Visual Information Encryption in Frequency Domain: Risk and Enhancement

  • Weihai Li
  • Yuan Yuan
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4153)


Focusing on the encryption of digital image and video, this paper reports an intrinsic weakness of all existing discrete-cosine-transform (DCT) based algorithms. This serious weakness of DCT is analyzed theoretically and then demonstrated practically. As an instance, a novel attack algorithm is proposed to acquire the sketch information from the encrypted data without any pre-knowledge of the encryption algorithm. Thereafter, to solve this problem, a full inter-block shuffle (FIBF) approach is developed and it can be employed to improve the encryption security in all DCT-based algorithms, such as JPEG, MPEG and H.26x.


Compression Ratio Encryption Algorithm Image Encryption Encrypt Image Attack Scheme 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Macq, B.M., Quisquater, J.-J.: Cryptology for Digital TV Broadcasting. Proceedings of the IEEE 83(6), 944–957 (1995)CrossRefGoogle Scholar
  2. 2.
    Iskender, A., Li, G.: An Empirical Study of Secure MPEG Video Transmissions. In: Proceedings of the Symposium on Network and Distributed System Security, pp. 137–144 (1996)Google Scholar
  3. 3.
    Qiao, L., Nahrstedt, K.: A New Algorithm for MPEG Video Encryption. In: Proceeding of the First Int’l. Conf. on Imaging Science, Systems and Technology, pp. 21–29 (1997)Google Scholar
  4. 4.
    Zhang, X., Liu, F., Jiao, L.: An Image Encryption Arithmetic Base on Chaotic Sequences. Journal of Image and Graphics 8A(4), 374–378 (2003)Google Scholar
  5. 5.
    Li, C., Han, Z.: The New Evolution of Image Encryption Techniques. Information and Control 32(4), 339–343, 351 (2003)Google Scholar
  6. 6.
    Lian, S., Wang, Z.: MPEG Video Encryption Algorithm Based on Entropy Encoding and Encryption. Mini-Micro Systems 125(12), 2207–2210 (2004)Google Scholar
  7. 7.
    Shi, C., Bharat, B.: A Fast MPEG Video Encryption Algorithm. In: Proceedings of the 6th ACM Int’l. Conf. on Multimedia, pp. 81–88 (1998)Google Scholar
  8. 8.
    Lu, Y., Yang, W., Chen, L.: Encryption Algorithm for the Image in the Frequency Domain. Computer Engineering and Application 39(14), 130–131, 172 (2003)Google Scholar
  9. 9.
    Tang, L.: Methods for Encrypting and Decrypting MPEG Video Data Efficiently. In: Proceedings of the Fourth ACM Int’l. Conf. on Multimedia, pp. 219–229 (1996)Google Scholar
  10. 10.
    Liu, X., Eskicioglu, A.M.: Selective Encryption of Multimedia Content in Distribution Networks: Challenges and New Directions. In: IASTED Int’l. Conf. on Communications, Internet and Information Technology, pp. 527–533 (2003)Google Scholar
  11. 11.
    Lian, S., Sun, J., Wang, Z.: Quality Analysis of Several Typical MPEG Video Encryption Algorithms. J. of Image and Graphics 9(4), 483–490 (2004)Google Scholar
  12. 12.
    Zeng, W., Lei, S.: Efficient Frequency Domain Selective Scrambling of Digital Video. IEEE Trans. Multimedia 5(1), 118–129 (2003)CrossRefGoogle Scholar
  13. 13.
    Li, X., Yuan, Y., Tao, D.: Artistic Mosaic Series Generation. Int. J. of Image and Graphics 6(1), 139–154 (2006)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Weihai Li
    • 1
  • Yuan Yuan
    • 2
  1. 1.Department of Electronic Engineering and Information ScienceUniversity of Sciences and Technology of ChinaHefei, AnhuiP.R. China
  2. 2.School of Computing and Applied ScienceAston UniversityBirminghamUnited Kingdom

Personalised recommendations