University of Surrey

Test tubes in the lab Research in the ATI Dance Research

A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks

Li, SJ, Li, CQ, Chen, GR, Bourbakis, NG and Lo, KT (2008) A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks Signal Processing-Image Communication, 23 (3). 212 - 223. ISSN 0923-5965

[img]
Preview
PDF
SPIC2008.pdf - Accepted Version
Available under License : See the attached licence file.

Download (858kB)
[img]
Preview
PDF (licence)
SRI_deposit_agreement.pdf

Download (33kB)

Abstract

In recent years secret permutations have been widely used for protecting different types of multimedia data, including speech files, digital images and videos. Based on a general model of permutation-only multimedia ciphers, this paper performs a quantitative cryptanalysis on the performance of these kind of ciphers against plaintext attacks. When the plaintext is of size MxN and with L different levels of values, the following quantitative cryptanalytic findings have been concluded under the assumption of a uniform distribution of each element in the plaintext: (1) all permutation-only multimedia ciphers are practically insecure against known/chosen-plaintext attacks in the sense that only O(log_L(MN)) known/chosen plaintexts are sufficient to recover not less than (in an average sense) half elements of the plaintext; (2) the computational complexity of the known/chosen-plaintext attack is only O(n(MN)^2), where n is the number of known/chosen plaintexts used. When the plaintext has a non-uniform distribution, the number of required plaintexts and the computational complexity is also discussed. Experiments are given to demonstrate the real performance of the known-plaintext attack for a typical permutation-only image cipher.

Item Type: Article
Additional Information: NOTICE: This is the author’s version of a work that was accepted by Signal Processing: Image Communication in January 2008. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. A definitive version has been published in Signal Processing: Image Communication, vol. 23, no. 3, pp. 212-223, 2008, DOI: 10.1016/j.image.2008.01.003.
Uncontrolled Keywords: permutation-only multimedia encryption, image, video, speech, cryptanalysis, known-plaintext attack, chosen-plaintext attack, IMAGE ENCRYPTION METHOD, SPEECH ENCRYPTION, BINARY IMAGES, SCAN PATTERNS, SCHEME, VIDEO, COMPRESSION, SECURITY, DOMAIN, JOINT
Related URLs:
Divisions: Faculty of Engineering and Physical Sciences > Computing Science
Depositing User: Symplectic Elements
Date Deposited: 26 May 2012 12:37
Last Modified: 23 Sep 2013 19:26
URI: http://epubs.surrey.ac.uk/id/eprint/532453

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year


Information about this web site

© The University of Surrey, Guildford, Surrey, GU2 7XH, United Kingdom.
+44 (0)1483 300800