When an attacker meets a cipher-image in 2018: A Year in Review

Abstract This paper aims to review the encountered technical contradictions when an attacker meets the cipher-images encrypted by the image encryption schemes (algorithms) proposed in 2018 from the viewpoint of an image cryptanalyst. The most representative works among them are selected and classified according to their essential structures. Almost all image cryptanalysis works published in 2018 are surveyed due to their small number. The challenging problems on design and analysis of image encryption schemes are summarized to receive the attentions of both designers and attackers (cryptanalysts) of image encryption schemes, which may promote solving scenario-oriented image security problems with new technologies.

[1]  Dong Liu,et al.  Cryptanalysis of a plaintext-related chaotic RGB image encryption scheme using total plain image characteristics , 2017, Multimedia Tools and Applications.

[2]  Yushu Zhang,et al.  Image salient regions encryption for generating visually meaningful ciphertext image , 2016, Neural Computing and Applications.

[3]  Congxu Zhu,et al.  Image encryption algorithm with an avalanche effect based on a six-dimensional discrete chaotic system , 2018, Multimedia Tools and Applications.

[4]  Xiaoyuan Wang,et al.  Security performance analysis of a chaotic stream cipher , 2018, Nonlinear Dynamics.

[5]  Rupali Bhardwaj Enhanced encrypted reversible data hiding algorithm with minimum distortion through homomorphic encryption , 2018 .

[6]  Jinhu Lu,et al.  On Cryptanalysis of Fridrich's chaotic image encryption scheme , 2016, ArXiv.

[7]  Xiaofeng Liao,et al.  Cryptanalysis and enhancements of image encryption based on three-dimensional bit matrix permutation , 2018, Signal Process..

[8]  R. Amutha,et al.  Double image compression and encryption scheme using logistic mapped convolution and cellular automata , 2017, Multimedia Tools and Applications.

[9]  Yi Zhu,et al.  Towards Privacy-Preserving Content-Based Image Retrieval in Cloud Computing , 2018, IEEE Transactions on Cloud Computing.

[10]  Feng Xu,et al.  Designing permutation-substitution image encryption networks with Henon map , 2017, Neurocomputing.

[11]  Majid Khan,et al.  A novel image encryption scheme based on quantum dynamical spinning and rotations , 2018, PloS one.

[12]  Kwok-Wo Wong,et al.  On the Security of a Class of Diffusion Mechanisms for Image Encryption , 2015, IEEE Transactions on Cybernetics.

[13]  Chenggen Quan,et al.  Cryptanalysis of an optical cryptosystem based on phase-truncated Fourier transform and nonlinear operations , 2018 .

[14]  Hongjun Liu,et al.  Chaos based adaptive double-image encryption scheme using hash function and S-boxes , 2017, Multimedia Tools and Applications.

[15]  A. A. Elsadany,et al.  Further analytical bifurcation analysis and applications of coupled logistic maps , 2018, Appl. Math. Comput..

[16]  Feng Hao,et al.  Cryptanalysis of a Chaotic Image Encryption Algorithm Based on Information Entropy , 2018, IEEE Access.

[17]  A He,et al.  Security analysis of a double-image encryption technique based on an asymmetric algorithm. , 2018, Journal of the Optical Society of America. A, Optics, image science, and vision.

[18]  Kehui Sun,et al.  Cryptanalyzing and Improving a Novel Color Image Encryption Algorithm Using RT-Enhanced Chaotic Tent Maps , 2018, IEEE Access.

[19]  Jizhao Liu,et al.  A new simple chaotic system and its application in medical image encryption , 2017, Multimedia Tools and Applications.

[20]  Dongdong Lin,et al.  Cryptanalyzing an Image-Scrambling Encryption Algorithm of Pixel Bits , 2016, IEEE MultiMedia.

[21]  Safya Belghith,et al.  RISC: a robust image symmetric cryptosystem , 2017, Multimedia Tools and Applications.

[22]  Motilal Singh Khoirom,et al.  Cryptanalysis of multimedia encryption using elliptic curve cryptography , 2018, Optik.

[23]  J. S. Murguía,et al.  Design of a strong S-box based on a matrix approach , 2018, Nonlinear Dynamics.

[24]  Fatih Özkaynak,et al.  Brief review on application of nonlinear dynamics in image encryption , 2018, Nonlinear Dynamics.

[25]  Olivier Déforges,et al.  Cryptanalyzing an image encryption scheme using reverse 2-dimensional chaotic map and dependent diffusion , 2018, Multimedia Tools and Applications.

[26]  S. El-Rabaie,et al.  Chaotic encryption with different modes of operation based on Rubik’s cube for efficient wireless communication , 2018, Multimedia Tools and Applications.

[27]  Elisa Bertino,et al.  PrivBioMTAuth: Privacy Preserving Biometrics-Based and User Centric Protocol for User Authentication From Mobile Phones , 2018, IEEE Transactions on Information Forensics and Security.

[28]  Guanrong Chen,et al.  Dynamic Analysis of Digital Chaotic Maps via State-Mapping Networks , 2014, IEEE Transactions on Circuits and Systems I: Regular Papers.

[29]  Weiwei Sun,et al.  Robust Privacy-Preserving Image Sharing over Online Social Networks (OSNs) , 2018, ACM Trans. Multim. Comput. Commun. Appl..

[30]  Vijay Kumar,et al.  A RGB image encryption technique using Lorenz and Rossler chaotic system on DNA sequences , 2018, Multimedia Tools and Applications.

[31]  Dongdong Lin,et al.  Cryptanalyzing an Image Encryption Algorithm Based on Autoblocking and Electrocardiography , 2017, IEEE MultiMedia.

[32]  Hang Zhou,et al.  Separable Reversible Data Hiding in Encrypted JPEG Bitstreams , 2018, IEEE Transactions on Dependable and Secure Computing.

[33]  Yicong Zhou,et al.  Medical image encryption using high-speed scrambling and pixel adaptive diffusion , 2018, Signal Process..

[34]  Ching-Nung Yang,et al.  Progressive (k, n) secret image sharing schemes based on Boolean operations and covering codes , 2018, Signal Process. Image Commun..

[35]  Zhengjun Liu,et al.  Optical hyperspectral image encryption based on improved Chirikov mapping and gyrator transform , 2018, Optics and Lasers in Engineering.

[36]  Jinhu Lu,et al.  Cryptanalysis of a Chaotic Stream Cipher and Its Improved Scheme , 2018, Int. J. Bifurc. Chaos.

[37]  Brian Lee,et al.  A new image encryption algorithm based on heterogeneous chaotic neural network generator and dna encoding , 2018, Multimedia Tools and Applications.

[38]  Jiwu Huang,et al.  JPEG Image Encryption With Improved Format Compatibility and File Size Preservation , 2018, IEEE Transactions on Multimedia.

[39]  Peijia Zheng,et al.  Efficient Encrypted Images Filtering and Transform Coding With Walsh-Hadamard Transform and Parallelization , 2018, IEEE Transactions on Image Processing.

[40]  Qing Zhou,et al.  Image encryption using partitioned cellular automata , 2018, Neurocomputing.

[41]  Ali Kanso,et al.  A novel image encryption algorithm based on piecewise linear chaotic maps and least squares approximation , 2017, Multimedia Tools and Applications.

[42]  Mahmoud H. Annaby,et al.  On security of image ciphers based on logic circuits and chaotic permutations , 2017, Multimedia Tools and Applications.

[43]  Dezheng Zhang,et al.  Cryptanalysis of Chaos-Based Cryptosystem from the Hardware Perspective , 2018, Int. J. Bifurc. Chaos.

[44]  Kehui Sun,et al.  Improved Cryptanalysis and Enhancements of an Image Encryption Scheme Using Combined 1D Chaotic Maps , 2018, Entropy.

[45]  Stefan Katzenbeisser,et al.  Depreciating Motivation and Empirical Security Analysis of Chaos-Based Image and Video Encryption , 2018, IEEE Transactions on Information Forensics and Security.

[46]  En Zhang,et al.  Cryptanalysis of a colour image encryption using chaotic APFM nonlinear adaptive filter , 2018, Signal Process..

[47]  Liangcai Cao,et al.  Image Encryption Based on Interleaved Computer-Generated Holograms , 2018, IEEE Transactions on Industrial Informatics.

[48]  Ali Chehab,et al.  A dynamic approach for a lightweight and secure cipher for medical images , 2018, Multimedia Tools and Applications.

[49]  Manish Kumar,et al.  A cryptographic model for better information security , 2018, J. Inf. Secur. Appl..

[50]  Kehui Sun,et al.  Cryptanalysis and Improvement on an Image Encryption Algorithm Design Using a Novel Chaos Based S-Box , 2018, Symmetry.

[51]  Sung Wook Baik,et al.  Secure Surveillance Framework for IoT Systems Using Probabilistic Image Encryption , 2018, IEEE Transactions on Industrial Informatics.

[52]  S. Subashini,et al.  A spatiotemporal chaotic image encryption scheme based on self adaptive model and dynamic keystream fetching technique , 2018, Multimedia Tools and Applications.

[53]  Yicong Zhou,et al.  One-Dimensional Nonlinear Model for Producing Chaos , 2018, IEEE Transactions on Circuits and Systems I: Regular Papers.

[54]  Kwok-Tung Lo,et al.  A Content-Adaptive Joint Image Compression and Encryption Scheme , 2018, IEEE Transactions on Multimedia.

[55]  Zhen Li,et al.  A novel plaintext-related image encryption scheme using hyper-chaotic system , 2018, Nonlinear Dynamics.

[56]  Yang Lu,et al.  A double color image encryption scheme based on three-dimensional brownian motion , 2018, Multimedia Tools and Applications.

[57]  Huazhong Shu,et al.  Double-image cryptosystem using chaotic map and mixture amplitude-phase retrieval in gyrator domain , 2016, Multimedia Tools and Applications.

[58]  Naixue Xiong,et al.  Intelligent Impulsive Synchronization of Nonlinear Interconnected Neural Networks for Image Protection , 2018, IEEE Transactions on Industrial Informatics.

[59]  Wei Li,et al.  Image Encryption-Then-Transmission Using DNA Encryption Algorithm and The Double Chaos , 2018, IEEE Photonics Journal.

[60]  Feng Xu,et al.  Design of image cipher using life-like cellular automata and chaotic map , 2018, Signal Process..

[61]  Ming Li,et al.  Cryptanalyzing a Color Image Encryption Scheme Based on Hybrid Hyper-Chaotic System and Cellular Automata , 2018, IEEE Access.

[62]  Yong Zhang,et al.  A plaintext-related image encryption algorithm based on chaos , 2017, Multimedia Tools and Applications.

[63]  Shijun Xiang,et al.  Reversible Data Hiding in Homomorphic Encrypted Domain by Mirroring Ciphertext Group , 2018, IEEE Transactions on Circuits and Systems for Video Technology.

[64]  Hassene Seddik,et al.  A new rapid hyperchaotic system for more efficient 2D data encryption , 2018, Multimedia Tools and Applications.

[65]  Xiaofeng Liao,et al.  A fast and efficient approach to color-image encryption based on compressive sensing and fractional Fourier transform , 2017, Multimedia Tools and Applications.

[66]  Hui Ding,et al.  Multiple color image encryption and authentication based on phase retrieval and partial decryption in quaternion gyrator domain , 2018, Multimedia Tools and Applications.

[67]  Mohsen Machhout,et al.  A novel chaotic image cryptosystem based on DNA sequence operations and single neuron model , 2018, Multimedia Tools and Applications.

[68]  Mohamed Lamine Sahari,et al.  A pseudo-random numbers generator based on a novel 3D chaotic map with an application to color image encryption , 2018, Nonlinear Dynamics.

[69]  Chengqing Li,et al.  Cracking a hierarchical chaotic image encryption algorithm based on permutation , 2015, Signal Process..

[70]  Ahmed A. Abd El-Latif,et al.  Robust Encryption of Quantum Medical Images , 2018, IEEE Access.

[71]  Xingyu Yan,et al.  Multi-image encryption scheme based on quantum 3D Arnold transform and scaled Zhongtang chaotic system , 2018, Quantum Information Processing.

[72]  Min Zhao,et al.  Designing optical 3D images encryption and reconstruction using monospectral synthetic aperture integral imaging. , 2018, Optics express.

[73]  Tariq Shah,et al.  A novel scheme for image encryption using substitution box and chaotic system , 2017 .

[74]  Saeed Noshadian,et al.  Optimizing chaos based image encryption , 2018, Multimedia Tools and Applications.

[75]  Yicong Zhou,et al.  Sine-Transform-Based Chaotic System With FPGA Implementation , 2018, IEEE Transactions on Industrial Electronics.

[76]  Lingfeng Liu,et al.  Image block encryption algorithm based on chaotic maps , 2017, IET Signal Process..

[77]  Hitoshi Kiya,et al.  A Block-Permutation-Based Encryption Scheme with Independent Processing of RGB Components , 2018, IEICE Trans. Inf. Syst..

[78]  Xiaofeng Liao,et al.  Image encryption using 2D Hénon-Sine map and DNA approach , 2018, Signal Process..

[79]  Hitoshi Kiya,et al.  Security Evaluation for Block Scrambling-Based Image Encryption Including JPEG Distortion against Jigsaw Puzzle Solver Attacks , 2018, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[80]  Hejiao Huang,et al.  2D Logistic-Sine-coupling map for image encryption , 2018, Signal Process..

[81]  Xiaofeng Liao,et al.  A novel scheme for simultaneous image compression and encryption based on wavelet packet transform and multi-chaotic systems , 2018, Multimedia Tools and Applications.

[82]  Xinpeng Zhang,et al.  Efficient Compression of Encrypted Binary Images Using the Markov Random Field , 2017, IEEE Transactions on Information Forensics and Security.

[83]  Bhaskar Mondal,et al.  A chaotic permutation and diffusion based image encryption algorithm for secure communications , 2018, Multimedia Tools and Applications.

[84]  Karl Entacher,et al.  Bad subsequences of well-known linear congruential pseudorandom number generators , 1998, TOMC.

[85]  Hui Wang,et al.  Cryptanalysis and enhancements of image encryption using combination of the 1D chaotic map , 2018, Signal Process..

[86]  Guanrong Chen,et al.  Design and FPGA-Based Realization of a Chaotic Secure Video Communication System , 2018, IEEE Transactions on Circuits and Systems for Video Technology.

[87]  Shuliang Sun,et al.  A Novel Hyperchaotic Image Encryption Scheme Based on DNA Encoding, Pixel-Level Scrambling and Bit-Level Scrambling , 2018, IEEE Photonics Journal.

[88]  Xiaoling Huang,et al.  An image encryption algorithm based on irregular wave representation , 2017, Multimedia Tools and Applications.

[89]  Wei Feng,et al.  Cryptanalysis and Improvement of the Hyper-Chaotic Image Encryption Scheme Based on DNA Encoding and Scrambling , 2018, IEEE Photonics Journal.

[90]  Wei Zhang,et al.  An image encryption scheme using self-adaptive selective permutation and inter-intra-block feedback diffusion , 2018, Signal Process..

[91]  Rengarajan Amirtharajan,et al.  Networked hardware assisted key image and chaotic attractors for secure RGB image communication , 2017, Multimedia Tools and Applications.

[92]  Mingguang Shan,et al.  Asymmetric image encryption using phase-truncated discrete multiple-parameter fractional Fourier transform , 2018, Optical Review.

[93]  Lin Teng,et al.  A chaotic color image encryption using integrated bit-level permutation , 2017, Multimedia Tools and Applications.

[94]  Jan Sher Khan,et al.  A novel image encryption scheme based on orthogonal matrix, skew tent map, and XOR operation , 2017, Neural Computing and Applications.

[95]  Wenqi He,et al.  Cryptanalysis on double random phase encoding with deep learning , 2018, Optical Engineering + Applications.

[96]  Jie Huang,et al.  Cryptanalysis of a chaotic image encryption scheme based on permutation-diffusion structure , 2018, Signal Process. Image Commun..

[97]  Vijay Kumar,et al.  Beta Chaotic Map Based Image Encryption Using Genetic Algorithm , 2018, Int. J. Bifurc. Chaos.

[98]  Rongyue Zhang,et al.  A lossy compression scheme for encrypted images exploiting Cauchy distribution and weighted rate distortion optimization , 2018, J. Vis. Commun. Image Represent..

[99]  Deepaknath Tandur,et al.  Image encryption based on modified Henon map using hybrid chaotic shift transform , 2018, Multimedia Tools and Applications.

[100]  Yicong Zhou,et al.  Designing Hyperchaotic Cat Maps With Any Desired Number of Positive Lyapunov Exponents , 2018, IEEE Transactions on Cybernetics.

[101]  Kapil Sharma,et al.  Cryptanalysis of image encryption scheme based on a new 1D chaotic system , 2018, Signal Process..

[102]  Fouad Khelifi,et al.  On the security of a stream cipher in reversible data hiding schemes operating in the encrypted domain , 2018, Signal Process..

[103]  Yi Cao,et al.  An efficient and self-adapting colour-image encryption algorithm based on chaos and interactions among multiple layers , 2018, Multimedia Tools and Applications.

[104]  Qixiang Mei,et al.  An efficient pixel-level chaotic image encryption algorithm , 2018, Nonlinear Dynamics.

[105]  Cong Wang,et al.  Towards Privacy-Preserving and Practical Image-Centric Social Discovery , 2018, IEEE Transactions on Dependable and Secure Computing.

[106]  Xuan Li,et al.  Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram , 2017, Multimedia Tools and Applications.

[107]  Xing-Yuan Wang,et al.  A novel color image encryption scheme using DNA permutation based on the Lorenz system , 2018, Multimedia Tools and Applications.

[108]  Guanrong Chen,et al.  Some Iterative Properties of (F1,F2)-Chaos in Non-Autonomous Discrete Systems , 2018, Entropy.

[109]  Xingming Sun,et al.  Multiple-parameter fractional quaternion Fourier transform and its application in colour image encryption , 2018, IET Image Process..

[110]  Chunhua Wang,et al.  A New Chaotic Image Encryption Scheme Using Breadth-First Search and Dynamic Diffusion , 2018, Int. J. Bifurc. Chaos.

[111]  S. Li,et al.  Cryptographic requirements for chaotic secure communications , 2003, nlin/0311039.

[112]  William Puech,et al.  An Efficient MSB Prediction-Based Method for High-Capacity Reversible Data Hiding in Encrypted Images , 2018, IEEE Transactions on Information Forensics and Security.

[113]  Kehui Sun,et al.  A novel bit-level image encryption algorithm based on 2D-LICM hyperchaotic map , 2018, Signal Process..

[114]  Ming Li,et al.  Cryptanalysis and Improvement of a Chaotic Image Encryption by First-Order Time-Delay System , 2018, IEEE MultiMedia.

[115]  Anupam Chattopadhyay,et al.  Secure and Lightweight Compressive Sensing Using Stream Cipher , 2018, IEEE Transactions on Circuits and Systems II: Express Briefs.

[116]  Bryan M. Hennelly,et al.  QR code-based non-linear image encryption using Shearlet transform and spiral phase transform , 2018 .

[117]  Hossam Diab,et al.  Cryptanalysis and improvement of the image cryptosystem reusing permutation matrix dynamically , 2018, Signal Process..

[118]  Musheer Ahmad,et al.  A New 1D Chaotic Map and $\beta$ -Hill Climbing for Generating Substitution-Boxes , 2018, IEEE Access.

[119]  Musheer Ahmad,et al.  Cryptanalysis of an Image Encryption Algorithm Based on Combined Chaos for a BAN System, and Improved Scheme Using SHA-512 and Hyperchaos , 2018, Symmetry.

[120]  Leonardo Palacios-Luengas,et al.  Symmetric cryptosystem based on skew tent map , 2017, Multimedia Tools and Applications.

[121]  Chee Peng Lim,et al.  Synchronization of an Inertial Neural Network With Time-Varying Delays and Its Application to Secure Communication , 2018, IEEE Transactions on Neural Networks and Learning Systems.

[122]  Thang Manh Hoang,et al.  Cryptanalysis and security improvement for a symmetric color image encryption algorithm , 2018 .

[123]  Hossam Diab,et al.  Secure image cryptosystem with unique key streams via hyper-chaotic system , 2018, Signal Process..

[124]  Xiaoming Chen,et al.  Joint encryption and compression of 3D images based on tensor compressive sensing with non-autonomous 3D chaotic system , 2017, Multimedia Tools and Applications.

[125]  Zeeshan Asghar,et al.  A novel construction of substitution box for image encryption applications with Gingerbreadman chaotic map and S8 permutation , 2016, Neural Computing and Applications.

[126]  Cong Wang,et al.  Improved known-plaintext attack to permutation-only multimedia ciphers , 2018, Inf. Sci..

[127]  Xiaofeng Liao,et al.  Some properties of the Logistic map over the finite field and its application , 2018, Signal Process..

[128]  Bing Chen,et al.  Reversible data hiding in encrypted images with private-key homomorphism and public-key homomorphism , 2018, J. Vis. Commun. Image Represent..

[129]  Gonzalo Álvarez,et al.  Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.

[130]  Feng Xu,et al.  A Chaos Based Image Encryption Scheme Using Digit-Level Permutation and Block Diffusion , 2018, IEEE Access.

[131]  Yong Xiang,et al.  A compression-diffusion-permutation strategy for securing image , 2018, Signal Process..

[132]  Yu-Dong Yao,et al.  Cryptanalysis and improvement in an image encryption scheme using combination of the 1D chaotic map , 2018, Nonlinear Dynamics.

[133]  Yuliang Lu,et al.  Chinese remainder theorem-based two-in-one image secret sharing with three decoding options , 2018, Digit. Signal Process..

[134]  Qian Wang,et al.  Searchable Encryption over Feature-Rich Data , 2018, IEEE Transactions on Dependable and Secure Computing.

[135]  Shyong Jian Shyu,et al.  XOR-Based Visual Cryptographic Schemes With Monotonously Increasing and Flawless Reconstruction Properties , 2018, IEEE Transactions on Circuits and Systems for Video Technology.

[136]  Ravindra Kumar Purwar,et al.  Cryptanalysis and improvement of an image encryption scheme using combination of one-dimensional chaotic maps , 2018, J. Electronic Imaging.

[137]  Saeed Mozaffari,et al.  Parallel image encryption with bitplane decomposition and genetic algorithm , 2018, Multimedia Tools and Applications.