Skip to main content

Analysis of Cryptographic Communications Using Bit-Plane Measures and Fuzzy Computing

  • Conference paper
  • First Online:
Soft Computing: Theories and Applications

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1053))

  • 1182 Accesses

Abstract

In cryptographic communications, messages may be transmitted in plain form or in encrypted form with same encryption keys due to customer’s mistakes and system’s weaknesses. Such communications should never happen in any situation as it is very dangerous and can be misused by adversaries. Identification of plain messages and crypts with same encryption keys is a very important problem to analyze such communications. In the paper, we consider the problem of identification to segregate traffic of encrypted visual messages as such form of messages are being used widely over communication networks in current era of information technology. We use bit-plane specific image measures and fuzzy computing scheme in our methodology of identification of plain images and encrypted images with same keys from encrypted images. Bit-plane specific measures are the row-wise (column-wise) frequency of ones, maximum run length and correlation between adjacent rows (columns) which exhibit characteristics of images and help to analyze images at bit-plane level. The results indicate that the methodology presented is able to identify plain images and encrypted images with same keys successfully.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Stallings, W.: Cryptography and Network Security. Prentice Hall, Englewood Cliffs (2003)

    Google Scholar 

  2. Menezes, A., Vanstone, S., Van Oorschot, P.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)

    MATH  Google Scholar 

  3. Katzenbeisser, S., Petitcolas, F.A.P.: Information Hiding Techniques for Steganography and Digital Watermarking. Artech House (2000)

    Google Scholar 

  4. Ratan, R., Veni Madhavan, C.E.: Steganography based information security. IETE Tech. Rev. 19, 213–19 (2002)

    Article  Google Scholar 

  5. Stinson, D.R.: Decomposition constructions for secret sharing schemes. IEEE Trans. Inf. Theory 40, 118–25 (1994)

    Article  MathSciNet  Google Scholar 

  6. Simon, K.S., Omura, J.K., Scholtz, R.A., Levitt, B.K.: Spread Spectrum Communications Handbook, rev edn. McGraw-Hill, NY (1994)

    Google Scholar 

  7. Rueppel, R.A.: Analysis and Design of Stream Ciphers. Springer, Berlin (1986)

    Book  Google Scholar 

  8. Shannon, C.E.: Communication theory of secrecy systems. Bell Syst. Tech. J. 28, 656–715 (1949)

    Article  MathSciNet  Google Scholar 

  9. Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600–12 (2004)

    Article  Google Scholar 

  10. Bouyer, P., et al.: Quantitative analysis of real-time systems. J. Commun. ACM 54(9), 78–87 (2010)

    Google Scholar 

  11. George, A.G., Prabavathy, A.K.: A survey on different approaches used in image quality assessment. Int. J. Emerg. Technol. Adv. Eng. 3(2), 197–203 (2013)

    Google Scholar 

  12. Keelan, B.W.: Handbook of Image Quality. Marcel Dekker Inc., NY (2002)

    Book  Google Scholar 

  13. Streijl, R.C., Winkler, S., Hands, D.S.: Mean opinion score (MOS) revisited: methods and applications, limitations and alternatives. Multimed. Syst. 22(2), 213–27 (2016)

    Article  Google Scholar 

  14. Lahouhou, A., Viennet, E., Beghdadi, A.: Selecting low-level features for image quality assessment by statistical methods. J. Comput. Inf. Technol. 18(2), 183–189 (2010)

    Google Scholar 

  15. Huber, P., Ronchetti, E.: Robust Statistics. Wiley, NY (2009)

    Google Scholar 

  16. Doane, D.P., Seward, L.E.: Measuring skewness: a forgotten statistics. J. Stat. Educ. 19(2), 1–18 (2011)

    Article  Google Scholar 

  17. Haddon, J.F., Boyce, J.F.: Co-occurrence matrices for image analysis. IEEE Electron. Commun. Eng. J. 5(2), 71–83 (1993)

    Article  Google Scholar 

  18. Zhou, W., Bovik, A.C.: Mean squared error: love it or leave it? A new look at signal fidelity measures. Signal Process. Mag. IEEE 26(1), 98–117 (2009)

    Article  Google Scholar 

  19. Chai, T., Draxler, R.R.: Root mean square error (RMSE) or mean absolute error (MAE)?—Arguments against avoiding RMSE in the literature. Geosci. Model Dev. 7(1), 1247–50 (2014)

    Article  Google Scholar 

  20. Ratan, R., Arvind: Bit-plane specific measures and its applications in analysis of image ciphers. Communications in Computer and Information Science (CCIS), vol. 968, pp. 282–297. Springer (2019)

    Google Scholar 

  21. Asthana, R., Sharma, A., Ratan, R., Verma, N.: Classification of error-correcting coded data using multidimensional feature vectors. Advances in Intelligent Systems and Computing (AISC), vol. 336, pp. 303–312. Springer (2015)

    Google Scholar 

  22. Sadkhan, S.B., Abbas, N.A.: Watermarked and noisy images identification based on statistical evaluation parameters. J. Zankoy Sulaimani Part A (JZS-A) 15(3), 159–168 (2013)

    Google Scholar 

  23. Din, M., Ratan, R., Bhateja, A.K., Bhateja, A.: Multimedia classification using ANN approach. Advances in Intelligent Systems and Computing (AISC), vol. 236, pp. 905–910. Springer (2012)

    Google Scholar 

  24. Renu, Ravi, Ratan, R.: Live traffic English text monitoring using fuzzy approach. Advances in Intelligent Systems and Computing (AISC), vol. 236, pp. 911–918. Springer (2012)

    Google Scholar 

  25. Bezdek, J.C., Keller, J., Krisnapuram, R., Pal, N.R.: Fuzzy Models and Algorithms for Pattern Recognition and Image Processing, rev. edn. Springer, NY (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ram Ratan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Arvind, Ratan, R. (2020). Analysis of Cryptographic Communications Using Bit-Plane Measures and Fuzzy Computing. In: Pant, M., Sharma, T., Verma, O., Singla, R., Sikander, A. (eds) Soft Computing: Theories and Applications. Advances in Intelligent Systems and Computing, vol 1053. Springer, Singapore. https://doi.org/10.1007/978-981-15-0751-9_90

Download citation

Publish with us

Policies and ethics