{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T01:30:18Z","timestamp":1760059818227,"version":"build-2065373602"},"reference-count":33,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2025,7,14]],"date-time":"2025-07-14T00:00:00Z","timestamp":1752451200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Guangdong Natural Science Foundation","award":["2024A1515010137","62476096"],"award-info":[{"award-number":["2024A1515010137","62476096"]}]},{"name":"National Natural Science Foundation of China","award":["2024A1515010137","62476096"],"award-info":[{"award-number":["2024A1515010137","62476096"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JSAN"],"abstract":"<jats:p>Format-compatible encryption can be used to ensure the security and privacy of JPEG images. Recently, a JPEG image encryption method proved to be secure against known plaintext attacks by employing an adaptive encryption key, which depends on the histogram of the number of non-zero alternating current coefficients (ACC) in Discrete Cosine Transform (DCT) blocks. However, this scheme has been demonstrated to be vulnerable to chosen-plaintext attacks (CPA) based on the run consistency of MCUs (RCM) between the original image and the encrypted image. In this paper, an improved CPA scheme is proposed. The method of incrementing run-length values instead of permutation is utilized to satisfy the uniqueness of run sequences of different minimum coded units (MCUs). The experimental results show that the proposed method can successfully recover the outlines of plaintext images from the encrypted images, even with lower-quality factors.<\/jats:p>","DOI":"10.3390\/jsan14040072","type":"journal-article","created":{"date-parts":[[2025,7,15]],"date-time":"2025-07-15T11:52:58Z","timestamp":1752580378000},"page":"72","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Improved Chosen Plaintext Attack on JPEG Encryption"],"prefix":"10.3390","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1689-0509","authenticated-orcid":false,"given":"Junhui","family":"He","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, South China University of Technology, Guangzhou 510006, China"}]},{"given":"Kaitian","family":"Gu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, South China University of Technology, Guangzhou 510006, China"}]},{"given":"Yihan","family":"Huang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, South China University of Technology, Guangzhou 510006, China"}]},{"given":"Yue","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, South China University of Technology, Guangzhou 510006, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9800-6472","authenticated-orcid":false,"given":"Xiang","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Electronics and Information Technology, Sun Yat-sen University, Guangzhou 510275, China"},{"name":"Guangdong Provincial Key Laboratory of Big Data Computing, The Chinese University of Hong Kong, Shenzhen 518172, China"}]}],"member":"1968","published-online":{"date-parts":[[2025,7,14]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1147\/rd.383.0243","article-title":"The Data Encryption Standard (DES) and its strength against attacks","volume":"38","author":"Coppersmith","year":"1994","journal-title":"IBM J. Res. Dev."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1016\/S1353-4858(01)01018-2","article-title":"The advanced encryption standard","volume":"2001","author":"Wright","year":"2001","journal-title":"Netw. Secur."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"1960","DOI":"10.1109\/TMM.2017.2786860","article-title":"A content-adaptive joint image compression and encryption scheme","volume":"20","author":"Li","year":"2018","journal-title":"IEEE Trans. Multimed."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1016\/j.jvcir.2018.11.018","article-title":"Joint image encryption and compression schemes based on 16 \u00d7 16 DCT","volume":"58","author":"Li","year":"2019","journal-title":"J. Vis. Commun. Image Represent."},{"key":"ref_5","first-page":"1","article-title":"JPEG-compatible Joint Image Compression and Encryption Algorithm with File Size Preservation","volume":"20","author":"Peng","year":"2024","journal-title":"ACM Trans. Multimed. Comput. Commun. Appl."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Cheng, H., and Xiaobo, L. (1996, January 23\u201324). On the application of image decomposition to image compression and encryption. Proceedings of the IFIP TC6\/TC11 International Conference on Communications and Multimedia Security II, Essen, Germany.","DOI":"10.1007\/978-0-387-35083-7_11"},{"key":"ref_7","first-page":"179290","article-title":"Overview on selective encryption of image and video: Challenges and perspectives","volume":"2008","author":"Massoudi","year":"2008","journal-title":"EURASIP J. Inf. Secur."},{"key":"ref_8","unstructured":"Puech, W., and Rodrigues, J. (2005, January 4\u20138). Crypto-compression of medical images by selective encryption of DCT. Proceedings of the 13th European Signal Processing Conference, Antalya, Turkey."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Pinto, M., Puech, W., and Subsol, G. (2013, January 15\u201318). Protection of JPEG compressed E-comics by selective encryption. Proceedings of the 20th IEEE International Conference on Image Processing (ICIP 2013), Melbourne, VIC, Australia.","DOI":"10.1109\/ICIP.2013.6738945"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"2509","DOI":"10.1016\/j.chaos.2007.10.054","article-title":"Efficient image or video encryption based on spatiotemporal chaos system","volume":"40","author":"Lian","year":"2009","journal-title":"Chaos Solitons Fractals"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"9639","DOI":"10.1007\/s11042-020-10110-5","article-title":"Selective encryption of JPEG images with chaotic based novel S-box","volume":"80","author":"Khan","year":"2021","journal-title":"Multimed. Tools Appl."},{"key":"ref_12","first-page":"140","article-title":"A new JPEG encryption scheme using adaptive block size","volume":"Volume 211","author":"Li","year":"2021","journal-title":"Advances in Intelligent Information Hiding and Multimedia Signal Processing: Proceeding of the 16th International Conference on IIHMSP in Conjunction with the 13th International Conference on FITAT, Ho Chi Minh City, Vietnam, 5\u20137 November 2020"},{"key":"ref_13","first-page":"1790","article-title":"Quantized DCT coefficient category address encryption for JPEG image","volume":"10","author":"Li","year":"2016","journal-title":"KSII Trans. Internet Inf. Syst."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/jdcf.2013070101","article-title":"Bitstream-based JPEG encryption in real-time","volume":"5","author":"Auer","year":"2013","journal-title":"Int. J. Digit. Crime Forensics"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"3030","DOI":"10.1109\/TCSVT.2022.3225644","article-title":"A secret JPEG image sharing method over GF(2M) galois fields","volume":"33","author":"Puteaux","year":"2022","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"103975","DOI":"10.1016\/j.jvcir.2023.103975","article-title":"JPEG image encryption with grouping coefficients based on entropy coding","volume":"97","author":"Yuan","year":"2023","journal-title":"J. Vis. Commun. Image Represent."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"475","DOI":"10.1049\/iet-spr.2019.0276","article-title":"Survey on JPEG compatible joint image compression and encryption algorithms","volume":"14","author":"Li","year":"2020","journal-title":"IET Signal Process."},{"key":"ref_18","first-page":"102361","article-title":"When an attacker meets a cipher-image in 2018: A year in review","volume":"48","author":"Li","year":"2019","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"2645","DOI":"10.1109\/TMM.2018.2817065","article-title":"JPEG image encryption with improved format compatibility and file size preservation","volume":"20","author":"He","year":"2018","journal-title":"IEEE Trans. Multimed."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Cardona-L\u00f3pez, M.A., Chimal-Egu\u00eda, J.C., Silva-Garc\u00eda, V.M., and Flores-Carapia, R. (2024). Statistical Analysis of the Negative\u2013Positive Transformation in Image Encryption. Mathematics, 12.","DOI":"10.3390\/math12060908"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"2372","DOI":"10.1109\/TMM.2020.3011315","article-title":"Universal chosen-ciphertext attack for a family of image encryption schemes","volume":"23","author":"Chen","year":"2021","journal-title":"IEEE Trans. Multimed."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"103733","DOI":"10.1016\/j.jvcir.2022.103733","article-title":"Chosen Plaintext Attack on JPEG Image Encryption with Adaptive Key and Run Consistency","volume":"90","author":"He","year":"2023","journal-title":"J. Vis. Commun. Image Represent."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1007\/978-3-030-95398-0_5","article-title":"On the security of encrypted JPEG image with adaptive key generated by invariant characteristic","volume":"Volume 13180","author":"Yuan","year":"2022","journal-title":"Digital Forensics and Watermarking: 20th International Workshop, IWDW 2021, Beijing, China, 20\u201322 November 2021"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"1281","DOI":"10.1007\/s11760-013-0570-y","article-title":"Cryptanalysis of a video encryption method based on mixing and permutation operations in the DCT domain","volume":"9","author":"Benrhouma","year":"2015","journal-title":"Signal Image Video Process."},{"key":"ref_25","first-page":"92568","article-title":"Cryptanalysis of start code-based encryption method for HEVC","volume":"9","author":"Lee","year":"2021","journal-title":"IEEE Access Pract. Innov. Open Solut."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"2137","DOI":"10.1109\/TIFS.2018.2812080","article-title":"Depreciating motivation and empirical security analysis of chaos-based image and video encryption","volume":"13","author":"Preishuber","year":"2018","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_27","first-page":"75834","article-title":"Cryptanalysis of a chaotic image encryption algorithm based on information entropy","volume":"6","author":"Li","year":"2018","journal-title":"IEEE Access Pract. Innov. Open Solut."},{"key":"ref_28","first-page":"1","article-title":"Cryptanalysis and improvement of the hyper-chaotic image encryption scheme based on DNA encoding and scrambling","volume":"10","author":"Feng","year":"2018","journal-title":"IEEE Photonics J."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"951","DOI":"10.1109\/TIFS.2016.2515503","article-title":"Perceptual visual security index based on edge and texture similarities","volume":"11","author":"Xiang","year":"2016","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1016\/j.ins.2012.07.049","article-title":"Local shannon entropy measure with statistical tests for image randomness","volume":"222","author":"Wu","year":"2013","journal-title":"Inf. Sci."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"2405","DOI":"10.1587\/transfun.E101.A.2405","article-title":"Security evaluation for block scrambling-based image encryption including JPEG distortion against jigsaw puzzle solver attacks","volume":"101-A","author":"Chuman","year":"2018","journal-title":"IEICE Trans."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"305","DOI":"10.1007\/s11071-018-4056-x","article-title":"Brief review on application of nonlinear dynamics in image encryption","volume":"92","year":"2018","journal-title":"Nonlinear Dyn."},{"key":"ref_33","unstructured":"Mitchell, J. (1992). Digital Compression and Coding of Continuous-Tone Still Images: Requirements and Guidelines, International Telecommunication Union. Available online: https:\/\/www.itu.int\/rec\/T-REC-T.81-199209-I\/en."}],"container-title":["Journal of Sensor and Actuator Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2224-2708\/14\/4\/72\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T18:09:34Z","timestamp":1760033374000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2224-2708\/14\/4\/72"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,14]]},"references-count":33,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2025,8]]}},"alternative-id":["jsan14040072"],"URL":"https:\/\/doi.org\/10.3390\/jsan14040072","relation":{},"ISSN":["2224-2708"],"issn-type":[{"type":"electronic","value":"2224-2708"}],"subject":[],"published":{"date-parts":[[2025,7,14]]}}}