Security Analysis and Improvement on an Image Encryption Algorithm Using Chebyshev Generator

Tsu-Yang Wu,
Xiaoning Fan,
King-Hang Wang,
Jeng-Shyang Pan,
Chien-Ming Chen,

Abstract


Chaotic map including Chebyshev’s polynomial have been studied and used in many cryptographic areas recently due to its low cost of computation and high level of security. Some research works have been proposed to use Chebyshev’s polynomial in image encryption by setting up two-stage encryption algorithms. Pixels of a plain image are first permuted by a Permutation process. Then each pixel values are changed by a Diffusion process. A two-stage image encryption algorithm is generally believed to be more secure than a single stage image encryption algorithm.
In this paper, however, we demonstrate a recent two-stage image encryption algorithm proposed by Wang et al., is insecure against chosen plaintext attack. An attacker may be able to decrypt a cipher image after knowing some ciphers of images which are chosen by the attacker. We present an subtle but efficient improvement over Wang et al.’s algorithm so that it is not only immune to the attack we presented but also statistically improved when experiment is conducted to measure pixels’ correlation, NPCR and UACI.


Citation Format:
Tsu-Yang Wu, Xiaoning Fan, King-Hang Wang, Jeng-Shyang Pan, Chien-Ming Chen, "Security Analysis and Improvement on an Image Encryption Algorithm Using Chebyshev Generator," Journal of Internet Technology, vol. 20, no. 1 , pp. 13-23, Jan. 2019.

Full Text:

PDF

Refbacks

  • There are currently no refbacks.





Published by Executive Committee, Taiwan Academic Network, Ministry of Education, Taipei, Taiwan, R.O.C
JIT Editorial Office, Office of Library and Information Services, National Dong Hwa University
No. 1, Sec. 2, Da Hsueh Rd., Shoufeng, Hualien 974301, Taiwan, R.O.C.
Tel: +886-3-931-7314  E-mail: jit.editorial@gmail.com