CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Image Encryption using RCES/RSES Scheme

Published on March 2013 by Madhusmita Sahoo, Sabita Pal, Rina Mahakud
International Conference on Computing, Communication and Sensor Network
Foundation of Computer Science USA
CCSN2012 - Number 3
March 2013
Authors: Madhusmita Sahoo, Sabita Pal, Rina Mahakud
f8f68b1c-acb3-4a0c-8eb8-4af6e19fc36f

Madhusmita Sahoo, Sabita Pal, Rina Mahakud . Image Encryption using RCES/RSES Scheme. International Conference on Computing, Communication and Sensor Network. CCSN2012, 3 (March 2013), 6-12.

@article{
author = { Madhusmita Sahoo, Sabita Pal, Rina Mahakud },
title = { Image Encryption using RCES/RSES Scheme },
journal = { International Conference on Computing, Communication and Sensor Network },
issue_date = { March 2013 },
volume = { CCSN2012 },
number = { 3 },
month = { March },
year = { 2013 },
issn = 0975-8887,
pages = { 6-12 },
numpages = 7,
url = { /specialissues/ccsn2012/number3/10861-1024/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Special Issue Article
%1 International Conference on Computing, Communication and Sensor Network
%A Madhusmita Sahoo
%A Sabita Pal
%A Rina Mahakud
%T Image Encryption using RCES/RSES Scheme
%J International Conference on Computing, Communication and Sensor Network
%@ 0975-8887
%V CCSN2012
%N 3
%P 6-12
%D 2013
%I International Journal of Computer Applications
Abstract

Today the demand for secure transfers of digital images , cryptanalysis and network security is a growing field. In this paper the security of RCES is analyzed and observed that it is insecure against the known/chosen-plaintext attacks . Here two seeds are generated chaotically and XOR'ed with plain image to get cipher image . The security of RCES against the brute-force attack was overestimated.

References
  1. S. Li, C. Li, G. Chen, and X. Mou, "Cryptanalysis of the RCES/RSES image encryption scheme," 2008.
  2. C. Li and G. Chen, "On the security of a class of image encryption schemes," Proceedings of the IEEE International Symposium on Circuits and Systems, 2008
  3. Cryptanalysis of the RCES/RSES image encryption scheme. Shujun Li, Chengqing Li, Guanrong Chen , Kwok-Tung Lo. The Journal of Systems and Software 81 (2008) 1130–1143. ( ScienceDirect)
  4. C. Chang, M. Hwang, and T. Chen, "A New Encryption Algorithm for Image Cryptosystem," The Journal of Systems and Software , vol. 58, pp. 83–91, 2001.
  5. S. Li and X. Zheng, ?Cryptanalysis of a chaotic image encryption method,? in Proc. IEEE Int. Symp. Circuits and Systems (ISCAS'2002) , Arizona, vol. 2, 2002, pp. 708–711.
  6. S. Lian, J. Sun, and Z. Wang, "Security analysis of a chaos-based image encryption algorithm," Phys. Lett. A 351, pp. 645-661, 2005.
  7. Pareek NK, Patidar V, Sud KK. Image encryption using chaotic logistic map. Image Vision Comput 2006;24:926–34
  8. Gao Haojiang, Zhang Yisheng, Liang Shuyun, Li Dequn. A new chaotic algorithm for image encryption. Chaos Soliton Fract 2006;29(2):393–9.
Index Terms

Computer Science
Information Sciences

Keywords

Cryptanalysis Rces Chosen-plaintext Attacks Seeds Brute-force Attack