Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








7,012 Hits in 5.8 sec

On the Security of Permutation-Only Image Encryption Schemes

Alireza Jolfaei, Xin-Wen Wu, Vallipuram Muthukkumarasamy
2016 IEEE Transactions on Information Forensics and Security  
In [24] , Matias and Shamir analyzed the security of early permutation-only image encryption schemes used in analog broadcasting systems.  ...  The security of permutation-only image encryption schemes has been studied for a long time, and it has been shown that most of such schemes are insecure against ciphertext-only attacks and/or known/chosen-plaintext  ... 
doi:10.1109/tifs.2015.2489178 fatcat:47zxbyuzkbct3cl35xbpv4wz7i

A new selective encryption technique of JPEG2000 codestream for medical images transmission

Zahia Brahimi, Hamid Bessalah, A. Tarabet, M. K. Kholladi
2008 2008 5th International Multi-Conference on Systems, Signals and Devices  
In this paper, a novel selective encryption image scheme based on JPEG2000 is proposed, which encrypts only the code-blocks corresponding to some sensitive precincts.  ...  In order to improve the security level we introduce the permutation of codeblocks contributing in the selected precincts. Symmetric encryption AES with CFB mode is used to encrypt swapped codeblocks.  ...  Each precinct is represented as a collection of packet with one packet by layer. We propose a secure encryption scheme, where only some sensitive precincts of the entire image are encrypted.  ... 
doi:10.1109/ssd.2008.4632785 fatcat:43tbh525mrgg7nrbebamwwjddi

When an attacker meets a cipher-image in 2018: A Year in Review [article]

Chengqing Li, Yun Zhang, Eric Yong Xie
2019 arXiv   pre-print
The challenging problems on design and analysis of image encryption schemes are summarized to receive the attentions of both designers and attackers (cryptanalysts) of image encryption schemes, which may  ...  This paper aims to review the encountered technical contradictions when an attacker meets the cipher-images encrypted by the image encryption schemes (algorithms) proposed in 2018 from the viewpoint of  ...  The challenges on design and analysis of image encryption schemes Based on the above review on two sides of image cryptology, we summarize some critical challenges on design and security analysis of image  ... 
arXiv:1903.11764v2 fatcat:uoun46alavexflmuvcbtlinlqm

Cracking a hierarchical chaotic image encryption algorithm based on permutation

Chengqing Li
2016 Signal Processing  
hierarchical permutation-only image encryption algorithms are less secure than normal (i.e., non-hierarchical) ones.  ...  In year 2000, an efficient hierarchical chaotic image encryption (HCIE) algorithm was proposed, which divides a plain-image of size M× N with T possible value levels into K blocks of the same size and  ...  Guanrong Chen, "On the security defects of an image encryption scheme," Image and Vision Computing, vol. 27, no. 9, pp. 1371-1381, August 2009 2008 2007 Elsevier doi PDF 25.  ... 
doi:10.1016/j.sigpro.2015.07.008 fatcat:ixd3yzbcy5h7fex2b3h56wldo4

An Efficient Chaos-based Image Encryption Scheme Using Affine Modular Maps

Ruisong Ye, Haiying Zhao
2012 International Journal of Computer Network and Information Security  
This paper proposes a novel chaos-based image encryption scheme using affine modular maps, which are extensions of linear congruential generators, acting on the unit interval.  ...  applications of fractal chaotic dynamical systems in information security, such as, digital image encryption, digital image hiding, digital image watermarking, digital image sharing.  ...  Chaosbased image encryption schemes are usually composed of one permutation process and one diffusion process generally.  ... 
doi:10.5815/ijcnis.2012.07.05 fatcat:ct6khdp6kvcfdlm7qi4g6mgx5e

Cryptanalysis and Improvement of an Efficient and Secure Medical Image Protection Scheme

Li-bo Zhang, Zhi-liang Zhu, Ben-qiang Yang, Wen-yuan Liu, Hong-feng Zhu, Ming-yu Zou
2015 Mathematical Problems in Engineering  
In this paper, we evaluate the security of an efficient and secure medical image protection scheme recently proposed (Fu et al., 2013).  ...  Extensive security analyses and experimental results both indicate that the improved scheme can well address the security flaws and advance the speed performance of the original one.  ...  ; no. 2013225089, research on imaging of children's congenital heart disease using multislice CT).  ... 
doi:10.1155/2015/913476 fatcat:ztowte6ar5cp3blhdmas2iu5ie

MSPPIR: Multi-source privacy-preserving image retrieval in cloud computing [article]

Qi Gu, Zhihua Xia, Xingming Sun
2020 arXiv   pre-print
Experiment results and security analysis on the proposed scheme show its efficiency, security and accuracy.  ...  Many privacy-preserving image retrieval schemes have been proposed, in which the image owner can upload the encrypted images to the cloud, and the owner himself or the authorized user can execute the secure  ...  The security strength depends on the image size, and the number of permutations in ImgValKey. Proof. • Security of image content.  ... 
arXiv:2007.12416v3 fatcat:disyay6dbzeozccb5ygrmj22ra

An Image Encryption Scheme Based on Chaotic Systems with Changeable Parameters

Ruisong Ye, Wenhua Guo
2014 International Journal of Computer Network and Information Security  
In both the permutation process and the diffusion process, the keystreams generated by chaotic maps are all strongly dependent on plain-image, and thereby can improve the encryption security efficiently  ...  This paper proposes an image encryption scheme based on chaotic system with changeable parameters depending on plain-image.  ...  THE PROPOSED IMAGE ENCRYPTION SCHEME The proposed image encryption scheme consists of one permutation stage and one diffusion stage.  ... 
doi:10.5815/ijcnis.2014.04.05 fatcat:5w6avvvfcfgkhhyf25isxuhrim

Secure Outsourcing Algorithm of BTC Feature Extraction in Cloud Computing

Mingfang Jiang, Hengfu Yang
2020 IEEE Access  
The privacy-preserving image encryption process consists of block permutation, pixel diffusion, and a bit-plane random shift.  ...  Some analyses and experimental results demonstrate that the proposed privacy-preserving feature extraction scheme for BTC-compressed images is efficient and secure, and it can be applied to secure image  ...  Secure feature extraction in our scheme can be implemented on only one server, which makes the new scheme is secure against the collusion attack of several servers.  ... 
doi:10.1109/access.2020.3000683 fatcat:kcqwyfs4bnh3rharj4g43uvix4

An AES-Based Secure Image Retrieval Scheme Using Random Mapping and BOW in Cloud Computing

Hua Wang, Zhihua Xia, Jianwei Fei, Fengjun Xiao
2020 IEEE Access  
The similarity between images can be measured by the distance between feature vectors on the cloud server. Experiments and analysis prove the effect of the scheme.  ...  After encrypting the image with Advanced Encryption Standard and block permutation, the cloud server generates random templates and then extracts the local features.  ...  ACKNOWLEDGMENT The authors would like to thank the Editor and the Anonymous Reviewers for their constructive comments and suggestions, which improve the quality of this article.  ... 
doi:10.1109/access.2020.2983194 fatcat:gdy6h7sy4rbkjjvoqa7cczsf4m

Secret Image Sharing Based on Encrypted Pixels

Zhili Zhou, Ching-Nung Yang, Yi Cao, Xingming Sun
2018 IEEE Access  
Also, the secret pixels are permuted before the sharing to address the residual-image problem on shadow images.  ...  To overcome this weakness, we propose a novel (k, n)-SIS scheme based on encrypted pixels, whose shadow image size is slightly larger than that of Thien and Lin's scheme.  ...  THE PROBLEM OF THE EXISTING SIS SCHEMES Shamir's scheme only uses one coefficient of a (k −1)-degree polynomial for embedding secret, and thus it has perfect security [5] .  ... 
doi:10.1109/access.2018.2811722 fatcat:ms3w5bzaordxngsnuqjow3q4he

A Chaos-based Pseudorandom Permutation and Bilateral Diffusion Scheme for Image Encryption

Guo Weichuang, Zhao Junqin, Ye Ruisong
2014 International Journal of Image Graphics and Signal Processing  
In this paper, we propose a novel image encryption scheme comprising of one permutation process and one diffusion process.  ...  All the experimental results suggest that the proposed image encryption scheme is robust and secure and can be used for secure image and video communication applications. since 2003.  ...  In this paper, a robust and secure chaos-based image encryption scheme is proposed. The proposed image encryption scheme comprises of one permutation process and one diffusion process.  ... 
doi:10.5815/ijigsp.2014.11.07 fatcat:lwgjt7t4bbedtm5igktve2by3y

Cryptanalysis of a Chaos-Based Fast Image Encryption Algorithm for Embedded Systems [article]

Imad El Hanouti, Hakim El Fadili, Khalid Zenkouar
2019 arXiv   pre-print
Moreover, only one 3x400 size image is sufficient to break the cryptosystem under chosen plaintext attack considering stability of sort algorithm.  ...  Therefore, the proposed scheme is not recommended for security purposes.  ...  permuted image of according to the confusion operation of the encryption process, we could easily recover the row permutation: ∑ (18) Thus, only one known plaintext of minimum size of 3×400 is needed  ... 
arXiv:1910.11679v1 fatcat:qfselrgylrcr3ezypamdepk25y

A Novel Approach of Digital Video Encryption

Mayank AryaChandra, Ravindra Purwar, Navin Rajpal
2012 International Journal of Computer Applications  
Based on novel secure video scheme, an effective and generalized scheme of video encryption. It is a matrix computation scheme which uses a concept of Videoframe and xor() operation.  ...  In the recent years with the development of internet technologies, video technologies have been broadly used in TV, communication and multimedia, So security is required on video data.  ...  Another category of algorithms is based on scramble (permutation) only methods, where the DCT coefficients are permuted to provide confusion.  ... 
doi:10.5120/7619-0673 fatcat:pnhcr6xgh5hypoeuewvbydl6wy

Security Evaluation of Compressible Image Encryption for Privacy-Preserving Image Classification against Ciphertext-only Attacks [article]

Tatsuya Chuman, Hitoshi Kiya
2022 arXiv   pre-print
The security of learnable image encryption schemes for image classification using deep neural networks against several attacks has been discussed.  ...  In this paper, the security of the block scrambling image encryption against ciphertext-only attacks is evaluated by using jigsaw puzzle solver attacks.  ...  On the other, non-compressible image encryption schemes are carried out pixel by pixel. In this paper, we focus on the security of compressible image encryption.  ... 
arXiv:2207.08109v1 fatcat:c5ew7g7ab5ffde6pzwqrmx7ks4
« Previous Showing results 1 — 15 out of 7,012 results