Skip to main content

An Attack on Wavelet Tree Shuffling Encryption Schemes

  • Conference paper
Security-Enriched Urban Computing and Smart Grid (SUComS 2010)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 78))

  • 2487 Accesses

Abstract

With the ubiquity of the internet and advances in technology, especially digital consumer electronics, demand for online multimedia services is ever increasing. While it’s possible to achieve a great reduction in bandwidth utilization of multimedia data such as image and video through compression, security still remains a great concern. Traditional cryptographic algorithms/systems for data security are often not fast enough to process the vast amounts of data generated by the multimedia applications to meet the realtime constraints. Selective encryption is a new scheme for multimedia content protection. It involves encrypting only a portion of the data to reduce computational complexity(the amount of data to encrypt)while preserving a sufficient level of security. To achieve this, many selective encryption schemes are presented in different literatures. One of them is Wavelet Tree Shuffling. In this paper we assess the security of a wavelet tree shuffling encryption scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Recommendation for Key Management, Special Publication 800-57 Part 1, NIST, 03/2007

    Google Scholar 

  2. Keylength - Cryptographic Key Length Recommendation, http://www.keylength.com

  3. Furht, B., Kirovski, D. (eds.): Multimedia Security Handbook. CRC Press, Boca Raton (2004)

    Google Scholar 

  4. Kwon, G., Lee, T., Kim, K., Jin, J., Ko, S.: Multimedia digital right management using selective scrambling for mobile handset. In: Hao, Y., Liu, J., Wang, Y.-P., Cheung, Y.-m., Yin, H., Jiao, L., Ma, J., Jiao, Y.-C. (eds.) CIS 2005. LNCS (LNAI), vol. 3802, pp. 1098–1103. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  5. Li, W.: Overview of Fine Granularity Scalability in MPEG-4 Video Standard. IEEE Trans. on Circuits & Systems for Video Technology 11(3), 301–317 (2001)

    Article  Google Scholar 

  6. Massoudi, A., Lefebvre, F., De Vleeschouwer, C., Macq, B., Quisquater, J.: Overview on selective encryption of image and video: challenges and perspectives. EURASIP J. Inf. Security, 1–18 (2008)

    Google Scholar 

  7. Naor, M., Yung, M.: Public-key cryptosystems provably secure against chosen ciphertext attacks. In: Proceedings of the 22nd Annual Symposium on Theory of Computing. ACM, New York (1990)

    Google Scholar 

  8. Mao, Y., Wu, M.: A joint signal processing and cryptographic approach to multimedia encryption. IEEE Trans. Image Processing 15(7), 2061–2075 (2006)

    Article  Google Scholar 

  9. Norcen, R., Uhl, A.: Encryption of wavelet-coded imagery using random permutations. In: Proceedings of the IEEE International Conference on Image Processing (ICIPÅ  2004), Singapore. IEEE Signal Processing Society (October 2004)

    Google Scholar 

  10. Podesser, M., Schmidt, H., Uhl, A.: Selective bitplane encryption for secure transmission of image data in mobile environments. In: Proceedings of the 5th Nordic Signal Processing Symposium, NORSIG 2002 (2002)

    Google Scholar 

  11. Pommer, A., Uhl, A.: Selective encryption of wavelet-packet encoded image data: efficiency and security. Multimedia Systems 9(3), 279–287 (2003)

    Article  Google Scholar 

  12. Said, A., Pearlman, W.A.: A new, fast and efficient image codec based on set partitioning in hierarchical trees. IEEE Trans. Circuits and Systems for Video Technology 6(3), 243–250 (1996)

    Article  Google Scholar 

  13. Salama, P., King, B.: Efficient secure image transmission: compression integrated with encryption. In: Proc. SPIE, vol. SPIE-5681, pp. 47–58 (2005)

    Google Scholar 

  14. Shapiro, M.: Embedded Image Coding using Zerotrees of Wavelet Coefficients. IEEE Trans. Signal Processing 41, 3445–3462 (1993)

    Article  MATH  Google Scholar 

  15. Shamir, A.: How to share a secret. Comm. of ACM 22(11), 612–613 (1979)

    Article  MathSciNet  MATH  Google Scholar 

  16. Stinson, D.: Cryptography: theory and practice, 2nd edn. CRC Press, Boca Raton (2002)

    MATH  Google Scholar 

  17. Uehara, T., Safavi-Naini, R., Ogunbona, P.: Securing wavelet compression with random permutations. In: Proceedings of the 2000 IEEE Pacific Rim Conference on Multimedia, Sydney, pp. 332–335. IEEE Signal Processing Society (December 2000)

    Google Scholar 

  18. Uhl, A., Pommer, A.: Image and Video Encryption: From Digital Rights Management to Secured Personal Communication. Springer, Boston (2005)

    MATH  Google Scholar 

  19. Valens, C.: As appeared in (1999), http://pagesperso-orange.fr/polyvalens/clemens/ezw/ezw.html

  20. Zeng, W., Lei, S.: Efficient frequency domain selective scrambling of digital video. IEEE Transactions on Multimedia 5(1), 118–129 (2003)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Assegie, S., Salama, P., King, B. (2010). An Attack on Wavelet Tree Shuffling Encryption Schemes. In: Kim, Th., Stoica, A., Chang, RS. (eds) Security-Enriched Urban Computing and Smart Grid. SUComS 2010. Communications in Computer and Information Science, vol 78. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16444-6_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-16444-6_19

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-16443-9

  • Online ISBN: 978-3-642-16444-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics