Paper Abstract and Keywords |
Presentation |
2016-12-09 15:15
Extension of Jigsaw Puzzle Solvers and Its Attack on Permutation-Based Image Encryption Schemes Tatsuya Chuman, Kenta Kurihara, Sayaka Shiota, Hitoshi Kiya (Tokyo Metro. Univ.) |
Abstract |
(in Japanese) |
(See Japanese page) |
(in English) |
Block-based scrambled image encryption schemes have superior features that are compressible and against noises to number theory-based encryption
methods such as RSA and DES.
In this paper, we discuss the security of the block-based scrambled schemes
against jigsaw-puzzle solvers.
The security of Block-based scrambled image encryption schemes have been conventionally verified based on the key space under the assumption of a brute-force attack.
However, jigsaw puzzle solvers can be used as a attack schemes because the encrypted image has the same correlation blocks between the original ones despite the encryption.
Then, a new jigsaw puzzle solver is proposed to extend some limitations of the conventional ones.
In the experiments, the jigsaw puzzle solvers are applied to encrypted images to consider the security conditions of the schemes. |
Keyword |
(in Japanese) |
(See Japanese page) |
(in English) |
image encryption / jigsaw puzzle solver / ciphertext-only attack / / / / / |
Reference Info. |
ITE Tech. Rep. |
Paper # |
|
Date of Issue |
|
ISSN |
Print edition: ISSN 1342-6893 Online edition: ISSN 2424-1970 |
Download PDF |
|
Conference Information |
Committee |
BCT IEICE-IE IEICE-CS IPSJ-AVM |
Conference Date |
2016-12-08 - 2016-12-09 |
Place (in Japanese) |
(See Japanese page) |
Place (in English) |
|
Topics (in Japanese) |
(See Japanese page) |
Topics (in English) |
|
Paper Information |
Registration To |
IEICE-IE |
Conference Code |
2016-12-IE-CS-AVM-BCT |
Language |
Japanese |
Title (in Japanese) |
(See Japanese page) |
Sub Title (in Japanese) |
(See Japanese page) |
Title (in English) |
Extension of Jigsaw Puzzle Solvers and Its Attack on Permutation-Based Image Encryption Schemes |
Sub Title (in English) |
|
Keyword(1) |
image encryption |
Keyword(2) |
jigsaw puzzle solver |
Keyword(3) |
ciphertext-only attack |
Keyword(4) |
|
Keyword(5) |
|
Keyword(6) |
|
Keyword(7) |
|
Keyword(8) |
|
1st Author's Name |
Tatsuya Chuman |
1st Author's Affiliation |
Tokyo Metropolitan University (Tokyo Metro. Univ.) |
2nd Author's Name |
Kenta Kurihara |
2nd Author's Affiliation |
Tokyo Metropolitan University (Tokyo Metro. Univ.) |
3rd Author's Name |
Sayaka Shiota |
3rd Author's Affiliation |
Tokyo Metropolitan University (Tokyo Metro. Univ.) |
4th Author's Name |
Hitoshi Kiya |
4th Author's Affiliation |
Tokyo Metropolitan University (Tokyo Metro. Univ.) |
5th Author's Name |
|
5th Author's Affiliation |
() |
6th Author's Name |
|
6th Author's Affiliation |
() |
7th Author's Name |
|
7th Author's Affiliation |
() |
8th Author's Name |
|
8th Author's Affiliation |
() |
9th Author's Name |
|
9th Author's Affiliation |
() |
10th Author's Name |
|
10th Author's Affiliation |
() |
11th Author's Name |
|
11th Author's Affiliation |
() |
12th Author's Name |
|
12th Author's Affiliation |
() |
13th Author's Name |
|
13th Author's Affiliation |
() |
14th Author's Name |
|
14th Author's Affiliation |
() |
15th Author's Name |
|
15th Author's Affiliation |
() |
16th Author's Name |
|
16th Author's Affiliation |
() |
17th Author's Name |
|
17th Author's Affiliation |
() |
18th Author's Name |
|
18th Author's Affiliation |
() |
19th Author's Name |
|
19th Author's Affiliation |
() |
20th Author's Name |
|
20th Author's Affiliation |
() |
Speaker |
1 |
Date Time |
2016-12-09 15:15:00 |
Presentation Time |
25 |
Registration for |
IEICE-IE |
Paper # |
|
Volume (vol) |
ITE-40 |
Number (no) |
no.45 |
Page |
|
#Pages |
ITE- |
Date of Issue |
|