Re-Evaluation of the Security of a Family of Image Diffusion Mechanisms

In recent years, the use of permutation-diffusion architecture for digital image encryption has become increasingly popular. The permutation procedure scrambles the pixel locations, while the diffusion phase modifies the pixel values and gives rise to the avalanche effect. Various diffusion techniques have been developed, and their strength strongly impacts the security of the overall cryptosystem. In this paper, we re-evaluate the security of a family of image diffusion mechanisms that are based on mixing modulo addition with bitwise exclusive OR operations. The recovery of the encryption element of these diffusion mechanisms is comprehensively demonstrated, and the accuracy bounds under various conditions are proved mathematically. Compared to the state-of-the-art methods, our work improves the recovery accuracy of the encryption element while the required prior knowledge is decreased. The proposed analysis of the diffusion mechanisms is further used to cryptanalyze the whole cryptosystem theoretically and experimentally.

[1]  Stefan Katzenbeisser,et al.  Depreciating Motivation and Empirical Security Analysis of Chaos-Based Image and Video Encryption , 2018, IEEE Transactions on Information Forensics and Security.

[2]  Guanrong Chen,et al.  Design and FPGA-Based Realization of a Chaotic Secure Video Communication System , 2018, IEEE Transactions on Circuits and Systems for Video Technology.

[3]  Kwok-Tung Lo,et al.  Breaking an Image Encryption Algorithm Based on Chaos , 2010, Int. J. Bifurc. Chaos.

[4]  Yicong Zhou,et al.  Cryptanalysis of Image Ciphers With Permutation-Substitution Network and Chaos , 2020, IEEE Transactions on Circuits and Systems for Video Technology.

[5]  Kwok-Tung Lo,et al.  Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks , 2011, Signal Process..

[6]  Fatih Özkaynak,et al.  Brief review on application of nonlinear dynamics in image encryption , 2018, Nonlinear Dynamics.

[7]  Yicong Zhou,et al.  Cascade Chaotic System With Applications , 2015, IEEE Transactions on Cybernetics.

[8]  Xin-Wen Wu,et al.  On the Security of Permutation-Only Image Encryption Schemes , 2016, IEEE Transactions on Information Forensics and Security.

[9]  Yong Liu,et al.  Exploiting Optical Chaos for Color Image Encryption and Secure Resource Sharing in Cloud , 2019, IEEE Photonics Journal.

[10]  Guanrong Chen,et al.  A Novel Fast Image Encryption Scheme Based on 3D Chaotic Baker Maps , 2004, Int. J. Bifurc. Chaos.

[11]  K. Deergha Rao,et al.  Modified Chaotic Key-Based Algorithm for Image Encryption and its VLSI Realization , 2007, 2007 15th International Conference on Digital Signal Processing.

[12]  Nikolaos G. Bourbakis,et al.  A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks , 2008, Signal Process. Image Commun..

[13]  Leo Yu Zhang,et al.  International Journal of Bifurcation and Chaos Breaking a Chaotic Image Encryption Algorithm Based on modulo Addition and Xor Operation , 2022 .

[14]  Hang Zhou,et al.  Separable Reversible Data Hiding in Encrypted JPEG Bitstreams , 2018, IEEE Transactions on Dependable and Secure Computing.

[15]  Cong Xu,et al.  An image encryption algorithm based on a hidden attractor chaos system and the Knuth–Durstenfeld algorithm , 2020, Optics and Lasers in Engineering.

[16]  Chunhua Wang,et al.  A novel image encryption scheme based on conservative hyperchaotic system and closed-loop diffusion between blocks , 2020, Signal Process..

[17]  Ming Li,et al.  Cryptanalysis and Improvement of a Chaotic Image Encryption by First-Order Time-Delay System , 2018, IEEE MultiMedia.

[18]  Bhaskar Mondal,et al.  A chaotic permutation and diffusion based image encryption algorithm for secure communications , 2018, Multimedia Tools and Applications.

[19]  Xuejing Kang,et al.  Color Image Encryption Using Pixel Scrambling Operator and Reality-Preserving MPFRHT , 2019, IEEE Transactions on Circuits and Systems for Video Technology.

[20]  Cong Wang,et al.  Improved known-plaintext attack to permutation-only multimedia ciphers , 2018, Inf. Sci..

[21]  C. Chui,et al.  A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .

[22]  J. Fridrich Symmetric Ciphers Based on Two-Dimensional Chaotic Maps , 1998 .

[23]  Guanrong Chen,et al.  Security Analysis of Some Diffusion Mechanisms Used in Chaotic Ciphers , 2017, Int. J. Bifurc. Chaos.

[24]  Kwok-Wo Wong,et al.  Chosen-plaintext attack of an image encryption scheme based on modified permutation–diffusion structure , 2015, ArXiv.

[25]  Kwok-Wo Wong,et al.  On the Security of a Class of Diffusion Mechanisms for Image Encryption , 2015, IEEE Transactions on Cybernetics.

[26]  Cong Xu,et al.  An Image Encryption Algorithm Based on Random Walk and Hyperchaotic Systems , 2020, Int. J. Bifurc. Chaos.

[27]  Di Xiao,et al.  Cryptanalyzing a novel image cipher based on mixed transformed logistic maps , 2013, Multimedia Tools and Applications.

[28]  D. Megías,et al.  Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined Fingerprints , 2015, IEEE Trans. Dependable Secur. Comput..

[29]  Bart Preneel,et al.  Near Optimal Algorithms for Solving Differential Equations of Addition with Batch Queries , 2005, INDOCRYPT.

[30]  Yicong Zhou,et al.  Universal Chosen-Ciphertext Attack for a Family of Image Encryption Schemes , 2019, IEEE Transactions on Multimedia.

[31]  Gonzalo Álvarez,et al.  Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.

[32]  David Megías Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined Fingerprints , 2015, IEEE Transactions on Dependable and Secure Computing.

[33]  I. Shatheesh Sam,et al.  A novel image cipher based on mixed transformed logistic maps , 2010, Multimedia Tools and Applications.

[34]  Yiyuan Xie,et al.  Exploiting Optics Chaos for Image Encryption-Then-Transmission , 2016, Journal of Lightwave Technology.

[35]  Yehuda Lindell,et al.  Introduction to Modern Cryptography , 2004 .

[36]  Hadi Seyedarabi,et al.  A new secure and sensitive image encryption scheme based on new substitution with chaotic function , 2014, Multimedia Tools and Applications.

[37]  Chengqing Li,et al.  When an attacker meets a cipher-image in 2018: A Year in Review , 2019, J. Inf. Secur. Appl..

[38]  Lei Chen,et al.  Medical image cipher using hierarchical diffusion and non-sequential encryption , 2019, Nonlinear Dynamics.

[39]  Ch. Gangadhar,et al.  Hyperchaos Based Image Encryption , 2009, Int. J. Bifurc. Chaos.