Key Independent Retrieval of Chaotic Encrypted Images

A chaotic image encryption algorithm based on circular shift functions proposed for high security is analysed in this paper for retrieving encrypted images. Proposed retrieval scheme is key independent and based on divide and conquer attack where neighbourhood similarity characteristic of images is applied. The simulation results show that retrieved images have very good visual perception quality and are as similar as original images. The analysis indicates that above algorithm in present form is insecure and encrypted images can be retrieved efficiently.

[1]  Ibrahim Sogukpinar,et al.  Analysis and Comparison of Image Encryption Algorithms , 2007 .

[2]  Darko Kirovski,et al.  Multimedia Security Handbook , 2004 .

[3]  Gang Chen,et al.  Cryptanalysis of a New Signal Security System for Multimedia Data Transmission , 2005, EURASIP J. Adv. Signal Process..

[4]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[5]  Shujun Li,et al.  On the security of an image encryption method , 2002, Proceedings. International Conference on Image Processing.

[6]  Chin-Chen Chang,et al.  A new encryption algorithm for image cryptosystems , 2001, J. Syst. Softw..

[7]  K. P. Subbalakshmi,et al.  Cryptanalysis of Some Multimedia Encryption Schemes , 2008, IEEE Transactions on Multimedia.

[8]  Chengqing Li,et al.  Cryptanalyses of Some Multimedia Encryption Schemes , 2006, IACR Cryptol. ePrint Arch..

[9]  Nikolaos G. Bourbakis,et al.  Image and video encryption using SCAN patterns , 2004, Pattern Recognit..

[10]  Jiun-In Guo,et al.  Design of a new signal security system , 2002, 2002 IEEE International Symposium on Circuits and Systems. Proceedings (Cat. No.02CH37353).