Security Evaluation for Block Scrambling-Based Image Encryption Including JPEG Distortion against Jigsaw Puzzle Solver Attacks

08/07/2018
by   Tatsuya Chuman, et al.
0

Encryption-then-Compression (EtC) systems have been considered for the user-controllable privacy protection of social media like Twitter. The aim of this paper is to evaluate the security of block scrambling-based encryption schemes, which have been proposed to construct EtC systems. Even though this scheme has enough key spaces against brute-force attacks, each block in encrypted images has almost the same correlation as that of original images. Therefore, it is required to consider the security from different viewpoints from number theory-based encryption methods with provable security such as RSA and AES. In this paper, we evaluate the security of encrypted images including JPEG distortion by using automatic jigsaw puzzle solvers.

READ FULL TEXT
research
11/01/2018

Encryption-then-Compression Systems using Grayscale-based Image Encryption for JPEG Images

A block scrambling-based encryption scheme is presented to enhance the s...
research
01/10/2022

Enhancing Selective Encryption for H.264/AVC Using Advanced Encryption Standard

Multimedia information availability has increased dramatically with the ...
research
05/31/2022

Rethinking Block Storage Encryption with Virtual Disks

Disk encryption today uses standard encryption methods that are length p...
research
10/13/2020

SafetyPin: Encrypted Backups with Human-Memorable Secrets

We present the design and implementation of SafetyPin, a system for encr...
research
02/01/2022

Security Evaluation of Block-based Image Encryption for Vision Transformer against Jigsaw Puzzle Solver Attack

The aim of this paper is to evaluate the security of a block-based image...
research
10/04/2018

Image Manipulation Specifications on Social Networking Services for Encryption-then-Compression Systems

Encryption-then-Compression (EtC) systems have been proposed to securely...
research
02/15/2023

Similarity Calculation Based on Homomorphic Encryption

In recent years, although some homomorphic encryption algorithms have be...

Please sign up or login with your details

Forgot password? Click here to reset