On the Security of Block Scrambling-Based EtC Systems against Extended Jigsaw Puzzle Solver Attacks

The aim of this paper is to apply automatic jigsaw puzzle solvers, which are methods of assembling jigsaw puzzles, to the field of information security. Encryption-then-Compression (EtC) systems have been considered for the user-controllable privacy protection of digital images in social network services. Block scrambling-based encryption schemes, which have been proposed to construct EtC systems, have enough key spaces for protecting brute-force attacks. However, each block in encrypted images has almost the same correlation as that of original images. Therefore, it is required to consider the security from different viewpoints from number theory-based encryption methods with provable security such as RSA and AES. In this paper, existing jigsaw puzzle solvers, which aim to assemble puzzles including only scrambled and rotated pieces, are first reviewed in terms of attacking strategies on encrypted images. Then, an extended jigsaw puzzle solver for block scrambling-based encryption scheme is proposed to solve encrypted images including inverted, negative-positive transformed and color component shuffled blocks in addition to scrambled and rotated ones. In the experiments, the jigsaw puzzle solvers are applied to encrypted images to consider the security conditions of the encryption schemes. key words: jigsaw puzzle, JPEG, encryption, EtC system

[1]  Hitoshi Kiya,et al.  An Encryption-then-Compression System for JPEG/Motion JPEG Standard , 2015, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[2]  Hitoshi Kiya,et al.  An encryption-then-compression system for JPEG XR standard , 2016, 2016 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB).

[3]  Hitoshi Kiya,et al.  On the security of block scrambling-based ETC systems against jigsaw puzzle solver attacks , 2017, 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[4]  Hitoshi Kiya,et al.  Security evaluation for block scrambling-based ETC systems against extended jigsaw puzzle solver attacks , 2017, 2017 IEEE International Conference on Multimedia and Expo (ICME).

[5]  Mauro Barni,et al.  Encrypted signal processing for privacy protection: Conveying the utility of homomorphic encryption and multiparty computation , 2013, IEEE Signal Processing Magazine.

[6]  Yuan Yan Tang,et al.  Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering and Random Permutation , 2014, IEEE Transactions on Information Forensics and Security.

[7]  Nathan S. Netanyahu,et al.  A Generalized Genetic Algorithm-Based Solver for Very Large Jigsaw Puzzles of Complex Types , 2014, AAAI.

[8]  Ayellet Tal,et al.  Solving multiple square jigsaw puzzles with missing pieces , 2015, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[9]  Gabriel Taubin,et al.  Solving Image Puzzles with a Simple Quadratic Programming Formulation , 2012, 2012 25th SIBGRAPI Conference on Graphics, Patterns and Images.

[10]  Ohad Ben-Shahar,et al.  A fully automated greedy square jigsaw puzzle solver , 2011, CVPR 2011.

[11]  Andrew C. Gallagher Jigsaw puzzles with pieces of unknown orientation , 2012, 2012 IEEE Conference on Computer Vision and Pattern Recognition.

[12]  Yang Wang,et al.  Robust Solvers for Square Jigsaw Puzzles , 2013, 2013 International Conference on Computer and Robot Vision.

[13]  Hitoshi Kiya,et al.  An encryption-then-compression system for JPEG standard , 2015, 2015 Picture Coding Symposium (PCS).

[14]  David B. Cooper,et al.  Solving Square Jigsaw Puzzles with Loop Constraints , 2014, ECCV.

[15]  David B. Cooper,et al.  Solving Small-piece Jigsaw Puzzles by Maximizing Consensus , 2016 .

[16]  Vijay Varadharajan,et al.  Apsipa Transactions on Signal and Information Processing Additional Services for Apsipa Transactions on Signal and Information Processing: Survey on Securing Data Storage in the Cloud , 2022 .

[17]  Kwok-Tung Lo,et al.  Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks , 2011, Signal Process..

[18]  Nikolaos G. Bourbakis,et al.  A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks , 2008, Signal Process. Image Commun..

[19]  Nathan S. Netanyahu,et al.  An automatic solver for very large jigsaw puzzles using genetic algorithms , 2016, Genetic Programming and Evolvable Machines.

[20]  William T. Freeman,et al.  A probabilistic image jigsaw puzzle solver , 2010, 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition.

[21]  Hitoshi Kiya,et al.  An Encryption-then-Compression System for Lossless Image Compression Standards , 2017, IEICE Trans. Inf. Syst..

[22]  Rui Yu,et al.  Solving Jigsaw Puzzles with Linear Programming , 2016, BMVC.

[23]  Xin-Wen Wu,et al.  On the Security of Permutation-Only Image Encryption Schemes , 2016, IEEE Transactions on Information Forensics and Security.

[24]  Hitoshi Kiya,et al.  An Encryption-then-Compression system for JPEG 2000 standard , 2015, 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).