A leak and its remedy in JPEG image encryption

Weihai Li*, Yuan Yuan

*Corresponding author for this work

Research output: Contribution to journalArticle

Abstract

Focusing on the encryption of digital image and video, an intrinsic weakness of all existing discrete-cosine-transform (DCT) based algorithms is reported. This serious weakness of DCT-based encryptions is analysed theoretically and then demonstrated practically. As an instance, a novel attack algorithm is proposed to acquire the sketch information from encrypted data without any prior knowledge of the encryption algorithm. The quality of the extracted sketch is then evaluated by comparing with the original picture edge. Thereafter, to prevent this kind of attack, a full inter-block shuffle (FIBS) approach is proposed. This method can be employed to improve the encryption security in all DCT-based algorithms, such as JPEG, MPEG video and H.26x video.

Original languageEnglish
Pages (from-to)1367-1378
Number of pages12
JournalInternational Journal of Computer Mathematics
Volume84
Issue number9
DOIs
Publication statusPublished - 1 Sep 2007

Keywords

  • Enhancement
  • Full inter-block shuffle
  • JPEG encryption
  • Non-zero-counting attack
  • Security

Fingerprint Dive into the research topics of 'A leak and its remedy in JPEG image encryption'. Together they form a unique fingerprint.

  • Cite this