Next Article in Journal
Bayesian Network Model Averaging Classifiers by Subbagging
Next Article in Special Issue
Deep Image Steganography Using Transformer and Recursive Permutation
Previous Article in Journal
Weakly Supervised Building Semantic Segmentation Based on Spot-Seeds and Refinement Process
Previous Article in Special Issue
A Novel Image Encryption Scheme Based on Elliptic Curves over Finite Rings
 
 
Article
Peer-Review Record

An Image Compression Encryption Algorithm Based on Chaos and ZUC Stream Cipher

Entropy 2022, 24(5), 742; https://doi.org/10.3390/e24050742
by Xiaomeng Song, Mengna Shi, Yanqi Zhou and Erfu Wang *
Reviewer 1: Anonymous
Reviewer 2: Anonymous
Reviewer 3: Anonymous
Entropy 2022, 24(5), 742; https://doi.org/10.3390/e24050742
Submission received: 22 April 2022 / Revised: 9 May 2022 / Accepted: 20 May 2022 / Published: 23 May 2022
(This article belongs to the Special Issue Computational Imaging and Image Encryption with Entropy)

Round 1

Reviewer 1 Report

The authors proposed image encryption based on a chaotic map. The main encryption structure is focused on grayscale images, which makes the applicability of the proposal work limited. I invite the authors to revise their proposal and extend the work to cover RGB images. It is also required to have a time execution test or complexity evaluation.

The paper contains poor comparative studies. The authors should evaluate and compare their results further with recent image encryption schemes.

Please proofread the manuscript.

Author Response

Thanks for your comment. Please see the attachment.

Author Response File: Author Response.pdf

Reviewer 2 Report

General Comments:

Any cryptographic system used in cryptography applications must meet two requirements: security and computational complexity.

The statistical security of the proposed system is studied but its security against cryptographic attacks, especially physical attacks (SCA, FIA), is not studied. Indeed, ZUC algorithm presents some weaknesses against SCA, see [1].

The computational performance (ET, NCpB) of the system should be carried out and compared to some systems in the literature. To compare the running speed of different systems working on different platforms usually we use the NCpB (Number of needed Cycles to generate one Byte) parameter witch is defined as:

ET(Mbit/s)=(Image size (Mbit))/(Average generation time (s))

NCpB=(CPU Speed (Hz))/(ET (Byte⁄s))

In order to simplify the complexity of your system, you can replace the ZUC algorithm by simple chaotic mixing based on the used one-dimensional Sine-Tent-Logistic (STL) chaotic system, see [2].

Comments:

  • There are some ambiguity on the used symbols, e.g.:
  • In paragraph 2.1, you wrote: “The image of size M X M is divided into image blocks xi of size M X N. But in paragraph 3.2, you wrote “to divide an image of size M X N into K sub-blocks.
  • In order to avoid ambiguity between the output Z of ZUC algorithm and the output Z of STL map, replace in figure 1, Zn by Cn
  • 5 lines below figure 4, Replace: “The sampling method in this paper is random sampling controlled by the chaotic system”

 By: “The sampling method in this paper is random sampling controlled by the

ZUC algorithm”

  • In relation (9), the sampled sequence S(p) is used and not C(p)
  • It is better to apply NIST test instead of Lyapunov exponents on the output sequences of Logistic, Sine map and STL map (of figure 5).
  • Figure 6, is not clear and must be replaced
  • The better parameter to quantify the Key sensitivity is the Hamming Distance.

 

 

[1] TANG Ming et al., 2012,. "Differential Power Analysis on ZUC Algorithm."

[2] O. Jallouli, et al., 2017, “Design and Analysis of two Stream Ciphers Based on Chaotic Coupling and Multiplexing techniques” MTAP, Multimedia Tools and Applications, June 2017, pp. 1-27. DOI 10.1007/s11042-017-4953-x

 

Author Response

Thank you for your valuable. Please see attachment.

Author Response File: Author Response.pdf

Reviewer 3 Report

In this paper, authors proposed a novel image encryption algorithm based on ZUC stream cipher and compressed sensing. The sampled chaotic sequence and the parallel compressed sensing operation have some new ideas. It is of reference significance for cryptosystem designers.  I have the following  comments for reference.
1. In the Abstract, the first sentence is too long and has word repetition with use of "based on" and "on
the basis of".
2. In Eq.(5), "S∈[0,1]"should be written as "S_n∈[0,1], n=0,1,...", T and L also have such problems, .
3. For Eq.(6), the source references should be cited.
4. In Figure 4, the text size should be the same. "the digits at the position Z of ZUC sequence 1 corresponding
to the original chaotic sequence C are retained", the expression of this sentence is not good. 
5. The title of Figure 8 should be "Decryption flow chart".
6. "Figure 9 shows the result of ..." should be "Figure 9 shows the results of ...". "It can be seen from Figure 10 that In the interval [0,255],..." should be  "It can be seen from Figure 10 that, in the interval [0,255], ... ". It is suggested that the author carefully check the language of the full text.
7. In Figure 9, the title of "(b1)-(b3) are the encryption image images" has two words of "image".
8. The abscissa and ordinate axes in Figure 14 shall be marked with coordinate quantity symbols.
In my opinion, the manuscript may be accepted for publication after minor revision.

Author Response

Thanks for your comment. Please see the attachment.

Author Response File: Author Response.pdf

Round 2

Reviewer 1 Report

I have no further comments

Reviewer 2 Report

Your responses to my general comments are not satisfied
Back to TopTop