CFP last date
20 January 2025
Reseach Article

Image Encryption using RCES/RSES Scheme

Published on March 2013 by Madhusmita Sahoo, Sabita Pal, Rina Mahakud
International Conference on Computing, Communication and Sensor Network
Foundation of Computer Science USA
CCSN2012 - Number 3
March 2013
Authors: Madhusmita Sahoo, Sabita Pal, Rina Mahakud
f8f68b1c-acb3-4a0c-8eb8-4af6e19fc36f

Madhusmita Sahoo, Sabita Pal, Rina Mahakud . Image Encryption using RCES/RSES Scheme. International Conference on Computing, Communication and Sensor Network. CCSN2012, 3 (March 2013), 6-12.

@article{
author = { Madhusmita Sahoo, Sabita Pal, Rina Mahakud },
title = { Image Encryption using RCES/RSES Scheme },
journal = { International Conference on Computing, Communication and Sensor Network },
issue_date = { March 2013 },
volume = { CCSN2012 },
number = { 3 },
month = { March },
year = { 2013 },
issn = 0975-8887,
pages = { 6-12 },
numpages = 7,
url = { /specialissues/ccsn2012/number3/10861-1024/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Special Issue Article
%1 International Conference on Computing, Communication and Sensor Network
%A Madhusmita Sahoo
%A Sabita Pal
%A Rina Mahakud
%T Image Encryption using RCES/RSES Scheme
%J International Conference on Computing, Communication and Sensor Network
%@ 0975-8887
%V CCSN2012
%N 3
%P 6-12
%D 2013
%I International Journal of Computer Applications
Abstract

Today the demand for secure transfers of digital images , cryptanalysis and network security is a growing field. In this paper the security of RCES is analyzed and observed that it is insecure against the known/chosen-plaintext attacks . Here two seeds are generated chaotically and XOR'ed with plain image to get cipher image . The security of RCES against the brute-force attack was overestimated.

References
  1. S. Li, C. Li, G. Chen, and X. Mou, "Cryptanalysis of the RCES/RSES image encryption scheme," 2008.
  2. C. Li and G. Chen, "On the security of a class of image encryption schemes," Proceedings of the IEEE International Symposium on Circuits and Systems, 2008
  3. Cryptanalysis of the RCES/RSES image encryption scheme. Shujun Li, Chengqing Li, Guanrong Chen , Kwok-Tung Lo. The Journal of Systems and Software 81 (2008) 1130–1143. ( ScienceDirect)
  4. C. Chang, M. Hwang, and T. Chen, "A New Encryption Algorithm for Image Cryptosystem," The Journal of Systems and Software , vol. 58, pp. 83–91, 2001.
  5. S. Li and X. Zheng, ?Cryptanalysis of a chaotic image encryption method,? in Proc. IEEE Int. Symp. Circuits and Systems (ISCAS'2002) , Arizona, vol. 2, 2002, pp. 708–711.
  6. S. Lian, J. Sun, and Z. Wang, "Security analysis of a chaos-based image encryption algorithm," Phys. Lett. A 351, pp. 645-661, 2005.
  7. Pareek NK, Patidar V, Sud KK. Image encryption using chaotic logistic map. Image Vision Comput 2006;24:926–34
  8. Gao Haojiang, Zhang Yisheng, Liang Shuyun, Li Dequn. A new chaotic algorithm for image encryption. Chaos Soliton Fract 2006;29(2):393–9.
Index Terms

Computer Science
Information Sciences

Keywords

Cryptanalysis Rces Chosen-plaintext Attacks Seeds Brute-force Attack