Security Analysis of Bit-plane Level Image Encryption Schemes

被引:9
作者
Ratan, Ram [1 ]
Yadav, Arvind [2 ]
机构
[1] DRDO Sci Anal Grp, Delhi 110054, India
[2] Univ Delhi, Hansraj Coll, Delhi 110007, India
关键词
Image encryption; Bit-plane level encryption; Cryptanalysis; Bit-plane measures; Security analysis; COMPUTATIONAL APPROACH; ALGORITHM; CRYPTANALYSIS;
D O I
10.14429/dsj.71.15643
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
A selective bit-plane encryption scheme was proposed for securing the transmission of image data in mobile environments with a claim that it provides a high security viz. the encryption of the four most significant bit-planes is sufficient for a high image data security. This paper presents the security analysis of the said encryption scheme and reports new important results. We perform the security analysis of the bit-level encryption by considering the normal images and their histogram equalised enhanced images. We consider different bit-plane aspects to analyse the security of the image encryption, and show that the encryption of the four most significant bit-planes is not adequate. The contents of the images can be obtained even when all the bit-planes except one least significant bitplane are encrypted in the histogram equalised images as shown in the results. The bit-plane level security analysis seems very useful for the analysis of the bit-plane level image encryption schemes. Keywords: Image encryption; Bit-plane level encryption; Cryptanalysis; Bit-
引用
收藏
页码:209 / 221
页数:13
相关论文
共 49 条
[1]  
Abugharsa AB, 2011, INT J COMPUT SCI NET, V11, P123
[2]  
Agarwal R., 2011, Proceedings of the 2011 Eighth International Conference on Computer Graphics, Imaging and Visualization (CGIV 2011), P13, DOI 10.1109/CGIV.2011.18
[3]  
Al-Husainy MAF, 2012, INT J SECUR APPL, V6, P1
[4]  
[Anonymous], 1995, FUNDAMENTALS DIGITAL
[5]  
[Anonymous], 2013, INT J SCI TECHNOL RE
[6]  
[Anonymous], 2011, The image processing handbook
[7]   Identifying traffic of same keys in cryptographic communications using fuzzy decision criteria and bit-plane measures [J].
Arvind ;
Ratan, Ram .
INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2020, 11 (02) :466-480
[8]   Statistical evaluation of image quality measures [J].
Avcibas, I ;
Sankur, B ;
Sayood, K .
JOURNAL OF ELECTRONIC IMAGING, 2002, 11 (02) :206-223
[9]   PICTURE DATA ENCRYPTION USING SCAN PATTERNS [J].
BOURBAKIS, N ;
ALEXOPOULOS, C .
PATTERN RECOGNITION, 1992, 25 (06) :567-581