Full Text:   <1282>

CLC number: TP391

On-line Access: 

Received: 2004-02-12

Revision Accepted: 2004-03-24

Crosschecked: 0000-00-00

Cited: 5

Clicked: 2992

Citations:  Bibtex RefMan EndNote GB/T7714

-   Go to

Article info.
1. Reference List
Open peer comments

Journal of Zhejiang University SCIENCE A 2004 Vol.5 No.7 P.803~809

http://doi.org/10.1631/jzus.2004.0803


Decryption of pure-position permutation algorithms


Author(s):  ZHAO Xiao-yu, CHEN Gang, ZHANG Dan, WANG Xiao-hong, DONG Guang-chang

Affiliation(s):  Institute of DSP and Software Techniques, Ningbo University, Ningbo 315211, China; more

Corresponding email(s):   zhxiaoyu@math.zju.edu.cn

Key Words:  Decryption, Image encryption, Fuzzy, Position permutation


Share this article to: More

ZHAO Xiao-yu, CHEN Gang, ZHANG Dan, WANG Xiao-hong, DONG Guang-chang. Decryption of pure-position permutation algorithms[J]. Journal of Zhejiang University Science A, 2004, 5(7): 803~809.

@article{title="Decryption of pure-position permutation algorithms",
author="ZHAO Xiao-yu, CHEN Gang, ZHANG Dan, WANG Xiao-hong, DONG Guang-chang",
journal="Journal of Zhejiang University Science A",
volume="5",
number="7",
pages="803~809",
year="2004",
publisher="Zhejiang University Press & Springer",
doi="10.1631/jzus.2004.0803"
}

%0 Journal Article
%T Decryption of pure-position permutation algorithms
%A ZHAO Xiao-yu
%A CHEN Gang
%A ZHANG Dan
%A WANG Xiao-hong
%A DONG Guang-chang
%J Journal of Zhejiang University SCIENCE A
%V 5
%N 7
%P 803~809
%@ 1869-1951
%D 2004
%I Zhejiang University Press & Springer
%DOI 10.1631/jzus.2004.0803

TY - JOUR
T1 - Decryption of pure-position permutation algorithms
A1 - ZHAO Xiao-yu
A1 - CHEN Gang
A1 - ZHANG Dan
A1 - WANG Xiao-hong
A1 - DONG Guang-chang
J0 - Journal of Zhejiang University Science A
VL - 5
IS - 7
SP - 803
EP - 809
%@ 1869-1951
Y1 - 2004
PB - Zhejiang University Press & Springer
ER -
DOI - 10.1631/jzus.2004.0803


Abstract: 
Pure position permutation image encryption algorithms, commonly used as image encryption investigated in this work are unfortunately frail under known-text attack. In view of the weakness of pure position permutation algorithm, we put forward an effective decryption algorithm for all pure-position permutation algorithms. First, a summary of the pure position permutation image encryption algorithms is given by introducing the concept of ergodic matrices. Then, by using probability theory and algebraic principles, the decryption probability of pure-position permutation algorithms is verified theoretically; and then, by defining the operation system of fuzzy ergodic matrices, we improve a specific decryption algorithm. Finally, some simulation results are shown.

Darkslateblue:Affiliate; Royal Blue:Author; Turquoise:Article

Reference

[1] Bourbakis, N., Alexopoulos, C., 1992. Picture data encryption using SCAN patter.Pattern Recognit.,25(6):567-581.

[2] Ding, W., Qi, D.X., 1998. Digital image transformation and information hiding and disguising technology.Chinese Journal of Computer,21(9):838-843 (in Chinese).

[3] Kuo, C.J., Chen, M.S., 1991. A New Signal Encryption Technique and its Attack Study. Proceedings of IEEE International Conference on Security Technology, Taipei, Taiwan, l:149-153.

[4] Lin , T.Q., Klara, N., 1998. Camparison of MPEG encryption algorithms.Comput. & Graphics,22(4):437-448.

[5] Matlas, Y., Shamir, A., 1992. A video scrambling technique based on space filling curves.Proceedings of CPYPTO'87,76(5):550-559.

[6] Refregier, P., Javidi, B., 1995. Optical-image encryption based on input plane and forier plane random encoding.Optics Letters,20(7):767-769.

[7] Sridharan, S., Dawson, E., Goldburg, B., 1991. Fast Fourier transform based speech encryption system.IEE Proc. I, Commun. Speech Vis,138(3):215-223.

[8] Yang, H.G., Kim, E.S., 1996. Practical image encryption scheme by real-valued data.Opt. Eng.,35(9):2473-2478.

[9] Yen, J.C., Guo, J.I., 1999. A Chaotic Neural Network for Signal Encryption/Decryption and its VLSTI Architecture. Proceedings of the Tenth VLSI Design/CAD Symposium, Nantou, Taiwan, p.319-322.

[10] Zhao, X.Y., Chen, G., 2002. Ergodic matrix in image encryption.SPIE, p.4875-4878.

Open peer comments: Debate/Discuss/Question/Opinion

<1>

aqeel@Aqeel<aqeel\_rehman@hotmail>

2010-12-25 08:01:52

I have studied this paper as i am new to image processing security its very helpful to understand the basic alogorithm Permutation

musheer@Computer Engg Dept<musheer.cse@gmail.com>

2010-08-08 18:50:16

The paper is very useful as it is clear from the Abstract

musheer@Computer Engg Dept<musheer.cse@gmail.com>

2010-08-08 18:48:13

Looks very useful paper

Please provide your name, email address and a comment





Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - Journal of Zhejiang University-SCIENCE