Skip to main content
Log in

Decryption of pure-position permutation algorithms

  • Computer & Information Science
  • Published:
Journal of Zhejiang University-SCIENCE A Aims and scope Submit manuscript

Abstract

Pure position permutation image encryption algorithms, commonly used as image encryption investigated in this work are unfortunately frail under known-text attack. In view of the weakness of pure position permutation algorithm, we put forward an effective decryption algorithm for all pure-position permutation algorithms. First, a summary of the pure position permutation image encryption algorithms is given by introducing the concept of ergodic matrices. Then, by using probability theory and algebraic principles, the decryption probability of pure-position permutation algorithms is verified theoretically; and then, by defining the operation system of fuzzy ergodic matrices, we improve a specific decryption algorithm. Finally, some simulation results are shown.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  • Bourbakis, N., Alexopoulos, C., 1992. Picture data encryption using SCAN patter.Pattern Recognit.,25(6): 567–581.

    Article  Google Scholar 

  • Ding, W., Qi, D.X., 1998. Digital image transformation and information hiding and disguising technology.Chinese Journal of Computer,21(9):838–843 (in Chinese).

    Google Scholar 

  • Kuo, C.J., Chen, M.S., 1991. A New Signal Encryption Technique and its Attack Study. Proceedings of IEEE International Conference on Security Technology, Taipei, Taiwan,1:149–153.

    Google Scholar 

  • Lin, T.Q., Klara, N., 1998. Camparison of MPEG encryption algorithms.Comput & Graphics 22(4):437–448.

    Article  Google Scholar 

  • Matlas, Y., Shamir, A., 1992. A video scrambling technique based on space filling curves.Proceedings of CPYPTO’87,76(5):550–559.

    Google Scholar 

  • Refregier, P., Javidi, B., 1995. Optical-image encryption based on input plane and forier plane random encoding.Optics Letters,20(7):767–769.

    Article  Google Scholar 

  • Sridharan, S., Dawson, E., Goldburg, B. 1991. Fast Fourier transform based speech encryption system.IEE Proc. I, Commun. Speech Vis,138(3):215–223.

    Article  Google Scholar 

  • Yang, H.G., Kim, E.S., 1996. Practical image encryption scheme by real-valued data.Opt. Eng.,35(9):2473–2478.

    Article  Google Scholar 

  • Yen, J.C., Guo, J.I., 1999. A Chaotic Neural Network for Signal Encryption/Decryption and its VLSTI Architecture. Proceedings of the Tenth VLSI Design/CAD Symposium, Nantou, Taiwan, p.319–322.

  • Zhao, X.Y., Chen, G., 2002. Ergodic matrix in image encryption.SPIE, p.4875–4878.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiao-yu Zhao.

Additional information

Project supported by the National Natural Science Foundation of China (Nos. 60302012, 60202002) and the Youth Scientific Research Foundation of Ningbo (No. 2003A61006), China

Rights and permissions

Reprints and permissions

About this article

Cite this article

Zhao, Xy., Cheng, G., Zhang, D. et al. Decryption of pure-position permutation algorithms. J. Zhejiang Univ. Sci. A 5, 803–809 (2004). https://doi.org/10.1631/jzus.2004.0803

Download citation

  • Received:

  • Revised:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1631/jzus.2004.0803

Key words

Document code

CLC number

Navigation