Security analysis of image cryptosystems only or partially based on a chaotic permutation

被引:30
作者
Hermassi, Houcemeddine [1 ]
Rhouma, Rhouma [1 ]
Belghith, Safya [1 ]
机构
[1] Ecole Natl Ingenieurs Tunis, Syscom Lab, Tunis, Tunisia
关键词
Cryptanalysis; Chaos; Image; Cryptosystem; Permutation; ONLY MULTIMEDIA CIPHERS; QUANTITATIVE CRYPTANALYSIS; SCRAMBLING ENCRYPTION; PIXEL BIT; STANDARD; ALGORITHM;
D O I
10.1016/j.jss.2012.04.031
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The paper proposes breaks for the permutation methods adopted in the chaos-based image cryptosystems. By a careful examination on the most chaotic image cryptosystems we can find that the permutation process constitute the main step or, in some cases, the only step to create the confusion. It can be applied on the pixels or on the pixel bits. A recently proposed image encryption scheme based on shuffling the pixel bits inspired from other works is treated as a case study. By applying a chosen plaintext attack, we demonstrate that a hacker can determine the permutation vectors (matrixes) used to permute the pixels bits or the pixels themselves and exploit them to reveal the plain image. (C) 2012 Elsevier Inc. All rights reserved.
引用
收藏
页码:2133 / 2144
页数:12
相关论文
共 28 条
[1]   Cryptanalyzing a nonlinear chaotic algorithm (NCA) for image encryption [J].
Alvarez, G. ;
Li, Shujun .
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2009, 14 (11) :3743-3749
[2]   A chaotic block cipher algorithm for image cryptosystems [J].
Amin, Mohamed ;
Faragallah, Osama S. ;
Abd El-Latif, Ahmed A. .
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2010, 15 (11) :3484-3497
[3]  
[Anonymous], Nist special publication 800-38a. online
[4]   Modified Baptista type chaotic cryptosystem via matrix secret key [J].
Ariffin, M. R. K. ;
Noorani, M. S. M. .
PHYSICS LETTERS A, 2008, 372 (33) :5427-5430
[5]   Cryptanalysis of a family of self-synchronizing chaotic stream ciphers [J].
Arroyo, David ;
Alvarez, Gonzalo ;
Amigo, Jose Maria ;
Li, Shujun .
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2011, 16 (02) :805-813
[6]   A hash-based image encryption algorithm [J].
Cheddad, Abbas ;
Condell, Joan ;
Curran, Kevin ;
McKevitt, Paul .
OPTICS COMMUNICATIONS, 2010, 283 (06) :879-893
[7]   A new chaotic algorithm for image encryption [J].
Gao, HJ ;
Zhang, YS ;
Liang, SY ;
Li, DQ .
CHAOS SOLITONS & FRACTALS, 2006, 29 (02) :393-399
[8]   Chaos-based cryptosystem on DSP [J].
Guglielmi, Veronique ;
Pinel, Pierre ;
Fournier-Prunaret, Daniele ;
Taha, Abdel-Kaddous .
CHAOS SOLITONS & FRACTALS, 2009, 42 (04) :2135-2144
[9]   Self-synchronizing chaotic stream ciphers [J].
Kurian, Ajeesh P. ;
Puthusserypady, Sadasivan .
SIGNAL PROCESSING, 2008, 88 (10) :2442-2452
[10]   Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks [J].
Li, Chengqing ;
Lo, Kwok-Tung .
SIGNAL PROCESSING, 2011, 91 (04) :949-954