On the Security of a Class of Diffusion Mechanisms for Image Encryption

The need for fast and strong image cryptosystems motivates researchers to develop new techniques to apply traditional cryptographic primitives in order to exploit the intrinsic features of digital images. One of the most popular and mature technique is the use of complex dynamic phenomena, including...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on cybernetics 2018-04, Vol.48 (4), p.1163-1175
Hauptverfasser: Zhang, Leo Yu, Liu, Yuansheng, Pareschi, Fabio, Zhang, Yushu, Wong, Kwok-Wo, Rovatti, Riccardo, Setti, Gianluca
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 1175
container_issue 4
container_start_page 1163
container_title IEEE transactions on cybernetics
container_volume 48
creator Zhang, Leo Yu
Liu, Yuansheng
Pareschi, Fabio
Zhang, Yushu
Wong, Kwok-Wo
Rovatti, Riccardo
Setti, Gianluca
description The need for fast and strong image cryptosystems motivates researchers to develop new techniques to apply traditional cryptographic primitives in order to exploit the intrinsic features of digital images. One of the most popular and mature technique is the use of complex dynamic phenomena, including chaotic orbits and quantum walks, to generate the required key stream. In this paper, under the assumption of plaintext attacks we investigate the security of a classic diffusion mechanism (and of its variants) used as the core cryptographic primitive in some image cryptosystems based on the aforementioned complex dynamic phenomena. We have theoretically found that regardless of the key schedule process, the data complexity for recovering each element of the equivalent secret key from these diffusion mechanisms is only {O} (1). The proposed analysis is validated by means of numerical examples. Some additional cryptographic applications of this paper are also discussed.
doi_str_mv 10.1109/TCYB.2017.2682561
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_proquest_journals_2013156083</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>7888457</ieee_id><sourcerecordid>1884167883</sourcerecordid><originalsourceid>FETCH-LOGICAL-c506t-f498df3bc2b5b2f2c66bcb3e313f1bda9b7a16d2174dc901f3741db48fe94b693</originalsourceid><addsrcrecordid>eNpdkEFPwjAUxxujEYJ8AGNimnjxAu61W9sddSKSYDiIB09L27UywjZstwPf3iLIwV760vf7v7z-ELqGaAwQpQ_L7PNpTCLgY8IESRicoT4BJkaE8OT8VDPeQ0Pv11E4Ijyl4hL1iKBMiJj20XRR43Zl8LvRnSvbHW4sljjbSO_35XNpbefLpsZvRq9kXfrKY9s4PKvkl8GTWrvdtg39K3Rh5cab4fEeoI-XyTJ7Hc0X01n2OB_pJGLtyMapKCxVmqhEEUs0Y0oraihQC6qQqeISWEGAx4VOI7CUx1CoWFiTxoqldIDuD3O3rvnujG_zqvTabDayNk3ncwjfAsaFoAG9-4eum87VYbs8aKOQsOiXggOlXeO9MzbfurKSbpdDlO9F53vR-wTPj6JD5vY4uVOVKU6JP60BuDkApTHm1A5biTjh9Af3d4AN</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2013156083</pqid></control><display><type>article</type><title>On the Security of a Class of Diffusion Mechanisms for Image Encryption</title><source>IEEE Electronic Library (IEL)</source><creator>Zhang, Leo Yu ; Liu, Yuansheng ; Pareschi, Fabio ; Zhang, Yushu ; Wong, Kwok-Wo ; Rovatti, Riccardo ; Setti, Gianluca</creator><creatorcontrib>Zhang, Leo Yu ; Liu, Yuansheng ; Pareschi, Fabio ; Zhang, Yushu ; Wong, Kwok-Wo ; Rovatti, Riccardo ; Setti, Gianluca</creatorcontrib><description>The need for fast and strong image cryptosystems motivates researchers to develop new techniques to apply traditional cryptographic primitives in order to exploit the intrinsic features of digital images. One of the most popular and mature technique is the use of complex dynamic phenomena, including chaotic orbits and quantum walks, to generate the required key stream. In this paper, under the assumption of plaintext attacks we investigate the security of a classic diffusion mechanism (and of its variants) used as the core cryptographic primitive in some image cryptosystems based on the aforementioned complex dynamic phenomena. We have theoretically found that regardless of the key schedule process, the data complexity for recovering each element of the equivalent secret key from these diffusion mechanisms is only &lt;inline-formula&gt; &lt;tex-math notation="LaTeX"&gt;{O} &lt;/tex-math&gt;&lt;/inline-formula&gt;(1). The proposed analysis is validated by means of numerical examples. Some additional cryptographic applications of this paper are also discussed.</description><identifier>ISSN: 2168-2267</identifier><identifier>EISSN: 2168-2275</identifier><identifier>DOI: 10.1109/TCYB.2017.2682561</identifier><identifier>PMID: 28368843</identifier><identifier>CODEN: ITCEB8</identifier><language>eng</language><publisher>United States: IEEE</publisher><subject>Ciphers ; Complexity ; Computer systems ; Cryptanalysis ; Cryptography ; diffusion ; Diffusion rate ; Digital imaging ; Encryption ; High-speed optical techniques ; image encryption ; Multimedia communication ; plaintext attack ; Security ; Streaming media</subject><ispartof>IEEE transactions on cybernetics, 2018-04, Vol.48 (4), p.1163-1175</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2018</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c506t-f498df3bc2b5b2f2c66bcb3e313f1bda9b7a16d2174dc901f3741db48fe94b693</citedby><cites>FETCH-LOGICAL-c506t-f498df3bc2b5b2f2c66bcb3e313f1bda9b7a16d2174dc901f3741db48fe94b693</cites><orcidid>0000-0001-9330-2662 ; 0000-0002-2496-1856</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/7888457$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,796,27924,27925,54758</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/7888457$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc><backlink>$$Uhttps://www.ncbi.nlm.nih.gov/pubmed/28368843$$D View this record in MEDLINE/PubMed$$Hfree_for_read</backlink></links><search><creatorcontrib>Zhang, Leo Yu</creatorcontrib><creatorcontrib>Liu, Yuansheng</creatorcontrib><creatorcontrib>Pareschi, Fabio</creatorcontrib><creatorcontrib>Zhang, Yushu</creatorcontrib><creatorcontrib>Wong, Kwok-Wo</creatorcontrib><creatorcontrib>Rovatti, Riccardo</creatorcontrib><creatorcontrib>Setti, Gianluca</creatorcontrib><title>On the Security of a Class of Diffusion Mechanisms for Image Encryption</title><title>IEEE transactions on cybernetics</title><addtitle>TCYB</addtitle><addtitle>IEEE Trans Cybern</addtitle><description>The need for fast and strong image cryptosystems motivates researchers to develop new techniques to apply traditional cryptographic primitives in order to exploit the intrinsic features of digital images. One of the most popular and mature technique is the use of complex dynamic phenomena, including chaotic orbits and quantum walks, to generate the required key stream. In this paper, under the assumption of plaintext attacks we investigate the security of a classic diffusion mechanism (and of its variants) used as the core cryptographic primitive in some image cryptosystems based on the aforementioned complex dynamic phenomena. We have theoretically found that regardless of the key schedule process, the data complexity for recovering each element of the equivalent secret key from these diffusion mechanisms is only &lt;inline-formula&gt; &lt;tex-math notation="LaTeX"&gt;{O} &lt;/tex-math&gt;&lt;/inline-formula&gt;(1). The proposed analysis is validated by means of numerical examples. Some additional cryptographic applications of this paper are also discussed.</description><subject>Ciphers</subject><subject>Complexity</subject><subject>Computer systems</subject><subject>Cryptanalysis</subject><subject>Cryptography</subject><subject>diffusion</subject><subject>Diffusion rate</subject><subject>Digital imaging</subject><subject>Encryption</subject><subject>High-speed optical techniques</subject><subject>image encryption</subject><subject>Multimedia communication</subject><subject>plaintext attack</subject><subject>Security</subject><subject>Streaming media</subject><issn>2168-2267</issn><issn>2168-2275</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2018</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpdkEFPwjAUxxujEYJ8AGNimnjxAu61W9sddSKSYDiIB09L27UywjZstwPf3iLIwV760vf7v7z-ELqGaAwQpQ_L7PNpTCLgY8IESRicoT4BJkaE8OT8VDPeQ0Pv11E4Ijyl4hL1iKBMiJj20XRR43Zl8LvRnSvbHW4sljjbSO_35XNpbefLpsZvRq9kXfrKY9s4PKvkl8GTWrvdtg39K3Rh5cab4fEeoI-XyTJ7Hc0X01n2OB_pJGLtyMapKCxVmqhEEUs0Y0oraihQC6qQqeISWEGAx4VOI7CUx1CoWFiTxoqldIDuD3O3rvnujG_zqvTabDayNk3ncwjfAsaFoAG9-4eum87VYbs8aKOQsOiXggOlXeO9MzbfurKSbpdDlO9F53vR-wTPj6JD5vY4uVOVKU6JP60BuDkApTHm1A5biTjh9Af3d4AN</recordid><startdate>20180401</startdate><enddate>20180401</enddate><creator>Zhang, Leo Yu</creator><creator>Liu, Yuansheng</creator><creator>Pareschi, Fabio</creator><creator>Zhang, Yushu</creator><creator>Wong, Kwok-Wo</creator><creator>Rovatti, Riccardo</creator><creator>Setti, Gianluca</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>NPM</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7TB</scope><scope>8FD</scope><scope>F28</scope><scope>FR3</scope><scope>H8D</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>7X8</scope><orcidid>https://orcid.org/0000-0001-9330-2662</orcidid><orcidid>https://orcid.org/0000-0002-2496-1856</orcidid></search><sort><creationdate>20180401</creationdate><title>On the Security of a Class of Diffusion Mechanisms for Image Encryption</title><author>Zhang, Leo Yu ; Liu, Yuansheng ; Pareschi, Fabio ; Zhang, Yushu ; Wong, Kwok-Wo ; Rovatti, Riccardo ; Setti, Gianluca</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c506t-f498df3bc2b5b2f2c66bcb3e313f1bda9b7a16d2174dc901f3741db48fe94b693</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2018</creationdate><topic>Ciphers</topic><topic>Complexity</topic><topic>Computer systems</topic><topic>Cryptanalysis</topic><topic>Cryptography</topic><topic>diffusion</topic><topic>Diffusion rate</topic><topic>Digital imaging</topic><topic>Encryption</topic><topic>High-speed optical techniques</topic><topic>image encryption</topic><topic>Multimedia communication</topic><topic>plaintext attack</topic><topic>Security</topic><topic>Streaming media</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Zhang, Leo Yu</creatorcontrib><creatorcontrib>Liu, Yuansheng</creatorcontrib><creatorcontrib>Pareschi, Fabio</creatorcontrib><creatorcontrib>Zhang, Yushu</creatorcontrib><creatorcontrib>Wong, Kwok-Wo</creatorcontrib><creatorcontrib>Rovatti, Riccardo</creatorcontrib><creatorcontrib>Setti, Gianluca</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>PubMed</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Mechanical &amp; Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>ANTE: Abstracts in New Technology &amp; Engineering</collection><collection>Engineering Research Database</collection><collection>Aerospace Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>MEDLINE - Academic</collection><jtitle>IEEE transactions on cybernetics</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Zhang, Leo Yu</au><au>Liu, Yuansheng</au><au>Pareschi, Fabio</au><au>Zhang, Yushu</au><au>Wong, Kwok-Wo</au><au>Rovatti, Riccardo</au><au>Setti, Gianluca</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>On the Security of a Class of Diffusion Mechanisms for Image Encryption</atitle><jtitle>IEEE transactions on cybernetics</jtitle><stitle>TCYB</stitle><addtitle>IEEE Trans Cybern</addtitle><date>2018-04-01</date><risdate>2018</risdate><volume>48</volume><issue>4</issue><spage>1163</spage><epage>1175</epage><pages>1163-1175</pages><issn>2168-2267</issn><eissn>2168-2275</eissn><coden>ITCEB8</coden><abstract>The need for fast and strong image cryptosystems motivates researchers to develop new techniques to apply traditional cryptographic primitives in order to exploit the intrinsic features of digital images. One of the most popular and mature technique is the use of complex dynamic phenomena, including chaotic orbits and quantum walks, to generate the required key stream. In this paper, under the assumption of plaintext attacks we investigate the security of a classic diffusion mechanism (and of its variants) used as the core cryptographic primitive in some image cryptosystems based on the aforementioned complex dynamic phenomena. We have theoretically found that regardless of the key schedule process, the data complexity for recovering each element of the equivalent secret key from these diffusion mechanisms is only &lt;inline-formula&gt; &lt;tex-math notation="LaTeX"&gt;{O} &lt;/tex-math&gt;&lt;/inline-formula&gt;(1). The proposed analysis is validated by means of numerical examples. Some additional cryptographic applications of this paper are also discussed.</abstract><cop>United States</cop><pub>IEEE</pub><pmid>28368843</pmid><doi>10.1109/TCYB.2017.2682561</doi><tpages>13</tpages><orcidid>https://orcid.org/0000-0001-9330-2662</orcidid><orcidid>https://orcid.org/0000-0002-2496-1856</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 2168-2267
ispartof IEEE transactions on cybernetics, 2018-04, Vol.48 (4), p.1163-1175
issn 2168-2267
2168-2275
language eng
recordid cdi_proquest_journals_2013156083
source IEEE Electronic Library (IEL)
subjects Ciphers
Complexity
Computer systems
Cryptanalysis
Cryptography
diffusion
Diffusion rate
Digital imaging
Encryption
High-speed optical techniques
image encryption
Multimedia communication
plaintext attack
Security
Streaming media
title On the Security of a Class of Diffusion Mechanisms for Image Encryption
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-27T02%3A42%3A50IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=On%20the%20Security%20of%20a%20Class%20of%20Diffusion%20Mechanisms%20for%20Image%20Encryption&rft.jtitle=IEEE%20transactions%20on%20cybernetics&rft.au=Zhang,%20Leo%20Yu&rft.date=2018-04-01&rft.volume=48&rft.issue=4&rft.spage=1163&rft.epage=1175&rft.pages=1163-1175&rft.issn=2168-2267&rft.eissn=2168-2275&rft.coden=ITCEB8&rft_id=info:doi/10.1109/TCYB.2017.2682561&rft_dat=%3Cproquest_RIE%3E1884167883%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2013156083&rft_id=info:pmid/28368843&rft_ieee_id=7888457&rfr_iscdi=true