Advertisement

Key Independent Retrieval of Chaotic Encrypted Images

  • Ram Ratan
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5909)

Abstract

A chaotic image encryption algorithm based on circular shift functions proposed for high security is analysed in this paper for retrieving encrypted images. Proposed retrieval scheme is key independent and based on divide and conquer attack where neighbourhood similarity characteristic of images is applied. The simulation results show that retrieved images have very good visual perception quality and are as similar as original images. The analysis indicates that above algorithm in present form is insecure and encrypted images can be retrieved efficiently.

Keywords

Image Secrecy Chaotic Image Encryption Circular Shift Function Image Decryption Divide and Conquer Attack Neighbourhood Similarity 

References

  1. 1.
    Yen, J.-C., Guo, J.-I.: A new chaotic image encryption algorithm and its VLSI architecture. In: Proc. IEEE Workshop Signal Processing Systems, pp. 430–437 (1999)Google Scholar
  2. 2.
    Yen, J.-C., Guo, J.-I.: A new chaotic image encryption algorithm. Department of Electronics Engineering National Lien-Ho College of Technology and Commerce, Miaoli, Taiwan, Republic of China, E-mail: jcyen@mail.lctc.edu.twGoogle Scholar
  3. 3.
    Yen, J.-C., Guo, J.-I.: Design of a new signal security system. In: Proc. IEEE Intl. Symposium on Circuits and Systems (ISCAS 2002), vol. 4, pp. 121–124 (2002)Google Scholar
  4. 4.
    Furht, B., Kirovski, D.: Multimedia Security Handbook. CRC Press, Boca Raton (2004)Google Scholar
  5. 5.
    Guo, J.-I., Yen, J.-C.: A new mirror-like image encryption algorithm and its VLSI architecture. In: Proc. 10th VLSI Design/CAD Symposium, Taiwan, pp. 319–322 (1999)Google Scholar
  6. 6.
    Maniccam, S.S., Bourbakis, N.G.: Lossless image compression and encryption using SCAN. Pattern Recognition 34, 1229–1245 (2001)zbMATHCrossRefGoogle Scholar
  7. 7.
    Maniccam, S.S., Bourbakis, N.G.: Image and video encryption using SCAN patterns. Pattern Recognition 37, 725–737 (2004)CrossRefGoogle Scholar
  8. 8.
    Ozturk, I., Sogukpinar, I.: Analysis and comparision of image encryption algorithms. Proc. of World Academy of Science, Engineering and Technology 3 (2005)Google Scholar
  9. 9.
    Chang, C.-C., Hwang, M.-S., Chen, T.-S.: A new encription algorithm for image cryptosystems. Journal of Systems and Software 58, 83–91 (2001)CrossRefGoogle Scholar
  10. 10.
    Li, S., Zheng, X.: On the security of an image encryption method. In: Proc. IEEE Intl. Conf. on Image Processing (ICIP 2002), vol. 2, pp. 925–928 (2002)Google Scholar
  11. 11.
    Li, C., Li, S., Chen, G., Chen, G., Hu, L.: Cryptanalysis of new signal security system for multimedia data transmission. EURASIP Journal on Applied Signal Processing 8, 1277–1288 (2005)MathSciNetGoogle Scholar
  12. 12.
    Li, C.: Cryptanalysis of some multimedia encryption schemes. M.S. Thesis (2005)Google Scholar
  13. 13.
    Menezes, A., Van Oorschot, P., Vanstone, S.: Handbook of applied cryptography. CRC Press, Boca Raton (1996)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Ram Ratan
    • 1
  1. 1.Defence Research and Development OrganisationScientific Analysis GroupDelhiIndia

Personalised recommendations