The European Physical Journal Special Topics

, Volume 223, Issue 8, pp 1635–1646 | Cite as

Cryptanalysis and security improvement for selective image encryption

  • T.M. HoangEmail author
  • D. Tran
Regular Article Chaos Based Image Encryption, Stream Cipher and Authentication
Part of the following topical collections:
  1. Chaos, Cryptography and Communications


Selective image encryption has been considered as an effective method to improve the encryption speed and computation resource by reducing considerable amount of data. In the present paper, the weaknesses of recent method of selective image encryption are presented analytically and the method of security improvement is proposed. The security for selective image encryption is improved in a way that number of selectively significant bits for encryption vary from pixel to pixel. This leads to be uncertain data for encryption and decryption. The examples are to demonstrate and verify for security weaknesses of the recent method and the effectiveness of the proposed method.


European Physical Journal Special Topic Grayscale Image Encrypt Image Plain Image Cipher Image 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    A. Medio, M. Lines, Nonlinear Dynamics: A Primer (Cambridge University Press, 2001)Google Scholar
  2. 2.
    C. Shannon, Bell Syst. Tech. J. 28, 656 (1949)CrossRefzbMATHMathSciNetGoogle Scholar
  3. 3.
    G. Alvarez, S. Li, Int. J. Bifur. Chaos 16, 2129 (2006)CrossRefzbMATHMathSciNetGoogle Scholar
  4. 4.
    D.R. Stinson, Cryptography: Theory and Practice (CRC Press, 1995)Google Scholar
  5. 5.
    L. Kocarev, S. Lian, Chaos-based Cryptography (Springer, 2011)Google Scholar
  6. 6.
    T. Xiang, K.-W. Wong, X. Liao, Chaos 17, 023115 (2007)ADSCrossRefGoogle Scholar
  7. 7.
    G. Bhatnagar, Q.M.J. Wu, Digital Signal Proc. 22, 648 (2012)CrossRefMathSciNetGoogle Scholar
  8. 8.
    X. Wang, L. Teng, X. Qin, Signal Proc. 92, 1101 (2012)CrossRefGoogle Scholar
  9. 9.
    C. Song, Y. Qiao, X. Zhang, ICIC Expr. Lett. Part B: Appl. 3, 831 (2012)Google Scholar
  10. 10.
    H.T. Panduranga, S.K. NaveenKumar, Int. J. Eng. Technol., 5, 112 (2013)Google Scholar
  11. 11.
    G.-Q. Chen, Q.-L. Zhang, H.-W. Wang, L.-Q. Wang, Lect. Notes Electr. Eng. 238, 1169 (2014)ADSCrossRefGoogle Scholar
  12. 12.
    X. Zhang, Z. Zhao, Nonlinear Dyn. 75, 319 (2014)CrossRefGoogle Scholar
  13. 13.
    C.-Y. Song, Y.-L. Qiao, X.-Z. Zhang, Optik 124, 3329 (2013)ADSCrossRefGoogle Scholar
  14. 14.
    K. Kaneko, Theory and Application of Coupled Map Lattices (John Wiley & Sons, 1993)Google Scholar

Copyright information

© EDP Sciences and Springer 2014

Authors and Affiliations

  1. 1.School of Electronics and Telecommunications, Hanoi University of Science and TechnologyHanoiVietnam
  2. 2.Faculty of Education, Science, Technology and Mathematics, University of CanberraCanberraAustralia

Personalised recommendations