Cryptanalysis of video encryption based on space-filling curves
EUROCRYPT '89 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Methods for encrypting and decrypting MPEG video data efficiently
MULTIMEDIA '96 Proceedings of the fourth ACM international conference on Multimedia
On the security of image encryption method
Information Processing Letters
Large encrypting binary images with higher security
Pattern Recognition Letters
Multimedia security and copyright protection
Multimedia security and copyright protection
Partial encryption for image and video communication
Partial encryption for image and video communication
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Cryptanalysis of an encryption scheme for binary images
Pattern Recognition Letters
A Video Scrambling Technique Based On Space Filling Curves
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
SCAN-Based Compression-Encryption-Hiding for Video on Demand
IEEE MultiMedia
Perceptual Cryptography on JPEG2000 Compressed Images or Videos
CIT '04 Proceedings of the The Fourth International Conference on Computer and Information Technology
Image And Video Encryption: From Digital Rights Management To Secured Personal Communication (Advances in Information Security)
Multimedia Encryption and Watermarking (Multimedia Systems and Applications)
Multimedia Encryption and Watermarking (Multimedia Systems and Applications)
Multimedia Security Technologies for Digital Rights Management
Multimedia Security Technologies for Digital Rights Management
Design and realization of a new signal security system for multimedia data transmission
EURASIP Journal on Applied Signal Processing
Partial encryption of compressed images and videos
IEEE Transactions on Signal Processing
Efficient frequency domain selective scrambling of digital video
IEEE Transactions on Multimedia
Design and cryptanalysis of transform-based analog speech scramblers
IEEE Journal on Selected Areas in Communications
A joint signal processing and cryptographic approach to multimedia encryption
IEEE Transactions on Image Processing
On the security defects of an image encryption scheme
Image and Vision Computing
Cryptanalysis of an image encryption scheme based on a compound chaotic sequence
Image and Vision Computing
Transparent and perceptually enhanced JPEG image encryption
DSP'09 Proceedings of the 16th international conference on Digital Signal Processing
A differential cryptanalysis of Yen-Chen-Wu multimedia cryptography system
Journal of Systems and Software
ICIP'09 Proceedings of the 16th IEEE international conference on Image processing
Image encryption algorithms based on generalized P-gray code bit plane decomposition
Asilomar'09 Proceedings of the 43rd Asilomar conference on Signals, systems and computers
Cryptanalysis of an image encryption scheme using cellular automata substitution and SCAN
PCM'10 Proceedings of the 11th Pacific Rim conference on Advances in multimedia information processing: Part I
A chaos-based symmetric image encryption scheme using a bit-level permutation
Information Sciences: an International Journal
Cryptanalysis on an image scrambling encryption scheme based on pixel bit
IWDW'10 Proceedings of the 9th international conference on Digital watermarking
An objective visual security assessment for cipher-images based on local entropy
Multimedia Tools and Applications
A chaos-based joint image compression and encryption scheme using DCT and SHA-1
Applied Soft Computing
A new image encryption scheme based on a chaotic function
Image Communication
Novel Approach for fast Compressed Hybrid color image Cryptosystem
Advances in Engineering Software
A secure image encryption algorithm based on Rubik's cube principle
Journal of Electrical and Computer Engineering
Security analysis of image cryptosystems only or partially based on a chaotic permutation
Journal of Systems and Software
Breaking row-column shuffle based image cipher
Proceedings of the 20th ACM international conference on Multimedia
A new approach to commutative watermarking-encryption
CMS'12 Proceedings of the 13th IFIP TC 6/TC 11 international conference on Communications and Multimedia Security
Hi-index | 0.00 |
In recent years secret permutations have been widely used for protecting different types of multimedia data, including speech files, digital images and videos. Based on a general model of permutation-only multimedia ciphers, this paper performs a quantitative cryptanalysis on the performance of these kind of ciphers against plaintext attacks. When the plaintext is of size MxN and with L different levels of values, the following quantitative cryptanalytic findings have been concluded under the assumption of a uniform distribution of each element in the plaintext: (1) all permutation-only multimedia ciphers are practically insecure against known/chosen-plaintext attacks in the sense that only O(log"L(MN)) known/chosen plaintexts are sufficient to recover not less than (in an average sense) half elements of the plaintext; (2) the computational complexity of the known/chosen-plaintext attack is only O(n.(MN)^2), where n is the number of known/chosen plaintexts used. When the plaintext has a non-uniform distribution, the number of required plaintexts and the computational complexity is also discussed. Experiments are given to demonstrate the real performance of the known-plaintext attack for a typical permutation-only image cipher.