scholarly journals Access Control and Scalable Encryption Using a Stream Cipher for JPEG 2000 Encoded Images

Author(s):  
Ayman Haggag ◽  
◽  
Mohamed Ghoneim ◽  
Jianming Lu ◽  
Takashi Yahagi ◽  
...  

The access control and scalable encryption scheme we propose for JPEG 2000 encoded images encrypts JEPG 2000 codestreams using the SNOW 2 progressive encryption algorithm to encrypt resolutions, quality layers, or packets independently to provide resolution, quality or fine-grain scalability. Access is controlled to different image resolutions or quality levels granted to different users receiving the same encrypted JPEG 2000 codestream but having different decryption keys. Keys used with successive resolutions or quality layers are mutually dependent based on the SHA-256 one-way hashing function. Encrypted JPEG 2000 codestreams are transcoded by an intermediate untrusted network transcoder, without decryption and without access to decryption keys. Our encryption scheme preserves most of the inherent flexibility of JPEG 2000 encoded images and is carefully designed to produce encrypted codestreams backward-compatible with JPEG 2000 compliant decoders.

Author(s):  
Xing-Yuan Wang ◽  
Zhi-Ming Li

AbstractIn this paper, a new chaotic image encryption scheme is proposed, which uses the combination of stream cipher and block cipher to spread and then uses the Logistic mapping matrix to perform the block sort transformation to complete the confusion. The specific method is as follows: First, perform the triple XOR operation, non-linear S-box transformation and linear cyclic shift transformation on the key. Second, the triple XOR operation of the transformed key and the plaintext and Logistic mapping sequence are used to obtain the semi-ciphertext. And set the obtained semi-ciphertext and plaintext as key components of the next round of encryption. Finally, the transformation of sorting and partition of the Logistic mapping matrix are used to confuse the semi-ciphertext. The experimental results show that the proposed algorithm improves the encryption efficiency, has good security and can resist common attacks.


Author(s):  
Fauduziduhu Laia ◽  
Erwin Panggabean

Rapid development of digital image technology secret causes images require security aspect. Reviews These digital secret image can be encrypted using cryptographic methods. After being encrypted, the image is randomized, so that if it is Obtained by an unauthorized party, the image has no meaning. The cryptographic algorithm used in this study is Gifford method. The Gifford method is a stream cipher, a symmetry encryption algorithm that transforms the data character by character. Gifford has 8 registers filled with key bits. The processes performed by the Gifford method are the Output Function process, the 1-bit Sticky Shift Right process, the 1-bit Left Shift process, the XOR operation and the shift register operation to the right. The decryption process must use the same key as the encryption process in order to Obtain the original image.


Author(s):  
Luan Ibraimi ◽  
Qiang Tang ◽  
Pieter Hartel ◽  
Willem Jonker

Commercial Web-based Personal-Health Record (PHR) systems can help patients to share their personal health records (PHRs) anytime from anywhere. PHRs are very sensitive data and an inappropriate disclosure may cause serious problems to an individual. Therefore commercial Web-based PHR systems have to ensure that the patient health data is secured using state-of-the-art mechanisms. In current commercial PHR systems, even though patients have the power to define the access control policy on who can access their data, patients have to trust entirely the access-control manager of the commercial PHR system to properly enforce these policies. Therefore patients hesitate to upload their health data to these systems as the data is processed unencrypted on untrusted platforms. Recent proposals on enforcing access control policies exploit the use of encryption techniques to enforce access control policies. In such systems, information is stored in an encrypted form by the third party and there is no need for an access control manager. This implies that data remains confidential even if the database maintained by the third party is compromised. In this paper we propose a new encryption technique called a type-and-identity-based proxy re-encryption scheme which is suitable to be used in the healthcare setting. The proposed scheme allows users (patients) to securely store their PHRs on commercial Web-based PHRs, and securely share their PHRs with other users (doctors).


Author(s):  
Mamta ­ ◽  
Brij B. Gupta

Attribute based encryption (ABE) is a widely used technique with tremendous application in cloud computing because it provides fine-grained access control capability. Owing to this property, it is emerging as a popular technique in the area of searchable encryption where the fine-grained access control is used to determine the search capabilities of a user. But, in the searchable encryption schemes developed using ABE it is assumed that the access structure is monotonic which contains AND, OR and threshold gates. Many ABE schemes have been developed for non-monotonic access structure which supports NOT gate, but this is the first attempt to develop a searchable encryption scheme for the same. The proposed scheme results in fast search and generates secret key and search token of constant size and also the ciphertext components are quite fewer than the number of attributes involved. The proposed scheme is proven secure against chosen keyword attack (CKA) in selective security model under Decisional Bilinear Diffie-Hellman (DBDH) assumption.


Sign in / Sign up

Export Citation Format

Share Document