Cryptanalysis of image encryption algorithm based on pixel shuffling and chaotic S-box transformation

12Citations
Citations of this article
11Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Recently Hussain et al. proposed an image encryption algorithm which has three independent phases: (1) total pixel shuffling performed, in spatial domain, with permutation sequences extracted from chaotic skew tent map, (2) diffusion carried out using random codes generated from same chaotic map, and (3) extra confusion induced with substitution-box transformation. Though, the encryption algorithm achieves optimal scores of NPCR/UACI and exhibits great encryption strength. But, a careful analysis unveils its inherent security flaws, leaving it vulnerable to cryptographic attack. In this paper, we analyze its security weaknesses and proposed a chosen plaintext-attack with inverse S-box to break the algorithm completely. It is shown that the plainimage can be recovered successfully without knowing the secret key. The computer simulation of attack highlights the ineptness of Hussain et al. algorithm and shows that it is not commendable to deploy it for practical encryption of digital images.

Cite

CITATION STYLE

APA

Sharma, P. K., Ahmad, M., & Khan, P. M. (2014). Cryptanalysis of image encryption algorithm based on pixel shuffling and chaotic S-box transformation. In Communications in Computer and Information Science (Vol. 467, pp. 173–181). Springer Verlag. https://doi.org/10.1007/978-3-662-44966-0_16

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free