Advertisement

Identifying traffic of same keys in cryptographic communications using fuzzy decision criteria and bit-plane measures

  • Arvind
  • Ram RatanEmail author
Original Article
  • 7 Downloads

Abstract

The use of same keys for different messages is not safe in cryptography to secure cryptographic communications even if encryption algorithm is strong enough and possesses good cryptographic properties. Such communications can be analyzed to find meaningful information by cryptanalysts or adversaries. Use of same keys may happens if keys are not managed in cipher systems appropriately by customers. One should evaluate ciphers thoroughly and assure for non-repetition of keys prior to its usage for secure communications. The paper presents a methodology to identify and segregate traffic of cryptographic communications of images encrypted with same keys by exploiting bit-plane image characteristics and applying Fuzzy decision criteria. Results presented in the paper shows that the proposed Fuzzy classification method is able to identify images encrypted with same keys successfully and it seems very useful to consider for various pattern recognition and image analysis problems.

Keywords

Bit-plane measures Classification Cryptography Fuzzy criteria Pattern recognition Secure communication Soft computing Traffic analysis 

Notes

References

  1. Asthana R, Sharma A, Ratan R, Verma N (2015) Classification of error-correcting coded data using multidimensional feature vectors. Adv Intell Syst Comput 336:303–312Google Scholar
  2. Bezdek JC, Keller J, Krisnapuram R, Pal NR (2005) Fuzzy models and algorithms for pattern recognition and image processing, Rev edn. Springer, New YorkzbMATHGoogle Scholar
  3. Bouyer P et al (2011) Quantitative analysis of real-time systems. J Commn ACM 54(9):78–87CrossRefGoogle Scholar
  4. Cusick TW, Stanica P (2009) Cryptographic Boolean functions and applications. Academic Press, Cambridge,zbMATHGoogle Scholar
  5. Din M, Ratan R, Bhateja AK, Bhateja A (2012) Multimedia classification using ANN approach. Adv Intell Syst Comput 236:905–910Google Scholar
  6. Doane DP, Seward LE (2011) Measuring Skewness: a forgotten statistics. J Stat Educ 19(2):1–18CrossRefGoogle Scholar
  7. George AG, Prabavathy AK (2013) A survey on different approaches used in image quality assessment. Int J Emerg Technol Adv Eng 3(2):197–203Google Scholar
  8. Haddon JF, Boyce JF (1993) Co-occurrence matrices for image analysis. IEEE Electron Commun Eng J 5(2):71–83CrossRefGoogle Scholar
  9. Huber P, Ronchetti E (2009) Robust statistics. Wiley, HobokenCrossRefzbMATHGoogle Scholar
  10. Jain AK (1995) Fundamentals of digital image processing. Prentice Hall, Englewood CliffszbMATHGoogle Scholar
  11. Katzenbeisser S, Petitcolas FAP (2000) Information hiding techniques for steganography and digital watermarking. Artech House, NorwoodGoogle Scholar
  12. Keelan BW (2002) Handbook of image quality. Marcel Dekker Inc., New YorkCrossRefGoogle Scholar
  13. Keerthi SS, Chapelle O, DeCoste D (2006) Building support vector machines with reduced classifier complexity. J Mach Learn Res 7:1493–1515MathSciNetzbMATHGoogle Scholar
  14. Klein A (2013) Stream ciphers. Springer, LondonCrossRefzbMATHGoogle Scholar
  15. Lahouhou A, Viennet E, Beghdadi A (2010) Selecting low-level features for image quality assessment by statistical methods. J Comput Inform Tech 18(2):183–189CrossRefGoogle Scholar
  16. Mc Cullough BD (2004) Wilkinson’s test and econometric software. J Econ Soc Meas 29:261–270CrossRefGoogle Scholar
  17. Menezes A, Vanstone S, Van Oorschot P (1996) Handbook of applied cryptography. CRC Press, Boca RatonzbMATHGoogle Scholar
  18. Prakash S, Trivedi V, Ramteke M (2016) An elitist non-dominated sorting bat algorithm NSBAT-II for multiobjective optimization of phthalic anhydride reactor. J Syst Assur Eng Manag 7(3):299–315CrossRefGoogle Scholar
  19. Prasad Mukesh, Li Dong-Lin, Lin Chin-Teng, Prakash Shiv, Singh Jagendra, Joshi Sudhanshu (2015) Designing mamdani-type fuzzy reasoning for visualizing prediction problems based on collaborative fuzzy clustering. IAENG Int J Comput Sci 42(4):404–411Google Scholar
  20. Ratan R (2014) Applications of genetic algorithms in cryptology. Adv Intell Syst Comput 258:281–291Google Scholar
  21. Ratan R, Arvind (2019) Bit-plane specific measures and its applications in analysis of image ciphers. Commun Comput Inf Sci 968:282–297Google Scholar
  22. Ratan R, Veni Madhavan CE (2002) Steganography based information security. IETE Tech Rev 19(4):213–219CrossRefGoogle Scholar
  23. Renu, Ravi, Ratan R (2012) Live traffic english text monitoring using fuzzy approach. Adv Intell Syst Comput 236:911–918Google Scholar
  24. Rueppel RA (1986) Analysis and design of stream ciphers. Springer, BerlinCrossRefzbMATHGoogle Scholar
  25. Sadkhan SB, Abbas NA (2013) Watermarked and noisy images identification based on statistical evaluation parameters. J Zankoy Sulaimani-Part A 15(3):159–168CrossRefGoogle Scholar
  26. Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28(4):656–715MathSciNetCrossRefzbMATHGoogle Scholar
  27. Simon KS, Omura JK, Scholtz RA, Levitt BK (1994) Spread spectrum communications handbook. McGraw-Hill, New YorkGoogle Scholar
  28. Stallings W (2011) Cryptography and network security. Prentice Hall, Englewood CliffsGoogle Scholar
  29. Stinson DR (1994) Decomposition constructions for secret sharing schemes. IEEE Trans Inf Theory 40(1):118–125MathSciNetCrossRefzbMATHGoogle Scholar
  30. Streijl RC, Winkler S, Hands DS (2016) Mean opinion score (MOS) revisited: methods and applications, limitations and alternatives. Multimed Syst 22(2):213–227CrossRefGoogle Scholar
  31. Teimouri M, Motlagh HK, (2017) Reverse engineering of communications networks: evolution and challenges. arXiv preprint arXiv:1704.05432 - arxiv.org
  32. Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612CrossRefGoogle Scholar
  33. Zadeh LA (1965) Fuzzy sets. Inf Control 8(3):338–353CrossRefzbMATHGoogle Scholar
  34. Zhou W, Bovik AC (2009) Mean squared error: love it or leave it? A new look at signal fidelity measures. Signal Process Mag IEEE 26(1):98–117CrossRefGoogle Scholar
  35. Zimmermann HJ (1987) Fuzzy sets. Decision making and expert systems. Kluwer, BostonCrossRefGoogle Scholar

Copyright information

© The Society for Reliability Engineering, Quality and Operations Management (SREQOM), India and The Division of Operation and Maintenance, Lulea University of Technology, Sweden 2019

Authors and Affiliations

  1. 1.Hansraj CollegeUniversity of DelhiNew DelhiIndia
  2. 2.Scientific Analysis GroupDefence Research and Development OrganizationNew DelhiIndia

Personalised recommendations