کد مقاله کد نشریه سال انتشار مقاله انگلیسی نسخه تمام متن
461163 696566 2012 12 صفحه PDF دانلود رایگان
عنوان انگلیسی مقاله ISI
Security analysis of image cryptosystems only or partially based on a chaotic permutation
موضوعات مرتبط
مهندسی و علوم پایه مهندسی کامپیوتر شبکه های کامپیوتری و ارتباطات
پیش نمایش صفحه اول مقاله
Security analysis of image cryptosystems only or partially based on a chaotic permutation
چکیده انگلیسی

The paper proposes breaks for the permutation methods adopted in the chaos-based image cryptosystems. By a careful examination on the most chaotic image cryptosystems we can find that the permutation process constitute the main step or, in some cases, the only step to create the confusion. It can be applied on the pixels or on the pixel bits. A recently proposed image encryption scheme based on shuffling the pixel bits inspired from other works is treated as a case study. By applying a chosen plaintext attack, we demonstrate that a hacker can determine the permutation vectors (matrixes) used to permute the pixels bits or the pixels themselves and exploit them to reveal the plain image.


► We propose a total break of cryptosystem having permutation process in their design.
► We made comparison between and previous proposed attacks by other researchers.
► We prove that permutation only ciphers are insecure.

ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: Journal of Systems and Software - Volume 85, Issue 9, September 2012, Pages 2133–2144
نویسندگان
, , ,