Impact of Attacks on Permutation Only Image Encryption Scheme

Ms.Snehal Bharat Ambare, Prof.Amruta Amune

Abstract


Permutation is a commonly used primitive in multimedia (image/video) encryption schemes, and many permutation
only algorithms have been proposed in recent years for protection
of multimedia data. In permutation-only image ciphers, the
entries of the image matrix are scrambled using a permutation mapping matrix which is built by splitting and shuffling
the part of the image. The literature on the cryptanalysis of
image ciphers indicates that permutation-only image ciphers are
insecure against cipher-text-only attacks and/or known/chosenplain-text attacks. However, previous studies have not been
able to ensure the correct retrieval of the complete plain-text
elements. In this paper, we re-visited the previous works on
cryptanalysis of permutation-only image encryption schemes
and made the cryptanalysis work on chosen-plain-text attacks
complete and more efficient. We proved that in all permutationonly image ciphers, regardless of the cipher structure, the correct
permutation mapping is recovered completely by a making
multiple combination of two encrypted image. To the best of
our knowledge, for the first time, this paper gives a combination
attack that completely determines the correct plain-text elements
using a deterministic method. Also, the detection of hacker at
admin side with the help of IP detection and blocking system is
to be done in this system for future prevention of permutation
attack

Full Text:

PDF

References


X. Zhang, Y. Ren, L. Shen, Z. Qian, and G. Feng, ”Compressing

encrypted images with auxiliary information”, IEEE Trans. Multim.,vol.

, no. 5, pp. 1327-1336, 2014.

J. Zhou, X. Liu, O.C. Au, and Y.Y. Tang, ”Designing an efficient image

encryption-then-compression system via prediction error clustering and

random permutation”, IEEE Trans. Inf. Foren. Sec., vol. 9, no. 1, pp.39-

, 2014.

A. Pande, J. Zambreno, ”Embedded Multimedia Security Systems: Algorithms and Architectures”, Springer-Verlag, London, 2013.

Z. Galias and W. Tucker, ”Numerical study of coexisting attractors for

the Henon map, Int. J. Bifurcation Chaos”, vol. 23, no. 7, pp. 118, 2013.

S. Li, G. Chen, A. Cheung, B. Bhargava, and K.-T. Lo, ”On the designof

perceptual MPEG-video encryption algorithms”, IEEE Trans. Circ.Sys.

Video Tech., vol. 17, no. 2, pp. 214-223, 2007.

Sk. Md. Mizanur Rahman, M.A. Hossain, H. Mouftah, A. El Saddik,and

E. Okamoto, ”Chaos-cryptography based privacy preservation technique

for video surveillance”, Multim. Sys., vol. 18, no. 2, pp. 145 155, 2012


Refbacks

  • There are currently no refbacks.


Copyright © IJETT, International Journal on Emerging Trends in Technology