Citation: | FENG Wei, ZHANG Jing, QIN Zhentao, HE Yigang. Cryptanalysis of Image Encryption Algorithm Based on Variable Step Length Josephus Traversing and DNA Dynamic Encoding[J]. Journal of Electronics & Information Technology, 2022, 44(10): 3635-3642. doi: 10.11999/JEIT210791 |
[1] |
ÖZKAYNAK F. Brief review on application of nonlinear dynamics in image encryption[J]. Nonlinear Dynamics, 2018, 92(2): 305–313. doi: 10.1007/s11071-018-4056-x
|
[2] |
FENG Wei, HE Yigang, LI Hongmin, et al. Image encryption algorithm based on discrete logarithm and memristive chaotic system[J]. The European Physical Journal Special Topics, 2019, 228(10): 1951–1967. doi: 10.1140/epjst/e2019-800209-3
|
[3] |
HUA Zhongyun, JIN Fan, XU Binxuan, et al. 2D logistic-sine-coupling map for image encryption[J]. Signal Processing, 2018, 149: 148–161. doi: 10.1016/j.sigpro.2018.03.010
|
[4] |
陈艳浩, 刘中艳, 周丽宴. 基于差异混合掩码与混沌Gyrator变换的光学图像加密算法[J]. 电子与信息学报, 2019, 41(4): 888–895. doi: 10.11999/JEIT180456
CHEN Yanhao, LIU Zhongyan, and ZHOU Liyan. Optical image encryption algorithm based on differential mixed mask and chaotic Gyrator transform[J]. Journal of Electronics &Information Technology, 2019, 41(4): 888–895. doi: 10.11999/JEIT180456
|
[5] |
李付鹏, 刘敬彪, 王光义, 等. 基于混沌集的图像加密算法[J]. 电子与信息学报, 2020, 42(4): 981–987. doi: 10.11999/JEIT190344
LI Fupeng, LIU Jingbiao, WANG Guangyi, et al. An image encryption algorithm based on chaos set[J]. Journal of Electronics &Information Technology, 2020, 42(4): 981–987. doi: 10.11999/JEIT190344
|
[6] |
ZHAO Ruoyu, ZHANG Yushu, XIAO Xiangli, et al. TPE2: Three-pixel exact thumbnail-preserving image encryption[J]. Signal Processing, 2021, 183: 108019. doi: 10.1016/j.sigpro.2021.108019
|
[7] |
肖成龙, 孙颖, 林邦姜, 等. 基于神经网络与复合离散混沌系统的双重加密方法[J]. 电子与信息学报, 2020, 42(3): 687–694. doi: 10.11999/JEIT190213
XIAO Chenglong, SUN Ying, LIN Bangjiang, et al. Double encryption method based on neural network and composite discrete chaotic system[J]. Journal of Electronics &Information Technology, 2020, 42(3): 687–694. doi: 10.11999/JEIT190213
|
[8] |
LI Hongmin, LI Tie, FENG Wei, et al. A novel image encryption scheme based on non-adjacent parallelable permutation and dynamic DNA-level two-way diffusion[J]. Journal of Information Security and Applications, 2021, 61: 102844. doi: 10.1016/j.jisa.2021.102844
|
[9] |
郭媛, 周艳艳, 敬世伟. 基于图像重组和比特置乱的多图像加密[J]. 光子学报, 2020, 49(4): 0410002. doi: 10.3788/gzxb20204904.0410002
GUO Yuan, ZHOU Yanyan, and JING Shiwei. Multiple-image encryption based on image recombination and bit scrambling[J]. Acta Photonica Sinica, 2020, 49(4): 0410002. doi: 10.3788/gzxb20204904.0410002
|
[10] |
LI Chengqing, ZHANG Yun, and XIE E Y. When an attacker meets a cipher-image in 2018: A year in review[J]. Journal of Information Security and Applications, 2019, 48: 102361. doi: 10.1016/j.jisa.2019.102361
|
[11] |
闵富红, 王珠林, 王恩荣, 等. 新型忆阻器混沌电路及其在图像加密中的应用[J]. 电子与信息学报, 2016, 38(10): 2681–2688. doi: 10.11999/JEIT160178
MIN Fuhong, WANG Zhulin, WANG Enrong, et al. New memristor chaotic circuit and its application to image encryption[J]. Journal of Electronics &Information Technology, 2016, 38(10): 2681–2688. doi: 10.11999/JEIT160178
|
[12] |
FRIDRICH J. Symmetric ciphers based on two-dimensional chaotic maps[J]. International Journal of Bifurcation and Chaos, 1998, 8(6): 1259–1284. doi: 10.1142/S021812749800098X
|
[13] |
WU Xiangjun, WANG Kunshu, WANG Xingyuan, et al. Color image DNA encryption using NCA map-based CML and one-time keys[J]. Signal Processing, 2018, 148: 272–287. doi: 10.1016/j.sigpro.2018.02.028
|
[14] |
CHAI Xiuli, GAN Zhihua, YUAN Ke, et al. A novel image encryption scheme based on DNA sequence operations and chaotic systems[J]. Neural Computing and Applications, 2019, 31(1): 219–237. doi: 10.1007/s00521-017-2993-9
|
[15] |
ZEFREH E Z. An image encryption scheme based on a hybrid model of DNA computing, chaotic systems and hash functions[J]. Multimedia Tools and Applications, 2020, 79(33): 24993–25022. doi: 10.1007/s11042-020-09111-1
|
[16] |
JOLFAEI A, WU Xinwen, and MUTHUKKUMARASAMY V. On the security of permutation-only image encryption schemes[J]. IEEE Transactions on Information Forensics and Security, 2016, 11(2): 235–246. doi: 10.1109/TIFS.2015.2489178
|
[17] |
FENG Wei and HE Yigang. Cryptanalysis and improvement of the hyper-chaotic image encryption scheme based on DNA encoding and scrambling[J]. IEEE Photonics Journal, 2018, 10(6): 7909215. doi: 10.1109/JPHOT.2018.2880590
|
[18] |
PREISHUBER M, HÜTTER T, KATZENBEISSER S, et al. Depreciating motivation and empirical security analysis of chaos-based image and video encryption[J]. IEEE Transactions on Information Forensics and Security, 2018, 13(9): 2137–2150. doi: 10.1109/TIFS.2018.2812080
|
[19] |
CHEN Junxin, CHEN Lei, and ZHOU Yicong. Cryptanalysis of a DNA-based image encryption scheme[J]. Information Sciences, 2020, 520: 130–141. doi: 10.1016/j.ins.2020.02.024
|
[20] |
牛莹, 张勋才. 基于变步长约瑟夫遍历和DNA动态编码的图像加密算法[J]. 电子与信息学报, 2020, 42(6): 1383–1391. doi: 10.11999/JEIT190849
NIU Ying and ZHANG Xuncai. Image encryption algorithm of based on variable step length Josephus traversing and DNA dynamic coding[J]. Journal of Electronics &Information Technology, 2020, 42(6): 1383–1391. doi: 10.11999/JEIT190849
|