ABSTRACT
In this paper, a redundancy based cipher-only attack is proposed to break row-column shuffle based image encryption algorithms, which are considered to be safe under cipher-only attack before although it is well known that they are fragile under known-plaintext attack. This attack is carried out on the shuffle operations itself by analyzing the redundancy remained in cipher image, and doesn't care how the shuffle tables are generated. So, no matter how the shuffling tables are generated, this attack is valid. Experimental results show high quality deciphered images from one single cipher image, and that demonstrate the validity of our attack method. This attack method is also a potential threat to shuffle-scramble combined encryptions.
- Bianchi, T., Piva, A. and Barni, M. 2008. Discrete cosine transform of encrypted images. In Proceedings of the 2008 International Conference on Image Processing (San Diego, USA, Oct. 12-15, 2008), 1668--1671. DOI= http://dx.doi.org/10.1109/ICIP.2008.4712093.Google ScholarCross Ref
- Patidar, V., Pareek, N. K., Purohit, G. and Sud, K. K. 2011. A robust and secure chaotic standard map based pseudorandom permutation-substitution scheme for image encryption. Optics Communications. 284, 19 (Sep. 2011), 4331--4339. DOI= http://dx.doi.org/10.1016/j.optcom.2011.05.028.Google ScholarCross Ref
- Bigdeli, N., Farid, Y. and Afshar, K. 2012. A robust hybrid method for image encryption based on Hopfield neural network. Computers and Electrical Engineering. 38, 2 (Mar. 2012), 356--369. DOI= doi:10.1016/j.compeleceng.2011.11.019. Google ScholarDigital Library
- Zhang, D., Gu, Q., Pan, Y. and Zhang, X. 2008. Discrete chaotic encryption and decryption of digital images. In Proceedings of the 2008 International Conference on Computer Science and Software Engineering (Wuhan, China, Dec. 12 - 14, 2008), 849--852. DOI= http://doi.ieeecomputersociety.org/10.1109/CSSE.2008.1165. Google ScholarDigital Library
- Li, C. Q., Lo, K. T. 2011. Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plain text attacks. Signal Processing. 91, 4 (Apr. 2011), 949--954. DOI= http://dx.doi.org/10.1016/j.sigpro.2010.09.014. Google ScholarDigital Library
- Li, S. J., Li, C. Q., Chen, G. R., Bourbakisc, N. G. and Lo, K. T. 2008. A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Processing : Image Communication. 23, 3 (Mar. 2008), 212--223. DOI= http://dx.doi.org/10.1016/j.image.2008.01.003. Google ScholarDigital Library
- Sam, I. S., Devaraj, P. and Bhuvaneswaran, R. S. 2011. Chaos based image encryption scheme based on enhanced logistic map. Lecture Notes in Computer Science. 6536 (2011), 290--300. DOI= http://dx.doi.org/10.1007/978-3-642-19056-8_22. Google ScholarDigital Library
- Patidar, V., Purohit, G., Sud, K. K. and Pareek, N. K. 2010. Image encryption through a novel permutation-substitution scheme based on chaotic standard map. In Proceedings of 2010 International Workshop on Chaos-Fractal Theories and Applications (Dalian, China, Oct. 29 - 31, 2010), 164--169. DOI= http://dx.doi.org/10.1109/IWCFTA.2010.58. Google ScholarDigital Library
Index Terms
- Breaking row-column shuffle based image cipher
Recommendations
Cryptanalysis of a High-Definition Image Encryption Based on AES Modification
Wadi and Zainal recently proposed a high definition image encryption algorithm based on a modified AES-128 block cipher in (Wirel Pers Commun 79(2):811---829, 2014). In this paper, we show that the core component of their image encryption algorithm, a ...
Cryptanalyzing a novel image cipher based on mixed transformed logistic maps
Recently, a novel image cipher [Multimed Tools Appl (2012) 56:315---330] was proposed based on mixed transformed logistic maps. The cipher includes three parts: initial permutation of all the pixels with six odd keys, nonlinear diffusion using the first ...
Biclique cryptanalysis on lightweight block cipher: HIGHT and Piccolo
Advanced Computer Mathematics based Cryptography and Security TechnologiesBiclique cryptanalysis is an attack that improves the computational complexity by finding a biclique which is a kind of bipartite graph. We present a single-key full-round attack of lightweight block ciphers, HIGHT and Piccolo by using biclique ...
Comments