{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T08:15:40Z","timestamp":1770884140571,"version":"3.50.1"},"reference-count":23,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Inf. &amp; Syst."],"published-print":{"date-parts":[[2018]]},"DOI":"10.1587\/transinf.2017mup0001","type":"journal-article","created":{"date-parts":[[2017,12,31]],"date-time":"2017-12-31T22:29:46Z","timestamp":1514759386000},"page":"37-44","source":"Crossref","is-referenced-by-count":40,"title":["On the Security of Block Scrambling-Based EtC Systems against Extended Jigsaw Puzzle Solver Attacks"],"prefix":"10.1587","volume":"E101.D","author":[{"given":"Tatsuya","family":"CHUMAN","sequence":"first","affiliation":[{"name":"Tokyo Metropolitan University"}]},{"given":"Kenta","family":"KURIHARA","sequence":"additional","affiliation":[{"name":"Tokyo Metropolitan University"}]},{"given":"Hitoshi","family":"KIYA","sequence":"additional","affiliation":[{"name":"Tokyo Metropolitan University"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"crossref","unstructured":"[1] C.T. Huang, L. Huang, Z. Qin, H. Yuan, L. Zhou, V. Varadharajan, and C-C.J. Kuo, \u201cSurvey on securing data storage in the cloud,\u201d APSIPA Transactions on Signal and Information Processing, vol.3, p.e7, 2014.","DOI":"10.1017\/ATSIP.2014.6"},{"key":"2","doi-asserted-by":"publisher","unstructured":"[2] R.L. Lagendijk, Z. Erkin, and M. Barni, \u201cEncrypted signal processing for privacy protection: Conveying the utility of homomorphic encryption and multiparty computation,\u201d IEEE Signal Process. Mag., vol.30, no.1, pp.82-105, 2013. 10.1109\/msp.2012.2219653","DOI":"10.1109\/MSP.2012.2219653"},{"key":"3","doi-asserted-by":"publisher","unstructured":"[3] J. Zhou, X. Liu, O.C. Au, and Y.Y. Tang, \u201cDesigning an efficient image encryption-then-compression system via prediction error clustering and random permutation,\u201d IEEE Trans. Inf. Forensics Security, vol.9, no.1, pp.39-50, 2014. 10.1109\/tifs.2013.2291625","DOI":"10.1109\/TIFS.2013.2291625"},{"key":"4","doi-asserted-by":"crossref","unstructured":"[4] O. Watanabe, A. Uchida, T. Fukuhara, and H. Kiya, \u201cAn encryption-then-compression system for jpeg 2000 standard,\u201d in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp.1226-1230, 2015. 10.1109\/icassp.2015.7178165","DOI":"10.1109\/ICASSP.2015.7178165"},{"key":"5","doi-asserted-by":"crossref","unstructured":"[5] K. Kurihara, S. Shiota, and H. Kiya, \u201cAn encryption-then-compression system for jpeg standard,\u201d in Picture Coding Symposium (PCS), pp.119-123, 2015. 10.1109\/pcs.2015.7170059","DOI":"10.1109\/PCS.2015.7170059"},{"key":"6","doi-asserted-by":"publisher","unstructured":"[6] K. Kurihara, M. Kikuchi, S. Imaizumi, S. Shiota, and H. Kiya, \u201cAn encryption-then-compression system for jpeg\/motion jpeg standard,\u201d IEICE Trans. Fundamentals, vol.E98-A, no.11, pp.2238-2245, 2015. 10.1587\/transfun.e98.a.2238","DOI":"10.1587\/transfun.E98.A.2238"},{"key":"7","doi-asserted-by":"crossref","unstructured":"[7] K. Kurihara, O. Watanabe, and H. Kiya, \u201cAn encryption-then-compression system for jpeg xr standard,\u201d in IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB), pp.1-5, 2016. 10.1109\/bmsb.2016.7521997","DOI":"10.1109\/BMSB.2016.7521997"},{"key":"8","doi-asserted-by":"publisher","unstructured":"[8] K. Kurihara, S. Imaizumi, S. Shiota, and H. Kiya, \u201cAn encryption-then-compression system for lossless image compression standards,\u201d IEICE Trans. Inf. &amp; Syst., vol.E100-D, no.1, pp.52-56, 2017. 10.1587\/transinf.2016mul0002","DOI":"10.1587\/transinf.2016MUL0002"},{"key":"9","doi-asserted-by":"crossref","unstructured":"[9] T. Chuman, K. Kurihara, and H. Kiya, \u201cOn the security of block scrambling-based etc systems against jigsaw puzzle solver attacks,\u201d in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp.2157-2161, 2017. 10.1109\/icassp.2017.7952538","DOI":"10.1109\/ICASSP.2017.7952538"},{"key":"10","doi-asserted-by":"crossref","unstructured":"[10] T. Chuman, K. Kurihara, and H. Kiya, \u201cSecurity evaluation for block scrambling-based etc systems against extended jigsaw puzzle solver attacks,\u201d in IEEE International Conference on Multimedia and Expo (ICME), pp.229-234, 2017. 10.1109\/icme.2017.8019487","DOI":"10.1109\/ICME.2017.8019487"},{"key":"11","doi-asserted-by":"publisher","unstructured":"[11] C. Li and K.-T. Lo, \u201cOptimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks,\u201d Signal processing, vol.91, no.4, pp.949-954, 2011. 10.1016\/j.sigpro.2010.09.014","DOI":"10.1016\/j.sigpro.2010.09.014"},{"key":"12","doi-asserted-by":"publisher","unstructured":"[12] A. Jolfaei, X.-W. Wu, and V. Muthukkumarasamy, \u201cOn the security of permutation-only image encryption schemes,\u201d IEEE Trans. Inf. Forensics Security, vol.11, no.2, pp.235-246, 2016. 10.1109\/tifs.2015.2489178","DOI":"10.1109\/TIFS.2015.2489178"},{"key":"13","doi-asserted-by":"crossref","unstructured":"[13] D. Pomeranz, M. Shemesh, and O. Ben-Shahar, \u201cA fully automated greedy square jigsaw puzzle solver,\u201d in IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp.9-16, 2011. 10.1109\/cvpr.2011.5995331","DOI":"10.1109\/CVPR.2011.5995331"},{"key":"14","doi-asserted-by":"crossref","unstructured":"[14] A.C. Gallagher, \u201cJigsaw puzzles with pieces of unknown orientation,\u201d in IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp.382-389, 2012. 10.1109\/cvpr.2012.6247699","DOI":"10.1109\/CVPR.2012.6247699"},{"key":"15","doi-asserted-by":"crossref","unstructured":"[15] D. Mondal, Y. Wang, and S. Durocher, \u201cRobust solvers for square jigsaw puzzles,\u201d in Proceedings of the International Conference on Computer and Robot Vision (CRV), pp.249-256, 2013. 10.1109\/crv.2013.54","DOI":"10.1109\/CRV.2013.54"},{"key":"16","doi-asserted-by":"crossref","unstructured":"[16] K. Son, J. Hays, and D.B. Cooper, \u201cSolving square jigsaw puzzles with loop constraints,\u201d in European Conference on Computer Vision (ECCV), vol.8694, pp.32-46, 2014. 10.1007\/978-3-319-10599-4_3","DOI":"10.1007\/978-3-319-10599-4_3"},{"key":"17","doi-asserted-by":"crossref","unstructured":"[17] G. Paikin and A. Tal, \u201cSolving multiple square jigsaw puzzles with missing pieces,\u201d in IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp.4832-4839, 2015. 10.1109\/cvpr.2015.7299116","DOI":"10.1109\/CVPR.2015.7299116"},{"key":"18","doi-asserted-by":"crossref","unstructured":"[18] K. Son, D. Moreno, J. Hays, and D.B. Cooper, \u201cSolving small-piece jigsaw puzzles by growing consensus,\u201d in IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp.1193-1201, 2016. 10.1109\/cvpr.2016.134","DOI":"10.1109\/CVPR.2016.134"},{"key":"19","doi-asserted-by":"crossref","unstructured":"[19] T.S. Cho, S. Avidan, and W.T. Freeman, \u201cA probabilistic image jigsaw puzzle solver,\u201d in IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp.183-190, 2010. 10.1109\/cvpr.2010.5540212","DOI":"10.1109\/CVPR.2010.5540212"},{"key":"20","doi-asserted-by":"crossref","unstructured":"[20] F.A. Andalo, G. Taubin, and S. Goldenstein, \u201cSolving image puzzles with a simple quadratic programming formulation,\u201d in Graphics, Patterns and Images (SIBGRAPI), pp.63-70, 2012. 10.1109\/sibgrapi.2012.18","DOI":"10.1109\/SIBGRAPI.2012.18"},{"key":"21","unstructured":"[21] D. Sholomon, O.E. David, and N.S. Netanyahu, \u201cA generalized genetic algorithm-based solver for very large jigsaw puzzles of complex types,\u201d in National Conference on Artificial Intelligence (AAAI), pp.2839-2845, 2014."},{"key":"22","doi-asserted-by":"publisher","unstructured":"[22] D. Sholomon, O.E. David, and N.S. Netanyahu, \u201cAn automatic solver for very large jigsaw puzzles using genetic algorithms,\u201d Genetic Programming and Evolvable Machines, vol.17, no.3, pp.291-313, 2016. 10.1007\/s10710-015-9258-0","DOI":"10.1007\/s10710-015-9258-0"},{"key":"23","unstructured":"[23] R. Yu, C. Russell, and L. Agapito, \u201cSolving jigsaw puzzles with linear programming,\u201d arXiv preprint arXiv:1511.04472, 2015."}],"container-title":["IEICE Transactions on Information and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E101.D\/1\/E101.D_2017MUP0001\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,8]],"date-time":"2019-10-08T22:23:42Z","timestamp":1570573422000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E101.D\/1\/E101.D_2017MUP0001\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"references-count":23,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018]]}},"URL":"https:\/\/doi.org\/10.1587\/transinf.2017mup0001","relation":{},"ISSN":["0916-8532","1745-1361"],"issn-type":[{"value":"0916-8532","type":"print"},{"value":"1745-1361","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]}}}