Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Cryptanalysis of an Image Scrambling Scheme Without Bandwidth Expansion

Published: 01 March 2008 Publication History

Abstract

Recently, a new image scrambling (i.e., encryption) scheme without bandwidth expansion was proposed based on two-dimensional discrete prolate spheroidal sequences. A comprehensive cryptanalysis is given here on this image scrambling scheme, showing that it is not sufficiently secure against various cryptographical attacks including ciphertext-only attack, known/chosen-plaintext attack, and chosen-ciphertext attack. Detailed cryptanalytic results suggest that the image scrambling scheme can only be used to realize perceptual encryption but not to provide content protection for digital images.

Cited By

View all
  • (2022)Development of secrete images in image transferring systemMultimedia Tools and Applications10.1007/s11042-022-13677-382:5(7529-7552)Online publication date: 24-Aug-2022
  • (2020)The Design of a Novel Multiple-Parameter Fractional Number-Theoretic Transform and Its Application to Image EncryptionIEEE Transactions on Circuits and Systems for Video Technology10.1109/TCSVT.2019.292552230:8(2489-2502)Online publication date: 1-Aug-2020
  • (2020)Security analysis of multiple permutation encryption adopt in reversible data hidingMultimedia Tools and Applications10.1007/s11042-020-09379-379:39-40(29451-29471)Online publication date: 1-Oct-2020
  • Show More Cited By
  1. Cryptanalysis of an Image Scrambling Scheme Without Bandwidth Expansion

        Recommendations

        Comments

        Please enable JavaScript to view thecomments powered by Disqus.

        Information & Contributors

        Information

        Published In

        cover image IEEE Transactions on Circuits and Systems for Video Technology
        IEEE Transactions on Circuits and Systems for Video Technology  Volume 18, Issue 3
        March 2008
        140 pages

        Publisher

        IEEE Press

        Publication History

        Published: 01 March 2008

        Author Tags

        1. Ciphertext-only attack
        2. Hadamard matrix
        3. chosen- ciphertext attack
        4. chosen-ciphertext attack
        5. chosen-plaintext attack
        6. ciphertext-only attack
        7. cryptanalysis
        8. discrete prolate spheroidal sequence (DPSS)
        9. encryption
        10. image scrambling
        11. known-plaintext attack
        12. perceptual encryption

        Qualifiers

        • Research-article

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)0
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 18 Dec 2024

        Other Metrics

        Citations

        Cited By

        View all
        • (2022)Development of secrete images in image transferring systemMultimedia Tools and Applications10.1007/s11042-022-13677-382:5(7529-7552)Online publication date: 24-Aug-2022
        • (2020)The Design of a Novel Multiple-Parameter Fractional Number-Theoretic Transform and Its Application to Image EncryptionIEEE Transactions on Circuits and Systems for Video Technology10.1109/TCSVT.2019.292552230:8(2489-2502)Online publication date: 1-Aug-2020
        • (2020)Security analysis of multiple permutation encryption adopt in reversible data hidingMultimedia Tools and Applications10.1007/s11042-020-09379-379:39-40(29451-29471)Online publication date: 1-Oct-2020
        • (2020)Image encryption based on a new 2D logistic adjusted logistic mapMultimedia Tools and Applications10.1007/s11042-019-08079-x79:1-2(355-374)Online publication date: 1-Jan-2020
        • (2018)On the security of a stream cipher in reversible data hiding schemes operating in the encrypted domainSignal Processing10.1016/j.sigpro.2017.09.020143:C(336-345)Online publication date: 1-Feb-2018
        • (2018)Symmetric Cryptosystem Based on Chaos Structured Phase Masks and Equal Modulus Decomposition Using Fractional Fourier Transform3D Research10.1007/s13319-018-0192-99:3(1-20)Online publication date: 1-Sep-2018
        • (2018)Enhancing Security of Double Random Phase Encoding Based on Random S-Box3D Research10.1007/s13319-018-0165-z9:2(1-20)Online publication date: 1-Jun-2018
        • (2017)An efficient symmetric image encryption algorithm based on an intertwining logistic mapNeurocomputing10.1016/j.neucom.2017.04.016251:C(45-53)Online publication date: 16-Aug-2017
        • (2017)An Asymmetric Image Encryption Based on Phase Truncated Hybrid Transform3D Research10.1007/s13319-017-0137-88:3(1-17)Online publication date: 1-Sep-2017
        • (2016)Chaotic image encryption using pseudo-random masks and pixel mappingSignal Processing10.1016/j.sigpro.2015.11.017125:C(48-63)Online publication date: 1-Aug-2016
        • Show More Cited By

        View Options

        View options

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media