On the Security of a Class of Diffusion Mechanisms for Image Encryption
The need for fast and strong image cryptosystems motivates researchers to develop new techniques to apply traditional cryptographic primitives in order to exploit the intrinsic features of digital images. One of the most popular and mature technique is the use of complex dynamic phenomena, including...
Gespeichert in:
Veröffentlicht in: | IEEE transactions on cybernetics 2018-04, Vol.48 (4), p.1163-1175 |
---|---|
Hauptverfasser: | , , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 1175 |
---|---|
container_issue | 4 |
container_start_page | 1163 |
container_title | IEEE transactions on cybernetics |
container_volume | 48 |
creator | Zhang, Leo Yu Liu, Yuansheng Pareschi, Fabio Zhang, Yushu Wong, Kwok-Wo Rovatti, Riccardo Setti, Gianluca |
description | The need for fast and strong image cryptosystems motivates researchers to develop new techniques to apply traditional cryptographic primitives in order to exploit the intrinsic features of digital images. One of the most popular and mature technique is the use of complex dynamic phenomena, including chaotic orbits and quantum walks, to generate the required key stream. In this paper, under the assumption of plaintext attacks we investigate the security of a classic diffusion mechanism (and of its variants) used as the core cryptographic primitive in some image cryptosystems based on the aforementioned complex dynamic phenomena. We have theoretically found that regardless of the key schedule process, the data complexity for recovering each element of the equivalent secret key from these diffusion mechanisms is only {O} (1). The proposed analysis is validated by means of numerical examples. Some additional cryptographic applications of this paper are also discussed. |
doi_str_mv | 10.1109/TCYB.2017.2682561 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_proquest_journals_2013156083</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>7888457</ieee_id><sourcerecordid>1884167883</sourcerecordid><originalsourceid>FETCH-LOGICAL-c506t-f498df3bc2b5b2f2c66bcb3e313f1bda9b7a16d2174dc901f3741db48fe94b693</originalsourceid><addsrcrecordid>eNpdkEFPwjAUxxujEYJ8AGNimnjxAu61W9sddSKSYDiIB09L27UywjZstwPf3iLIwV760vf7v7z-ELqGaAwQpQ_L7PNpTCLgY8IESRicoT4BJkaE8OT8VDPeQ0Pv11E4Ijyl4hL1iKBMiJj20XRR43Zl8LvRnSvbHW4sljjbSO_35XNpbefLpsZvRq9kXfrKY9s4PKvkl8GTWrvdtg39K3Rh5cab4fEeoI-XyTJ7Hc0X01n2OB_pJGLtyMapKCxVmqhEEUs0Y0oraihQC6qQqeISWEGAx4VOI7CUx1CoWFiTxoqldIDuD3O3rvnujG_zqvTabDayNk3ncwjfAsaFoAG9-4eum87VYbs8aKOQsOiXggOlXeO9MzbfurKSbpdDlO9F53vR-wTPj6JD5vY4uVOVKU6JP60BuDkApTHm1A5biTjh9Af3d4AN</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2013156083</pqid></control><display><type>article</type><title>On the Security of a Class of Diffusion Mechanisms for Image Encryption</title><source>IEEE Electronic Library (IEL)</source><creator>Zhang, Leo Yu ; Liu, Yuansheng ; Pareschi, Fabio ; Zhang, Yushu ; Wong, Kwok-Wo ; Rovatti, Riccardo ; Setti, Gianluca</creator><creatorcontrib>Zhang, Leo Yu ; Liu, Yuansheng ; Pareschi, Fabio ; Zhang, Yushu ; Wong, Kwok-Wo ; Rovatti, Riccardo ; Setti, Gianluca</creatorcontrib><description>The need for fast and strong image cryptosystems motivates researchers to develop new techniques to apply traditional cryptographic primitives in order to exploit the intrinsic features of digital images. One of the most popular and mature technique is the use of complex dynamic phenomena, including chaotic orbits and quantum walks, to generate the required key stream. In this paper, under the assumption of plaintext attacks we investigate the security of a classic diffusion mechanism (and of its variants) used as the core cryptographic primitive in some image cryptosystems based on the aforementioned complex dynamic phenomena. We have theoretically found that regardless of the key schedule process, the data complexity for recovering each element of the equivalent secret key from these diffusion mechanisms is only <inline-formula> <tex-math notation="LaTeX">{O} </tex-math></inline-formula>(1). The proposed analysis is validated by means of numerical examples. Some additional cryptographic applications of this paper are also discussed.</description><identifier>ISSN: 2168-2267</identifier><identifier>EISSN: 2168-2275</identifier><identifier>DOI: 10.1109/TCYB.2017.2682561</identifier><identifier>PMID: 28368843</identifier><identifier>CODEN: ITCEB8</identifier><language>eng</language><publisher>United States: IEEE</publisher><subject>Ciphers ; Complexity ; Computer systems ; Cryptanalysis ; Cryptography ; diffusion ; Diffusion rate ; Digital imaging ; Encryption ; High-speed optical techniques ; image encryption ; Multimedia communication ; plaintext attack ; Security ; Streaming media</subject><ispartof>IEEE transactions on cybernetics, 2018-04, Vol.48 (4), p.1163-1175</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2018</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c506t-f498df3bc2b5b2f2c66bcb3e313f1bda9b7a16d2174dc901f3741db48fe94b693</citedby><cites>FETCH-LOGICAL-c506t-f498df3bc2b5b2f2c66bcb3e313f1bda9b7a16d2174dc901f3741db48fe94b693</cites><orcidid>0000-0001-9330-2662 ; 0000-0002-2496-1856</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/7888457$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,796,27924,27925,54758</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/7888457$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc><backlink>$$Uhttps://www.ncbi.nlm.nih.gov/pubmed/28368843$$D View this record in MEDLINE/PubMed$$Hfree_for_read</backlink></links><search><creatorcontrib>Zhang, Leo Yu</creatorcontrib><creatorcontrib>Liu, Yuansheng</creatorcontrib><creatorcontrib>Pareschi, Fabio</creatorcontrib><creatorcontrib>Zhang, Yushu</creatorcontrib><creatorcontrib>Wong, Kwok-Wo</creatorcontrib><creatorcontrib>Rovatti, Riccardo</creatorcontrib><creatorcontrib>Setti, Gianluca</creatorcontrib><title>On the Security of a Class of Diffusion Mechanisms for Image Encryption</title><title>IEEE transactions on cybernetics</title><addtitle>TCYB</addtitle><addtitle>IEEE Trans Cybern</addtitle><description>The need for fast and strong image cryptosystems motivates researchers to develop new techniques to apply traditional cryptographic primitives in order to exploit the intrinsic features of digital images. One of the most popular and mature technique is the use of complex dynamic phenomena, including chaotic orbits and quantum walks, to generate the required key stream. In this paper, under the assumption of plaintext attacks we investigate the security of a classic diffusion mechanism (and of its variants) used as the core cryptographic primitive in some image cryptosystems based on the aforementioned complex dynamic phenomena. We have theoretically found that regardless of the key schedule process, the data complexity for recovering each element of the equivalent secret key from these diffusion mechanisms is only <inline-formula> <tex-math notation="LaTeX">{O} </tex-math></inline-formula>(1). The proposed analysis is validated by means of numerical examples. Some additional cryptographic applications of this paper are also discussed.</description><subject>Ciphers</subject><subject>Complexity</subject><subject>Computer systems</subject><subject>Cryptanalysis</subject><subject>Cryptography</subject><subject>diffusion</subject><subject>Diffusion rate</subject><subject>Digital imaging</subject><subject>Encryption</subject><subject>High-speed optical techniques</subject><subject>image encryption</subject><subject>Multimedia communication</subject><subject>plaintext attack</subject><subject>Security</subject><subject>Streaming media</subject><issn>2168-2267</issn><issn>2168-2275</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2018</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpdkEFPwjAUxxujEYJ8AGNimnjxAu61W9sddSKSYDiIB09L27UywjZstwPf3iLIwV760vf7v7z-ELqGaAwQpQ_L7PNpTCLgY8IESRicoT4BJkaE8OT8VDPeQ0Pv11E4Ijyl4hL1iKBMiJj20XRR43Zl8LvRnSvbHW4sljjbSO_35XNpbefLpsZvRq9kXfrKY9s4PKvkl8GTWrvdtg39K3Rh5cab4fEeoI-XyTJ7Hc0X01n2OB_pJGLtyMapKCxVmqhEEUs0Y0oraihQC6qQqeISWEGAx4VOI7CUx1CoWFiTxoqldIDuD3O3rvnujG_zqvTabDayNk3ncwjfAsaFoAG9-4eum87VYbs8aKOQsOiXggOlXeO9MzbfurKSbpdDlO9F53vR-wTPj6JD5vY4uVOVKU6JP60BuDkApTHm1A5biTjh9Af3d4AN</recordid><startdate>20180401</startdate><enddate>20180401</enddate><creator>Zhang, Leo Yu</creator><creator>Liu, Yuansheng</creator><creator>Pareschi, Fabio</creator><creator>Zhang, Yushu</creator><creator>Wong, Kwok-Wo</creator><creator>Rovatti, Riccardo</creator><creator>Setti, Gianluca</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>NPM</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7TB</scope><scope>8FD</scope><scope>F28</scope><scope>FR3</scope><scope>H8D</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>7X8</scope><orcidid>https://orcid.org/0000-0001-9330-2662</orcidid><orcidid>https://orcid.org/0000-0002-2496-1856</orcidid></search><sort><creationdate>20180401</creationdate><title>On the Security of a Class of Diffusion Mechanisms for Image Encryption</title><author>Zhang, Leo Yu ; Liu, Yuansheng ; Pareschi, Fabio ; Zhang, Yushu ; Wong, Kwok-Wo ; Rovatti, Riccardo ; Setti, Gianluca</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c506t-f498df3bc2b5b2f2c66bcb3e313f1bda9b7a16d2174dc901f3741db48fe94b693</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2018</creationdate><topic>Ciphers</topic><topic>Complexity</topic><topic>Computer systems</topic><topic>Cryptanalysis</topic><topic>Cryptography</topic><topic>diffusion</topic><topic>Diffusion rate</topic><topic>Digital imaging</topic><topic>Encryption</topic><topic>High-speed optical techniques</topic><topic>image encryption</topic><topic>Multimedia communication</topic><topic>plaintext attack</topic><topic>Security</topic><topic>Streaming media</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Zhang, Leo Yu</creatorcontrib><creatorcontrib>Liu, Yuansheng</creatorcontrib><creatorcontrib>Pareschi, Fabio</creatorcontrib><creatorcontrib>Zhang, Yushu</creatorcontrib><creatorcontrib>Wong, Kwok-Wo</creatorcontrib><creatorcontrib>Rovatti, Riccardo</creatorcontrib><creatorcontrib>Setti, Gianluca</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>PubMed</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Mechanical & Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>ANTE: Abstracts in New Technology & Engineering</collection><collection>Engineering Research Database</collection><collection>Aerospace Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>MEDLINE - Academic</collection><jtitle>IEEE transactions on cybernetics</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Zhang, Leo Yu</au><au>Liu, Yuansheng</au><au>Pareschi, Fabio</au><au>Zhang, Yushu</au><au>Wong, Kwok-Wo</au><au>Rovatti, Riccardo</au><au>Setti, Gianluca</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>On the Security of a Class of Diffusion Mechanisms for Image Encryption</atitle><jtitle>IEEE transactions on cybernetics</jtitle><stitle>TCYB</stitle><addtitle>IEEE Trans Cybern</addtitle><date>2018-04-01</date><risdate>2018</risdate><volume>48</volume><issue>4</issue><spage>1163</spage><epage>1175</epage><pages>1163-1175</pages><issn>2168-2267</issn><eissn>2168-2275</eissn><coden>ITCEB8</coden><abstract>The need for fast and strong image cryptosystems motivates researchers to develop new techniques to apply traditional cryptographic primitives in order to exploit the intrinsic features of digital images. One of the most popular and mature technique is the use of complex dynamic phenomena, including chaotic orbits and quantum walks, to generate the required key stream. In this paper, under the assumption of plaintext attacks we investigate the security of a classic diffusion mechanism (and of its variants) used as the core cryptographic primitive in some image cryptosystems based on the aforementioned complex dynamic phenomena. We have theoretically found that regardless of the key schedule process, the data complexity for recovering each element of the equivalent secret key from these diffusion mechanisms is only <inline-formula> <tex-math notation="LaTeX">{O} </tex-math></inline-formula>(1). The proposed analysis is validated by means of numerical examples. Some additional cryptographic applications of this paper are also discussed.</abstract><cop>United States</cop><pub>IEEE</pub><pmid>28368843</pmid><doi>10.1109/TCYB.2017.2682561</doi><tpages>13</tpages><orcidid>https://orcid.org/0000-0001-9330-2662</orcidid><orcidid>https://orcid.org/0000-0002-2496-1856</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 2168-2267 |
ispartof | IEEE transactions on cybernetics, 2018-04, Vol.48 (4), p.1163-1175 |
issn | 2168-2267 2168-2275 |
language | eng |
recordid | cdi_proquest_journals_2013156083 |
source | IEEE Electronic Library (IEL) |
subjects | Ciphers Complexity Computer systems Cryptanalysis Cryptography diffusion Diffusion rate Digital imaging Encryption High-speed optical techniques image encryption Multimedia communication plaintext attack Security Streaming media |
title | On the Security of a Class of Diffusion Mechanisms for Image Encryption |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-27T02%3A42%3A50IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=On%20the%20Security%20of%20a%20Class%20of%20Diffusion%20Mechanisms%20for%20Image%20Encryption&rft.jtitle=IEEE%20transactions%20on%20cybernetics&rft.au=Zhang,%20Leo%20Yu&rft.date=2018-04-01&rft.volume=48&rft.issue=4&rft.spage=1163&rft.epage=1175&rft.pages=1163-1175&rft.issn=2168-2267&rft.eissn=2168-2275&rft.coden=ITCEB8&rft_id=info:doi/10.1109/TCYB.2017.2682561&rft_dat=%3Cproquest_RIE%3E1884167883%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2013156083&rft_id=info:pmid/28368843&rft_ieee_id=7888457&rfr_iscdi=true |