Skip to main content

Key Independent Decryption of Graphically Encrypted Images

  • Conference paper
Intelligence and Security Informatics (PAISI 2010)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6122))

Included in the following conference series:

Abstract

Cryptographically, an encryption algorithm should be strong enough so that one could not extract any information from encrypted data. A graphical encryption method proposed in [1] for the security of computer data is cryptanalysed in this paper. There are some regions left unchanged and clearly visible in graphically encrypted images. Key independent decryption of graphically encrypted images is proposed for recovery of intelligible information. Decryption scheme is based on neighbourhood similarity characteristics of adjacent pixels. Simulation results show that the decrypted images obtained by the proposed scheme are quite intelligible to understand. The graphical encryption method in present form is not suitable for security applications as encrypted images can be decrypted easily.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Schwartz, C.: A new graphical method for encryption of computer data. Journal of Cryptologia 15(1), 43–46 (1991)

    Article  Google Scholar 

  2. Bourbakis, N.G., Alexopoulos, C.: Picture data encryption using scan patterns. Pattern Recognition 25(6), 567–581 (1882)

    Article  Google Scholar 

  3. Maitra, A., Rao, Y.V.S., Prasanna, S.R.M.: A new image encryption approach using combinational permutation techniques. International Journal of Computer Science 19(2), 127–131 (2006)

    Google Scholar 

  4. Maniccam, S.S., Bourbakis, N.G.: Image and video encryption using scan patterns. Pattern Recognition 37(4), 725–737 (2004)

    Article  Google Scholar 

  5. Yen, J.-C., Guo, J.-I.: A new image encryption algorithm and its VLSI architecture. In: Proceedings of IEEE Workshop Signal Processing Systems, pp. 430–437 (1999)

    Google Scholar 

  6. Chin, Y.-C., Wang, P.-C., Hwang, J.-J.: Cryptanalysis on Schwartz graphical encryption method. Journal of Cryptologia 17(3), 301–304 (1993)

    Article  MATH  Google Scholar 

  7. Ratan, R., Saxena, P.K.: An algorithm for the restoration of distorted text documents. In: Proceedings of Intl. Conference on Computational Linguistics, Speech and Document Processing (ICCLSDP’98), pp. A38–A43 (1998)

    Google Scholar 

  8. Jain, A.K.: Fundamentals of digital image processing. Prentice Hall, Englewood Cliffs (1995)

    Google Scholar 

  9. Russ, J.C.: The image processing handbook. CRC Press, Boca Raton (1995)

    Google Scholar 

  10. Young, T.Y., Fu, K.S.: Handbook of pattern recognition and image processing. Academic Press, London (1986)

    MATH  Google Scholar 

  11. Ratan, R., Saxena, P.K.: Image processing based techniques for securing text documents. Journal of Discrete Mathematical Sciences and Cryptography 3(1-3), 113–129 (2000)

    MATH  MathSciNet  Google Scholar 

  12. Fu, C., Zhu, Z.: A chaotic encryption scheme based on circular bit shift method. In: Proceedings of Intl. Conference for Young Computer Scientists, pp. 3057–3061. IEEE Computer Society, Los Alamitos (2008)

    Chapter  Google Scholar 

  13. Menezes, A.P., Van Oorschot, Vanstone, S.: Handbook of applied cryptography. CRC Press, Boca Raton (1996)

    Google Scholar 

  14. Schneier, B.: Applied cryptography. John Wiley & Sons Inc., Chichester (1996)

    Google Scholar 

  15. Yen, J.C., Guo, J.I.: A new chaotic key based design for image encryption and decryption. In: Proceedings of IEEE International Symposium Circuits ans Systems, vol. 4, pp. 49–52 (2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ratan, R. (2010). Key Independent Decryption of Graphically Encrypted Images. In: Chen, H., Chau, M., Li, Sh., Urs, S., Srinivasa, S., Wang, G.A. (eds) Intelligence and Security Informatics. PAISI 2010. Lecture Notes in Computer Science, vol 6122. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13601-6_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-13601-6_11

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-13600-9

  • Online ISBN: 978-3-642-13601-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics