Downloads: 108
M.Tech / M.E / PhD Thesis | Electronics & Communication Engineering | India | Volume 6 Issue 5, May 2017
A Chosen-Plaintext Attack on Permutation-Only Image Encryption Schemes and Steganography on Images
Soja Prasannan [2] | Devi Murali [3]
Abstract: An encryption process which is a commonly used primitive in multimedia for both images and videos is permutation scheme, and many permutation-only algorithms have been proposed in recent years for the protection of multimedia data. The image matrix entries in permutation-only image ciphers are scrambled using a pseudo-random number generated permutation mapping matrix. The literature survey done on the cryptanalysis of the image ciphers in the previous works indicates that the permutation-only image ciphers are prone to cipher text-only attacks and/or known/chosen-plaintext attacks. Steganography is a type of hidden communication in which a file, message, image, or video is concealed within another file, message, image, or video. The previous works on cryptanalysis of permutation-only image encryption schemes were studied in this paper and the cryptanalysis performed on chosen-plaintext attacks were made more efficient and along with this a steganographic process is done to hide text data as well. It was proved that in all permutation-only image ciphers, nevertheless of the cipher structure, the exact permutation mapping is recovered completely by a chosen-plaintext attack. A chosen-plaintext attack is introduced in this paper that determines the exact plaintext elements perfectly using a deterministic method. When the plain-images are of size M N and with L different color potency, the number m of chosen plain-images required for breaking the permutation-only image encryption algorithm is m = [log_L (M N)]. The complexity of the proposed attack is small as permutation is used and hence the consumption time is also small. To endorse the performance of the proposed chosen-plaintext attack, an experiment was performed on a recently proposed permutation-only image/video ciphers. Both the theoretical and the experimental results exhibited that the proposed attack surpasses the state-of-the art cryptanalytic methods. The steganographic step provides an additional security to the overallsystem by hiding the image data within another image.
Keywords: Chosen-plaintext attack, Cryptanalysis, Image encryption, Steganography, Payload
Edition: Volume 6 Issue 5, May 2017,
Pages: 1420 - 1426
Similar Articles with Keyword 'Cryptanalysis'
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Masters Thesis, Electronics & Communication Engineering, India, Volume 11 Issue 7, July 2022
Pages: 1015 - 1019A High Performance Data Encryption and Masking Using AES Algorithm
Poornima TN | Dr. Somashekar K
Downloads: 110
Research Paper, Electronics & Communication Engineering, India, Volume 3 Issue 9, September 2014
Pages: 1102 - 1107Analysis of Stream Ciphers Based on Theoretic Approach
Shisif Pokhrel | Ahmed Abdul Kadhim Basheer [3]