메뉴 건너뛰기




Volumn 17, Issue 8, 2012, Pages 3303-3327

On the security analysis of an image scrambling encryption of pixel bit and its improved scheme based on self-correlation encryption

Author keywords

Chosen ciphertext attack; Chosen plaintext attack; Computational complexity; Self correlation

Indexed keywords

BINARY IMAGES; COMPUTATIONAL COMPLEXITY; IMAGE ANALYSIS; IMAGE ENHANCEMENT; PIXELS;

EID: 84863392976     PISSN: 10075704     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cnsns.2011.12.015     Document Type: Article
Times cited : (48)

References (43)
  • 1
    • 0042823356 scopus 로고    scopus 로고
    • Wavelet packets-based digital watermarking for image verification and authentication
    • Paquet A.H., Ward R.K., Pitas L. Wavelet packets-based digital watermarking for image verification and authentication. Signal Process 2003, 83:2117-2132.
    • (2003) Signal Process , vol.83 , pp. 2117-2132
    • Paquet, A.H.1    Ward, R.K.2    Pitas, L.3
  • 2
    • 73049097021 scopus 로고    scopus 로고
    • Secure reversible visible image watermarking with authentication
    • Tsai H.M., Chang L.W. Secure reversible visible image watermarking with authentication. Signal Process Image Commun 2010, 25:10-17.
    • (2010) Signal Process Image Commun , vol.25 , pp. 10-17
    • Tsai, H.M.1    Chang, L.W.2
  • 3
    • 75249099043 scopus 로고    scopus 로고
    • A secure and robust hash-based scheme for image authentication
    • Ahmed F., Siyal M.Y., Abbas V.U. A secure and robust hash-based scheme for image authentication. Signal Process 2010, 90:1456-1470.
    • (2010) Signal Process , vol.90 , pp. 1456-1470
    • Ahmed, F.1    Siyal, M.Y.2    Abbas, V.U.3
  • 5
    • 67651097643 scopus 로고    scopus 로고
    • A novel image hash algorithm resistant to print-scan
    • Wu D., Zhou X.B., Niu X.M. A novel image hash algorithm resistant to print-scan. Signal Process 2009, 89:2415-2424.
    • (2009) Signal Process , vol.89 , pp. 2415-2424
    • Wu, D.1    Zhou, X.B.2    Niu, X.M.3
  • 7
    • 77956113542 scopus 로고    scopus 로고
    • Analysis of the diffusion property of image encryption algorithm in block-and-permutation mode and its implementation
    • Zhou Q., Hu Y., Liao X.F. Analysis of the diffusion property of image encryption algorithm in block-and-permutation mode and its implementation. J Electron Info Technol 2010, 32:2015-2018.
    • (2010) J Electron Info Technol , vol.32 , pp. 2015-2018
    • Zhou, Q.1    Hu, Y.2    Liao, X.F.3
  • 8
    • 41349105116 scopus 로고    scopus 로고
    • Image encryption with fractional wavelet packet method
    • Chen L.F., Zhao D.M. Image encryption with fractional wavelet packet method. Optik 2008, 119:286-291.
    • (2008) Optik , vol.119 , pp. 286-291
    • Chen, L.F.1    Zhao, D.M.2
  • 9
    • 70049102750 scopus 로고    scopus 로고
    • Compression performance analysis of a sort of fast binary image encryption algorithms
    • Zhou Q., Hu Y., Liao X.F. Compression performance analysis of a sort of fast binary image encryption algorithms. J Electron Info Technol 2009, 31:2015-2018.
    • (2009) J Electron Info Technol , vol.31 , pp. 2015-2018
    • Zhou, Q.1    Hu, Y.2    Liao, X.F.3
  • 10
    • 0034249821 scopus 로고    scopus 로고
    • Partial encryption of compressed images and videos
    • Cheng H., Li X. Partial encryption of compressed images and videos. IEEE Trans Signal Process 2000, 48:2439-2451.
    • (2000) IEEE Trans Signal Process , vol.48 , pp. 2439-2451
    • Cheng, H.1    Li, X.2
  • 11
    • 33645805455 scopus 로고    scopus 로고
    • A novel compression and encryption scheme using variable model arithmetic coding and coupled chaotic system
    • Bose R., Pathak S. A novel compression and encryption scheme using variable model arithmetic coding and coupled chaotic system. IEEE Trans Circ Syst I 2006, 53:848-857.
    • (2006) IEEE Trans Circ Syst I , vol.53 , pp. 848-857
    • Bose, R.1    Pathak, S.2
  • 12
    • 24944578706 scopus 로고    scopus 로고
    • Selective bitplane encryption for secure transmission of image data in mobile environments
    • In: Fifth IEEE nordic signal processing symposium, Tromso-Trondheim, Norway;
    • Podesser M, Schmidt H, Uhl A, Selective bitplane encryption for secure transmission of image data in mobile environments. In: Fifth IEEE nordic signal processing symposium, Tromso-Trondheim, Norway; 2002.
    • (2002)
    • Podesser, M.1    Schmidt, H.2    Uhl, A.3
  • 13
    • 0032045063 scopus 로고    scopus 로고
    • Large encrypting binary images with higher security
    • Chung K.L., Chang L.C. Large encrypting binary images with higher security. Pattern Recognit Lett 1998, 19:461-468.
    • (1998) Pattern Recognit Lett , vol.19 , pp. 461-468
    • Chung, K.L.1    Chang, L.C.2
  • 14
    • 77952745685 scopus 로고    scopus 로고
    • An image encryption scheme with a pseudorandom permutation based on chaotic maps
    • Yoon J.W., Kim H. An image encryption scheme with a pseudorandom permutation based on chaotic maps. Commun Nonlinear Sci Numer Simul 2010, 15:3998-4006.
    • (2010) Commun Nonlinear Sci Numer Simul , vol.15 , pp. 3998-4006
    • Yoon, J.W.1    Kim, H.2
  • 15
    • 1342306864 scopus 로고    scopus 로고
    • A symmetric image encryption scheme based on 3D chaotic cat maps
    • Chen G., Mao Y., Chui C. A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons Fract 2004, 21:749-761.
    • (2004) Chaos Solitons Fract , vol.21 , pp. 749-761
    • Chen, G.1    Mao, Y.2    Chui, C.3
  • 16
    • 24944459842 scopus 로고    scopus 로고
    • Chaos-based image encryption algorithm
    • Guan Z., Huang F., Guan W. Chaos-based image encryption algorithm. Phys Lett A 2005, 346:153-157.
    • (2005) Phys Lett A , vol.346 , pp. 153-157
    • Guan, Z.1    Huang, F.2    Guan, W.3
  • 17
    • 57749200497 scopus 로고    scopus 로고
    • Image encryption scheme based on 3D baker with dynamical compound chaotic sequence cipher generator
    • Tong X.J., Cui M.G. Image encryption scheme based on 3D baker with dynamical compound chaotic sequence cipher generator. Signal Process 2009, 89:480-491.
    • (2009) Signal Process , vol.89 , pp. 480-491
    • Tong, X.J.1    Cui, M.G.2
  • 18
    • 37549014203 scopus 로고    scopus 로고
    • A new image encryption algorithm based on hyper-chaos
    • Gao T.G., Chen Z.Q. A new image encryption algorithm based on hyper-chaos. Phys Lett A 2008, 372:394-400.
    • (2008) Phys Lett A , vol.372 , pp. 394-400
    • Gao, T.G.1    Chen, Z.Q.2
  • 19
    • 45849121786 scopus 로고    scopus 로고
    • Parallel image encryption algorithm based on discretized chaotic map
    • Zhou Q., Wong K.W., Liao X.F., Xiang T., Hu Y. Parallel image encryption algorithm based on discretized chaotic map. Chaos Solitons Fract 2008, 38:1081-1092.
    • (2008) Chaos Solitons Fract , vol.38 , pp. 1081-1092
    • Zhou, Q.1    Wong, K.W.2    Liao, X.F.3    Xiang, T.4    Hu, Y.5
  • 20
    • 0036885204 scopus 로고    scopus 로고
    • Cryptanalysis of an encryption scheme for binary images
    • Chang C.C., Yu T.X. Cryptanalysis of an encryption scheme for binary images. Pattern Recognit Lett 2002, 23:1847-1852.
    • (2002) Pattern Recognit Lett , vol.23 , pp. 1847-1852
    • Chang, C.C.1    Yu, T.X.2
  • 21
    • 23144450151 scopus 로고    scopus 로고
    • On the security of 3D Cat map based symmetric image encryption scheme
    • Wang K., Pei, Zou L.H., Song A.G., He Z.Y. On the security of 3D Cat map based symmetric image encryption scheme. Phys Lett A 2005, 343:432-439.
    • (2005) Phys Lett A , vol.343 , pp. 432-439
    • Wang, K.1    Pei2    Zou, L.H.3    Song, A.G.4    He, Z.Y.5
  • 22
    • 61349130629 scopus 로고    scopus 로고
    • Cryptanalysis of a chaos-based image encryption algorithm
    • Cokal C., Solak E. Cryptanalysis of a chaos-based image encryption algorithm. Phys Lett A 2009, 373:1357-1360.
    • (2009) Phys Lett A , vol.373 , pp. 1357-1360
    • Cokal, C.1    Solak, E.2
  • 23
    • 65549134847 scopus 로고    scopus 로고
    • Analysis and improvement of a chaos-based image encryption algorithm
    • Xiao D., Liao X.F., Wei P.C. Analysis and improvement of a chaos-based image encryption algorithm. Chaos Solitons Fract 2009, 40:2191-2199.
    • (2009) Chaos Solitons Fract , vol.40 , pp. 2191-2199
    • Xiao, D.1    Liao, X.F.2    Wei, P.C.3
  • 24
    • 85196202553 scopus 로고    scopus 로고
    • Cryptanalysis of image encryption with compound chaotic sequence
    • In: 6th International multi-conference on systems, signals and devices, SSD'09, Djerba, Tunus
    • E. Solak, Cryptanalysis of image encryption with compound chaotic sequence. In: 6th International multi-conference on systems, signals and devices, SSD'09, Djerba, Tunus, 2009.
    • (2009)
    • Solak, E.1
  • 25
    • 70449495660 scopus 로고    scopus 로고
    • Cryptanalysis of a multi-chaotic systems based image cryptosystem
    • Solak E., Rhouma R., Belghith S. Cryptanalysis of a multi-chaotic systems based image cryptosystem. Opt Commun 2010, 283:232-236.
    • (2010) Opt Commun , vol.283 , pp. 232-236
    • Solak, E.1    Rhouma, R.2    Belghith, S.3
  • 26
    • 0346024202 scopus 로고    scopus 로고
    • On the security of a class of discrete-time chaotic cryptosystems
    • Solak E. On the security of a class of discrete-time chaotic cryptosystems. Phys Lett A 2004, 320:389-395.
    • (2004) Phys Lett A , vol.320 , pp. 389-395
    • Solak, E.1
  • 27
    • 85008921093 scopus 로고    scopus 로고
    • Chaos-based encryption for digital images and videos
    • Chapter 4, CRC Press, LLC, Available at:, B. Furht, D. Kirovski (Eds.)
    • Li S.J., Chen G.R., Zheng X. Chaos-based encryption for digital images and videos. Multimedia security handbook 2004, 133-167. Chapter 4, CRC Press, LLC, Available at:. http://www.hooklee.com/pub.html, B. Furht, D. Kirovski (Eds.).
    • (2004) Multimedia security handbook , pp. 133-167
    • Li, S.J.1    Chen, G.R.2    Zheng, X.3
  • 28
    • 85045783142 scopus 로고    scopus 로고
    • Fundamentals of multimedia encryption techniques
    • CRC Press, Boca Raton, FL, Chapter 3, B. Furht, D. Kirovski (Eds.)
    • Furht B., Socek D., Eskicioglu A.M. Fundamentals of multimedia encryption techniques. Multimedia security handbook 2004, 93-132. CRC Press, Boca Raton, FL, Chapter 3. B. Furht, D. Kirovski (Eds.).
    • (2004) Multimedia security handbook , pp. 93-132
    • Furht, B.1    Socek, D.2    Eskicioglu, A.M.3
  • 30
    • 33750542126 scopus 로고    scopus 로고
    • Some basic cryptographic requirements for chaos-based cryptosystems
    • Álvarez G., Li S.J. Some basic cryptographic requirements for chaos-based cryptosystems. Int J Bifurcat Chaos 2006, 16:2129-2151.
    • (2006) Int J Bifurcat Chaos , vol.16 , pp. 2129-2151
    • Álvarez, G.1    Li, S.J.2
  • 31
    • 42049108003 scopus 로고    scopus 로고
    • A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks
    • Li S.J., Li C.Q., Chen G.R., Bourbakis N.G., Lo K.-T. A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Process Image Commun 2008, 23:212-223.
    • (2008) Signal Process Image Commun , vol.23 , pp. 212-223
    • Li, S.J.1    Li, C.Q.2    Chen, G.R.3    Bourbakis, N.G.4    Lo, K.-T.5
  • 32
    • 75149134193 scopus 로고    scopus 로고
    • Image scrambling encryption algorithm of pixel bit based on chaos map
    • Ye G.D. Image scrambling encryption algorithm of pixel bit based on chaos map. Pattern Recognit Lett 2010, 31:347-354.
    • (2010) Pattern Recognit Lett , vol.31 , pp. 347-354
    • Ye, G.D.1
  • 33
    • 78650867097 scopus 로고    scopus 로고
    • Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks
    • Li C.Q., Lo K.T. Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Process 2011, 91:949-954.
    • (2011) Signal Process , vol.91 , pp. 949-954
    • Li, C.Q.1    Lo, K.T.2
  • 35
    • 67349274130 scopus 로고    scopus 로고
    • Cryptanalysis of a spatiotemporal chaotic cryptosystem
    • Rhouma R., Safya B. Cryptanalysis of a spatiotemporal chaotic cryptosystem. Chaos Solitons Fract 2009, 41:1718-1722.
    • (2009) Chaos Solitons Fract , vol.41 , pp. 1718-1722
    • Rhouma, R.1    Safya, B.2
  • 36
    • 34548361693 scopus 로고    scopus 로고
    • Cryptanalysis of two chaotic encryption schemes based on circular bit shift and xor operations
    • Li C.Q., Li S.J., Álvarez G., Chen G.R., Lo K.-T. Cryptanalysis of two chaotic encryption schemes based on circular bit shift and xor operations. Phys Lett A 2007, 369:23-30.
    • (2007) Phys Lett A , vol.369 , pp. 23-30
    • Li, C.Q.1    Li, S.J.2    Álvarez, G.3    Chen, G.R.4    Lo, K.-T.5
  • 37
    • 85196177395 scopus 로고    scopus 로고
    • FileFormat.Info. Available from:
    • FileFormat.Info. Available from: 2009. http://www.fileformat.info/tip/web/imagesize.htm.
    • (2009)
  • 38
    • 85196211123 scopus 로고    scopus 로고
    • The USC-SIPI image database. Available from:
    • The USC-SIPI image database. Available from: http://sipi.usc.edu/database/.
  • 39
    • 33644933805 scopus 로고    scopus 로고
    • A self-adaptive algorithm on image encryption
    • Chen G., Zhao X.Y., Li J.L. A self-adaptive algorithm on image encryption. J Softw 2005, 16(11):1974-1975.
    • (2005) J Softw , vol.16 , Issue.11 , pp. 1974-1975
    • Chen, G.1    Zhao, X.Y.2    Li, J.L.3
  • 40
    • 34547285788 scopus 로고    scopus 로고
    • Selective image encryption using a spatiotemporal chaotic system
    • Xiang T., Wong K.W., Liao X.F. Selective image encryption using a spatiotemporal chaotic system. Chaos 2007, 17:023115.
    • (2007) Chaos , vol.17 , pp. 023115
    • Xiang, T.1    Wong, K.W.2    Liao, X.F.3
  • 41
    • 85196151120 scopus 로고    scopus 로고
    • FIPS-197, Announcing the advanced encryption standard.
    • FIPS-197, Announcing the advanced encryption standard.
  • 42
    • 85036655885 scopus 로고    scopus 로고
    • Cryptanalysis on an image scrambling encryption scheme based on pixel bit
    • Springer, Heidelberg, H.J. Kim, Y.Q. Shi, M. Barni (Eds.) IWDW 2010
    • Zhao L., Adhikari A., Xiao D., Sakurai K. Cryptanalysis on an image scrambling encryption scheme based on pixel bit. LNCS 2011, vol. 6526:45-59. Springer, Heidelberg. H.J. Kim, Y.Q. Shi, M. Barni (Eds.).
    • (2011) LNCS , vol.6526 , pp. 45-59
    • Zhao, L.1    Adhikari, A.2    Xiao, D.3    Sakurai, K.4
  • 43
    • 85196156943 scopus 로고    scopus 로고
    • Security improvement of a pixel bit based image scrambling encryption scheme through the self-correlation method
    • In: Lai XJ, Yung M, Lin DD, editors. INSCRYPT 2010 (short paper), Science Press of China;
    • Zhao L, Adhikari A, Xiao D, Sakurai K. Security improvement of a pixel bit based image scrambling encryption scheme through the self-correlation method. In: Lai XJ, Yung M, Lin DD, editors. INSCRYPT 2010 (short paper), Science Press of China; 2010. p. 88-102.
    • (2010) , pp. 88-102
    • Zhao, L.1    Adhikari, A.2    Xiao, D.3    Sakurai, K.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.