The use of same keys for different messages is not safe in cryptography to secure cryptographic communications even if encryption algorithm is strong enough and possesses good cryptographic properties. Such communications can be analyzed to find meaningful information by cryptanalysts or adversaries. Use of same keys may happens if keys are not managed in cipher systems appropriately by customers. One should evaluate ciphers thoroughly and assure for non-repetition of keys prior to its usage for secure communications. The paper presents a methodology to identify and segregate traffic of cryptographic communications of images encrypted with same keys by exploiting bit-plane image characteristics and applying Fuzzy decision criteria. Results presented in the paper shows that the proposed Fuzzy classification method is able to identify images encrypted with same keys successfully and it seems very useful to consider for various pattern recognition and image analysis problems.
This is a preview of subscription content, access via your institution.
Buy single article
Instant access to the full article PDF.
Tax calculation will be finalised during checkout.
Subscribe to journal
Immediate online access to all issues from 2019. Subscription will auto renew annually.
Tax calculation will be finalised during checkout.
Asthana R, Sharma A, Ratan R, Verma N (2015) Classification of error-correcting coded data using multidimensional feature vectors. Adv Intell Syst Comput 336:303–312
Bezdek JC, Keller J, Krisnapuram R, Pal NR (2005) Fuzzy models and algorithms for pattern recognition and image processing, Rev edn. Springer, New York
Bouyer P et al (2011) Quantitative analysis of real-time systems. J Commn ACM 54(9):78–87
Cusick TW, Stanica P (2009) Cryptographic Boolean functions and applications. Academic Press, Cambridge,
Din M, Ratan R, Bhateja AK, Bhateja A (2012) Multimedia classification using ANN approach. Adv Intell Syst Comput 236:905–910
Doane DP, Seward LE (2011) Measuring Skewness: a forgotten statistics. J Stat Educ 19(2):1–18
George AG, Prabavathy AK (2013) A survey on different approaches used in image quality assessment. Int J Emerg Technol Adv Eng 3(2):197–203
Haddon JF, Boyce JF (1993) Co-occurrence matrices for image analysis. IEEE Electron Commun Eng J 5(2):71–83
Huber P, Ronchetti E (2009) Robust statistics. Wiley, Hoboken
Jain AK (1995) Fundamentals of digital image processing. Prentice Hall, Englewood Cliffs
Katzenbeisser S, Petitcolas FAP (2000) Information hiding techniques for steganography and digital watermarking. Artech House, Norwood
Keelan BW (2002) Handbook of image quality. Marcel Dekker Inc., New York
Keerthi SS, Chapelle O, DeCoste D (2006) Building support vector machines with reduced classifier complexity. J Mach Learn Res 7:1493–1515
Klein A (2013) Stream ciphers. Springer, London
Lahouhou A, Viennet E, Beghdadi A (2010) Selecting low-level features for image quality assessment by statistical methods. J Comput Inform Tech 18(2):183–189
Mc Cullough BD (2004) Wilkinson’s test and econometric software. J Econ Soc Meas 29:261–270
Menezes A, Vanstone S, Van Oorschot P (1996) Handbook of applied cryptography. CRC Press, Boca Raton
Prakash S, Trivedi V, Ramteke M (2016) An elitist non-dominated sorting bat algorithm NSBAT-II for multiobjective optimization of phthalic anhydride reactor. J Syst Assur Eng Manag 7(3):299–315
Prasad Mukesh, Li Dong-Lin, Lin Chin-Teng, Prakash Shiv, Singh Jagendra, Joshi Sudhanshu (2015) Designing mamdani-type fuzzy reasoning for visualizing prediction problems based on collaborative fuzzy clustering. IAENG Int J Comput Sci 42(4):404–411
Ratan R (2014) Applications of genetic algorithms in cryptology. Adv Intell Syst Comput 258:281–291
Ratan R, Arvind (2019) Bit-plane specific measures and its applications in analysis of image ciphers. Commun Comput Inf Sci 968:282–297
Ratan R, Veni Madhavan CE (2002) Steganography based information security. IETE Tech Rev 19(4):213–219
Renu, Ravi, Ratan R (2012) Live traffic english text monitoring using fuzzy approach. Adv Intell Syst Comput 236:911–918
Rueppel RA (1986) Analysis and design of stream ciphers. Springer, Berlin
Sadkhan SB, Abbas NA (2013) Watermarked and noisy images identification based on statistical evaluation parameters. J Zankoy Sulaimani-Part A 15(3):159–168
Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28(4):656–715
Simon KS, Omura JK, Scholtz RA, Levitt BK (1994) Spread spectrum communications handbook. McGraw-Hill, New York
Stallings W (2011) Cryptography and network security. Prentice Hall, Englewood Cliffs
Stinson DR (1994) Decomposition constructions for secret sharing schemes. IEEE Trans Inf Theory 40(1):118–125
Streijl RC, Winkler S, Hands DS (2016) Mean opinion score (MOS) revisited: methods and applications, limitations and alternatives. Multimed Syst 22(2):213–227
Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612
Zadeh LA (1965) Fuzzy sets. Inf Control 8(3):338–353
Zhou W, Bovik AC (2009) Mean squared error: love it or leave it? A new look at signal fidelity measures. Signal Process Mag IEEE 26(1):98–117
Zimmermann HJ (1987) Fuzzy sets. Decision making and expert systems. Kluwer, Boston
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
About this article
Cite this article
Arvind, Ratan, R. Identifying traffic of same keys in cryptographic communications using fuzzy decision criteria and bit-plane measures. Int J Syst Assur Eng Manag 11, 466–480 (2020). https://doi.org/10.1007/s13198-019-00878-7
- Bit-plane measures
- Fuzzy criteria
- Pattern recognition
- Secure communication
- Soft computing
- Traffic analysis