Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm (original) (raw)

09 Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm.pdf

Communicated by Prof. Ji-Huan He a b s t r a c t Chaotic systems have been broadly exploited through the last two decades to build encryption methods. Recently, two new image encryption schemes have been proposed, where the encryption process involves a permutation operation and an XOR-like transformation of the shuffled pixels, which are controlled by three chaotic systems. This paper discusses some defects of the schemes and how to break them with a chosen-plaintext attack.

Security analysis of image cryptosystems only or partially based on a chaotic permutation

Journal of Systems and Software, 2012

The paper proposes breaks for the permutation methods adopted in the chaos-based image cryptosystems. By a careful examination on the most chaotic image cryptosystems we can find that the permutation process constitute the main step or, in some cases, the only step to create the confusion. It can be applied on the pixels or on the pixel bits. A recently proposed image encryption scheme based on shuffling the pixel bits inspired from other works is treated as a case study. By applying a chosen plaintext attack, we demonstrate that a hacker can determine the permutation vectors(matrixes) used to permute the pixels bits or the pixels themselves and exploit them to reveal the plain image.

New Chaotic Permutation Methods for Image Encryption

IAENG International Journal of Computer Science

Since two decades, and in order to reach higher performance, more and more studies look to combine the conventional encryption methods and the complex behaviour of chaotic signals. To quantify the expected improvement induced by such a mix, this paper aims to compare the performance of two well known chaotic maps, namely, Logistic and piecewise linear chaotic map with their performance when they are perturbed by a new technique. These four chaotic maps are then used to control three bit permutation methods: Grp, Cross and Socek, known to have good inherent cryptographic properties. When applied to images, the common measures like NPCR, UACI, intra and inter-components correlation coefficients, histogram and distribution of two adjacent pixels lead to two main results. First, Socek permutation method remains better than Grp and Cross whatever the used chaotic map. Second, the proposed chaotic permutation methods controlled by the perturbed maps present higher performance and is more secure and suitable for chaotic image encryption schemes.

A New method for Image Encryption Using Chaotic Permutation

International Journal of Image, Graphics and Signal Processing

With the extensive recent development of communication methods and resulting increase in data surveillance and espionage, the need for reliable data encryption methods is greater than ever. Conventional encryption calculations, for example, DES and RSA, are not beneficial in the field of picture encryption because of some inherent characteristics of pictures such as bulk data size and high redundancy, which are problematic for conventional encryption. Many researchers have proposed different image encryption schemes to overcome image encryption problems. In the last two decades, more and more studies have looked to incorporate conventional encryption methods and the complex behavior of chaotic signals. In this paper, a novel image encryption algorithm is proposed based on pixel chaotic permutation. A chaotic logistic map and Ikeda map are used to design a new pseudo-random bit generator, and a novel permutation scheme is used to modify pixel values. Then, a new permutation algorithm based on a traditional Japanese game called Amidakuji is used for pixel scrambling. Different statistical manners, such as correlation coefficient, NPCR (Number of Pixels Change Rate), UACI (Unified Average Changing Intensity), and entropy, are used to provide analysis of the effectiveness of the proposed encryption methods. Our example reveals that the proposed encryption method can obtain highly secure encrypted images using a novel chaotic permutation method based on Amidakuji.

Chaos Image Encryption Using Transposition and Pixel Shuffling

2014

The advent of wireless communications, both inside and outside the home-office environment has led to an increased demand for effective encryption systems. The beauty of encryption technology comes out in more pronounced way when there is no absolute relation between cipher and original data and it is possible to rebuild the original image in much easier way. As chaotic systems are known to be more random and non-predictable, they can be made utilized in achieving the encryption. The transposition technology of encryption systems requires scrambleness behaviour in order to achieve the encryption of the data. This scrambleness behaviour can be derived from the randomness property of chaos which can be better utilized in the techniques like transposition system. In wireless communication systems, bandwidth utilization is an important criterion. In order to use encryption system in wireless communication; key space plays an important role for the efficient utilization of the bandwidth....

Cryptanalysis of a Pixel Permutation Based Image Encryption Technique Using Chaotic Map

Traitement du Signal

Recently, a new image encryption algorithm was proposed by Anwar and Meghana. This encryption scheme uses the Arnold's chaotic cat map to permute the image pixels. The resulting image is then confused with both a secret image provided as part of the secret key and a secret value selected randomly from the permuted image. Using a random image as part of the secret key, gives this algorithm an infinite key space which increases its efficiency against brute-force attacks. In order to help improving the security of modern image encryption schemes, this paper presents a cryptanalysis of the proposed algorithm using a combination of chosen-plaintext and brute-force attacks. First, the infinite key space that the secret image offers is broken using a chosen-plaintext attack. Then, the permutation phase is reversed through a series of chosen-plaintext attacks too. Finally, the secret value chosen randomly from the permuted image is easily brute-forced due to its reduced number of possible values. By applying the above method, it is possible to restore the plain version of any image that was encrypted using the former encryption algorithm. Thus, relying on this algorithm to encrypt real sensitive data is not secure.

Image Encryption Based on Pixel Shuffling with 3D Chaotic System

2014

In recent years, with the fascinating development of internet technologies and wireless communication networks such as computer and mobile networks. all types of multimedia data such as digital image, Audio, text and video can be reached in easily way over internet. Due to this, cryptographic techniques are required to accomplish a sufficient level of security, integrity, confidentiality as well as, to prevent unauthorized access of important information during data storage and transmission. To meet this challenges, a novel and efficient color image encryption chaos-based scheme has been suggested in order to confuse the relation between adjecent pixels by alter the position of image pixels using block image scrambling by iteratively dividing it to sixteen blocks and rotate each one in to clockwise direction with 90 angle.then, apply 2D Arnold cat map with row_colunm wise methods to make more distortion of the relationship among connected pixels of original image by hide the statist...

Cryptanalysis of a multi-chaotic systems based image cryptosystem

Optics Communications, 2010

This paper is a cryptanalysis of a recently proposed multi-chaotic systems based image cryptosystem. The cryptosystem is composed of two shuffling stages parameterized by chaotically generated sequences. We propose and implement two different attacks which completely break this encryption scheme.

An Image Encryption & Decryption Approach Based on Pixel Shuffling Using Chaotic Functions with ShiftColumns Manipulation

In my project, I have implemented various old approaches which are combining into a new Advance Cryptography Encipherment system whose resist all types of attack and secure data from adversary. It's basically belonging to AES category, built as a substitution permutation networks and bits are changed in every round. In particular, each round, we XOR the input with the round key K i , then send the result through a substitution phase, and finally send the result through a permutation layer, that all layers in AES are reversible. Our vision is not only secure data (like image), recovery with serious damage and secure form cryptanalysis and Statistical Attack.

Efficient Chaotic Permutations for Image Encryption Algorithms

Many chaos-based encryption methods have been presented and discussed in the last two decades. In order to reach higher performance, these methods take advantage of the more and more complex behavior of chaotic signals. This paper contributes in this issue by comparing the performance of the well known piecewise linear chaotic map (PWLCM) with that of PWLCM perturbed by a new technique. Both chaotic maps are then used to control three bit-permutation methods having good inherent cryptographic properties. When applied to image, the proposed chaotic permutation methods controlled by the perturbed map, present higher performance characteristics.