Abstract
In cryptographic communications, messages may be transmitted in plain form or in encrypted form with same encryption keys due to customer’s mistakes and system’s weaknesses. Such communications should never happen in any situation as it is very dangerous and can be misused by adversaries. Identification of plain messages and crypts with same encryption keys is a very important problem to analyze such communications. In the paper, we consider the problem of identification to segregate traffic of encrypted visual messages as such form of messages are being used widely over communication networks in current era of information technology. We use bit-plane specific image measures and fuzzy computing scheme in our methodology of identification of plain images and encrypted images with same keys from encrypted images. Bit-plane specific measures are the row-wise (column-wise) frequency of ones, maximum run length and correlation between adjacent rows (columns) which exhibit characteristics of images and help to analyze images at bit-plane level. The results indicate that the methodology presented is able to identify plain images and encrypted images with same keys successfully.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Stallings, W.: Cryptography and Network Security. Prentice Hall, Englewood Cliffs (2003)
Menezes, A., Vanstone, S., Van Oorschot, P.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)
Katzenbeisser, S., Petitcolas, F.A.P.: Information Hiding Techniques for Steganography and Digital Watermarking. Artech House (2000)
Ratan, R., Veni Madhavan, C.E.: Steganography based information security. IETE Tech. Rev. 19, 213–19 (2002)
Stinson, D.R.: Decomposition constructions for secret sharing schemes. IEEE Trans. Inf. Theory 40, 118–25 (1994)
Simon, K.S., Omura, J.K., Scholtz, R.A., Levitt, B.K.: Spread Spectrum Communications Handbook, rev edn. McGraw-Hill, NY (1994)
Rueppel, R.A.: Analysis and Design of Stream Ciphers. Springer, Berlin (1986)
Shannon, C.E.: Communication theory of secrecy systems. Bell Syst. Tech. J. 28, 656–715 (1949)
Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600–12 (2004)
Bouyer, P., et al.: Quantitative analysis of real-time systems. J. Commun. ACM 54(9), 78–87 (2010)
George, A.G., Prabavathy, A.K.: A survey on different approaches used in image quality assessment. Int. J. Emerg. Technol. Adv. Eng. 3(2), 197–203 (2013)
Keelan, B.W.: Handbook of Image Quality. Marcel Dekker Inc., NY (2002)
Streijl, R.C., Winkler, S., Hands, D.S.: Mean opinion score (MOS) revisited: methods and applications, limitations and alternatives. Multimed. Syst. 22(2), 213–27 (2016)
Lahouhou, A., Viennet, E., Beghdadi, A.: Selecting low-level features for image quality assessment by statistical methods. J. Comput. Inf. Technol. 18(2), 183–189 (2010)
Huber, P., Ronchetti, E.: Robust Statistics. Wiley, NY (2009)
Doane, D.P., Seward, L.E.: Measuring skewness: a forgotten statistics. J. Stat. Educ. 19(2), 1–18 (2011)
Haddon, J.F., Boyce, J.F.: Co-occurrence matrices for image analysis. IEEE Electron. Commun. Eng. J. 5(2), 71–83 (1993)
Zhou, W., Bovik, A.C.: Mean squared error: love it or leave it? A new look at signal fidelity measures. Signal Process. Mag. IEEE 26(1), 98–117 (2009)
Chai, T., Draxler, R.R.: Root mean square error (RMSE) or mean absolute error (MAE)?—Arguments against avoiding RMSE in the literature. Geosci. Model Dev. 7(1), 1247–50 (2014)
Ratan, R., Arvind: Bit-plane specific measures and its applications in analysis of image ciphers. Communications in Computer and Information Science (CCIS), vol. 968, pp. 282–297. Springer (2019)
Asthana, R., Sharma, A., Ratan, R., Verma, N.: Classification of error-correcting coded data using multidimensional feature vectors. Advances in Intelligent Systems and Computing (AISC), vol. 336, pp. 303–312. Springer (2015)
Sadkhan, S.B., Abbas, N.A.: Watermarked and noisy images identification based on statistical evaluation parameters. J. Zankoy Sulaimani Part A (JZS-A) 15(3), 159–168 (2013)
Din, M., Ratan, R., Bhateja, A.K., Bhateja, A.: Multimedia classification using ANN approach. Advances in Intelligent Systems and Computing (AISC), vol. 236, pp. 905–910. Springer (2012)
Renu, Ravi, Ratan, R.: Live traffic English text monitoring using fuzzy approach. Advances in Intelligent Systems and Computing (AISC), vol. 236, pp. 911–918. Springer (2012)
Bezdek, J.C., Keller, J., Krisnapuram, R., Pal, N.R.: Fuzzy Models and Algorithms for Pattern Recognition and Image Processing, rev. edn. Springer, NY (2005)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Arvind, Ratan, R. (2020). Analysis of Cryptographic Communications Using Bit-Plane Measures and Fuzzy Computing. In: Pant, M., Sharma, T., Verma, O., Singla, R., Sikander, A. (eds) Soft Computing: Theories and Applications. Advances in Intelligent Systems and Computing, vol 1053. Springer, Singapore. https://doi.org/10.1007/978-981-15-0751-9_90
Download citation
DOI: https://doi.org/10.1007/978-981-15-0751-9_90
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-0750-2
Online ISBN: 978-981-15-0751-9
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)