713 research outputs found
Joint Quantization and Diffusion for Compressed Sensing Measurements of Natural Images
Recent research advances have revealed the computational secrecy of the
compressed sensing (CS) paradigm. Perfect secrecy can also be achieved by
normalizing the CS measurement vector. However, these findings are established
on real measurements while digital devices can only store measurements at a
finite precision. Based on the distribution of measurements of natural images
sensed by structurally random ensemble, a joint quantization and diffusion
approach is proposed for these real-valued measurements. In this way, a
nonlinear cryptographic diffusion is intrinsically imposed on the CS process
and the overall security level is thus enhanced. Security analyses show that
the proposed scheme is able to resist known-plaintext attack while the original
CS scheme without quantization cannot. Experimental results demonstrate that
the reconstruction quality of our scheme is comparable to that of the original
one.Comment: 4 pages, 4 figure
Chosen-plaintext attack of an image encryption scheme based on modified permutation-diffusion structure
Since the first appearance in Fridrich's design, the usage of
permutation-diffusion structure for designing digital image cryptosystem has
been receiving increasing research attention in the field of chaos-based
cryptography. Recently, a novel chaotic Image Cipher using one round Modified
Permutation-Diffusion pattern (ICMPD) was proposed. Unlike traditional
permutation-diffusion structure, the permutation is operated on bit level
instead of pixel level and the diffusion is operated on masked pixels, which
are obtained by carrying out the classical affine cipher, instead of plain
pixels in ICMPD. Following a \textit{divide-and-conquer strategy}, this paper
reports that ICMPD can be compromised by a chosen-plaintext attack efficiently
and the involved data complexity is linear to the size of the plain-image.
Moreover, the relationship between the cryptographic kernel at the diffusion
stage of ICMPD and modulo addition then XORing is explored thoroughly
Breaking a novel colour image encryption algorithm based on chaos
Recently, a colour image encryption algorithm based on chaos was proposed by
cascading two position permutation operations and one substitution operation,
which are all determined by some pseudo-random number sequences generated by
iterating the Logistic map. This paper evaluates the security level of the
encryption algorithm and finds that the position permutation-only part and the
substitution part can be separately broken with only and 2 chosen plain-images, respectively, where is the size of the
plain-image. Concise theoretical analyses are provided to support the
chosen-plaintext attack, which are verified by experimental results also.Comment: 5 pages, 1 figur
- …