L-Ary Based General Attacks on Permutation-Only Image/Video Ciphers

Article Preview

Abstract:

For the recovery of an plaintext with different levels of values encrypted by permutation-only multimedia ciphers, a L-ary based chosen text construction method is first proposed in this paper. And plaintexts are created to reach the lower bound of the plaintext number required for chosen plaintext attacks which is given by Li et al. Then based on the created plaintexts, two attacks are proposed on permutation-only image/video ciphers. Finally the validity of the two attacks is proved by Proposition 2 and Proposition 3 respectively.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2542-2546

Citation:

Online since:

September 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] N. G. Bourbakis and A. Dollas, SCAN-based compression-encryption-hiding for video on demand, IEEE Multimedia, vol. 10, no. 3, p.79–87, (2003).

DOI: 10.1109/mmul.2003.1218259

Google Scholar

[2] S. S. Maniccam and N. G. Bourbakis, Image and video encryption using SCAN patterns, Pattern Recognition, vol. 37, no. 4, p.725–737, (2004).

DOI: 10.1016/j.patcog.2003.08.011

Google Scholar

[3] H. K. -C. Chang and J. -L. Liu, A linear quadtree compression scheme for image encryption, Signal Processing: Image Communication, vol. 10, no. 4, p.279–290, (1997).

DOI: 10.1016/s0923-5965(96)00025-2

Google Scholar

[4] C. K. Huang, H. H. Nien, Multi chaotic system based pixel shuffle for image encryption, Optics communications, 2009, 282: 2123-2127.

DOI: 10.1016/j.optcom.2009.02.044

Google Scholar

[5] G. Ye. Image scrambling encryption algorithm of pixel bit based on chaos map. Pattern. Recognition Lett. 31(5), (2010): 347-354.

DOI: 10.1016/j.patrec.2009.11.008

Google Scholar

[6] Fuwen Liu, Hartmut Koenig, A survey of video encryption algorithms, computers security 29 (2010) 3-1 5.

Google Scholar

[7] C.C. Chang, T.X. Yu, Cryptanalysis of an encryption scheme for binary images, Pattern Recognition Letters, vol. 23, no. 14, p.1847–1852, (2002).

DOI: 10.1016/s0167-8655(02)00157-5

Google Scholar

[8] E. Solak, R. Rhouma , S. Belghith, Cryptanalysis of a multi-chaotic systems based image cryptosystem, Optics Communications 283 (2010) 232–236.

DOI: 10.1016/j.optcom.2009.09.070

Google Scholar

[9] S. J. Li, et al., A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks, Signal Process. Image Commun. 23(3), (2008) 212-223.

DOI: 10.1016/j.image.2008.01.003

Google Scholar