کد مقاله | کد نشریه | سال انتشار | مقاله انگلیسی | نسخه تمام متن |
---|---|---|---|---|
461163 | 696566 | 2012 | 12 صفحه PDF | دانلود رایگان |
![عکس صفحه اول مقاله: Security analysis of image cryptosystems only or partially based on a chaotic permutation Security analysis of image cryptosystems only or partially based on a chaotic permutation](/preview/png/461163.png)
The paper proposes breaks for the permutation methods adopted in the chaos-based image cryptosystems. By a careful examination on the most chaotic image cryptosystems we can find that the permutation process constitute the main step or, in some cases, the only step to create the confusion. It can be applied on the pixels or on the pixel bits. A recently proposed image encryption scheme based on shuffling the pixel bits inspired from other works is treated as a case study. By applying a chosen plaintext attack, we demonstrate that a hacker can determine the permutation vectors (matrixes) used to permute the pixels bits or the pixels themselves and exploit them to reveal the plain image.
► We propose a total break of cryptosystem having permutation process in their design.
► We made comparison between and previous proposed attacks by other researchers.
► We prove that permutation only ciphers are insecure.
Journal: Journal of Systems and Software - Volume 85, Issue 9, September 2012, Pages 2133–2144