Abstract
A chaotic image encryption algorithm based on circular shift functions proposed for high security is analysed in this paper for retrieving encrypted images. Proposed retrieval scheme is key independent and based on divide and conquer attack where neighbourhood similarity characteristic of images is applied. The simulation results show that retrieved images have very good visual perception quality and are as similar as original images. The analysis indicates that above algorithm in present form is insecure and encrypted images can be retrieved efficiently.
Chapter PDF
Similar content being viewed by others
Keywords
References
Yen, J.-C., Guo, J.-I.: A new chaotic image encryption algorithm and its VLSI architecture. In: Proc. IEEE Workshop Signal Processing Systems, pp. 430–437 (1999)
Yen, J.-C., Guo, J.-I.: A new chaotic image encryption algorithm. Department of Electronics Engineering National Lien-Ho College of Technology and Commerce, Miaoli, Taiwan, Republic of China, E-mail: jcyen@mail.lctc.edu.tw
Yen, J.-C., Guo, J.-I.: Design of a new signal security system. In: Proc. IEEE Intl. Symposium on Circuits and Systems (ISCAS 2002), vol. 4, pp. 121–124 (2002)
Furht, B., Kirovski, D.: Multimedia Security Handbook. CRC Press, Boca Raton (2004)
Guo, J.-I., Yen, J.-C.: A new mirror-like image encryption algorithm and its VLSI architecture. In: Proc. 10th VLSI Design/CAD Symposium, Taiwan, pp. 319–322 (1999)
Maniccam, S.S., Bourbakis, N.G.: Lossless image compression and encryption using SCAN. Pattern Recognition 34, 1229–1245 (2001)
Maniccam, S.S., Bourbakis, N.G.: Image and video encryption using SCAN patterns. Pattern Recognition 37, 725–737 (2004)
Ozturk, I., Sogukpinar, I.: Analysis and comparision of image encryption algorithms. Proc. of World Academy of Science, Engineering and Technology 3 (2005)
Chang, C.-C., Hwang, M.-S., Chen, T.-S.: A new encription algorithm for image cryptosystems. Journal of Systems and Software 58, 83–91 (2001)
Li, S., Zheng, X.: On the security of an image encryption method. In: Proc. IEEE Intl. Conf. on Image Processing (ICIP 2002), vol. 2, pp. 925–928 (2002)
Li, C., Li, S., Chen, G., Chen, G., Hu, L.: Cryptanalysis of new signal security system for multimedia data transmission. EURASIP Journal on Applied Signal Processing 8, 1277–1288 (2005)
Li, C.: Cryptanalysis of some multimedia encryption schemes. M.S. Thesis (2005)
Menezes, A., Van Oorschot, P., Vanstone, S.: Handbook of applied cryptography. CRC Press, Boca Raton (1996)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ratan, R. (2009). Key Independent Retrieval of Chaotic Encrypted Images. In: Chaudhury, S., Mitra, S., Murthy, C.A., Sastry, P.S., Pal, S.K. (eds) Pattern Recognition and Machine Intelligence. PReMI 2009. Lecture Notes in Computer Science, vol 5909. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-11164-8_78
Download citation
DOI: https://doi.org/10.1007/978-3-642-11164-8_78
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-11163-1
Online ISBN: 978-3-642-11164-8
eBook Packages: Computer ScienceComputer Science (R0)