{"id":"https://openalex.org/W2768794874","doi":"https://doi.org/10.1109/iwsda.2017.8095737","title":"On the security of block scrambling-based image encryption including JPEG distorsion against jigsaw puzzle solver attacks","display_name":"On the security of block scrambling-based image encryption including JPEG distorsion against jigsaw puzzle solver attacks","publication_year":2017,"publication_date":"2017-09-01","ids":{"openalex":"https://openalex.org/W2768794874","doi":"https://doi.org/10.1109/iwsda.2017.8095737","mag":"2768794874"},"language":"en","primary_location":{"id":"doi:10.1109/iwsda.2017.8095737","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwsda.2017.8095737","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 Eighth International Workshop on Signal Design and Its Applications in Communications (IWSDA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5021075343","display_name":"Tatsuya Chuman","orcid":"https://orcid.org/0000-0001-8687-3854"},"institutions":[{"id":"https://openalex.org/I69740276","display_name":"Tokyo Metropolitan University","ror":"https://ror.org/00ws30h19","country_code":"JP","type":"education","lineage":["https://openalex.org/I69740276"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Tatsuya Chuman","raw_affiliation_strings":["Tokyo Metropolitan University, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"Tokyo Metropolitan University, Tokyo, Japan","institution_ids":["https://openalex.org/I69740276"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5015250468","display_name":"Hitoshi Kiya","orcid":"https://orcid.org/0000-0001-8061-3090"},"institutions":[{"id":"https://openalex.org/I69740276","display_name":"Tokyo Metropolitan University","ror":"https://ror.org/00ws30h19","country_code":"JP","type":"education","lineage":["https://openalex.org/I69740276"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Hitoshi Kiya","raw_affiliation_strings":["Tokyo Metropolitan University, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"Tokyo Metropolitan University, Tokyo, Japan","institution_ids":["https://openalex.org/I69740276"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5021075343"],"corresponding_institution_ids":["https://openalex.org/I69740276"],"apc_list":null,"apc_paid":null,"fwci":0.5461,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.76445545,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"64","last_page":"68"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T14339","display_name":"Image Processing and 3D Reconstruction","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T14339","display_name":"Image Processing and 3D Reconstruction","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9890000224113464,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12364","display_name":"Archaeological Research and Protection","score":0.9847000241279602,"subfield":{"id":"https://openalex.org/subfields/1912","display_name":"Space and Planetary Science"},"field":{"id":"https://openalex.org/fields/19","display_name":"Earth and Planetary Sciences"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8249588012695312},{"id":"https://openalex.org/keywords/scrambling","display_name":"Scrambling","score":0.7637727856636047},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7616849541664124},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.5879257917404175},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5390763282775879},{"id":"https://openalex.org/keywords/56-bit-encryption","display_name":"56-bit encryption","score":0.4698454737663269},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.45821091532707214},{"id":"https://openalex.org/keywords/watermarking-attack","display_name":"Watermarking attack","score":0.453539103269577},{"id":"https://openalex.org/keywords/jpeg","display_name":"JPEG","score":0.44995880126953125},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.41168057918548584},{"id":"https://openalex.org/keywords/probabilistic-encryption","display_name":"Probabilistic encryption","score":0.3671843111515045},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.2906494736671448},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.26569437980651855},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.18859481811523438},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.12942788004875183}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8249588012695312},{"id":"https://openalex.org/C182548165","wikidata":"https://www.wikidata.org/wiki/Q2261483","display_name":"Scrambling","level":2,"score":0.7637727856636047},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7616849541664124},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.5879257917404175},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5390763282775879},{"id":"https://openalex.org/C46905813","wikidata":"https://www.wikidata.org/wiki/Q4640678","display_name":"56-bit encryption","level":4,"score":0.4698454737663269},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.45821091532707214},{"id":"https://openalex.org/C122760801","wikidata":"https://www.wikidata.org/wiki/Q2552011","display_name":"Watermarking attack","level":5,"score":0.453539103269577},{"id":"https://openalex.org/C198751489","wikidata":"https://www.wikidata.org/wiki/Q2195","display_name":"JPEG","level":3,"score":0.44995880126953125},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.41168057918548584},{"id":"https://openalex.org/C54569210","wikidata":"https://www.wikidata.org/wiki/Q7246854","display_name":"Probabilistic encryption","level":3,"score":0.3671843111515045},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.2906494736671448},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.26569437980651855},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.18859481811523438},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.12942788004875183},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iwsda.2017.8095737","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwsda.2017.8095737","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 Eighth International Workshop on Signal Design and Its Applications in Communications (IWSDA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.699999988079071,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W165381567","https://openalex.org/W219767539","https://openalex.org/W1501211345","https://openalex.org/W1510526020","https://openalex.org/W1598206900","https://openalex.org/W1941539351","https://openalex.org/W1965644184","https://openalex.org/W1976015505","https://openalex.org/W2008604527","https://openalex.org/W2009460929","https://openalex.org/W2050770647","https://openalex.org/W2085762799","https://openalex.org/W2124196353","https://openalex.org/W2128745377","https://openalex.org/W2148300333","https://openalex.org/W2166727092","https://openalex.org/W2190925335","https://openalex.org/W2245606036","https://openalex.org/W2281075210","https://openalex.org/W2318684976","https://openalex.org/W2344228793","https://openalex.org/W2461705298","https://openalex.org/W2494134239","https://openalex.org/W2563180213","https://openalex.org/W2689968489","https://openalex.org/W2753607224","https://openalex.org/W2963824344","https://openalex.org/W4252343056","https://openalex.org/W6608699693","https://openalex.org/W6694997365","https://openalex.org/W6739584322"],"related_works":["https://openalex.org/W2355986883","https://openalex.org/W1988224692","https://openalex.org/W4315815885","https://openalex.org/W2175086517","https://openalex.org/W4362613232","https://openalex.org/W1958453626","https://openalex.org/W2364426341","https://openalex.org/W3197142514","https://openalex.org/W4281639007","https://openalex.org/W1518301672"],"abstract_inverted_index":{"Encryption-then-Compression":[0],"(EtC)":[1],"systems":[2],"have":[3,34],"been":[4,35],"considered":[5],"for":[6,49],"the":[7,26,60,74,97],"user-controllable":[8],"privacy":[9],"protection":[10],"of":[11,20,28,65,99],"social":[12],"media":[13],"like":[14],"Twitter":[15],"and":[16,90],"Facebook.":[17],"The":[18],"aim":[19],"this":[21,43,93],"paper":[22],"is":[23,70],"to":[24,37,72],"evaluate":[25,96],"security":[27,75,86,98],"block":[29,54],"scrambling-based":[30],"encryption":[31,82],"schemes,":[32],"which":[33],"proposed":[36],"construct":[38],"EtC":[39],"systems.":[40],"Even":[41],"though":[42],"scheme":[44],"has":[45,58],"enough":[46],"key":[47],"spaces":[48],"protecting":[50],"brute-force":[51],"attacks,":[52],"each":[53],"in":[55],"encrypted":[56,100],"images":[57,101],"almost":[59],"same":[61],"correlation":[62],"as":[63,88],"that":[64],"original":[66],"images.":[67],"Therefore,":[68],"it":[69],"required":[71],"consider":[73],"from":[76,79],"different":[77],"viewpoints":[78],"number":[80],"theory-based":[81],"methods":[83],"with":[84],"provable":[85],"such":[87],"RSA":[89],"DES.":[91],"In":[92],"paper,":[94],"we":[95],"including":[102],"JPEG":[103],"distorsion":[104],"by":[105],"using":[106],"automatic":[107],"jigsaw":[108],"puzzle":[109],"solvers.":[110]},"counts_by_year":[{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":5}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
