The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
Les systèmes de cryptage puis de compression (EtC) ont été envisagés pour la protection de la confidentialité contrôlable par l'utilisateur des médias sociaux comme Twitter. Le but de cet article est d'évaluer la sécurité des schémas de chiffrement basés sur le brouillage de blocs, qui ont été proposés pour construire des systèmes EtC. Même si ce schéma dispose de suffisamment d’espaces clés pour résister aux attaques par force brute, chaque bloc des images cryptées a presque la même corrélation que celui des images originales. Par conséquent, il est nécessaire de considérer la sécurité sous différents points de vue, à partir des méthodes de chiffrement basées sur la théorie des nombres avec une sécurité prouvable telles que RSA et AES. Dans cet article, nous évaluons la sécurité des images cryptées, y compris la distorsion JPEG, en utilisant des solutions automatiques de résolution de puzzles.
Tatsuya CHUMAN
Tokyo Metropolitan University
Hitoshi KIYA
Tokyo Metropolitan University
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copier
Tatsuya CHUMAN, Hitoshi KIYA, "Security Evaluation for Block Scrambling-Based Image Encryption Including JPEG Distortion against Jigsaw Puzzle Solver Attacks" in IEICE TRANSACTIONS on Fundamentals,
vol. E101-A, no. 12, pp. 2405-2408, December 2018, doi: 10.1587/transfun.E101.A.2405.
Abstract: Encryption-then-Compression (EtC) systems have been considered for the user-controllable privacy protection of social media like Twitter. The aim of this paper is to evaluate the security of block scrambling-based encryption schemes, which have been proposed to construct EtC systems. Even though this scheme has enough key spaces against brute-force attacks, each block in encrypted images has almost the same correlation as that of original images. Therefore, it is required to consider the security from different viewpoints from number theory-based encryption methods with provable security such as RSA and AES. In this paper, we evaluate the security of encrypted images including JPEG distortion by using automatic jigsaw puzzle solvers.
URL: https://global.ieice.org/en_transactions/fundamentals/10.1587/transfun.E101.A.2405/_p
Copier
@ARTICLE{e101-a_12_2405,
author={Tatsuya CHUMAN, Hitoshi KIYA, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={Security Evaluation for Block Scrambling-Based Image Encryption Including JPEG Distortion against Jigsaw Puzzle Solver Attacks},
year={2018},
volume={E101-A},
number={12},
pages={2405-2408},
abstract={Encryption-then-Compression (EtC) systems have been considered for the user-controllable privacy protection of social media like Twitter. The aim of this paper is to evaluate the security of block scrambling-based encryption schemes, which have been proposed to construct EtC systems. Even though this scheme has enough key spaces against brute-force attacks, each block in encrypted images has almost the same correlation as that of original images. Therefore, it is required to consider the security from different viewpoints from number theory-based encryption methods with provable security such as RSA and AES. In this paper, we evaluate the security of encrypted images including JPEG distortion by using automatic jigsaw puzzle solvers.},
keywords={},
doi={10.1587/transfun.E101.A.2405},
ISSN={1745-1337},
month={December},}
Copier
TY - JOUR
TI - Security Evaluation for Block Scrambling-Based Image Encryption Including JPEG Distortion against Jigsaw Puzzle Solver Attacks
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 2405
EP - 2408
AU - Tatsuya CHUMAN
AU - Hitoshi KIYA
PY - 2018
DO - 10.1587/transfun.E101.A.2405
JO - IEICE TRANSACTIONS on Fundamentals
SN - 1745-1337
VL - E101-A
IS - 12
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - December 2018
AB - Encryption-then-Compression (EtC) systems have been considered for the user-controllable privacy protection of social media like Twitter. The aim of this paper is to evaluate the security of block scrambling-based encryption schemes, which have been proposed to construct EtC systems. Even though this scheme has enough key spaces against brute-force attacks, each block in encrypted images has almost the same correlation as that of original images. Therefore, it is required to consider the security from different viewpoints from number theory-based encryption methods with provable security such as RSA and AES. In this paper, we evaluate the security of encrypted images including JPEG distortion by using automatic jigsaw puzzle solvers.
ER -