Cryptanalysis and Improvement of an Image Encryption Scheme Using Fourier Series

被引:1
作者
Ahmad M. [1 ]
Doja M.N. [1 ]
Beg M.M.S. [2 ]
机构
[1] Department of Computer Engineering, Jamia Millia Islamia, New Delhi
[2] Department of Computer Engineering, Aligarh Muslim University, Aligarh
来源
3D Research | 2017年 / 8卷 / 04期
关键词
Chosen plaintext attack; Cryptanalysis; Fourier series; Image encryption; Plain-image sensitivity; S-box transformation;
D O I
10.1007/s13319-017-0150-y
中图分类号
学科分类号
摘要
This paper proposes cryptanalysis of an image encryption scheme reported in (Khan, J Vib Control 21(16):3450–3455, 2015). The encryption scheme synthesized nonlinear substitution-box using Fourier series to accomplish encryption of color images. Security investigation unveils that the scheme has inherent flaws which can be exploited by an attacker to reveal the plain-image information. We show that the encryption scheme is breakable under chosen-plaintext attack without owning secret key. The simulation analyses bring to notice that Khan’s scheme is insecure for encryption of images during secure communication. Besides, an improved image encryption scheme is proposed which is backed up by better statistical results and performance. © 2017, 3D Research Center, Kwangwoon University and Springer-Verlag GmbH Germany, part of Springer Nature.
引用
收藏
相关论文
共 36 条
  • [21] Biryukov A., Daemen J., Lucks S., Vaudenay S., Topics and Research Directions for Symmetric Cryptography. In Proceedings of Early Symmetric Crypto workshop, (pp. 1–4). University of Luxembourg, (2017)
  • [22] Schneier B., Applied Cryptography: Protocols Algorithms and Source Code in C, (1996)
  • [23] Khan M., A novel image encryption using Fourier series, Journal of Vibration and Control, 21, 16, pp. 3450-3455, (2015)
  • [24] Fourier Series
  • [25] Folland G.B., Fourier Analysis and Its Applications, (1992)
  • [26] Military Cryptanalysis Part I- National Security Agency
  • [27] Kerckhoffs’s principle
  • [28] Parvin Z., Seyedarabi H., Shamsi M., A new secure and sensitive image encryption scheme based on new substitution with chaotic function, Multimedia Tools and Applications, 75, 17, pp. 10631-10648, (2016)
  • [29] Chen Z., Lu J., Yang P., Luo X., Recognizing substitution steganography of spatial domain based on the characteristics of pixels correlation, International Journal of Digital Crime and Forensics, 9, 4, pp. 48-61, (2017)
  • [30] Liu H., Wang X., Color image encryption using spatial bit-level permutation and high-dimension chaotic system, Optics Communications, 284, 16, pp. 3895-3903, (2011)