Cryptanalyzing an Encryption Scheme Based on Blind Source Separation

@article{Li2008CryptanalyzingAE,
  title={Cryptanalyzing an Encryption Scheme Based on Blind Source Separation},
  author={S. Li and Chengqing Li and Kwok-Tung Lo and Guanrong Chen},
  journal={IEEE Transactions on Circuits and Systems I: Regular Papers},
  year={2008},
  volume={55},
  pages={1055-1063}
}
Recently, there was a proposal of using the underdetermined blind source separation (BSS) principle to design image and speech encryption. In this paper, we report a cryptanalysis of this BSS-based encryption scheme and point out that it is not secure against known-/chosen-plaintext attack and chosen-ciphertext attack. In addition, we discuss some other security defects of the schemes: (1) it has a low sensitivity to part of the key and to the plaintext; (2) it is weak against a ciphertext-only… 
Subspace-Based Encryption
TLDR
Experimental results show an enhancement in the performances of the proposed subspace-based encryption system, beside some interesting and specific features, from a cryptographic point of view, brought by the proposed encryption system.
Security in the speech cryptosystem based on blind sources separation
TLDR
An appropriate selection for the key is investigated to enhance the security level of the speech cryptosystem based on blind sources separation and results show that with smaller coefficient for the confidential signal in comparison with the key, the number of quantized levels for theKey should be more to guarantee the security.
Thresholding attack on the BSS-based cryptosystem which has binary key
TLDR
Performance analysis in terms of normalised MSE shows that the original signal can be accurately extracted by the proposed procedure from the encrypted one, and a key with multiple values has been exploited to enhance the security of the cryptosystem.
On the security defects of an image encryption scheme
TLDR
This paper studies the security of a recently-proposed chaos-based image encryption scheme and points out that there exist a number of invalid keys and weak keys, and some keys are partially equivalent for encryption/decryption.
A Combination of Chaos and Blind Source Separation for Image Encryption
We propose a new perspective on image encryption using chaotic signal and blind source separation. The original image is permuted by the chaotic signal and then mixed with key images. In the
On the strengthening of the speech encryption schemes for communication systems based on blind source separation approach
TLDR
In the current study, it is shown that it is possible to extract an intelligible version from BSS based encrypted speech using modified speech denoising scheme to reinforce the security of transmitting encrypted signal.
A Semi- One Time Pad Using Blind Source Separation for Speech Encryption
TLDR
It is demonstrated that the proposed scheme is immune against traditional attacks and obtains the advantages of a One Time Pad encryption while avoiding its drawbacks in key exchange.
A subspace-based method for speech encryption
  • Atef Mermoul, A. Belouchrani
  • Computer Science
    10th International Conference on Information Science, Signal Processing and their Applications (ISSPA 2010)
  • 2010
TLDR
This paper proposes a new encryption method based on the subspace concept together with the use of nonlinear functions and key signals that enhances the security level of existing BSS-based speech encryption methods.
A blind source separation based cryptography scheme for mobile military communication applications
TLDR
A preliminary cryptanalysis study is presented that verifies the adequacy of the new scheme for use in mobile military communication units and other applications where security is critical and is immune to some of the attacks to which existing methods were believed to be vulnerable.
A combination of blind source separation and impulsive chaos synchronisation for encryption
TLDR
Simulation results show that this scheme has an enhanced level of encryption security, and a cryptanalysis study is presented to show that the proposed scheme is immune to some attacks.
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 65 REFERENCES
Cryptanalysis of a chaotic image encryption method
  • S. Li, Xuan Zheng
  • Computer Science
    2002 IEEE International Symposium on Circuits and Systems. Proceedings (Cat. No.02CH37353)
  • 2002
TLDR
This paper points out CKBA is very weak to the chosen/known-plaintext attack with only one plain-image, and its security to brute-force ciphertext-only attack is overestimated by the authors.
Cryptanalysis of the RCES/RSES image encryption scheme
TLDR
This paper analyses the security of RCES, and points out that it is insecure against the known/chosen-plaintext attacks: the number of required known/Chosen plain-images is only one or two to succeed an attack.
On the security of the Yen-Guo's domino signal encryption algorithm (DSEA)
TLDR
This paper analyzes the security of DSEA, and points out the following weaknesses: its security against the brute-force attack was overestimated, it is not sufficiently secure against ciphertext-only attacks, and only one ciphertext is enough to get some information about the plaintext and to break the value of a sub-key.
Security problems with improper implementations of improved FEA-M
TLDR
It is found that an implementation-dependent differential chosen-plaintext attack or its chosen-ciphertext counterpart can reveal the secret key of the cryptosystem, if the involved (pseudo-)random process can be tampered (for example, through a public time service).
Cryptanalysis of an encryption scheme for binary images
TLDR
This paper shows that Chung and Chang's scheme to encrypt binary images can be broken with some pairs of plain image and cipher image.
On the security of an image encryption method
  • S. Li, Xuan Zheng
  • Computer Science
    Proceedings. International Conference on Image Processing
  • 2002
TLDR
This paper points out that BRIE (bit recirculation image encryption) is not secure enough from strict cryptographic viewpoint, and a known/chosen-plaintext attack can break BriE with only one known/Chosen plain-image.
Image cryptosystems based on blind source separation
  • Li Qiuhua, Yin Fuliang
  • Computer Science
    International Conference on Neural Networks and Signal Processing, 2003. Proceedings of the 2003
  • 2003
TLDR
This paper applies blind source separation (BSS) to forming a new efficient cryptosystem for images that has high security performance and flexible feature and results of experiments illustrate the validity of the proposed method.
Cryptanalysis of an Image Scrambling Scheme Without Bandwidth Expansion
TLDR
A comprehensive cryptanalysis is given here on this image scrambling scheme, showing that it is not sufficiently secure against various cryptographical attacks including ciphertext-only attack, known/chosen-plaintext attack, and chosen-ciphertext attack.
Cryptanalysis of a New Signal Security System for Multimedia Data Transmission
TLDR
TDCEA is not suitable for applications that require a high level of security and the chosen-plaintext and chosen-ciphertext versions of the aforementioned two known-plain text attacks can break TDCEA even with a smaller complexity and a better performance.
Secure image communication using blind source separation
  • Qiu-Hua Lin, Fu-Liang Yin, Yong-Rui Zheng
  • Computer Science
    Proceedings of the IEEE 6th Circuits and Systems Symposium on Emerging Technologies: Frontiers of Mobile and Wireless Communication (IEEE Cat. No.04EX710)
  • 2004
In this paper, an image encryption method is proposed by using the linear mixing model of blind source separation (BSS). It can simultaneously encrypt multiple images with the same size by mixing
...
1
2
3
4
5
...