A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks

被引:218
作者
Li, Shujun [1 ]
Li, Chengqing [2 ]
Chen, Guanrong [2 ]
Bourbakis, Nikolaos G. [3 ]
Lo, Kwok-Tung [4 ]
机构
[1] Fernuniv, Lehrgebiet Informat Tech, D-58084 Hagen, Germany
[2] City Univ Hong Kong, Dept Elect Engn, Kowloon, Hong Kong, Peoples R China
[3] Wright State Univ, Informat Technol Res Inst, Coll Engn & Comp Sci, Dayton, OH 45435 USA
[4] Hong Kong Polytech Univ, Elect & Informat Engn Dept, Kowloon, Hong Kong, Peoples R China
关键词
permutation-only multimedia encryption; image; video; speech; cryptanalysis; known-plaintext attack; chosen-plaintext attack;
D O I
10.1016/j.image.2008.01.003
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In recent years secret permutations have been widely used for protecting different types of multimedia data, including speech files, digital images and videos. Based on a general model of permutation-only multimedia ciphers, this paper performs a quantitative cryptanalysis on the performance of these kind of ciphers against plaintext attacks. When the plaintext is of size M x N and with L different levels of values, the following quantitative cryptanalytic findings have been concluded under the assumption of a uniform distribution of each element in the plaintext: (1) all permutation-only multimedia ciphers are practically insecure against known/chosen-plaintext attacks in the sense that only O(log(L)(MN)) known/chosen plaintexts are sufficient to recover not less than (in an average sense) half elements of the plaintext; (2) the computational complexity of the known/chosen-plain text attack is only O(n center dot (MN)(2)), where n is the number of known/chosen plaintexts used. When the plaintext has a non-uniform distribution, the number of required plaintexts and the computational complexity is also discussed. Experiments are given to demonstrate the real performance of the known-plaintext attack for a typical permutation-only image cipher. (c) 2008 Elsevier B.V. All rights reserved.
引用
收藏
页码:212 / 223
页数:12
相关论文
共 54 条
[1]   IMAGE ENCRYPTION METHOD USING A CLASS OF FRACTALS [J].
ALEXOPOULOS, C ;
BOURBAKIS, NG ;
IOANNOU, N .
JOURNAL OF ELECTRONIC IMAGING, 1995, 4 (03) :251-259
[2]  
Beker H., 1985, SECURE SPEECH COMMUN
[3]  
BERTILSSON M, 1990, LECT NOTES COMPUT SC, V434, P403
[4]   PICTURE DATA ENCRYPTION USING SCAN PATTERNS [J].
BOURBAKIS, N ;
ALEXOPOULOS, C .
PATTERN RECOGNITION, 1992, 25 (06) :567-581
[5]   SCAN-based compression-encryption-hiding for video on demand [J].
Bourbakis, N ;
Dollas, A .
IEEE MULTIMEDIA, 2003, 10 (03) :79-87
[6]  
BROWN L, 1990, AUST TELECOMMUN RES, V24, P1
[7]   Cryptanalysis of an encryption scheme for binary images [J].
Chang, CC ;
Yu, TX .
PATTERN RECOGNITION LETTERS, 2002, 23 (14) :1847-1852
[8]   A linear quadtree compression scheme for image encryption [J].
Chang, HKC ;
Liu, JL .
SIGNAL PROCESSING-IMAGE COMMUNICATION, 1997, 10 (04) :279-290
[9]   Design and realization of a new signal security system for multimedia data transmission [J].
Chen, HC ;
Guo, JI ;
Huang, LC ;
Yen, JC .
EURASIP JOURNAL ON APPLIED SIGNAL PROCESSING, 2003, 2003 (13) :1291-1305
[10]   Partial encryption of compressed images and videos [J].
Cheng, H ;
Li, XB .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2000, 48 (08) :2439-2451