. Zhang, Optik 124, 3329 (2013)

    Article  ADS  Google Scholar 

  14. K. Kaneko, Theory and Application of Coupled Map Lattices (John Wiley & Sons, 1993)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to T.M. Hoang.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Hoang, T., Tran, D. Cryptanalysis and security improvement for selective image encryption. Eur. Phys. J. Spec. Top. 223, 1635–1646 (2014). https://doi.org/10.1140/epjst/e2014-02121-3

Download citation

  • Received:

  • Revised:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1140/epjst/e2014-02121-3

Keywords

Navigation