Skip to Content

89 Results Found

  • Article
  • Open Access
26 Citations
2,745 Views
13 Pages

22 April 2021

This paper analyzes the security of image encryption systems based on bit plane extraction and multi chaos. It includes a bit-level permutation for high, 4-bit planes and bit-wise XOR diffusion, and finds that the key streams in the permutation and d...

  • Article
  • Open Access
4 Citations
2,074 Views
19 Pages

An Efficient Encryption Scheme with Fully Hidden Access Policy for Medical Data

  • Moli Zhang,
  • Feijiao Shao,
  • Ruijuan Zheng,
  • Muhua Liu and
  • Zhihang Ji

With the development of informatization, patient medical data are generally stored in the form of electronic medical records. Hospitals store a large amount of medical data on cloud servers, which can ensure the integrity and sharing of medical data....

  • Article
  • Open Access
9 Citations
2,772 Views
13 Pages

24 June 2021

This paper proposes a more efficient attack method on an image fusion encryption algorithm based on DNA operation and hyperchaos. Although several references have reported some methods to crack the image encryption algorithm, they are not the most ef...

  • Article
  • Open Access
20 Citations
4,050 Views
14 Pages

31 January 2019

In order to meet the requirement of secure image communication in a resource-constrained network environment, a novel lightweight chaotic image encryption scheme based on permutation and diffusion has been proposed. It was claimed that this scheme ca...

  • Article
  • Open Access
22 Citations
5,986 Views
17 Pages

16 May 2019

CAPTCHA authentication has been challenged by recent technology advances in AI. However, many of the AI advances challenging CAPTCHA are either restricted by a limited amount of labeled CAPTCHA data or are constructed in an expensive or complicated w...

  • Article
  • Open Access
1 Citations
2,737 Views
13 Pages

15 February 2023

A new class of cryptosystems called verifiable encryption (VE) that facilitates the verification of two plaintexts without decryption was proposed in our previous paper. The main contributions of our previous study include the following. (1) Certain...

  • Article
  • Open Access
22 Citations
4,352 Views
22 Pages

9 March 2023

Due to the equivalent keys revealed by a chosen-plaintext attack or a chosen-ciphertext attack, most of the existing chaotic image encryption schemes are demonstrated to be insecure. In order to improve security performance, some scholars have recent...

  • Article
  • Open Access
87 Citations
6,827 Views
15 Pages

14 September 2018

This article performs the cryptanalysis of an image encryption algorithm using an S-box generated by chaos. The algorithm has the advantages of simple structure, high encryption efficiency, and good encryption performance. However, an attentive inves...

  • Article
  • Open Access
26 Citations
3,411 Views
10 Pages

23 March 2020

Security of image communication is more and more important in many applications such as the transmission of military and medical images. To meet the requirement, a new color image encryption algorithm using a new one-dimension (1D) chaotic map was pr...

  • Article
  • Open Access
53 Citations
8,108 Views
20 Pages

A Symmetric Plaintext-Related Color Image Encryption System Based on Bit Permutation

  • Shuting Cai,
  • Linqing Huang,
  • Xuesong Chen and
  • Xiaoming Xiong

13 April 2018

Recently, a variety of chaos-based image encryption algorithms adopting the traditional permutation-diffusion structure have been suggested. Most of these algorithms cannot resist the powerful chosen-plaintext attack and chosen-ciphertext attack effi...

  • Article
  • Open Access
82 Citations
5,254 Views
20 Pages

15 July 2020

In this paper, we construct a five dimensional continuous hyperchaotic system and propose an image encryption scheme based on the hyperchaotic system, which adopts DNA dynamic coding mechanism and classical scrambling diffusion encryption structure....

  • Article
  • Open Access
1,648 Views
19 Pages

An Improved Chosen Plaintext Attack on JPEG Encryption

  • Junhui He,
  • Kaitian Gu,
  • Yihan Huang,
  • Yue Li and
  • Xiang Chen

Format-compatible encryption can be used to ensure the security and privacy of JPEG images. Recently, a JPEG image encryption method proved to be secure against known plaintext attacks by employing an adaptive encryption key, which depends on the his...

  • Article
  • Open Access
9 Citations
3,286 Views
19 Pages

20 July 2023

With the advent of communication networks, protecting data from security threats has become increasingly important. To address this issue, we present a new text encryption scheme that uses a combination of elliptic curve cryptography and max-plus alg...

  • Article
  • Open Access
43 Citations
3,443 Views
26 Pages

27 February 2021

Digital images can be large in size and contain sensitive information that needs protection. Compression using compressed sensing performs well, but the measurement matrix directly affects the signal compression and reconstruction performance. The go...

  • Article
  • Open Access
4 Citations
995 Views
23 Pages

Image Privacy Protection Communication Scheme by Fibonacci Interleaved Diffusion and Non-Degenerate Discrete Chaos

  • Zhiyu Xie,
  • Weihong Xie,
  • Xiyuan Cheng,
  • Zhengqin Yuan,
  • Wenbin Cheng and
  • Yiting Lin

25 July 2025

The rapid development of network communication technology has led to an increased focus on the security of image storage and transmission in multimedia information. This paper proposes an enhanced image security communication scheme based on Fibonacc...

  • Article
  • Open Access
1 Citations
581 Views
26 Pages

31 October 2025

The dynamic confrontation between medical image-encryption technology and cryptanalysis enhances the security of sensitive healthcare information. Recently, Lai et al. proposed a color medical image-encryption scheme (LG-IES) based on a 2D Logistic-G...

  • Article
  • Open Access
71 Citations
5,095 Views
23 Pages

3 November 2018

This paper presents an improved cryptanalysis of a chaos-based image encryption scheme, which integrated permutation, diffusion, and linear transformation process. It was found that the equivalent key streams and all the unknown parameters of the cry...

  • Article
  • Open Access
6 Citations
4,041 Views
30 Pages

Chaotic Hénon–Logistic Map Integration: A Powerful Approach for Safeguarding Digital Images

  • Abeer Al-Hyari,
  • Mua’ad Abu-Faraj,
  • Charlie Obimbo and
  • Moutaz Alazab

This paper presents an integrated chaos-based algorithm for image encryption that combines the chaotic Hénon map and chaotic logistic map (CLM) to enhance the security of digital image communication. The proposed method leverages chaos theory...

  • Article
  • Open Access
12 Citations
3,598 Views
21 Pages

17 July 2020

Based on a logistic map and Feigenbaum map, we proposed a logistic Feigenbaum non-linear cross-coupled hyperchaotic map (LF-NCHM) model. Experimental verification showed that the system is a hyperchaotic system. Compared with the existing cross-coupl...

  • Article
  • Open Access
9 Citations
4,057 Views
33 Pages

3C3R, an Image Encryption Algorithm Based on BBI, 2D-CA, and SM-DNA

  • Sajid Khan,
  • Lansheng Han,
  • Ghulam Mudassir,
  • Bachira Guehguih and
  • Hidayat Ullah

2 November 2019

Color image encryption has enticed a lot of attention in recent years. Many authors proposed a chaotic system-based encryption algorithms for that purpose. However, due to the shortcomings of the low dimensional chaotic systems, similar rule structur...

  • Article
  • Open Access
5 Citations
2,053 Views
23 Pages

2 April 2025

This study presents a decentralised ciphertext-policy attribute-based encryption (CP-ABE) scheme designed for secure and efficient access control in resource-constrained Internet-of-Things (IoT) environments. By utilising multi-authority architecture...

  • Article
  • Open Access
72 Citations
5,402 Views
18 Pages

5 March 2019

Recently, an image encryption algorithm based on DNA encoding and spatiotemporal chaos (IEA-DESC) was proposed. In IEA-DESC, pixel diffusion, DNA encoding, DNA-base permutation and DNA decoding are performed successively to generate cipher-images fro...

  • Article
  • Open Access
7 Citations
2,609 Views
15 Pages

An IND-CPA Analysis of a Cryptosystem Based on Bivariate Polynomial Reconstruction Problem

  • Siti Nabilah Yusof,
  • Muhammad Rezal Kamel Ariffin,
  • Terry Shue Chien Lau,
  • Nur Raidah Salim,
  • Sook-Chin Yip and
  • Timothy Tzen Vun Yap

17 March 2023

The Polynomial Reconstruction Problem (PRP) was introduced in 1999 as a new hard problem in post-quantum cryptography. Augot and Finiasz were the first to design a cryptographic system based on a univariate PRP, which was published at Eurocrypt 2003...

  • Article
  • Open Access
1 Citations
463 Views
15 Pages

Quantum Security of Nonce-Based Encryption

  • Shuping Mao,
  • Peng Wang,
  • Yan Jia,
  • Gang Liu and
  • Bing Liu

24 November 2025

We investigate the quantum security of nonce-based encryption under the indistinguishability against quantum chosen-plaintext attacks (IND-qCPA). While classical results establish that IV-based modes such as CBC, CFB, OFB, and CTR achieve IND-qCPA se...

  • Article
  • Open Access
120 Citations
7,555 Views
22 Pages

2 January 2023

In this paper, a new one-dimensional fractional chaotic map is proposed and an image encryption scheme based on parallel DNA coding is designed by using the chaotic map. The mathematical model of the new chaotic system combines a sine map and a fract...

  • Article
  • Open Access
27 Citations
3,760 Views
17 Pages

Security Analysis of a Color Image Encryption Algorithm Using a Fractional-Order Chaos

  • Heping Wen,
  • Chongfu Zhang,
  • Lan Huang,
  • Juxin Ke and
  • Dongqing Xiong

23 February 2021

Fractional-order chaos has complex dynamic behavior characteristics, so its application in secure communication has attracted much attention. Compared with the design of fractional-order chaos-based cipher, there are fewer researches on security anal...

  • Article
  • Open Access
7 Citations
2,253 Views
26 Pages

18 May 2023

Image abstraction simplifies complex images, highlights specific features, and preserves different levels of structures to achieve a desired style. This paper presents a constructive and adjustable data hiding algorithm to convey various secret messa...

  • Article
  • Open Access
1 Citations
1,170 Views
19 Pages

Weighted Color Image Encryption Algorithm Based on RNA Extended Dynamic Coding and Quantum Chaotic System

  • Xiangyu Zhang,
  • Heping Wen,
  • Wei Feng,
  • Shenghao Kang,
  • Zhiyu Xie,
  • Xuexi Zhang and
  • Yiting Lin

11 August 2025

The rapid development of Internet technology, while providing convenient services for users, has also aroused deep concern among the public about the issue of privacy leakage during image data transmission. To address this situation, this article pro...

  • Article
  • Open Access
6 Citations
3,383 Views
11 Pages

24 April 2023

With the development of quantum technology, quantum computing has an increasingly significant impact on cryptanalysis. Several quantum algorithms, such as Simon’s algorithm, Grover’s algorithm, the Bernstein–Vazirani algorithm, Shor...

  • Article
  • Open Access
19 Citations
2,585 Views
24 Pages

4 December 2021

In the current paper, a new conservative hyperchaotic system is proposed. We make a quantitative analysis of the complexity of the conservative hyperchaotic system from several different aspects, such as phase diagrams, bifurcation diagrams, Lyapunov...

  • Article
  • Open Access
5 Citations
1,890 Views
26 Pages

Secure Image Transmission Using Multilevel Chaotic Encryption and Video Steganography

  • Suhad Naji Alrekaby,
  • Maisa’a Abid Ali Khodher,
  • Layth Kamil Adday and
  • Reem Aljuaidi

1 July 2025

The swift advancement of information and communication technology has made it increasingly difficult to guarantee the security of transmitted data. Traditional encryption techniques, particularly in multimedia applications, frequently fail to defend...

  • Article
  • Open Access
14 Citations
3,105 Views
23 Pages

21 October 2022

Social networks have greatly expanded in the last ten years the need for sharing multimedia data. However, on open networks such as the Internet, where security is frequently compromised, it is simple for eavesdroppers to approach the actual contents...

  • Article
  • Open Access
282 Views
25 Pages

11 February 2026

In cloud computing, ciphertext-policy attribute-based encryption (CP-ABE) is widely adopted for secure data storage and flexible fine-grained access control. For collaborative scenarios involving hierarchical file structures, file hierarchy CP-ABE (F...

  • Article
  • Open Access
9 Citations
7,772 Views
31 Pages

On Quantum Chosen-Ciphertext Attacks and Learning with Errors

  • Gorjan Alagic,
  • Stacey Jeffery,
  • Maris Ozols and
  • Alexander Poremba

Large-scale quantum computing poses a major threat to classical public-key cryptography. Recently, strong “quantum access” security models have shown that numerous symmetric-key cryptosystems are also vulnerable. In this paper, we conside...

  • Article
  • Open Access
4 Citations
2,410 Views
16 Pages

Modified SHARK Cipher and Duffing Map-Based Cryptosystem

  • Osama Rabie,
  • Jawad Ahmad and
  • Daniyal Alghazzawi

12 June 2022

Recent years have seen a lot of interest in the study of chaotic structures and their accompanying cryptography frameworks. In this research, we came up with a new way to encrypt images that used the chaos and a modified block cipher named the SHARK...

  • Article
  • Open Access
66 Citations
8,279 Views
20 Pages

18 July 2018

Recently, to conquer most non-plain related chaos-based image cryptosystems’ security flaws that cannot resist the powerful chosen/knownn plain-text attacks or differential attacks efficiently for less plaintext sensitivity, many plain related...

  • Article
  • Open Access
3 Citations
3,094 Views
20 Pages

An Efficient Pairing-Free Ciphertext-Policy Attribute-Based Encryption Scheme for Internet of Things

  • Chong Guo,
  • Bei Gong,
  • Muhammad Waqas,
  • Hisham Alasmary,
  • Shanshan Tu and
  • Sheng Chen

24 October 2024

The Internet of Things (IoT) is a heterogeneous network composed of numerous dynamically connected devices. While it brings convenience, the IoT also faces serious challenges in data security. Ciphertext-policy attribute-based encryption (CP-ABE) is...

  • Article
  • Open Access
38 Citations
3,349 Views
23 Pages

25 November 2021

In the edge computing and network communication environment, important image data need to be transmitted and stored securely. Under the condition of limited computing resources, it is particularly necessary to design effective and fast image encrypti...

  • Article
  • Open Access
4 Citations
1,251 Views
28 Pages

A Novel ECC-Based Method for Secure Image Encryption

  • Younes Lahraoui,
  • Saiida Lazaar,
  • Youssef Amal and
  • Abderrahmane Nitaj

14 August 2025

As the Internet of Things (IoT) expands, ensuring secure and efficient image transmission in resource-limited environments has become crucial and important. In this paper, we propose a lightweight image encryption scheme based on Elliptic Curve Crypt...

  • Article
  • Open Access
1 Citations
1,078 Views
28 Pages

8 December 2025

TLS 1.3 is a crucial protocol for securing modern internet communications. To facilitate a smooth transition to post-quantum security, hybrid key exchange, which combines classical key exchange algorithms with post-quantum key encapsulation mechanism...

  • Article
  • Open Access
4 Citations
3,774 Views
12 Pages

18 September 2022

The SM4 algorithm is widely used to ensure the security of data transmission. The traditional chosen plaintext power attacks against SM4 usually need to analyze four rounds power traces in turn to recover the secret key. In this paper, we propose a n...

  • Article
  • Open Access
7 Citations
3,150 Views
17 Pages

Syrga2: Post-Quantum Hash-Based Signature Scheme

  • Kunbolat Algazy,
  • Kairat Sakan,
  • Saule Nyssanbayeva and
  • Oleg Lizunov

This paper proposes a new post-quantum signature scheme, Syrga2, based on hash functions. As known, existing post-quantum algorithms are classified based on their structures. The proposed Syrga2 scheme belongs to the class of multi-use signatures wit...

  • Article
  • Open Access
15 Citations
2,733 Views
21 Pages

7 January 2025

In recent years, many chaotic image encryption algorithms have been cracked by chosen plaintext attack. Therefore, the method of associating the key with the plaintext to resist the cryptanalysis has received extensive attention from designers. This...

  • Article
  • Open Access
5 Citations
3,326 Views
20 Pages

An Access Control Scheme Based on Blockchain and Ciphertext Policy-Attribute Based Encryption

  • Ronglei Hu,
  • Ziwei Ma,
  • Li Li,
  • Peiliang Zuo,
  • Xiuying Li,
  • Jiaxin Wei and
  • Sihui Liu

23 September 2023

Ciphertext policy–attribute-based encryption (CP-ABE), which provides fine-grained access control and ensures data confidentiality, is widely used in data sharing. However, traditional CP-ABE schemes often choose to outsource data to untrusted...

  • Article
  • Open Access
24 Citations
3,830 Views
17 Pages

On a Symmetric Image Encryption Algorithm Based on the Peculiarity of Plaintext DNA Coding

  • Yulan Kang,
  • Linqing Huang,
  • Yan He,
  • Xiaoming Xiong,
  • Shuting Cai and
  • Haiyu Zhang

21 August 2020

Many plaintext-related or non-plaintext-related image encryption algorithms based on chaotic systems have been found inefficient and insecure under chosen plaintext attacks. In this paper, a novel plaintext-related mechanism based on the peculiarity...

  • Article
  • Open Access
6 Citations
3,107 Views
15 Pages

11 March 2019

The re-keying scheme is a variant of the symmetric encryption scheme where a sender (respectively, receiver) encrypts (respectively, decrypts) plaintext with a temporal session key derived from a master secret key and publicly-shared randomness. It i...

  • Article
  • Open Access
3 Citations
1,985 Views
17 Pages

Identity-Based Online/Offline Encryption Scheme from LWE

  • Binger Zuo,
  • Jiguo Li,
  • Yichen Zhang and
  • Jian Shen

4 September 2024

With quantum computers, the quantum resistance of cryptographic systems has gradually attracted attention. To overcome the shortcoming of existing identity-based encryption (IBE) schemes in resisting quantum attacks, we introduce an IBE scheme based...

  • Article
  • Open Access
368 Views
21 Pages

Image Encryption Using Chaotic Box Partition–Permutation and Modular Diffusion with PBKDF2 Key Derivation

  • Javier Alberto Vargas Valencia,
  • Mauricio A. Londoño-Arboleda,
  • Hernán David Salinas Jiménez,
  • Carlos Alberto Marín Arango and
  • Luis Fernando Duque Gómez

This work presents a hybrid chaotic–cryptographic image encryption method that integrates a physical two-dimensional delta-kicked oscillator with a PBKDF2-HMAC-SHA256 key derivation function (KDF). The user-provided key material—a 12-char...

  • Article
  • Open Access
369 Views
23 Pages

2 December 2025

The vulnerability of transmitted digital images has become a pressing concern due to recent advancements in multimedia technology. Conventional encryption methods often fail to meet the requirements of large-scale real-time multimedia security. In or...

of 2