CLC number: TP391
On-line Access: 2024-08-27
Received: 2023-10-17
Revision Accepted: 2024-05-08
Crosschecked: 0000-00-00
Cited: 5
Clicked: 5031
ZHAO Xiao-yu, CHEN Gang, ZHANG Dan, WANG Xiao-hong, DONG Guang-chang. Decryption of pure-position permutation algorithms[J]. Journal of Zhejiang University Science A, 2004, 5(7): 803-809.
@article{title="Decryption of pure-position permutation algorithms",
author="ZHAO Xiao-yu, CHEN Gang, ZHANG Dan, WANG Xiao-hong, DONG Guang-chang",
journal="Journal of Zhejiang University Science A",
volume="5",
number="7",
pages="803-809",
year="2004",
publisher="Zhejiang University Press & Springer",
doi="10.1631/jzus.2004.0803"
}
%0 Journal Article
%T Decryption of pure-position permutation algorithms
%A ZHAO Xiao-yu
%A CHEN Gang
%A ZHANG Dan
%A WANG Xiao-hong
%A DONG Guang-chang
%J Journal of Zhejiang University SCIENCE A
%V 5
%N 7
%P 803-809
%@ 1869-1951
%D 2004
%I Zhejiang University Press & Springer
%DOI 10.1631/jzus.2004.0803
TY - JOUR
T1 - Decryption of pure-position permutation algorithms
A1 - ZHAO Xiao-yu
A1 - CHEN Gang
A1 - ZHANG Dan
A1 - WANG Xiao-hong
A1 - DONG Guang-chang
J0 - Journal of Zhejiang University Science A
VL - 5
IS - 7
SP - 803
EP - 809
%@ 1869-1951
Y1 - 2004
PB - Zhejiang University Press & Springer
ER -
DOI - 10.1631/jzus.2004.0803
Abstract: Pure position permutation image encryption algorithms, commonly used as image encryption investigated in this work are unfortunately frail under known-text attack. In view of the weakness of pure position permutation algorithm, we put forward an effective decryption algorithm for all pure-position permutation algorithms. First, a summary of the pure position permutation image encryption algorithms is given by introducing the concept of ergodic matrices. Then, by using probability theory and algebraic principles, the decryption probability of pure-position permutation algorithms is verified theoretically; and then, by defining the operation system of fuzzy ergodic matrices, we improve a specific decryption algorithm. Finally, some simulation results are shown.
[1] Bourbakis, N., Alexopoulos, C., 1992. Picture data encryption using SCAN patter.Pattern Recognit.,25(6):567-581.
[2] Ding, W., Qi, D.X., 1998. Digital image transformation and information hiding and disguising technology.Chinese Journal of Computer,21(9):838-843 (in Chinese).
[3] Kuo, C.J., Chen, M.S., 1991. A New Signal Encryption Technique and its Attack Study. Proceedings of IEEE International Conference on Security Technology, Taipei, Taiwan, l:149-153.
[4] Lin , T.Q., Klara, N., 1998. Camparison of MPEG encryption algorithms.Comput. & Graphics,22(4):437-448.
[5] Matlas, Y., Shamir, A., 1992. A video scrambling technique based on space filling curves.Proceedings of CPYPTO'87,76(5):550-559.
[6] Refregier, P., Javidi, B., 1995. Optical-image encryption based on input plane and forier plane random encoding.Optics Letters,20(7):767-769.
[7] Sridharan, S., Dawson, E., Goldburg, B., 1991. Fast Fourier transform based speech encryption system.IEE Proc. I, Commun. Speech Vis,138(3):215-223.
[8] Yang, H.G., Kim, E.S., 1996. Practical image encryption scheme by real-valued data.Opt. Eng.,35(9):2473-2478.
[9] Yen, J.C., Guo, J.I., 1999. A Chaotic Neural Network for Signal Encryption/Decryption and its VLSTI Architecture. Proceedings of the Tenth VLSI Design/CAD Symposium, Nantou, Taiwan, p.319-322.
[10] Zhao, X.Y., Chen, G., 2002. Ergodic matrix in image encryption.SPIE, p.4875-4878.
Open peer comments: Debate/Discuss/Question/Opinion
<1>
aqeel@Aqeel<aqeel\_rehman@hotmail>
2010-12-25 08:01:52
I have studied this paper as i am new to image processing security its very helpful to understand the basic alogorithm Permutation
musheer@Computer Engg Dept<musheer.cse@gmail.com>
2010-08-08 18:50:16
The paper is very useful as it is clear from the Abstract
musheer@Computer Engg Dept<musheer.cse@gmail.com>
2010-08-08 18:48:13
Looks very useful paper