Impact of Attacks on Permutation Only Image Encryption Scheme
Abstract
only algorithms have been proposed in recent years for protection
of multimedia data. In permutation-only image ciphers, the
entries of the image matrix are scrambled using a permutation mapping matrix which is built by splitting and shuffling
the part of the image. The literature on the cryptanalysis of
image ciphers indicates that permutation-only image ciphers are
insecure against cipher-text-only attacks and/or known/chosenplain-text attacks. However, previous studies have not been
able to ensure the correct retrieval of the complete plain-text
elements. In this paper, we re-visited the previous works on
cryptanalysis of permutation-only image encryption schemes
and made the cryptanalysis work on chosen-plain-text attacks
complete and more efficient. We proved that in all permutationonly image ciphers, regardless of the cipher structure, the correct
permutation mapping is recovered completely by a making
multiple combination of two encrypted image. To the best of
our knowledge, for the first time, this paper gives a combination
attack that completely determines the correct plain-text elements
using a deterministic method. Also, the detection of hacker at
admin side with the help of IP detection and blocking system is
to be done in this system for future prevention of permutation
attack
Full Text:
PDFReferences
X. Zhang, Y. Ren, L. Shen, Z. Qian, and G. Feng, ”Compressing
encrypted images with auxiliary information”, IEEE Trans. Multim.,vol.
, no. 5, pp. 1327-1336, 2014.
J. Zhou, X. Liu, O.C. Au, and Y.Y. Tang, ”Designing an efficient image
encryption-then-compression system via prediction error clustering and
random permutation”, IEEE Trans. Inf. Foren. Sec., vol. 9, no. 1, pp.39-
, 2014.
A. Pande, J. Zambreno, ”Embedded Multimedia Security Systems: Algorithms and Architectures”, Springer-Verlag, London, 2013.
Z. Galias and W. Tucker, ”Numerical study of coexisting attractors for
the Henon map, Int. J. Bifurcation Chaos”, vol. 23, no. 7, pp. 118, 2013.
S. Li, G. Chen, A. Cheung, B. Bhargava, and K.-T. Lo, ”On the designof
perceptual MPEG-video encryption algorithms”, IEEE Trans. Circ.Sys.
Video Tech., vol. 17, no. 2, pp. 214-223, 2007.
Sk. Md. Mizanur Rahman, M.A. Hossain, H. Mouftah, A. El Saddik,and
E. Okamoto, ”Chaos-cryptography based privacy preservation technique
for video surveillance”, Multim. Sys., vol. 18, no. 2, pp. 145 155, 2012
Refbacks
- There are currently no refbacks.
Copyright © IJETT, International Journal on Emerging Trends in Technology