Proceedings of the on Multimedia and Security 2012
DOI: 10.1145/2361407.2361421
|View full text |Cite
|
Sign up to set email alerts
|

Length-preserving bit-stream-based JPEG encryption

Abstract: We propose a new method to encrypt baseline JPEG bit streams by selective Huffman code word swapping and coefficient value scrambling based on AES encryption. Furthermore, we show that our approach preserves the length of the bit stream while being completely format-compliant. In contrast to most existing approaches, no recompression is necessary as the encryption is applied directly to the bit stream. In addition, we assess the effort required for brute-force and known-plaintext attacks on pictures encrypted … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
28
0
3

Year Published

2013
2013
2023
2023

Publication Types

Select...
3
2
1

Relationship

2
4

Authors

Journals

citations
Cited by 23 publications
(31 citation statements)
references
References 13 publications
0
28
0
3
Order By: Relevance
“…A more detailed description of all encryption steps as well as a thorough security analysis can be found in [1,43]. Note that, although Auer et al [1] describe a full-picture encryption approach, their security analysis is limited to single blocks, so it can be used for our modified approach as well.…”
Section: Encryption Approach By Auer Et Almentioning
confidence: 99%
See 2 more Smart Citations
“…A more detailed description of all encryption steps as well as a thorough security analysis can be found in [1,43]. Note that, although Auer et al [1] describe a full-picture encryption approach, their security analysis is limited to single blocks, so it can be used for our modified approach as well.…”
Section: Encryption Approach By Auer Et Almentioning
confidence: 99%
“…We use this replacement attack on our proposed approach and the one by Unterweger and Uhl [43]. The latter performs AC encryption in the same way as the approach by Auer et al [1], but does not encrypt DC coefficient differences, i.e.…”
Section: Effect Of Replacement Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…In this Section, we discuss several design choices for encodings, aiming at listing a set of practically useable encodings to be evaluated in Section 4. As most state-of-the-art encryption approaches for JPEG operate on a block [15] or iMCU (interleaved Minimum Coding Unit, multiple luminance and the corresponding chrominance blocks) level [22], coordinates are limited to iMCU granularity. Note that this limitation is also imposed -often self-imposed [3] -on format-independent encryption approaches which operate in the image domain.…”
Section: Roi Coordinate Encodingmentioning
confidence: 99%
“…Availability: The guarantee that the proposed method will work on every JPEG picture 4. Length-preservation: The guarantee that the picture's file size does not change (suitable for lengthpreserving encryption methods like [22]) Furthermore, the capacity, i.e., the amount of storable bits, of each signalling method is given. Note the capacity of some of the proposed methods depends on the picture and/or its metadata.…”
Section: Roi Signallingmentioning
confidence: 99%