Security analysis of image cryptosystems only or partially based on a chaotic permutation (original) (raw)
Abstract
The paper proposes breaks for the permutation methods adopted in the chaos-based image cryptosystems. By a careful examination on the most chaotic image cryptosystems we can find that the permutation process constitute the main step or, in some cases, the only step to create the confusion. It can be applied on the pixels or on the pixel bits. A recently proposed image encryption scheme based on shuffling the pixel bits inspired from other works is treated as a case study. By applying a chosen plaintext attack, we demonstrate that a hacker can determine the permutation vectors(matrixes) used to permute the pixels bits or the pixels themselves and exploit them to reveal the plain image.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
References (30)
- V. Patidar, N. K. Pareek, K. K. Sud, A new substitutiondiffusion based image cipher using chaotic standard and logistic maps, Commun Nonlinear Sci Numer Simulat 14 (2009) 3056-3075.
- A. Cheddad, J. Condell, K. Curran, P. McKevitt, A hash-based image encryption algorithm, Optics Communications 283 (2010) 879-893.
- J. W. Yoon, H. Kim, An image encryption scheme with a pseudorandom permutation based on chaotic maps, Communi- cations in Nonlinear Science and Numerical Simulation 15 (2010) 3998-4006.
- M. Amin, O. S. Faragallah, A. A. A. El-Latif, A chaotic block cipher algorithm for image cryptosystems, Communications in Nonlinear Science and Numerical Simulation 15 (2010) 3484-3497.
- Y. Wang, K.-W. Wong, X. Liao, G. Chen, A new chaos-based fast image encryption algorithm, Appl. Soft Comput. J. 11 (2011) 514-522.
- M. Usama, M. K. Khan, K. Alghathbar, C. Lee, Chaos-based secure satellite imagery cryptosystem, Computers and Mathematics with Applications 60 (2010) 326-337.
- F. Sun, Z. Lü, S. Liu, A novel scheme for image encryption based on 2D piecwise chaotic map, Optics Communications 283 (2010) 3259-3266.
- Nist, Nist special publication 800 -22 http://csrc.nist.gov/rng/rng2.html.
- Nist, Fips pub 140-2: Security requirements for cryptographic modules http://csrc.nist.gov/publications/Pubsfips. html.
- B. Schneier, Cours individuel de cryptanalyse Available online at http://www.apprendre-en-ligne.net/crypto/ bibliotheque/pdf/cours--cryptanalyse.pdf.
- A. Kurian, S. Puthusserypady, Self-synchronizing chaotic stream ciphers, Signal Processing 88 (2008) 2442-2452.
- V. Patidar, N. Pareek, K. Sud, Modified substitutiondiffusion image cipher using chaotic standard and logistic maps, Communications in Nonlinear Science and Numerical Simulation 14 (2010) 2755-2765.
- V. Guglielmi, P. Pinel, D. Fournier-Prunaret, A.-K. Taha, Chaos-based cryptosystem on DSP, Chaos Soliton Fract 42 (2009) 21352144.
- V. Patidar, N. Pareek, K. Sud, A new substitution diffusion based image cipher using chaotic standard and logistic maps, Communications in Nonlinear Science and Numerical Simulation 14 (2009) 3056-3075.
- H. Gao, Y. Zhang, S. Liang, D. Li, A new chaotic algorithm for image encryption, Chaos Solitons Fractals 29 (2005) 393-399.
- M. Ariffin, M. Noorani, Modified Baptista type chaotic cryptosystem via matrix secret key, Phys. Lett. A 372 (2008) 5427-5430.
- D. Arroyo, G. Alvarez, J. M. Amig, S. Li, Cryptanalysis of a family of self-synchronizing chaotic stream ciphers, Commu- nications in Nonlinear Science and Numerical Simulation 16 (2011) 805-813.
- C. Li, S. Li, K.-T. Lo, Breaking a modified substitutiondiffusion image cipher based on chaotic standard and logistic maps, Communications in Nonlinear Science and Numerical Simulation 16 (2011) 837-843.
- R. Rhouma, S. Belghith, Cryptanalysis of a chaos-based cryptosystem on DSP, Communications in Nonlinear Science and Numerical Simulation 16 (2011) 876-884.
- E. Solak, C. Cokal, Algebraic break of image ciphers based on discretized chaotic map lattices, Information Sciences 181 (2011) 227-233.
- G. Alvarez, S. Li, Cryptanalyzing a nonlinear chaotic algorithm (NCA) for image encryption, Communications in Nonlinear Science and Numerical Simulation 14 (2009) 3743-3749.
- R. Rhouma, E. Solak, D. Arroyo, S. Li, G. Alvarez, S. Belghith, Comment on Modified Baptista type chaotic cryptosystem via matrix secret key, Physics Letters A 373 (2009) 3398-3400.
- R. Rhouma, E. Solak, S. Belghith, Cryptanalysis of a new substitutiondiffusion based image cipher, Communications in Nonlinear Science and Numerical Simulation 15 (2010) 1887-1892.
- C. Li, S. Li, G. Chen, W. A. Halang, Cryptanalysis of an image encryption scheme based on a compound chaotic sequence, Image and Vision Computing 27 (2009) 1035-1039.
- G. Ye, Image scrambling encryption algorithm of pixel bit based on chaos map, Pattern Recognition Letters 31 (2010) 347-354.
- S. Li, C. Li, G. Chen, N. G. Bourbakis, K.-T. Lo, A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks, Signal Processing: Image Communication 23 (2008) 212-223.
- L. Zhao, A. Adhikari, D. Xiao, K. Sakurai, On the security analysis of an image scrambling encryption of pixel bit and its improved scheme based on self-correlation encryption, Communications in Nonlinear Science and Numerical Simulation 17 (2012) 3303-3327.
- C. Li, K.-T. Lo, Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks, Signal Processing 91 (2011) 949-954.
- FileFormat.Info, FileFormat.Info http://www.filoformat.info/tip/web/imagesize.htm.
- R. Rhouma, D. Arroyo, S. Belghith, A new color image cryptosystem based on a piecewise linear chaotic map, Proceeding of SSD'09 Tunisia.