With this application, image scramble and descramble functionalities can be achieved without any key management servers since a scrambled image itself includes authentication information and encrypted scramble key. This means that this application can be provided on top of already existing IMS or SNS.Fig. 4 depicts an example of image scramble application. Although a sender shares a scramble image to multiple recipients through IMS or SNS, only authorized users can decode an encrypted scramble key and descramble back to the original image (without embedded data area) while unauthorized users can only see the scrambled image.