Abstract
Cryptographically, an encryption algorithm should be strong enough so that one could not extract any information from encrypted data. A graphical encryption method proposed in [1] for the security of computer data is cryptanalysed in this paper. There are some regions left unchanged and clearly visible in graphically encrypted images. Key independent decryption of graphically encrypted images is proposed for recovery of intelligible information. Decryption scheme is based on neighbourhood similarity characteristics of adjacent pixels. Simulation results show that the decrypted images obtained by the proposed scheme are quite intelligible to understand. The graphical encryption method in present form is not suitable for security applications as encrypted images can be decrypted easily.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
References
Schwartz, C.: A new graphical method for encryption of computer data. Journal of Cryptologia 15(1), 43–46 (1991)
Bourbakis, N.G., Alexopoulos, C.: Picture data encryption using scan patterns. Pattern Recognition 25(6), 567–581 (1882)
Maitra, A., Rao, Y.V.S., Prasanna, S.R.M.: A new image encryption approach using combinational permutation techniques. International Journal of Computer Science 19(2), 127–131 (2006)
Maniccam, S.S., Bourbakis, N.G.: Image and video encryption using scan patterns. Pattern Recognition 37(4), 725–737 (2004)
Yen, J.-C., Guo, J.-I.: A new image encryption algorithm and its VLSI architecture. In: Proceedings of IEEE Workshop Signal Processing Systems, pp. 430–437 (1999)
Chin, Y.-C., Wang, P.-C., Hwang, J.-J.: Cryptanalysis on Schwartz graphical encryption method. Journal of Cryptologia 17(3), 301–304 (1993)
Ratan, R., Saxena, P.K.: An algorithm for the restoration of distorted text documents. In: Proceedings of Intl. Conference on Computational Linguistics, Speech and Document Processing (ICCLSDP’98), pp. A38–A43 (1998)
Jain, A.K.: Fundamentals of digital image processing. Prentice Hall, Englewood Cliffs (1995)
Russ, J.C.: The image processing handbook. CRC Press, Boca Raton (1995)
Young, T.Y., Fu, K.S.: Handbook of pattern recognition and image processing. Academic Press, London (1986)
Ratan, R., Saxena, P.K.: Image processing based techniques for securing text documents. Journal of Discrete Mathematical Sciences and Cryptography 3(1-3), 113–129 (2000)
Fu, C., Zhu, Z.: A chaotic encryption scheme based on circular bit shift method. In: Proceedings of Intl. Conference for Young Computer Scientists, pp. 3057–3061. IEEE Computer Society, Los Alamitos (2008)
Menezes, A.P., Van Oorschot, Vanstone, S.: Handbook of applied cryptography. CRC Press, Boca Raton (1996)
Schneier, B.: Applied cryptography. John Wiley & Sons Inc., Chichester (1996)
Yen, J.C., Guo, J.I.: A new chaotic key based design for image encryption and decryption. In: Proceedings of IEEE International Symposium Circuits ans Systems, vol. 4, pp. 49–52 (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ratan, R. (2010). Key Independent Decryption of Graphically Encrypted Images. In: Chen, H., Chau, M., Li, Sh., Urs, S., Srinivasa, S., Wang, G.A. (eds) Intelligence and Security Informatics. PAISI 2010. Lecture Notes in Computer Science, vol 6122. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13601-6_11
Download citation
DOI: https://doi.org/10.1007/978-3-642-13601-6_11
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-13600-9
Online ISBN: 978-3-642-13601-6
eBook Packages: Computer ScienceComputer Science (R0)