IDEAS home Printed from https://ideas.repec.org/a/eee/matcom/v190y2021icp826-836.html
   My bibliography  Save this article

Cryptanalysis of hybrid secure image encryption based on Julia set fractals and three-dimensional Lorenz chaotic map

Author

Listed:
  • Munir, Noor
  • Khan, Majid
  • Jamal, Sajjad Shaukat
  • Hazzazi, Mohammad Mazyad
  • Hussain, Iqtadar

Abstract

Recently a hybrid secure image encryption scheme based on Julia set and three-dimensional Lorenz chaotic system was suggested. The offered scheme was based on the multiplicative operation carried out by Julia set fractals and bitwise XOR which was implemented by the trajectories obtained from the Lorenz chaotic system. This paper presents the cryptanalysis of the scheme through a chosen-plaintext attack by taking three different chosen images. In this work, a practical chosen-plaintext attack is performed which reveals that the cryptosystem depending on only multiplication and bitwise XOR operation can be effortlessly attacked. The results of the analysis performed on the retrieved image reflect the effectiveness of the chosen-plaintext attack which fruitfully produces the original image.

Suggested Citation

  • Munir, Noor & Khan, Majid & Jamal, Sajjad Shaukat & Hazzazi, Mohammad Mazyad & Hussain, Iqtadar, 2021. "Cryptanalysis of hybrid secure image encryption based on Julia set fractals and three-dimensional Lorenz chaotic map," Mathematics and Computers in Simulation (MATCOM), Elsevier, vol. 190(C), pages 826-836.
  • Handle: RePEc:eee:matcom:v:190:y:2021:i:c:p:826-836
    DOI: 10.1016/j.matcom.2021.06.008
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S0378475421002317
    Download Restriction: Full text for ScienceDirect subscribers only

    File URL: https://libkey.io/10.1016/j.matcom.2021.06.008?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Majid Khan & Hafiz Muhammad Waseem, 2018. "A novel image encryption scheme based on quantum dynamical spinning and rotations," PLOS ONE, Public Library of Science, vol. 13(11), pages 1-23, November.
    2. Rafik Hamza & Alzubair Hassan & Teng Huang & Lishan Ke & Hongyang Yan, 2019. "An Efficient Cryptosystem for Video Surveillance in the Internet of Things Environment," Complexity, Hindawi, vol. 2019, pages 1-11, December.
    3. Hao Zhou & Muhammad Tanveer & Jingjng Li & Basil K. Papadopoulos, 2020. "Comparative Study of Some Fixed-Point Methods in the Generation of Julia and Mandelbrot Sets," Journal of Mathematics, Hindawi, vol. 2020, pages 1-15, July.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Liu, Lingfeng & Wang, Jie, 2023. "A cluster of 1D quadratic chaotic map and its applications in image encryption," Mathematics and Computers in Simulation (MATCOM), Elsevier, vol. 204(C), pages 89-114.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Alghafis, Abdullah & Waseem, Hafiz Muhammad & Khan, Majid & Jamal, Sajjad Shaukat, 2020. "A hybrid cryptosystem for digital contents confidentiality based on rotation of quantum spin states," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 554(C).
    2. Arshad, Usman & Khan, Majid & Shaukat, Sajjad & Amin, Muhammad & Shah, Tariq, 2020. "An efficient image privacy scheme based on nonlinear chaotic system and linear canonical transformation," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 546(C).
    3. Batool, Syeda Iram & Amin, Muhammad & Waseem, Hafiz Muhammad, 2020. "Public key digital contents confidentiality scheme based on quantum spin and finite state automation," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 537(C).

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:matcom:v:190:y:2021:i:c:p:826-836. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: http://www.journals.elsevier.com/mathematics-and-computers-in-simulation/ .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.