Cryptanalysis of image confidentiality scheme based on hybrid chaotic maps

Majid Khan, Noor Munir

Research output: Contribution to journalArticlepeer-review

Abstract

Chaos-based encryption has come to prominence as an efficient and lightweight approach to secure image communication. A recently proposed scheme using both one dimensional (1D) logistic map and two dimensional (2D) sin-cosine map showed high resistance to statistical and differential attacks. A thorough cryptanalysis, however, shows vulnerability to chosen-plaintext attacks (CPA), mainly the result of weak sensitivity to keys and implementation issues. In our study, we provide a systematic CPA of the elementary algorithm, confirmed using experimental evaluation. To counter these limitations, we put forth an augmented encryption model with enhanced chaotic parameter coupling and adaptive key scheduling. With the revised design, there is much increased resistance to cryptanalysis, offering secure image transmission in resource-constrained environments.

Original languageEnglish
Article number130
JournalJournal of King Saud University - Computer and Information Sciences
Volume37
Issue number6
DOIs
StatePublished - Aug 2025

Keywords

  • Chosen-plaintext attack
  • Cryptanalysis
  • Diffusion
  • Hybrid chaotic map
  • Permutation

Fingerprint

Dive into the research topics of 'Cryptanalysis of image confidentiality scheme based on hybrid chaotic maps'. Together they form a unique fingerprint.

Cite this