The paper proposes breaks for the permutation methods adopted in the chaos-based image cryptosystems. By a careful examination on the most chaotic image cryptosystems we can find that the permutation process constitute the main step or, in some cases, the only step to create the confusion. It can be applied on the pixels or on the pixel bits. A recently proposed image encryption scheme based on shuffling the pixel bits inspired from other works is treated as a case study. By applying a chosen plaintext attack, we demonstrate that a hacker can determine the permutation vectors (matrixes) used to permute the pixels bits or the pixels themselves and exploit them to reveal the plain image. (C) 2012 Elsevier Inc. All rights reserved.
机构:
Univ Kebangsaan Malaysia, Fac Sci & Technol, Sch Math Sci, Bangi 43600, MalaysiaUniv Putra Malaysia, Fac Sci, Dept Math, Serdang 43400, Selangor, Malaysia
机构:
Xiangtan Univ, Coll Informat Engn, Xiangtan 411105, Hunan, Peoples R China
Hong Kong Polytech Univ, Elect & Informat Engn Dept, Hong Kong, Hong Kong, Peoples R ChinaXiangtan Univ, Coll Informat Engn, Xiangtan 411105, Hunan, Peoples R China
Li, Chengqing
;
Lo, Kwok-Tung
论文数: 0引用数: 0
h-index: 0
机构:
Hong Kong Polytech Univ, Elect & Informat Engn Dept, Hong Kong, Hong Kong, Peoples R ChinaXiangtan Univ, Coll Informat Engn, Xiangtan 411105, Hunan, Peoples R China
机构:
Univ Kebangsaan Malaysia, Fac Sci & Technol, Sch Math Sci, Bangi 43600, MalaysiaUniv Putra Malaysia, Fac Sci, Dept Math, Serdang 43400, Selangor, Malaysia
机构:
Xiangtan Univ, Coll Informat Engn, Xiangtan 411105, Hunan, Peoples R China
Hong Kong Polytech Univ, Elect & Informat Engn Dept, Hong Kong, Hong Kong, Peoples R ChinaXiangtan Univ, Coll Informat Engn, Xiangtan 411105, Hunan, Peoples R China
Li, Chengqing
;
Lo, Kwok-Tung
论文数: 0引用数: 0
h-index: 0
机构:
Hong Kong Polytech Univ, Elect & Informat Engn Dept, Hong Kong, Hong Kong, Peoples R ChinaXiangtan Univ, Coll Informat Engn, Xiangtan 411105, Hunan, Peoples R China