A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks

In recent years secret permutations have been widely used for protecting different types of multimedia data, including speech files, digital images and videos. Based on a general model of permutation-only multimedia ciphers, this paper performs a quantitative cryptanalysis on the performance of these kind of ciphers against plaintext attacks. When the plaintext is of size MxN and with L different levels of values, the following quantitative cryptanalytic findings have been concluded under the assumption of a uniform distribution of each element in the plaintext: (1) all permutation-only multimedia ciphers are practically insecure against known/chosen-plaintext attacks in the sense that only O(log"L(MN)) known/chosen plaintexts are sufficient to recover not less than (in an average sense) half elements of the plaintext; (2) the computational complexity of the known/chosen-plaintext attack is only O(n.(MN)^2), where n is the number of known/chosen plaintexts used. When the plaintext has a non-uniform distribution, the number of required plaintexts and the computational complexity is also discussed. Experiments are given to demonstrate the real performance of the known-plaintext attack for a typical permutation-only image cipher.

[1]  Guanrong Chen,et al.  On the security of a class of image encryption schemes , 2008, 2008 IEEE International Symposium on Circuits and Systems.

[2]  Klara Nahrstedt,et al.  Is MPEG encryption by using random list instead of zigzag order secure? , 1997, ISCE '97. Proceedings of 1997 IEEE International Symposium on Consumer Electronics (Cat. No.97TH8348).

[3]  Xiaojun Tong,et al.  Image encryption scheme based on 3D baker with dynamical compound chaotic sequence cipher generator , 2009, Signal Process..

[4]  J.-C. Yeo,et al.  Efficient hierarchical chaotic image encryption algorithm and its VLSI realisation , 2000 .

[5]  Fred Piper,et al.  Secure Speech Communications , 1985 .

[6]  Wenjun Zeng,et al.  Multimedia Security Technologies for Digital Rights Management , 2006 .

[7]  Gonzalo Alvarez,et al.  Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations , 2006, nlin/0611017.

[8]  Howard Cheng,et al.  Partial encryption for image and video communication , 1998 .

[9]  Min Wu,et al.  A joint signal processing and cryptographic approach to multimedia encryption , 2006, IEEE Transactions on Image Processing.

[10]  Vinod Patidar,et al.  Image encryption using chaotic logistic map , 2006, Image Vis. Comput..

[11]  Ed Dawson,et al.  Fast Fourier transform based speech encryption system , 1991 .

[12]  Nikolaos G. Bourbakis,et al.  Image encryption method using a class of fractals , 1995, J. Electronic Imaging.

[13]  Shujun Li,et al.  On the security of an image encryption method , 2002, Proceedings. International Conference on Image Processing.

[14]  Darko Kirovski,et al.  Multimedia Security Handbook , 2004 .

[15]  Kai Wang,et al.  On the security of 3D Cat map based symmetric image encryption scheme , 2005 .

[16]  Hun-Chen Chen,et al.  A new cryptography system and its VLSI realization , 2003, Journal of systems architecture.

[17]  Guanrong Chen,et al.  Chaos-Based Encryption for Digital Images and Videos , 2004 .

[18]  Xiaobo Li,et al.  Image compression and encryption using tree structures , 1997, Pattern Recognit. Lett..

[19]  Sang-Uk Shin,et al.  A Secrecy Scheme for MPEG Video Data Using the Joint of Compression and Encryption , 1999, ISW.

[20]  Lintian Qiao,et al.  Multimedia Security and Copyright Protection , 1998 .

[21]  Lei Tang,et al.  Methods for encrypting and decrypting MPEG video data efficiently , 1997, MULTIMEDIA '96.

[22]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .

[23]  Shujun Li,et al.  On the security of the Yen-Guo's domino signal encryption algorithm (DSEA) , 2005, J. Syst. Softw..

[24]  Markus G. Kuhn,et al.  Analysis of the Nagravision Video Scrambling Method , 1998 .

[25]  Andreas Uhl,et al.  Image And Video Encryption: From Digital Rights Management To Secured Personal Communication (Advances in Information Security) , 2004 .

[26]  Wenjun Zeng,et al.  Efficient frequency domain selective scrambling of digital video , 2003, IEEE Trans. Multim..

[27]  C. Chui,et al.  A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .

[28]  Yossi Matias,et al.  A Video Scrambling Technique Based On Space Filling Curves , 1987, CRYPTO.

[29]  Randall K. Nichols,et al.  Wireless Security: Models, Threats, and Solutions , 2001 .

[30]  Bruce Schneier,et al.  Applied cryptography : protocols, algorithms, and source codein C , 1996 .

[31]  N. Bourbakis,et al.  SCAN-Based Compression-Encryption-Hiding for Video on Demand , 2003, IEEE Multim..

[32]  Henry Ker-Chang Chang,et al.  A linear quadtree compression scheme for image encryption , 1997, Signal Process. Image Commun..

[33]  Ernest F. Brickell,et al.  Cryptanalysis of Video Encryption Based on Space-Filling Curves , 1990, EUROCRYPT.

[34]  S. Li,et al.  On the security of a new image encryption scheme based on chaotic map lattices. , 2008, Chaos.

[35]  Ed Dawson,et al.  Design and Cryptanalysis of Transform-Based Analog Speech Scamblers , 1993, IEEE J. Sel. Areas Commun..

[36]  A. Pisarchik,et al.  Encryption and decryption of images with chaotic map lattices. , 2006, Chaos.

[37]  Guanrong Chen,et al.  A Novel Fast Image Encryption Scheme Based on 3D Chaotic Baker Maps , 2004, Int. J. Bifurc. Chaos.

[38]  Chin-Chen Chang,et al.  A new encryption algorithm for image cryptosystems , 2001, J. Syst. Softw..

[39]  Dan Zhang,et al.  Decryption of pure-position permutation algorithms , 2004, Journal of Zhejiang University. Science.

[40]  Rhouma Rhouma,et al.  Cryptanalysis of a spatiotemporal chaotic image/video cryptosystem , 2008 .

[41]  Jinsheng Sun,et al.  Perceptual cryptography on wavelet-transform encoded videos , 2004, Proceedings of 2004 International Symposium on Intelligent Multimedia, Video and Speech Processing, 2004..

[42]  S. Li,et al.  Cryptanalyzing a nonlinear chaotic algorithm (NCA) for image encryption , 2009 .

[43]  Guanrong Chen,et al.  Cryptanalysis of RCES/RSES Image Encryption Scheme , 2004, IACR Cryptol. ePrint Arch..

[44]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[45]  Wenjiang Pei,et al.  Symbolic dynamics approach to parameter estimation without initial value , 2009 .

[46]  Kuo-Liang Chung,et al.  Large encrypting binary images with higher security , 1998, Pattern Recognit. Lett..

[47]  Chin-Chen Chang,et al.  Cryptanalysis of an encryption scheme for binary images , 2002, Pattern Recognit. Lett..

[48]  Borko Furht,et al.  Multimedia Encryption and Watermarking (Multimedia Systems and Applications) , 2005 .

[49]  Borko Furht,et al.  Multimedia encryption and watermarking , 2005, Multimedia systems and applications.

[50]  R. Zunino Fractal circuit layout for spatial decorrelation of images , 1998 .

[51]  Borko Furht,et al.  Fundamentals of Multimedia Encryption Techniques , 2006 .

[52]  Ed Dawson,et al.  Speech encryption in the transform domain , 1990 .

[53]  Nikolaos G. Bourbakis,et al.  Picture data encryption using scan patterns , 1992, Pattern Recognit..

[54]  Klara Nahrstedt,et al.  Comparison of MPEG encryption algorithms , 1998, Comput. Graph..

[55]  Gonzalo Álvarez,et al.  Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.

[56]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .

[57]  J. Fridrich Symmetric Ciphers Based on Two-Dimensional Chaotic Maps , 1998 .

[58]  Chen Gang,et al.  Ergodic matrix in image encryption , 2002, Other Conferences.

[59]  Jiun-In Guo,et al.  EURASIP Journal on Applied Signal Processing 2003:13, 1291–1305 c ○ 2003 Hindawi Publishing Corporation Design and Realization of a New Signal Security System for Multimedia Data Transmission , 2003 .

[60]  Guanrong Chen,et al.  On the security defects of an image encryption scheme , 2009, Image Vis. Comput..

[61]  Shiguo Lian,et al.  Perceptual cryptography on SPIHT compressed images or videos , 2004, 2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763).

[62]  Andreas Uhl,et al.  Image and Video Encryption - From Digital Rights Management to Secured Personal Communication , 2005, Advances in Information Security.

[63]  Sadasivan Puthusserypady,et al.  Self-synchronizing chaotic stream ciphers , 2008, Signal Process..

[64]  Josef Scharinger Fast encryption of image data using chaotic Kolmogorov flows , 1998, J. Electronic Imaging.

[65]  P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .

[66]  Philip Ogunbona,et al.  Securing wavelet compression with random permutations , 2000 .

[67]  Abir Awad,et al.  A New Chaotic Image Encryption Algorithm using a New Way of Permutation Methods , 2010, IACR Cryptol. ePrint Arch..

[68]  Shiguo Lian,et al.  Perceptual cryptography on JPEG2000 compressed images or videos , 2004, The Fourth International Conference onComputer and Information Technology, 2004. CIT '04..

[69]  Xiaobo Li,et al.  Partial encryption of compressed images and videos , 2000, IEEE Trans. Signal Process..

[70]  Nikolaos G. Bourbakis,et al.  Image and video encryption using SCAN patterns , 2004, Pattern Recognit..

[71]  Dongxu Qi,et al.  A new class of scrambling transformation and its application in the image information covering , 2000 .

[72]  Bruce Schneier,et al.  Applied cryptography (2nd ed.): protocols, algorithms, and source code in C , 1995 .