Cryptanalysis and Improvement of an Image Encryption Scheme Using Fourier Series

被引:1
作者
Ahmad M. [1 ]
Doja M.N. [1 ]
Beg M.M.S. [2 ]
机构
[1] Department of Computer Engineering, Jamia Millia Islamia, New Delhi
[2] Department of Computer Engineering, Aligarh Muslim University, Aligarh
来源
3D Research | 2017年 / 8卷 / 04期
关键词
Chosen plaintext attack; Cryptanalysis; Fourier series; Image encryption; Plain-image sensitivity; S-box transformation;
D O I
10.1007/s13319-017-0150-y
中图分类号
学科分类号
摘要
This paper proposes cryptanalysis of an image encryption scheme reported in (Khan, J Vib Control 21(16):3450–3455, 2015). The encryption scheme synthesized nonlinear substitution-box using Fourier series to accomplish encryption of color images. Security investigation unveils that the scheme has inherent flaws which can be exploited by an attacker to reveal the plain-image information. We show that the encryption scheme is breakable under chosen-plaintext attack without owning secret key. The simulation analyses bring to notice that Khan’s scheme is insecure for encryption of images during secure communication. Besides, an improved image encryption scheme is proposed which is backed up by better statistical results and performance. © 2017, 3D Research Center, Kwangwoon University and Springer-Verlag GmbH Germany, part of Springer Nature.
引用
收藏
相关论文
共 36 条
  • [1] Furht B., Kirovski D., Multimedia encryption and authentication techniques and applications, (2006)
  • [2] Goncalves D.D.O., Costa D.G., A survey of image security in wireless sensor networks, Journal of Imaging, 1, 1, pp. 4-30, (2015)
  • [3] Ye G., Image scrambling encryption algorithm of pixel bit based on chaos map, Pattern Recognition Letters, 31, 5, pp. 347-354, (2010)
  • [4] Huang C.K., Nien H.H., Multi chaotic systems based pixel shuffle for image encryption, Optics Communications, 282, 11, pp. 2123-2127, (2009)
  • [5] Huang C.K., Liao C.W., Hsu S.L., Jeng Y.C., Implementation of gray image encryption with pixel shuffling and gray-level encryption by single chaotic system, Telecommunication Systems, 52, 2, pp. 563-571, (2013)
  • [6] Shyu S.J., Image encryption by random grids, Pattern Recognition, 40, 3, pp. 1014-1031, (2007)
  • [7] Ahmad M., Ahmad T., Securing multimedia colour imagery using multiple high dimensional chaos-based hybrid keys, International Journal of Communication Networks and Distributed Systems, 12, 1, pp. 113-128, (2014)
  • [8] Xu Y., Wang H., Li Y., Pei B., Image encryption based on synchronization of fractional chaotic systems, Communications in Nonlinear Science and Numerical Simulation, 19, 10, pp. 3735-3744, (2014)
  • [9] Rhouma R., Meherzi S., Belghith S., OCML-based colour image encryption, Chaos, Solitons and Fractals, 40, 1, pp. 309-318, (2009)
  • [10] Patidar V., Pareek N.K., Purohit G., Sud K.K., A robust and secure chaotic standard map based pseudorandom permutation-substitution scheme for image encryption, Optics Communications, 284, 19, pp. 4331-4339, (2011)