A leak and its remedy in JPEG image encryption

Weihai Li*, Yuan Yuan

*Corresponding author for this work

Research output: Contribution to journalArticle

Abstract

Focusing on the encryption of digital image and video, an intrinsic weakness of all existing discrete-cosine-transform (DCT) based algorithms is reported. This serious weakness of DCT-based encryptions is analysed theoretically and then demonstrated practically. As an instance, a novel attack algorithm is proposed to acquire the sketch information from encrypted data without any prior knowledge of the encryption algorithm. The quality of the extracted sketch is then evaluated by comparing with the original picture edge. Thereafter, to prevent this kind of attack, a full inter-block shuffle (FIBS) approach is proposed. This method can be employed to improve the encryption security in all DCT-based algorithms, such as JPEG, MPEG video and H.26x video.

Original languageEnglish
Pages (from-to)1367-1378
Number of pages12
JournalInternational Journal of Computer Mathematics
Volume84
Issue number9
DOIs
Publication statusPublished - 1 Sep 2007

Fingerprint

Image Encryption
Encryption
Cryptography
Discrete Cosine Transform
Discrete cosine transforms
Attack
Digital Video
Shuffle
Digital Image
Prior Knowledge

Keywords

  • Enhancement
  • Full inter-block shuffle
  • JPEG encryption
  • Non-zero-counting attack
  • Security

Cite this

Li, Weihai ; Yuan, Yuan. / A leak and its remedy in JPEG image encryption. In: International Journal of Computer Mathematics. 2007 ; Vol. 84, No. 9. pp. 1367-1378.
@article{3e1868668b8649ed9881b803a3b98386,
title = "A leak and its remedy in JPEG image encryption",
abstract = "Focusing on the encryption of digital image and video, an intrinsic weakness of all existing discrete-cosine-transform (DCT) based algorithms is reported. This serious weakness of DCT-based encryptions is analysed theoretically and then demonstrated practically. As an instance, a novel attack algorithm is proposed to acquire the sketch information from encrypted data without any prior knowledge of the encryption algorithm. The quality of the extracted sketch is then evaluated by comparing with the original picture edge. Thereafter, to prevent this kind of attack, a full inter-block shuffle (FIBS) approach is proposed. This method can be employed to improve the encryption security in all DCT-based algorithms, such as JPEG, MPEG video and H.26x video.",
keywords = "Enhancement, Full inter-block shuffle, JPEG encryption, Non-zero-counting attack, Security",
author = "Weihai Li and Yuan Yuan",
year = "2007",
month = "9",
day = "1",
doi = "10.1080/00207160701294376",
language = "English",
volume = "84",
pages = "1367--1378",
journal = "International Journal of Computer Mathematics",
issn = "0020-7160",
publisher = "Taylor & Francis",
number = "9",

}

A leak and its remedy in JPEG image encryption. / Li, Weihai; Yuan, Yuan.

In: International Journal of Computer Mathematics, Vol. 84, No. 9, 01.09.2007, p. 1367-1378.

Research output: Contribution to journalArticle

TY - JOUR

T1 - A leak and its remedy in JPEG image encryption

AU - Li, Weihai

AU - Yuan, Yuan

PY - 2007/9/1

Y1 - 2007/9/1

N2 - Focusing on the encryption of digital image and video, an intrinsic weakness of all existing discrete-cosine-transform (DCT) based algorithms is reported. This serious weakness of DCT-based encryptions is analysed theoretically and then demonstrated practically. As an instance, a novel attack algorithm is proposed to acquire the sketch information from encrypted data without any prior knowledge of the encryption algorithm. The quality of the extracted sketch is then evaluated by comparing with the original picture edge. Thereafter, to prevent this kind of attack, a full inter-block shuffle (FIBS) approach is proposed. This method can be employed to improve the encryption security in all DCT-based algorithms, such as JPEG, MPEG video and H.26x video.

AB - Focusing on the encryption of digital image and video, an intrinsic weakness of all existing discrete-cosine-transform (DCT) based algorithms is reported. This serious weakness of DCT-based encryptions is analysed theoretically and then demonstrated practically. As an instance, a novel attack algorithm is proposed to acquire the sketch information from encrypted data without any prior knowledge of the encryption algorithm. The quality of the extracted sketch is then evaluated by comparing with the original picture edge. Thereafter, to prevent this kind of attack, a full inter-block shuffle (FIBS) approach is proposed. This method can be employed to improve the encryption security in all DCT-based algorithms, such as JPEG, MPEG video and H.26x video.

KW - Enhancement

KW - Full inter-block shuffle

KW - JPEG encryption

KW - Non-zero-counting attack

KW - Security

UR - http://www.scopus.com/inward/record.url?scp=34548303710&partnerID=8YFLogxK

U2 - 10.1080/00207160701294376

DO - 10.1080/00207160701294376

M3 - Article

AN - SCOPUS:34548303710

VL - 84

SP - 1367

EP - 1378

JO - International Journal of Computer Mathematics

JF - International Journal of Computer Mathematics

SN - 0020-7160

IS - 9

ER -