ITE Technical Group Submission System
Conference Paper's Information
Online Proceedings
[Sign in]
 Go Top Page Go Previous   [Japanese] / [English] 

Paper Abstract and Keywords
Presentation 2016-12-09 15:15
Extension of Jigsaw Puzzle Solvers and Its Attack on Permutation-Based Image Encryption Schemes
Tatsuya Chuman, Kenta Kurihara, Sayaka Shiota, Hitoshi Kiya (Tokyo Metro. Univ.)
Abstract (in Japanese) (See Japanese page) 
(in English) Block-based scrambled image encryption schemes have superior features that are compressible and against noises to number theory-based encryption
methods such as RSA and DES.
In this paper, we discuss the security of the block-based scrambled schemes
against jigsaw-puzzle solvers.
The security of Block-based scrambled image encryption schemes have been conventionally verified based on the key space under the assumption of a brute-force attack.
However, jigsaw puzzle solvers can be used as a attack schemes because the encrypted image has the same correlation blocks between the original ones despite the encryption.
Then, a new jigsaw puzzle solver is proposed to extend some limitations of the conventional ones.
In the experiments, the jigsaw puzzle solvers are applied to encrypted images to consider the security conditions of the schemes.
Keyword (in Japanese) (See Japanese page) 
(in English) image encryption / jigsaw puzzle solver / ciphertext-only attack / / / / /  
Reference Info. ITE Tech. Rep.
Paper #  
Date of Issue  
ISSN Print edition: ISSN 1342-6893  Online edition: ISSN 2424-1970
Download PDF

Conference Information
Committee BCT IEICE-IE IEICE-CS IPSJ-AVM  
Conference Date 2016-12-08 - 2016-12-09 
Place (in Japanese) (See Japanese page) 
Place (in English)  
Topics (in Japanese) (See Japanese page) 
Topics (in English)  
Paper Information
Registration To IEICE-IE 
Conference Code 2016-12-IE-CS-AVM-BCT 
Language Japanese 
Title (in Japanese) (See Japanese page) 
Sub Title (in Japanese) (See Japanese page) 
Title (in English) Extension of Jigsaw Puzzle Solvers and Its Attack on Permutation-Based Image Encryption Schemes 
Sub Title (in English)  
Keyword(1) image encryption  
Keyword(2) jigsaw puzzle solver  
Keyword(3) ciphertext-only attack  
Keyword(4)  
Keyword(5)  
Keyword(6)  
Keyword(7)  
Keyword(8)  
1st Author's Name Tatsuya Chuman  
1st Author's Affiliation Tokyo Metropolitan University (Tokyo Metro. Univ.)
2nd Author's Name Kenta Kurihara  
2nd Author's Affiliation Tokyo Metropolitan University (Tokyo Metro. Univ.)
3rd Author's Name Sayaka Shiota  
3rd Author's Affiliation Tokyo Metropolitan University (Tokyo Metro. Univ.)
4th Author's Name Hitoshi Kiya  
4th Author's Affiliation Tokyo Metropolitan University (Tokyo Metro. Univ.)
5th Author's Name  
5th Author's Affiliation ()
6th Author's Name  
6th Author's Affiliation ()
7th Author's Name  
7th Author's Affiliation ()
8th Author's Name  
8th Author's Affiliation ()
9th Author's Name  
9th Author's Affiliation ()
10th Author's Name  
10th Author's Affiliation ()
11th Author's Name  
11th Author's Affiliation ()
12th Author's Name  
12th Author's Affiliation ()
13th Author's Name  
13th Author's Affiliation ()
14th Author's Name  
14th Author's Affiliation ()
15th Author's Name  
15th Author's Affiliation ()
16th Author's Name  
16th Author's Affiliation ()
17th Author's Name  
17th Author's Affiliation ()
18th Author's Name  
18th Author's Affiliation ()
19th Author's Name  
19th Author's Affiliation ()
20th Author's Name  
20th Author's Affiliation ()
Speaker
Date Time 2016-12-09 15:15:00 
Presentation Time 25 
Registration for IEICE-IE 
Paper #  
Volume (vol) ITE-40 
Number (no) no.45 
Page  
#Pages ITE- 
Date of Issue  


[Return to Top Page]

[Return to ITE Web Page]


The Institute of Image Information and Television Engineers (ITE), Japan