Cryptanalysis of an image encryption scheme using cellular automata substitution and SCAN

Chengqing Li, Kwok Tung Lo

Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

7 Citations (Scopus)

Abstract

Recently, a novel image encryption scheme using progressive cellular automata (CA) substitution and SCAN was proposed. This paper analyzes the security of the scheme and reports the following problems: 1) the scheme is not sensitive to the changes of plain-images; 2) the scheme is not sensitive to the changes of the key streams generated by CA; 3) there are some problems about the secret key of the scheme; 4) the scheme can be broken with no more than chosen-images when the two basic parts of the scheme are not iterated, where MN is the number of pixels of the plain-image and L is the number of all possible different pixel values. Moreover, the strength against known/chosen-plaintext attack is also discussed briefly when the iteration number of the two basic parts is more than one.
Original languageEnglish
Title of host publicationAdvances in Multimedia Information Processing, PCM 2010 - 11th Pacific Rim Conference on Multimedia, Proceedings
Pages601-610
Number of pages10
EditionPART 1
DOIs
Publication statusPublished - 8 Nov 2010
Event11th Pacific Rim Conference on Multimedia, PCM 2010 - Shanghai, China
Duration: 21 Sept 201024 Sept 2010

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
NumberPART 1
Volume6297 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference11th Pacific Rim Conference on Multimedia, PCM 2010
Country/TerritoryChina
CityShanghai
Period21/09/1024/09/10

ASJC Scopus subject areas

  • General Computer Science
  • Theoretical Computer Science

Fingerprint

Dive into the research topics of 'Cryptanalysis of an image encryption scheme using cellular automata substitution and SCAN'. Together they form a unique fingerprint.

Cite this