3 research outputs found

    Security Analysis of Bit plane Level Image Encryption Schemes

    Get PDF
    A selective bit-plane encryption scheme was proposed for securing the transmission of image data in mobile environments with a claim that it provides a high security viz. the encryption of the four most significant bit-planes is sufficient for a high image data security. This paper presents the security analysis of the said encryption scheme and reports new important results. We perform the security analysis of the bit-level encryption by considering the normal images and their histogram equalised enhanced images. We consider different bit-plane aspects to analyse the security of the image encryption, and show that the encryption of the four most significant bit-planes is not adequate. The contents of the images can be obtained even when all the bit-planes except one least significant bit-plane are encrypted in the histogram equalised images as shown in the results. The bit-plane level security analysis seems very useful for the analysis of the bit-plane level image encryption schemes

    A Novel Traffic Based Framework for Smartphone Security Analysis

    Get PDF
    Android Operating system (OS) has grown into the most predominant smartphone platform due to its flexibility and open source characteristics. Because of its openness, it has become prone to numerous attackers and malware designers who are constantly trying to elicit confidential information by articulating a plethora of attacks through these designed malwares. Detection of these malwares to protect the smartphone is the core function of the smartphone security analysis. This paper proposes a novel traffic-based framework that exploits the network traffic features to detect these malwares. Here, a unified feature (UF) is created by graph-based cross-diffusion of generated order and sparse matrices corresponding to the network traffic features. Generated unified feature is then given to three classifiers to get corresponding classifier scores. The robustness of the suggested framework when evaluated on the standard datasets outperforms contemporary techniques to achieve an average accuracy of 98.74 per cent

    Cryptanalysis of an Image Cipher using Multi entropy Measures and the Countermeasures

    Get PDF
    The use of same keys or equivalent keys should not be occurred in cryptographic communications because a cipher system utilising such keys to secure messages can be attacked even it possesses excellent cryptographic characteristics for extracting intelligible information from encrypted messages. Identification of crypts formed with such keys is an important task of traffic analysis of cryptographic communications to check the applicability of two-messages-on-same-key (TMSK) attack. To avoid its applicability, adequate safeguards are required. In the paper, we cryptanalyze stream encryption based cipher system and propose an intelligent identification methodology using multi-entropy measures and soft decision criteria for identification of encrypted images of same or equivalent keys. Experimental test results show that the crypts formed with same keys can be identified successfully with high precision. We also present the countermeasures against TMSK attack
    corecore