A Comparative Survey on Cryptology-Based Methodologies

Security is an important issue related to the storage and communication of data and information. In data and information security, cryptography and steganography are two of the most common security techniques. On one hand, there is cryptography, which is the secret communication between two parties by message scrambling on the sender's side and message unscrambling on the receiver's side so that only the intended receiver gets the secret message. Cryptography and cryptanalysis constitute cryptology or crypto while steganography and steganalysis make up steganology or stegano. This paper presents a comparative survey of various cryptology and steganology techniques by analyzing and comparing different methodologies using a set of predefined parameters. It also offers to the reader valuable knowledge on the state of the art techniques used on cryptanalysis.

[1]  Moni Naor,et al.  Public-key cryptosystems provably secure against chosen ciphertext attacks , 1990, STOC '90.

[2]  Nikolaos G. Bourbakis,et al.  Picture data encryption using scan patterns , 1992, Pattern Recognit..

[3]  Ross J. Anderson Why cryptosystems fail , 1993, CCS '93.

[4]  Joos Vandewalle,et al.  Differential cryptanalysis of hash functions based on block ciphers , 1993, CCS '93.

[5]  Howard M. Heys,et al.  The design of substitution-permutation networks resistant to differential and linear cryptanalysis , 1994, CCS '94.

[6]  Stafford E. Tavares,et al.  Information leakage of boolean functions and its relationship to other cryptographic criteria , 1994, CCS '94.

[7]  Alan T. Sherman,et al.  How to break Gifford's cipher (extended abstract) , 1994, CCS '94.

[8]  Heba Kamal Aslan,et al.  Implementation of a hybrid encryption scheme for Ethernet , 1995, Proceedings IEEE Symposium on Computers and Communications.

[9]  Hung-Min Sun,et al.  Cryptanalysis of private-key encryption schemes based on burst-error-correcting codes , 1996, CCS '96.

[10]  Serge Vaudenay,et al.  An experiment on DES statistical cryptanalysis , 1996, CCS '96.

[11]  Bharat K. Bhargava,et al.  A fast MPEG video encryption algorithm , 1998, MULTIMEDIA '98.

[12]  Marcos A. Kiwi,et al.  Strength of two data encryption standard implementations under timing attacks , 1998, TSEC.

[13]  Wenjun Zeng,et al.  Efficient frequency domain video scrambling for content access control , 1999, MULTIMEDIA '99.

[14]  Dan Boneh,et al.  Finding smooth integers in short intervals using CRT decoding , 2000, STOC '00.

[15]  Pradosh Kumar Mohapatra Public key cryptography , 2000, CROS.

[16]  Ramesh Karri,et al.  Concurrent error detection of fault-based side-channel cryptanalysis of 128-bit symmetric block ciphers , 2001, Proceedings of the 38th Design Automation Conference (IEEE Cat. No.01CH37232).

[17]  Thomas S. Huang,et al.  An image watermarking technique using pyramid transform , 2001, MULTIMEDIA '01.

[18]  Jacques Stern,et al.  The Two Faces of Lattices in Cryptology , 2001, CaLC.

[19]  Jiun-In Guo,et al.  Design of a New Cryptography System , 2002, IEEE Pacific Rim Conference on Multimedia.

[20]  Eli Biham,et al.  How to decrypt or even substitute DES-encrypted messages in 228 steps , 2002, Inf. Process. Lett..

[21]  Luca Benini,et al.  Energy-aware design techniques for differential power analysis protection , 2003, Proceedings 2003. Design Automation Conference (IEEE Cat. No.03CH37451).

[22]  Wenjun Zeng,et al.  Efficient frequency domain selective scrambling of digital video , 2003, IEEE Trans. Multim..

[23]  Jean-Pierre Seifert,et al.  A new CRT-RSA algorithm secure against bellcore attacks , 2003, CCS '03.

[24]  M. Shaar,et al.  A hybrid hiding encryption algorithm (HHEA) for data communication security , 2003, 2003 46th Midwest Symposium on Circuits and Systems.

[25]  Chi-Ching Chang,et al.  Hybrid encrypted holographic data storage , 2003, 2003 Conference on Lasers and Electro-Optics Europe (CLEO/Europe 2003) (IEEE Cat. No.03TH8666).

[26]  David A. Wagner,et al.  Cryptanalysis of a provably secure CRT-RSA algorithm , 2004, CCS '04.

[27]  Ramarathnam Venkatesan,et al.  Scale-invariant image watermarking via optimization algorithms for quantizing randomized statistics , 2004, MM&Sec '04.

[28]  Nikolaos G. Bourbakis,et al.  Image and video encryption using SCAN patterns , 2004, Pattern Recognit..

[29]  Darko Kirovski,et al.  Multimedia Security Handbook , 2004 .

[30]  Ahmet M. Eskicioglu,et al.  Robust DWT-SVD domain image watermarking: embedding data in all frequencies , 2004, MM&Sec '04.

[31]  Ahmad-Reza Sadeghi,et al.  Overcoming the obstacles of zero-knowledge watermark detection , 2004, MM&Sec '04.

[32]  Zuhua Shao Cryptanalysis of publicly verifiable authenticated encryption , 2004, InfoSecu '04.

[33]  N. Bourbakis,et al.  Data-image-video encryption , 2004, IEEE Potentials.

[34]  Andreas Uhl,et al.  Parameterized biorthogonal wavelet lifting for lightweight JPEG 2000 transparent encryption , 2005, MM&Sec '05.

[35]  Hartmut König,et al.  A novel encryption algorithm for high resolution video , 2005, NOSSDAV '05.

[36]  M. Ayoub Khan,et al.  On the security of joint signature and hybrid encryption , 2005, 2005 13th IEEE International Conference on Networks Jointly held with the 2005 IEEE 7th Malaysia International Conf on Communic.

[37]  Ingrid Verbauwhede,et al.  A VLSI design flow for secure side-channel attack resistant ICs , 2005, Design, Automation and Test in Europe.

[38]  Guo-Shiang Lin,et al.  A feature-based classification technique for blind image steganalysis , 2005, IEEE Transactions on Multimedia.

[39]  Magdy Saeb,et al.  An improved FPGA implementation of the modified hybrid hiding encryption algorithm (MHHEA) for data communication security , 2005, Design, Automation and Test in Europe.

[40]  Kouichi Sakurai,et al.  Side Channel Cryptanalysis on XTR Public Key Cryptosystem , 2005, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[41]  Tieniu Tan,et al.  Extended optimization method of LSB steganalysis , 2005, IEEE International Conference on Image Processing 2005.

[42]  Deepa Kundur,et al.  Analysis and design of secure watermark-based authentication systems , 2006, IEEE Transactions on Information Forensics and Security.

[43]  Mohammad Umar Siddiqi,et al.  A Framework for Describing Block Cipher Cryptanalysis , 2006, IEEE Transactions on Computers.

[44]  Alex Biryukov,et al.  An introduction to Block Cipher Cryptanalysis , 2006, Proceedings of the IEEE.

[45]  Benoit M. Macq,et al.  Watermarking relying on cover signal content to hide synchronization marks , 2006, IEEE Transactions on Information Forensics and Security.

[46]  N. Nalini,et al.  Cryptanalysis of Block Ciphers via Improved Simulated Annealing Technique , 2006, 9th International Conference on Information Technology (ICIT'06).

[47]  Fernando Pérez-González,et al.  An accurate analysis of scalar quantization-based data hiding , 2006, IEEE Transactions on Information Forensics and Security.

[48]  Yixian Yang,et al.  Analysis of Current Steganography Tools: Classifications & Features , 2006, 2006 International Conference on Intelligent Information Hiding and Multimedia.

[49]  Siwei Lyu,et al.  Steganalysis using higher-order image statistics , 2006, IEEE Transactions on Information Forensics and Security.

[50]  Takashi Matsumoto,et al.  A Markov chain Monte Carlo algorithm for bayesian dynamic signature verification , 2006, IEEE Transactions on Information Forensics and Security.

[51]  Giovanni Di Crescenzo,et al.  Approximate Message Authentication Codes for$N$-ary Alphabets , 2006, IEEE Transactions on Information Forensics and Security.

[52]  Lei Guo,et al.  Blind Image Steganalysis Based on Statistical Analysis of Empirical Matrix , 2006, 18th International Conference on Pattern Recognition (ICPR'06).

[53]  Zhang Hong-bin,et al.  Image Texture Energy-Entropy-Based Blind Steganalysis , 2007 .

[54]  Hamid R. Nemati International Journal of Information Security and Privacy , 2007 .

[55]  Andrew D. Ker Steganalysis of Embedding in Two Least-Significant Bits , 2007, IEEE Transactions on Information Forensics and Security.

[56]  Nikolaos G. Bourbakis,et al.  A robust information hiding methodology in wavelet domain , 2007, SIP.

[57]  Yixian Yang,et al.  A Novel Hybrid Encryption Scheme against Adaptive Chosen Ciphertext Attack , 2007, 2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007).

[58]  Jing Dong,et al.  Blind image steganalysis based on run-length histogram analysis , 2008, 2008 15th IEEE International Conference on Image Processing.

[59]  Jon Erickson,et al.  Hacking: The Art of Exploitation , 2008 .

[60]  C. Pandu Rangan,et al.  Cryptanalysis of Li et al.'s Identity-Based Threshold Signcryption Scheme , 2008, 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.

[61]  S. Manoharan,et al.  An Empirical Analysis of RS Steganalysis , 2008, 2008 The Third International Conference on Internet Monitoring and Protection.

[62]  N. Rowe Ethics of Deception in Virtual Communities , 2008 .

[63]  Vivek Kapoor,et al.  Elliptic curve cryptography , 2008, UBIQ.

[64]  K. P. Subbalakshmi,et al.  Cryptanalysis of Some Multimedia Encryption Schemes , 2008, IEEE Transactions on Multimedia.

[65]  Bin Jiang,et al.  Pattern Analysis Applied on Steganalysis for Binary Text Images , 2008, 2008 International Symposium on Electronic Commerce and Security.

[66]  Guanrong Chen,et al.  Cryptanalyzing an Encryption Scheme Based on Blind Source Separation , 2006, IEEE Transactions on Circuits and Systems I: Regular Papers.

[67]  Xu Mankun,et al.  Steganalysis of LSB matching based on histogram features in grayscale image , 2008, 2008 11th IEEE International Conference on Communication Technology.

[68]  Xu Mankun,et al.  Steganalysis of LSB Matching Based on Wavelet Denoising Estimation in Grayscale Image , 2008, 2008 Second International Conference on Future Generation Communication and Networking.

[69]  Hamid R. Nemati,et al.  Information Security and Ethics: Concepts, Methodologies, Tools and Applications , 2008 .

[70]  Tim Güneysu,et al.  Cryptanalysis with COPACOBANA , 2008, IEEE Transactions on Computers.

[71]  Fenlin Liu,et al.  Steganalysis Frameworks of Embedding in Multiple Least-Significant Bits , 2008, IEEE Transactions on Information Forensics and Security.

[72]  Kevin Curran,et al.  Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..

[73]  Munir Majdalawieh,et al.  The Integrated Privacy Model: Building a Privacy Model in the Business Processes of the Enterprise , 2010, Int. J. Inf. Secur. Priv..

[74]  Hamid R. Nemati,et al.  Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering , 2010 .

[75]  Nikolaos G. Bourbakis,et al.  SCAN secure processor and its biometric capabilities , 2011, J. Electronic Imaging.

[76]  Kenneth Jacobs A Survey of Modern Mathematical Cryptology , 2011 .

[77]  John E. Canavan,et al.  Fundamentals of Network Security , 2012 .