When an attacker meets a cipher-image in 2018: A Year in Review

03/28/2019
by   Chengqing Li, et al.
0

This paper aims to review the encountered technical contradictions when an attacker meets the cipher-images encrypted by the image encryption schemes (algorithms) proposed in 2018 from the viewpoint of an image cryptanalyst. The most representative works among them are selected and classified according to their essential structures. Almost all image cryptanalysis works published in 2018 are surveyed due to their small number. The challenging problems on design and analysis of image encryption schemes are summarized to receive the attentions of both designers and attackers (cryptanalysts) of image encryption schemes, which may promote solving scenario-oriented image security problems with new technologies.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/17/2022

Security Evaluation of Compressible Image Encryption for Privacy-Preserving Image Classification against Ciphertext-only Attacks

The security of learnable image encryption schemes for image classificat...
research
12/30/2019

Cryptanalysis of an Image Block Encryption Algorithm Based on Chaotic Maps

Recently, an image block encryption algorithm was proposed based on some...
research
03/06/2022

Image Encryption using Fractional Integral transforms: Vulnerabilities, Threats and Future scope

This paper presents a review on various image encryption schemes based o...
research
06/22/2019

Comparative study of Joint Image Encryption and Compression Schemes: A Review

With the development of imaging methods in wireless communications, enha...
research
06/11/2021

A survey on Functional Encryption

Functional Encryption (FE) expands traditional public-key encryption in ...
research
11/06/2017

Cryptanalyzing an image encryption algorithm based on autoblocking and electrocardiography

This paper analyzes the security of an image encryption algorithm propos...
research
09/23/2018

Insufficient properties of image encryption algorithms

We analyze the security of recently proposed image encryption scheme [1]...

Please sign up or login with your details

Forgot password? Click here to reset