A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
On the Security of Permutation-Only Image Encryption Schemes
2016
IEEE Transactions on Information Forensics and Security
In [24] , Matias and Shamir analyzed the security of early permutation-only image encryption schemes used in analog broadcasting systems. ...
The security of permutation-only image encryption schemes has been studied for a long time, and it has been shown that most of such schemes are insecure against ciphertext-only attacks and/or known/chosen-plaintext ...
doi:10.1109/tifs.2015.2489178
fatcat:47zxbyuzkbct3cl35xbpv4wz7i
A new selective encryption technique of JPEG2000 codestream for medical images transmission
2008
2008 5th International Multi-Conference on Systems, Signals and Devices
In this paper, a novel selective encryption image scheme based on JPEG2000 is proposed, which encrypts only the code-blocks corresponding to some sensitive precincts. ...
In order to improve the security level we introduce the permutation of codeblocks contributing in the selected precincts. Symmetric encryption AES with CFB mode is used to encrypt swapped codeblocks. ...
Each precinct is represented as a collection of packet with one packet by layer. We propose a secure encryption scheme, where only some sensitive precincts of the entire image are encrypted. ...
doi:10.1109/ssd.2008.4632785
fatcat:43tbh525mrgg7nrbebamwwjddi
When an attacker meets a cipher-image in 2018: A Year in Review
[article]
2019
arXiv
pre-print
The challenging problems on design and analysis of image encryption schemes are summarized to receive the attentions of both designers and attackers (cryptanalysts) of image encryption schemes, which may ...
This paper aims to review the encountered technical contradictions when an attacker meets the cipher-images encrypted by the image encryption schemes (algorithms) proposed in 2018 from the viewpoint of ...
The challenges on design and analysis of image encryption schemes Based on the above review on two sides of image cryptology, we summarize some critical challenges on design and security analysis of image ...
arXiv:1903.11764v2
fatcat:uoun46alavexflmuvcbtlinlqm
Cracking a hierarchical chaotic image encryption algorithm based on permutation
2016
Signal Processing
hierarchical permutation-only image encryption algorithms are less secure than normal (i.e., non-hierarchical) ones. ...
In year 2000, an efficient hierarchical chaotic image encryption (HCIE) algorithm was proposed, which divides a plain-image of size M× N with T possible value levels into K blocks of the same size and ...
Guanrong Chen,
"On the security defects of an image encryption scheme,"
Image and Vision Computing, vol. 27, no. 9, pp. 1371-1381, August 2009
2008
2007
Elsevier doi PDF
25. ...
doi:10.1016/j.sigpro.2015.07.008
fatcat:ixd3yzbcy5h7fex2b3h56wldo4
An Efficient Chaos-based Image Encryption Scheme Using Affine Modular Maps
2012
International Journal of Computer Network and Information Security
This paper proposes a novel chaos-based image encryption scheme using affine modular maps, which are extensions of linear congruential generators, acting on the unit interval. ...
applications of fractal chaotic dynamical systems in information security, such as, digital image encryption, digital image hiding, digital image watermarking, digital image sharing. ...
Chaosbased image encryption schemes are usually composed of one permutation process and one diffusion process generally. ...
doi:10.5815/ijcnis.2012.07.05
fatcat:ct6khdp6kvcfdlm7qi4g6mgx5e
Cryptanalysis and Improvement of an Efficient and Secure Medical Image Protection Scheme
2015
Mathematical Problems in Engineering
In this paper, we evaluate the security of an efficient and secure medical image protection scheme recently proposed (Fu et al., 2013). ...
Extensive security analyses and experimental results both indicate that the improved scheme can well address the security flaws and advance the speed performance of the original one. ...
; no. 2013225089, research on imaging of children's congenital heart disease using multislice CT). ...
doi:10.1155/2015/913476
fatcat:ztowte6ar5cp3blhdmas2iu5ie
MSPPIR: Multi-source privacy-preserving image retrieval in cloud computing
[article]
2020
arXiv
pre-print
Experiment results and security analysis on the proposed scheme show its efficiency, security and accuracy. ...
Many privacy-preserving image retrieval schemes have been proposed, in which the image owner can upload the encrypted images to the cloud, and the owner himself or the authorized user can execute the secure ...
The security strength depends on the image size, and the number of permutations in ImgValKey. Proof. • Security of image content. ...
arXiv:2007.12416v3
fatcat:disyay6dbzeozccb5ygrmj22ra
An Image Encryption Scheme Based on Chaotic Systems with Changeable Parameters
2014
International Journal of Computer Network and Information Security
In both the permutation process and the diffusion process, the keystreams generated by chaotic maps are all strongly dependent on plain-image, and thereby can improve the encryption security efficiently ...
This paper proposes an image encryption scheme based on chaotic system with changeable parameters depending on plain-image. ...
THE PROPOSED IMAGE ENCRYPTION SCHEME The proposed image encryption scheme consists of one permutation stage and one diffusion stage. ...
doi:10.5815/ijcnis.2014.04.05
fatcat:5w6avvvfcfgkhhyf25isxuhrim
Secure Outsourcing Algorithm of BTC Feature Extraction in Cloud Computing
2020
IEEE Access
The privacy-preserving image encryption process consists of block permutation, pixel diffusion, and a bit-plane random shift. ...
Some analyses and experimental results demonstrate that the proposed privacy-preserving feature extraction scheme for BTC-compressed images is efficient and secure, and it can be applied to secure image ...
Secure feature extraction in our scheme can be implemented on only one server, which makes the new scheme is secure against the collusion attack of several servers. ...
doi:10.1109/access.2020.3000683
fatcat:kcqwyfs4bnh3rharj4g43uvix4
An AES-Based Secure Image Retrieval Scheme Using Random Mapping and BOW in Cloud Computing
2020
IEEE Access
The similarity between images can be measured by the distance between feature vectors on the cloud server. Experiments and analysis prove the effect of the scheme. ...
After encrypting the image with Advanced Encryption Standard and block permutation, the cloud server generates random templates and then extracts the local features. ...
ACKNOWLEDGMENT The authors would like to thank the Editor and the Anonymous Reviewers for their constructive comments and suggestions, which improve the quality of this article. ...
doi:10.1109/access.2020.2983194
fatcat:gdy6h7sy4rbkjjvoqa7cczsf4m
Secret Image Sharing Based on Encrypted Pixels
2018
IEEE Access
Also, the secret pixels are permuted before the sharing to address the residual-image problem on shadow images. ...
To overcome this weakness, we propose a novel (k, n)-SIS scheme based on encrypted pixels, whose shadow image size is slightly larger than that of Thien and Lin's scheme. ...
THE PROBLEM OF THE EXISTING SIS SCHEMES Shamir's scheme only uses one coefficient of a (k −1)-degree polynomial for embedding secret, and thus it has perfect security [5] . ...
doi:10.1109/access.2018.2811722
fatcat:ms3w5bzaordxngsnuqjow3q4he
A Chaos-based Pseudorandom Permutation and Bilateral Diffusion Scheme for Image Encryption
2014
International Journal of Image Graphics and Signal Processing
In this paper, we propose a novel image encryption scheme comprising of one permutation process and one diffusion process. ...
All the experimental results suggest that the proposed image encryption scheme is robust and secure and can be used for secure image and video communication applications. since 2003. ...
In this paper, a robust and secure chaos-based image encryption scheme is proposed. The proposed image encryption scheme comprises of one permutation process and one diffusion process. ...
doi:10.5815/ijigsp.2014.11.07
fatcat:lwgjt7t4bbedtm5igktve2by3y
Cryptanalysis of a Chaos-Based Fast Image Encryption Algorithm for Embedded Systems
[article]
2019
arXiv
pre-print
Moreover, only one 3x400 size image is sufficient to break the cryptosystem under chosen plaintext attack considering stability of sort algorithm. ...
Therefore, the proposed scheme is not recommended for security purposes. ...
permuted image of according to the confusion operation of the encryption process, we could easily recover the row permutation: ∑ (18) Thus, only one known plaintext of minimum size of 3×400 is needed ...
arXiv:1910.11679v1
fatcat:qfselrgylrcr3ezypamdepk25y
A Novel Approach of Digital Video Encryption
2012
International Journal of Computer Applications
Based on novel secure video scheme, an effective and generalized scheme of video encryption. It is a matrix computation scheme which uses a concept of Videoframe and xor() operation. ...
In the recent years with the development of internet technologies, video technologies have been broadly used in TV, communication and multimedia, So security is required on video data. ...
Another category of algorithms is based on scramble (permutation) only methods, where the DCT coefficients are permuted to provide confusion. ...
doi:10.5120/7619-0673
fatcat:pnhcr6xgh5hypoeuewvbydl6wy
Security Evaluation of Compressible Image Encryption for Privacy-Preserving Image Classification against Ciphertext-only Attacks
[article]
2022
arXiv
pre-print
The security of learnable image encryption schemes for image classification using deep neural networks against several attacks has been discussed. ...
In this paper, the security of the block scrambling image encryption against ciphertext-only attacks is evaluated by using jigsaw puzzle solver attacks. ...
On the other, non-compressible image encryption schemes are carried out pixel by pixel. In this paper, we focus on the security of compressible image encryption. ...
arXiv:2207.08109v1
fatcat:c5ew7g7ab5ffde6pzwqrmx7ks4
« Previous
Showing results 1 — 15 out of 7,012 results