TY - JOUR
T1 - A leak and its remedy in JPEG image encryption
AU - Li, Weihai
AU - Yuan, Yuan
PY - 2007/9
Y1 - 2007/9
N2 - Focusing on the encryption of digital image and video, an intrinsic weakness of all existing discrete-cosine-transform (DCT) based algorithms is reported. This serious weakness of DCT-based encryptions is analysed theoretically and then demonstrated practically. As an instance, a novel attack algorithm is proposed to acquire the sketch information from encrypted data without any prior knowledge of the encryption algorithm. The quality of the extracted sketch is then evaluated by comparing with the original picture edge. Thereafter, to prevent this kind of attack, a full inter-block shuffle (FIBS) approach is proposed. This method can be employed to improve the encryption security in all DCT-based algorithms, such as JPEG, MPEG video and H.26x video.
AB - Focusing on the encryption of digital image and video, an intrinsic weakness of all existing discrete-cosine-transform (DCT) based algorithms is reported. This serious weakness of DCT-based encryptions is analysed theoretically and then demonstrated practically. As an instance, a novel attack algorithm is proposed to acquire the sketch information from encrypted data without any prior knowledge of the encryption algorithm. The quality of the extracted sketch is then evaluated by comparing with the original picture edge. Thereafter, to prevent this kind of attack, a full inter-block shuffle (FIBS) approach is proposed. This method can be employed to improve the encryption security in all DCT-based algorithms, such as JPEG, MPEG video and H.26x video.
KW - Enhancement
KW - Full inter-block shuffle
KW - JPEG encryption
KW - Non-zero-counting attack
KW - Security
UR - http://www.scopus.com/inward/record.url?scp=34548303710&partnerID=8YFLogxK
U2 - 10.1080/00207160701294376
DO - 10.1080/00207160701294376
M3 - 文章
AN - SCOPUS:34548303710
SN - 0020-7160
VL - 84
SP - 1367
EP - 1378
JO - International Journal of Computer Mathematics
JF - International Journal of Computer Mathematics
IS - 9
ER -