skip to main content
10.1145/2393347.2396392acmconferencesArticle/Chapter ViewAbstractPublication PagesmmConference Proceedingsconference-collections
poster

Breaking row-column shuffle based image cipher

Authors Info & Claims
Published:29 October 2012Publication History

ABSTRACT

In this paper, a redundancy based cipher-only attack is proposed to break row-column shuffle based image encryption algorithms, which are considered to be safe under cipher-only attack before although it is well known that they are fragile under known-plaintext attack. This attack is carried out on the shuffle operations itself by analyzing the redundancy remained in cipher image, and doesn't care how the shuffle tables are generated. So, no matter how the shuffling tables are generated, this attack is valid. Experimental results show high quality deciphered images from one single cipher image, and that demonstrate the validity of our attack method. This attack method is also a potential threat to shuffle-scramble combined encryptions.

References

  1. Bianchi, T., Piva, A. and Barni, M. 2008. Discrete cosine transform of encrypted images. In Proceedings of the 2008 International Conference on Image Processing (San Diego, USA, Oct. 12-15, 2008), 1668--1671. DOI= http://dx.doi.org/10.1109/ICIP.2008.4712093.Google ScholarGoogle ScholarCross RefCross Ref
  2. Patidar, V., Pareek, N. K., Purohit, G. and Sud, K. K. 2011. A robust and secure chaotic standard map based pseudorandom permutation-substitution scheme for image encryption. Optics Communications. 284, 19 (Sep. 2011), 4331--4339. DOI= http://dx.doi.org/10.1016/j.optcom.2011.05.028.Google ScholarGoogle ScholarCross RefCross Ref
  3. Bigdeli, N., Farid, Y. and Afshar, K. 2012. A robust hybrid method for image encryption based on Hopfield neural network. Computers and Electrical Engineering. 38, 2 (Mar. 2012), 356--369. DOI= doi:10.1016/j.compeleceng.2011.11.019. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Zhang, D., Gu, Q., Pan, Y. and Zhang, X. 2008. Discrete chaotic encryption and decryption of digital images. In Proceedings of the 2008 International Conference on Computer Science and Software Engineering (Wuhan, China, Dec. 12 - 14, 2008), 849--852. DOI= http://doi.ieeecomputersociety.org/10.1109/CSSE.2008.1165. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Li, C. Q., Lo, K. T. 2011. Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plain text attacks. Signal Processing. 91, 4 (Apr. 2011), 949--954. DOI= http://dx.doi.org/10.1016/j.sigpro.2010.09.014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Li, S. J., Li, C. Q., Chen, G. R., Bourbakisc, N. G. and Lo, K. T. 2008. A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Processing : Image Communication. 23, 3 (Mar. 2008), 212--223. DOI= http://dx.doi.org/10.1016/j.image.2008.01.003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Sam, I. S., Devaraj, P. and Bhuvaneswaran, R. S. 2011. Chaos based image encryption scheme based on enhanced logistic map. Lecture Notes in Computer Science. 6536 (2011), 290--300. DOI= http://dx.doi.org/10.1007/978-3-642-19056-8_22. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Patidar, V., Purohit, G., Sud, K. K. and Pareek, N. K. 2010. Image encryption through a novel permutation-substitution scheme based on chaotic standard map. In Proceedings of 2010 International Workshop on Chaos-Fractal Theories and Applications (Dalian, China, Oct. 29 - 31, 2010), 164--169. DOI= http://dx.doi.org/10.1109/IWCFTA.2010.58. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Breaking row-column shuffle based image cipher

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          MM '12: Proceedings of the 20th ACM international conference on Multimedia
          October 2012
          1584 pages
          ISBN:9781450310895
          DOI:10.1145/2393347

          Copyright © 2012 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 29 October 2012

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • poster

          Acceptance Rates

          Overall Acceptance Rate995of4,171submissions,24%

          Upcoming Conference

          MM '24
          MM '24: The 32nd ACM International Conference on Multimedia
          October 28 - November 1, 2024
          Melbourne , VIC , Australia

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader