메뉴 건너뛰기




Volumn 18, Issue 3, 2008, Pages 338-349

Cryptanalysis of an image scrambling scheme without bandwidth expansion

Author keywords

Chosen ciphertext attack; Chosen plaintext attack; Ciphertext only attack; Cryptanalysis; Discrete prolate spheroidal sequence (DPSS); Encryption; Hadamard matrix; Image scrambling; Known plaintext attack; Perceptual encryption

Indexed keywords

BANDWIDTH; CRYPTOGRAPHY; PROBLEM SOLVING; SECURITY OF DATA; TEXT PROCESSING;

EID: 41649091475     PISSN: 10518215     EISSN: None     Source Type: Journal    
DOI: 10.1109/TCSVT.2008.918116     Document Type: Article
Times cited : (45)

References (47)
  • 1
    • 85045783142 scopus 로고    scopus 로고
    • Fundamentals of multimedia encryption techniques
    • B. Furht and D. Kirovski, Eds. Boca Raton, FL: CRC, ch. 3, pp
    • B. Furht, D. Socek, and A. M. Eskicioglu, "Fundamentals of multimedia encryption techniques," in Multimedia Security Handbook, B. Furht and D. Kirovski, Eds. Boca Raton, FL: CRC, 2004, ch. 3, pp. 93-132.
    • (2004) Multimedia Security Handbook , pp. 93-132
    • Furht, B.1    Socek, D.2    Eskicioglu, A.M.3
  • 2
    • 85008921093 scopus 로고    scopus 로고
    • Chaos-based encryption for digital images and videos
    • B. Furht and D. Kirovski, Eds. Boca Raton, FL: CRC, ch. 4, pp, On-line, Available:, preprint is available at
    • S. Li, G. Chen, and X. Zheng, "Chaos-based encryption for digital images and videos," in Multimedia Security Handbook, B. Furht and D. Kirovski, Eds. Boca Raton, FL: CRC, 2004, ch. 4, pp. 133-167 [On-line], Available: http://www.hooklee.com/pub.html, preprint is available at
    • (2004) Multimedia Security Handbook , pp. 133-167
    • Li, S.1    Chen, G.2    Zheng, X.3
  • 3
    • 41649085677 scopus 로고    scopus 로고
    • Image and Video Encryption: From Digital Rights Management to Secured Personal Communication. Boston, MA: Springer Science, Business Media, 2005
    • A. UhI and A. Pommer, Image and Video Encryption: From Digital Rights Management to Secured Personal Communication. Boston, MA: Springer Science + Business Media, 2005.
    • UhI, A.1    Pommer, A.2
  • 4
    • 33847743046 scopus 로고    scopus 로고
    • B. Furht, E. Muharemagic, and D. Socek, Eds, New York: Springer-Verlag
    • B. Furht, E. Muharemagic, and D. Socek, Eds., Multimedia Encryption and Watermarking. New York: Springer-Verlag, 2005.
    • (2005) Multimedia Encryption and Watermarking
  • 8
    • 0003508560 scopus 로고    scopus 로고
    • Nat. Inst. Standards Technol, US, Nov, Federal Information Processing Standards Publication 197 HPS PUB 197
    • Specification for the Advanced Encryption Standard (AES), Nat. Inst. Standards Technol. (US), Nov. 2001, Federal Information Processing Standards Publication 197 (HPS PUB 197).
    • (2001) Specification for the Advanced Encryption Standard (AES)
  • 9
    • 0038209203 scopus 로고    scopus 로고
    • Multimedia security and copyright protection,
    • Ph.D. dissertation, Dept. of Comput. Sci, Univ. of Illinois at Urbana-Champaign, Urbana
    • L. Qiao, "Multimedia security and copyright protection," Ph.D. dissertation, Dept. of Comput. Sci., Univ. of Illinois at Urbana-Champaign, Urbana, 1998.
    • (1998)
    • Qiao, L.1
  • 11
    • 0036612847 scopus 로고    scopus 로고
    • A formatcompliant configurable encryption framework for access control of video
    • Jun
    • J. Wen, M. Severa, W. Zeng, M. H. Luttrell, and W. Jin, "A formatcompliant configurable encryption framework for access control of video," IEEE Trans. Circuits Syst. Video Technol., vol. 12, no. 6, pp. 545-557, Jun. 2002.
    • (2002) IEEE Trans. Circuits Syst. Video Technol , vol.12 , Issue.6 , pp. 545-557
    • Wen, J.1    Severa, M.2    Zeng, W.3    Luttrell, M.H.4    Jin, W.5
  • 12
    • 84857536837 scopus 로고
    • A video scrambing technique based on space filling curve (extended abstract)
    • Y. Matias and A. Shamir, "A video scrambing technique based on space filling curve (extended abstract)," in Proc. Advances in Cryptology - Crypto"87, 1987, vol. 293, pp. 398-417.
    • (1987) Proc. Advances in Cryptology - Crypto87 , vol.293 , pp. 398-417
    • Matias, Y.1    Shamir, A.2
  • 13
    • 0000326312 scopus 로고
    • Picture data encryption using scan patterns
    • N. Bourbakis and C. Alexopoulos, "Picture data encryption using scan patterns," Patt. Recognit., vol. 25, no. 6, pp. 567-581, 1992.
    • (1992) Patt. Recognit , vol.25 , Issue.6 , pp. 567-581
    • Bourbakis, N.1    Alexopoulos, C.2
  • 14
    • 33746978693 scopus 로고
    • Method for Scrambling and Unscrambling a Video Signal,
    • U.S. Patent 5375168
    • A. Kudelski, "Method for Scrambling and Unscrambling a Video Signal," U.S. Patent 5375168, 1994.
    • (1994)
    • Kudelski, A.1
  • 15
    • 0026173255 scopus 로고
    • Design and cryptanalysis of transform-based analog speech scramblers
    • S. Sridharan, E. Dawson, and B. Goldburg, "Design and cryptanalysis of transform-based analog speech scramblers," IEE Proc. I - Comm., Speech Vis., vol. 138, no. 3, pp. 215-223, 1991.
    • (1991) IEE Proc. I - Comm., Speech Vis , vol.138 , Issue.3 , pp. 215-223
    • Sridharan, S.1    Dawson, E.2    Goldburg, B.3
  • 16
    • 0027617334 scopus 로고
    • Design and cryptanalysis of transform-based analog speech scramblers
    • May
    • B. Goldburg, S. Sridharan, and E. Dawson, "Design and cryptanalysis of transform-based analog speech scramblers," in IEEE J. Sel. Areas Commun., May 1993, vol. 11, no. 5, pp. 735-744.
    • (1993) IEEE J. Sel. Areas Commun , vol.11 , Issue.5 , pp. 735-744
    • Goldburg, B.1    Sridharan, S.2    Dawson, E.3
  • 17
    • 0030419062 scopus 로고    scopus 로고
    • Methods for encrypting and decrypting MPEG video data efficiently
    • L. Tang, "Methods for encrypting and decrypting MPEG video data efficiently," in Proc. 4th ACM Int. Conf. Multimedia, 1996, pp. 219-229.
    • (1996) Proc. 4th ACM Int. Conf. Multimedia , pp. 219-229
    • Tang, L.1
  • 18
    • 0032045063 scopus 로고    scopus 로고
    • Large encrypting binary images with higher security
    • K.-L. Chung and L.-C. Chang, "Large encrypting binary images with higher security," Patt. Recognit. Lett., vol. 19, no. 5-6, pp. 461-468, 1998.
    • (1998) Patt. Recognit. Lett , vol.19 , Issue.5-6 , pp. 461-468
    • Chung, K.-L.1    Chang, L.-C.2
  • 19
    • 2342457357 scopus 로고    scopus 로고
    • A secrecy scheme for MPEG video data using the joint of compression and encryption
    • Proc. Inf. Security: 2nd Int. Workshop
    • S. U. Shin, K. S. Sim, and K. H. Rhee, "A secrecy scheme for MPEG video data using the joint of compression and encryption," in Proc. Inf. Security: 2nd Int. Workshop, 1999, vol. 1729, pp. 191-201, ser. Lecture Notes in Computer Science.
    • (1999) ser. Lecture Notes in Computer Science , vol.1729 , pp. 191-201
    • Shin, S.U.1    Sim, K.S.2    Rhee, K.H.3
  • 20
    • 0038273965 scopus 로고    scopus 로고
    • Efficient frequency domain selective scrambling of digital video
    • Jan
    • W. Zeng and S. Lei, "Efficient frequency domain selective scrambling of digital video," IEEE Trans. Multimedia, vol. 5, no. 1, pp. 118-129, Jan. 2003.
    • (2003) IEEE Trans. Multimedia , vol.5 , Issue.1 , pp. 118-129
    • Zeng, W.1    Lei, S.2
  • 22
    • 0030577343 scopus 로고    scopus 로고
    • On the security of image encryption method
    • J.-K. Jan and Y.-M. Tseng, "On the security of image encryption method," Inf. Pmcess. Lett., vol. 60, no. 5, pp. 261-265, 1996.
    • (1996) Inf. Pmcess. Lett , vol.60 , Issue.5 , pp. 261-265
    • Jan, J.-K.1    Tseng, Y.-M.2
  • 24
    • 0003993602 scopus 로고    scopus 로고
    • Partial Encryption for Image and Video Communication.,
    • Master's thesis, Dept. of Comput. Sci, Univ. of Alberta, Edmonton, AB, Canada
    • H. C. H. Cheng, "Partial Encryption for Image and Video Communication.," Master's thesis, Dept. of Comput. Sci., Univ. of Alberta, Edmonton, AB, Canada, 1998.
    • (1998)
    • Cheng, H.C.H.1
  • 26
    • 0036885204 scopus 로고    scopus 로고
    • Cryptanalysis of an encryption scheme for binary images
    • C.-C. Chang and T.-X. Yu, "Cryptanalysis of an encryption scheme for binary images," Patt. Recognit. Lett., vol. 23, no. 14, pp. 1847-1852, 2002.
    • (2002) Patt. Recognit. Lett , vol.23 , Issue.14 , pp. 1847-1852
    • Chang, C.-C.1    Yu, T.-X.2
  • 27
    • 41649110336 scopus 로고    scopus 로고
    • A general cryptanalysis of permutation-only multimedia encryption algorithms
    • accepted for publication
    • S. Li, C. Li, G. Chen, N. G. Bourbakis, and K.-T. Lo, "A general cryptanalysis of permutation-only multimedia encryption algorithms," Signal Process: Image Process., 2008, accepted for publication.
    • (2008) Signal Process: Image Process
    • Li, S.1    Li, C.2    Chen, G.3    Bourbakis, N.G.4    Lo, K.-T.5
  • 28
    • 0029289969 scopus 로고
    • Optical image encryption based on input plane and Fourier plane random encoding
    • P. Refregier and B. Javidi, "Optical image encryption based on input plane and Fourier plane random encoding," Opt. Lett., vol. 20, no. 7, pp. 767-769, 1995.
    • (1995) Opt. Lett , vol.20 , Issue.7 , pp. 767-769
    • Refregier, P.1    Javidi, B.2
  • 29
    • 0000235402 scopus 로고    scopus 로고
    • Secure optical storage that uses fully phase encryption
    • X. Tan, O. Matoba, T. Shimura, K. Kuroda, and B. Javidi, "Secure optical storage that uses fully phase encryption," Appl. Opt., vol. 39, no. 35, pp. 6689-6694, 2000.
    • (2000) Appl. Opt , vol.39 , Issue.35 , pp. 6689-6694
    • Tan, X.1    Matoba, O.2    Shimura, T.3    Kuroda, K.4    Javidi, B.5
  • 30
    • 22144431522 scopus 로고    scopus 로고
    • Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys
    • A. Carnicer, M. Montes-Usategui, S. Arcos, and I. Juvells, "Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys," Opt. Lett., vol. 30, no. 13, pp. 1644-1646, 2005.
    • (2005) Opt. Lett , vol.30 , Issue.13 , pp. 1644-1646
    • Carnicer, A.1    Montes-Usategui, M.2    Arcos, S.3    Juvells, I.4
  • 31
    • 33744788334 scopus 로고    scopus 로고
    • X. Peng, P. Zhang, H. Wei, and B. Yu, Known-plaintext attack on optical encryption based on double random phase keys, Opt. Lett., 3.1, no. 8, pp. 1044-1046, 2006.
    • X. Peng, P. Zhang, H. Wei, and B. Yu, "Known-plaintext attack on optical encryption based on double random phase keys," Opt. Lett., vol. 3.1, no. 8, pp. 1044-1046, 2006.
  • 32
    • 33645790805 scopus 로고    scopus 로고
    • Known-plaintext attack on double random encoding encryption technique
    • X. Peng, P. Zhang, H. Wei, and B. Yu, "Known-plaintext attack on double random encoding encryption technique," Acta Physica Sinica, vol. 55, no. 3, pp. 1130-1136, 2006.
    • (2006) Acta Physica Sinica , vol.55 , Issue.3 , pp. 1130-1136
    • Peng, X.1    Zhang, P.2    Wei, H.3    Yu, B.4
  • 33
    • 0000378191 scopus 로고    scopus 로고
    • Fast encryption of image data using chaotic Kolmogorov flows
    • J. Scharinger, "Fast encryption of image data using chaotic Kolmogorov flows," J. Electron. Imaging, vol. 7, no. 2, pp. 318-325, 1998.
    • (1998) J. Electron. Imaging , vol.7 , Issue.2 , pp. 318-325
    • Scharinger, J.1
  • 34
    • 0032089417 scopus 로고    scopus 로고
    • Symmetric ciphers based on two-dimensional chaotic maps
    • J. Fridrich, "Symmetric ciphers based on two-dimensional chaotic maps," Int. J. Bifurc. Chaos, vol. 8, no. 6, pp. 1259-1284, 1998.
    • (1998) Int. J. Bifurc. Chaos , vol.8 , Issue.6 , pp. 1259-1284
    • Fridrich, J.1
  • 35
    • 1342306864 scopus 로고    scopus 로고
    • A symmetric image encryption scheme based on 3-D chaotic cat maps
    • Y. Mao, G. Chen, and C. K. Chui, "A symmetric image encryption scheme based on 3-D chaotic cat maps," Chaos, Solitons & Fractals, vol. 21, no. 3, pp. 749-761, 2004.
    • (2004) Chaos, Solitons & Fractals , vol.21 , Issue.3 , pp. 749-761
    • Mao, Y.1    Chen, G.2    Chui, C.K.3
  • 36
    • 0036296858 scopus 로고    scopus 로고
    • Cryptanalysis of a chaotic image encryption method
    • S. Li and X. Zheng, "Cryptanalysis of a chaotic image encryption method," in Proc. IEEE Int. Symp. Circuits Syst., 2002, vol. II, pp. 708-711.
    • (2002) Proc. IEEE Int. Symp. Circuits Syst , vol.2 , pp. 708-711
    • Li, S.1    Zheng, X.2
  • 37
    • 0036453480 scopus 로고    scopus 로고
    • On the security of an image encryption method
    • S. Li and X. Zheng, "On the security of an image encryption method," in Proc. IEEE Int. Conf. Image. Process., 2002, vol. 2, pp. 925-928.
    • (2002) Proc. IEEE Int. Conf. Image. Process , vol.2 , pp. 925-928
    • Li, S.1    Zheng, X.2
  • 38
    • 35048844681 scopus 로고    scopus 로고
    • Cryptanalysis of a chaotic neural network based multimedia encryption scheme
    • C. Li, S. Li, D. Zhang, and G. Chen, "Cryptanalysis of a chaotic neural network based multimedia encryption scheme," in Proc. Adv. Multimedia Inf. Process., 2004, vol. 3333, pp. 418-425.
    • (2004) Proc. Adv. Multimedia Inf. Process , vol.3333 , pp. 418-425
    • Li, C.1    Li, S.2    Zhang, D.3    Chen, G.4
  • 39
    • 41649121962 scopus 로고    scopus 로고
    • Cryptanalysis of RCES/RSES image encryption scheme
    • Jul. 2007 [Online, Available
    • S. Li, C. Li, G. Chen, and K.-T. Lo, "Cryptanalysis of RCES/RSES image encryption scheme," J. Syst. Softw., Jul. 2007 [Online]. Available: http://eprint.iacr.org/2004/376
    • J. Syst. Softw
    • Li, S.1    Li, C.2    Chen, G.3    Lo, K.-T.4
  • 41
    • 24344510301 scopus 로고    scopus 로고
    • Cryptanalysis of a new signal security system for multimedia data transmission
    • C. Li, S. Li, G. Chen, G. Chen, and L. Hu, "Cryptanalysis of a new signal security system for multimedia data transmission," EURASIP J. Appl. Signal Process., vol. 2005, no. 8, pp. 1277-1288, 2005.
    • (2005) EURASIP J. Appl. Signal Process , vol.2005 , Issue.8 , pp. 1277-1288
    • Li, C.1    Li, S.2    Chen, G.3    Chen, G.4    Hu, L.5
  • 42
    • 32544436119 scopus 로고    scopus 로고
    • On the security of the YenGuo's domino signal encryption algorithm. (DSEA)
    • C. Li, S. Li, D.-C. Lou, and D. Zhang, "On the security of the YenGuo's domino signal encryption algorithm. (DSEA)," J. Syst. Software, vol. 79, no. 2. pp. 253-258, 2006.
    • (2006) J. Syst. Software , vol.79 , Issue.2 , pp. 253-258
    • Li, C.1    Li, S.2    Lou, D.-C.3    Zhang, D.4
  • 44
    • 0018467416 scopus 로고
    • An analog scrambling scheme which does not expand bandwidth, Part I: Discrete time
    • A. D. Wyner, "An analog scrambling scheme which does not expand bandwidth, Part I: Discrete time," IEEE Trans. Inf. Theory, vol. 25, no. 3, pp. 261-274, 1979.
    • (1979) IEEE Trans. Inf. Theory , vol.25 , Issue.3 , pp. 261-274
    • Wyner, A.D.1
  • 45
    • 0017961888 scopus 로고
    • Prolate spheroidal wave functions, Fourier analysis, and uncertainty-V: The discrete case
    • D. Slepian, "Prolate spheroidal wave functions, Fourier analysis, and uncertainty-V: The discrete case," Bell Syst. Tech. J., vol. 57, no. 5, pp. 1371-1430, 1978.
    • (1978) Bell Syst. Tech. J , vol.57 , Issue.5 , pp. 1371-1430
    • Slepian, D.1
  • 46
    • 41649113028 scopus 로고    scopus 로고
    • Hadamard matrix
    • Web Resource, Online, Available
    • E. W. Weisstein, "Hadamard matrix," From MathWorld - A Wolfram. Web Resource. [Online]. Available: http://mathworld.wol-fram.com/ HadamardMatrix.html2005
    • From MathWorld - A Wolfram
    • Weisstein, E.W.1
  • 47
    • 26844567623 scopus 로고    scopus 로고
    • Design of integrated multimedia compression and encryption systems
    • May
    • C.-P. Wu and C.-C. J. Kuo, "Design of integrated multimedia compression and encryption systems," IEEE Trans. Multimedia, vol. 7, no. 5, pp. 828-839, May 2005.
    • (2005) IEEE Trans. Multimedia , vol.7 , Issue.5 , pp. 828-839
    • Wu, C.-P.1    Kuo, C.-C.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.