Cryptanalysis of image encryption based on permutation-substitution using chaotic map and Latin square image cipher

19Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Recently Panduranga et al. suggested an image encryption algorithm based on permutation-substitution architecture using chaotic map and Latin square. According to the proposal, the pixels of plain-image are firstly scrambled according to permutation vector, extracted from chaotic sequence, in permutation phase. In substitution phase, the permuted image is substituted by XOR operation with key image generated from a keyed Latin square. The algorithm has the ability to adapt and encrypt any plain-image with unequal width and height. Moreover, it also exhibits the features of high entropy, low pixels correlation, large key space, high key sensitivity, etc. However, a careful analysis of Panduranga et al. algorithm unveils few security flaws which make it susceptible to cryptographic attack. In this paper, we analyze its security and proposed a chosen plaintext-attack to break the algorithm completely. It is shown that the plain-image can be successfully recovered without knowing the secret key. The simulation of proposed attack demonstrates that Panduranga et al. algorithm is not at all secure for practical encryption of sensitive digital images.

Cite

CITATION STYLE

APA

Ahmad, M., & Ahmad, F. (2014). Cryptanalysis of image encryption based on permutation-substitution using chaotic map and Latin square image cipher. In Advances in Intelligent Systems and Computing (Vol. 327, pp. 481–488). Springer Verlag. https://doi.org/10.1007/978-3-319-11933-5_53

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free