skip to main content
10.1145/2393347.2396392acmconferencesArticle/Chapter ViewAbstractPublication PagesmmConference Proceedingsconference-collections
poster

Breaking row-column shuffle based image cipher

Published: 29 October 2012 Publication History

Abstract

In this paper, a redundancy based cipher-only attack is proposed to break row-column shuffle based image encryption algorithms, which are considered to be safe under cipher-only attack before although it is well known that they are fragile under known-plaintext attack. This attack is carried out on the shuffle operations itself by analyzing the redundancy remained in cipher image, and doesn't care how the shuffle tables are generated. So, no matter how the shuffling tables are generated, this attack is valid. Experimental results show high quality deciphered images from one single cipher image, and that demonstrate the validity of our attack method. This attack method is also a potential threat to shuffle-scramble combined encryptions.

References

[1]
Bianchi, T., Piva, A. and Barni, M. 2008. Discrete cosine transform of encrypted images. In Proceedings of the 2008 International Conference on Image Processing (San Diego, USA, Oct. 12-15, 2008), 1668--1671. DOI= http://dx.doi.org/10.1109/ICIP.2008.4712093.
[2]
Patidar, V., Pareek, N. K., Purohit, G. and Sud, K. K. 2011. A robust and secure chaotic standard map based pseudorandom permutation-substitution scheme for image encryption. Optics Communications. 284, 19 (Sep. 2011), 4331--4339. DOI= http://dx.doi.org/10.1016/j.optcom.2011.05.028.
[3]
Bigdeli, N., Farid, Y. and Afshar, K. 2012. A robust hybrid method for image encryption based on Hopfield neural network. Computers and Electrical Engineering. 38, 2 (Mar. 2012), 356--369. DOI=
[4]
Zhang, D., Gu, Q., Pan, Y. and Zhang, X. 2008. Discrete chaotic encryption and decryption of digital images. In Proceedings of the 2008 International Conference on Computer Science and Software Engineering (Wuhan, China, Dec. 12 - 14, 2008), 849--852. DOI= http://doi.ieeecomputersociety.org/10.1109/CSSE.2008.1165.
[5]
Li, C. Q., Lo, K. T. 2011. Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plain text attacks. Signal Processing. 91, 4 (Apr. 2011), 949--954. DOI= http://dx.doi.org/10.1016/j.sigpro.2010.09.014.
[6]
Li, S. J., Li, C. Q., Chen, G. R., Bourbakisc, N. G. and Lo, K. T. 2008. A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Processing : Image Communication. 23, 3 (Mar. 2008), 212--223. DOI= http://dx.doi.org/10.1016/j.image.2008.01.003.
[7]
Sam, I. S., Devaraj, P. and Bhuvaneswaran, R. S. 2011. Chaos based image encryption scheme based on enhanced logistic map. Lecture Notes in Computer Science. 6536 (2011), 290--300. DOI= http://dx.doi.org/10.1007/978-3-642-19056-8_22.
[8]
Patidar, V., Purohit, G., Sud, K. K. and Pareek, N. K. 2010. Image encryption through a novel permutation-substitution scheme based on chaotic standard map. In Proceedings of 2010 International Workshop on Chaos-Fractal Theories and Applications (Dalian, China, Oct. 29 - 31, 2010), 164--169. DOI= http://dx.doi.org/10.1109/IWCFTA.2010.58.

Cited By

View all
  • (2023)Heterogeneous and Customized Cost-Efficient Reversible Image Degradation for Green IoTIEEE Internet of Things Journal10.1109/JIOT.2022.321387510:3(2630-2645)Online publication date: 1-Feb-2023
  • (2022)Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security AssessmentIEEE Access10.1109/ACCESS.2022.320417510(94019-94039)Online publication date: 2022
  • (2022)Primitively visually meaningful image encryptionInformation Sciences: an International Journal10.1016/j.ins.2022.08.027613:C(628-648)Online publication date: 1-Oct-2022
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
MM '12: Proceedings of the 20th ACM international conference on Multimedia
October 2012
1584 pages
ISBN:9781450310895
DOI:10.1145/2393347
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 29 October 2012

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. cryptanalysis
  2. image encryption
  3. redundancy
  4. row-column shuffle

Qualifiers

  • Poster

Conference

MM '12
Sponsor:
MM '12: ACM Multimedia Conference
October 29 - November 2, 2012
Nara, Japan

Acceptance Rates

Overall Acceptance Rate 1,291 of 5,076 submissions, 25%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)4
  • Downloads (Last 6 weeks)0
Reflects downloads up to 15 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2023)Heterogeneous and Customized Cost-Efficient Reversible Image Degradation for Green IoTIEEE Internet of Things Journal10.1109/JIOT.2022.321387510:3(2630-2645)Online publication date: 1-Feb-2023
  • (2022)Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security AssessmentIEEE Access10.1109/ACCESS.2022.320417510(94019-94039)Online publication date: 2022
  • (2022)Primitively visually meaningful image encryptionInformation Sciences: an International Journal10.1016/j.ins.2022.08.027613:C(628-648)Online publication date: 1-Oct-2022
  • (2021)Non-Linear Hopped Chaos Parameters-Based Image Encryption Algorithm Using Histogram EqualizationEntropy10.3390/e2305053523:5(535)Online publication date: 27-Apr-2021
  • (2021)Towards a Novel Cryptanalysis Platform based Regions Of Interest Detection via Deep Learning models2021 International Conference on Recent Advances in Mathematics and Informatics (ICRAMI)10.1109/ICRAMI52622.2021.9585924(1-6)Online publication date: 21-Sep-2021
  • (2020)Survey on JPEG compatible joint image compression and encryption algorithmsIET Signal Processing10.1049/iet-spr.2019.027614:8(475-488)Online publication date: 4-Sep-2020
  • (2020)Security analysis of multiple permutation encryption adopt in reversible data hidingMultimedia Tools and Applications10.1007/s11042-020-09379-379:39-40(29451-29471)Online publication date: 1-Oct-2020
  • (2018)On the Security of a Class of Diffusion Mechanisms for Image EncryptionIEEE Transactions on Cybernetics10.1109/TCYB.2017.268256148:4(1163-1175)Online publication date: Apr-2018
  • (2018)On the security of a stream cipher in reversible data hiding schemes operating in the encrypted domainSignal Processing10.1016/j.sigpro.2017.09.020143:C(336-345)Online publication date: 1-Feb-2018
  • (2018)Exploiting self-adaptive permutationdiffusion and DNA random encoding for secure and efficient image encryptionSignal Processing10.1016/j.sigpro.2017.07.034142:C(340-353)Online publication date: 1-Jan-2018
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media