Cryptanalysis of Reversible Data Hiding in Encrypted Images by Block Permutation and Co-Modulation

Reversible data hiding in encrypted images (RDH-EI) technology is commonly used in cloud storage images for privacy protection. Most existing RDH-EI techniques reported in the literature applied block permutation and co-modulation (BPCM) encryption to generate encrypted images. This work analyses th...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on multimedia Vol. 24; pp. 2924 - 2937
Main Authors Lingfeng, Qu, Fan, Chen, Shanjun, Zhang, He, Hongjie
Format Journal Article
LanguageEnglish
Published Piscataway IEEE 2022
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Reversible data hiding in encrypted images (RDH-EI) technology is commonly used in cloud storage images for privacy protection. Most existing RDH-EI techniques reported in the literature applied block permutation and co-modulation (BPCM) encryption to generate encrypted images. This work analyses the security of the RDH-EI algorithm based on BPCM encryption under known plaintext attacks (KPAs). Different from the existing KPAs, this paper considers that attackers can perform KPAs based on marked encrypted images and shows that BPCM encryption has the risk of information leakage. To find the constant features of a block before and after co-modulation, the first-pixel difference block (FDB) of a block is first defined. Then, a pseudo cypher difference image of the cyphertext image is constructed to eliminate the changed FDBs so that the differences in the cyphertext FDBs are the same as the FDBs in the corresponding plaintext difference image. Finally, we design an FDB-based block permutation key estimation method according to the plaintext difference image and pseudocyphertext difference image. The influence of block size on key estimation accuracy and the time complexity of the proposed KPA algorithm are analysed and discussed. Experimental results show that the correct rate of key estimation is positively correlated with the block size and the number of plain-cyphertext pairs. The average correct rate of key estimation reaches 63% when the block size is greater than 3×3.
AbstractList Reversible data hiding in encrypted images (RDH-EI) technology is commonly used in cloud storage images for privacy protection. Most existing RDH-EI techniques reported in the literature applied block permutation and co-modulation (BPCM) encryption to generate encrypted images. This work analyses the security of the RDH-EI algorithm based on BPCM encryption under known plaintext attacks (KPAs). Different from the existing KPAs, this paper considers that attackers can perform KPAs based on marked encrypted images and shows that BPCM encryption has the risk of information leakage. To find the constant features of a block before and after co-modulation, the first-pixel difference block (FDB) of a block is first defined. Then, a pseudo cypher difference image of the cyphertext image is constructed to eliminate the changed FDBs so that the differences in the cyphertext FDBs are the same as the FDBs in the corresponding plaintext difference image. Finally, we design an FDB-based block permutation key estimation method according to the plaintext difference image and pseudocyphertext difference image. The influence of block size on key estimation accuracy and the time complexity of the proposed KPA algorithm are analysed and discussed. Experimental results show that the correct rate of key estimation is positively correlated with the block size and the number of plain-cyphertext pairs. The average correct rate of key estimation reaches 63% when the block size is greater than 3×3.
Author He, Hongjie
Fan, Chen
Lingfeng, Qu
Shanjun, Zhang
Author_xml – sequence: 1
  givenname: Qu
  orcidid: 0000-0002-2544-4324
  surname: Lingfeng
  fullname: Lingfeng, Qu
  email: 792443987@qq.com
  organization: Key Laboratory of Signal & Information Processing, Southwest Jiaotong University, Chengdu, China
– sequence: 2
  givenname: Chen
  orcidid: 0000-0002-2909-0295
  surname: Fan
  fullname: Fan, Chen
  email: fchen@swjtu.edu.cn
  organization: School of Computing and Artificial Intelligence, Southwest Jiaotong University, Chengdu, China
– sequence: 3
  givenname: Zhang
  surname: Shanjun
  fullname: Shanjun, Zhang
  email: zhang@info.kanagawa-u.ac.jp
  organization: Department of Information Science, the Faculty of Science, Kanagawa University, Kanazawa, Japan
– sequence: 4
  givenname: Hongjie
  orcidid: 0000-0003-2683-0419
  surname: He
  fullname: He, Hongjie
  email: hjhe@swjtu.edu.cn
  organization: Key Laboratory of Signal & Information Processing, Southwest Jiaotong University, Chengdu, China
BookMark eNo9kE1Lw0AQhhepYFu9C14WPKfOfiXdo9ZqCy2K1PMySTYlNc3W3UTIvze1xdO8DM87MM-IDGpXW0JuGUwYA_2wWa8nHDibCNCgptMLMmRasgggSQZ9VhwizRlckVEIOwAmFSRDks58d2iwxqoLZaCuoB_2x_pQppWlz9ggXZR5WW9pWdN5nR1hm9PlHrc20LSjT5XLvui79fu2waZ0NcU6pzMXrV3eVn-ba3JZYBXszXmOyefLfDNbRKu31-XscRVlHOImkpZpEaMtCsV5KmCaSbCouIBcsxhZLIVMMUXFcsVkrnKGWSKZAI4JIi_EmNyf7h68-25taMzOtb7_LBgeJwr6vtA9BScq8y4Ebwtz8OUefWcYmKNJ05s0R5PmbLKv3J0qpbX2H9cyhkTF4hdljnCm
CODEN ITMUF8
CitedBy_id crossref_primary_10_1109_TCSVT_2023_3298803
crossref_primary_10_1109_TIFS_2023_3280341
crossref_primary_10_1145_3638771
crossref_primary_10_1109_TCSVT_2022_3163905
crossref_primary_10_1016_j_jisa_2024_103771
crossref_primary_10_1109_TMM_2021_3132168
crossref_primary_10_1109_TCSVT_2023_3270882
crossref_primary_10_1016_j_jvcir_2023_103975
crossref_primary_10_1109_TMM_2023_3314975
crossref_primary_10_1145_3672568
crossref_primary_10_1007_s11042_023_17154_3
crossref_primary_10_1109_TMM_2023_3342700
crossref_primary_10_1109_TDSC_2022_3218570
crossref_primary_10_1109_TCSVT_2022_3208030
crossref_primary_10_1016_j_jksuci_2023_101752
Cites_doi 10.1109/TCSVT.2020.2992817
10.1109/TIFS.2015.2489178
10.1155/2019/7480147
10.1109/TIFS.2020.3006382
10.1109/ACCESS.2016.2573308
10.1109/TIFS.2011.2176120
10.1109/ICIP.2017.8297098
10.1109/LSP.2011.2114651
10.1007/1-4020-0613-6_4267
10.1016/j.sigpro.2010.09.014
10.1016/j.sigpro.2017.09.020
10.1109/ACCESS.2020.2972622
10.1109/TMM.2016.2569497
10.1016/j.sigpro.2015.12.012
10.1109/TIFS.2013.2248725
10.1109/TMM.2020.2985537
10.1109/TMM.2019.2952979
10.1109/ICASSP.2016.7472053
10.1109/TMM.2019.2936314
10.1155/2018/1734961
10.1109/TIFS.2016.2598528
10.1016/j.ins.2017.12.044
10.1109/TCSVT.2015.2418611
10.1007/978-3-319-31960-5_30
10.1109/TCSVT.2018.2863029
10.1016/j.sigpro.2018.04.016
10.1016/j.image.2008.01.003
10.1109/TIFS.2018.2799381
10.1007/s11042-016-4049-z
10.1016/j.ins.2017.11.021
10.1109/TMM.2018.2844679
10.4018/IJDCF.2018040101
10.1007/s11042-020-09379-3
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022
DBID 97E
RIA
RIE
AAYXX
CITATION
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
DOI 10.1109/TMM.2021.3090588
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005-present
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE/IET Electronic Library (IEL)
CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
DatabaseTitleList
Technology Research Database
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE/IET Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
EISSN 1941-0077
EndPage 2937
ExternalDocumentID 10_1109_TMM_2021_3090588
9460756
Genre orig-research
GrantInformation_xml – fundername: Technology Department of Sichuan Province
  grantid: 2021004
– fundername: National Natural Science Foundation of China
  grantid: U1936113; 61872303
  funderid: 10.13039/501100001809
GroupedDBID -~X
0R~
29I
4.4
5GY
5VS
6IK
97E
AAJGR
AASAJ
ABQJQ
ABTAH
ABVLG
ACGFO
ACGFS
ACIWK
AENEX
AETIX
AI.
AIBXA
AKJIK
ALLEH
ALMA_UNASSIGNED_HOLDINGS
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CS3
DU5
EBS
EJD
HZ~
H~9
IFIPE
IFJZH
IPLJI
JAVBF
LAI
M43
O9-
OCL
P2P
PQQKQ
RIA
RIE
RNS
TN5
VH1
XFK
ZY4
AAYXX
CITATION
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c206t-4e1936aeff522b308c40ea5230d916a16434baba51d514d5d1ac741302a7aa2f3
IEDL.DBID RIE
ISSN 1520-9210
IngestDate Thu Oct 10 17:36:45 EDT 2024
Fri Aug 23 01:41:48 EDT 2024
Wed Jun 26 19:24:58 EDT 2024
IsPeerReviewed true
IsScholarly true
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c206t-4e1936aeff522b308c40ea5230d916a16434baba51d514d5d1ac741302a7aa2f3
ORCID 0000-0002-2544-4324
0000-0002-2909-0295
0000-0003-2683-0419
PQID 2675043439
PQPubID 75737
PageCount 14
ParticipantIDs crossref_primary_10_1109_TMM_2021_3090588
ieee_primary_9460756
proquest_journals_2675043439
PublicationCentury 2000
PublicationDate 20220000
2022-00-00
20220101
PublicationDateYYYYMMDD 2022-01-01
PublicationDate_xml – year: 2022
  text: 20220000
PublicationDecade 2020
PublicationPlace Piscataway
PublicationPlace_xml – name: Piscataway
PublicationTitle IEEE transactions on multimedia
PublicationTitleAbbrev TMM
PublicationYear 2022
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref13
ref12
ref34
ref15
ref14
ref31
ref30
ref11
ref33
ref10
ref32
ref2
ref1
ref17
ref16
ref19
ref18
ref24
ref23
ref26
ref25
ref20
ref22
ref21
ref28
ref27
ref7
ref9
ref4
ref3
ref6
Chen (ref8) 2018; 56
ref5
Kai (ref29) 2018; 10
Kerckhoffs (ref35) 1883; IX
References_xml – volume: IX
  start-page: 161
  year: 1883
  ident: ref35
  article-title: La cryptographie militaire
  publication-title: J. Des Sci. Militaires
  contributor:
    fullname: Kerckhoffs
– ident: ref9
  doi: 10.1109/TCSVT.2020.2992817
– ident: ref19
  doi: 10.1109/TIFS.2015.2489178
– ident: ref31
  doi: 10.1155/2019/7480147
– ident: ref22
  doi: 10.1109/TIFS.2020.3006382
– ident: ref2
  doi: 10.1109/ACCESS.2016.2573308
– ident: ref12
  doi: 10.1109/TIFS.2011.2176120
– ident: ref32
  doi: 10.1109/ICIP.2017.8297098
– ident: ref11
  doi: 10.1109/LSP.2011.2114651
– ident: ref20
  doi: 10.1007/1-4020-0613-6_4267
– ident: ref24
  doi: 10.1016/j.sigpro.2010.09.014
– ident: ref21
  doi: 10.1016/j.sigpro.2017.09.020
– ident: ref34
  doi: 10.1109/ACCESS.2020.2972622
– ident: ref1
  doi: 10.1109/TMM.2016.2569497
– ident: ref28
  doi: 10.1016/j.sigpro.2015.12.012
– ident: ref3
  doi: 10.1109/TIFS.2013.2248725
– ident: ref5
  doi: 10.1109/TMM.2020.2985537
– ident: ref6
  doi: 10.1109/TMM.2019.2952979
– ident: ref16
  doi: 10.1109/ICASSP.2016.7472053
– ident: ref4
  doi: 10.1109/TMM.2019.2936314
– volume: 56
  start-page: 299
  issue: 2
  year: 2018
  ident: ref8
  article-title: Reversible data hiding in classification-scrambling encrypted-image based on iterative recovery
  publication-title: Comput., Mater. Continua
  contributor:
    fullname: Chen
– ident: ref30
  doi: 10.1155/2018/1734961
– ident: ref14
  doi: 10.1109/TIFS.2016.2598528
– ident: ref17
  doi: 10.1016/j.ins.2017.12.044
– ident: ref13
  doi: 10.1109/TCSVT.2015.2418611
– ident: ref27
  doi: 10.1007/978-3-319-31960-5_30
– ident: ref18
  doi: 10.1109/TCSVT.2018.2863029
– ident: ref33
  doi: 10.1016/j.sigpro.2018.04.016
– ident: ref23
  doi: 10.1016/j.image.2008.01.003
– ident: ref7
  doi: 10.1109/TIFS.2018.2799381
– ident: ref15
  doi: 10.1007/s11042-016-4049-z
– ident: ref25
  doi: 10.1016/j.ins.2017.11.021
– ident: ref10
  doi: 10.1109/TMM.2018.2844679
– volume: 10
  start-page: 1
  issue: 2
  year: 2018
  ident: ref29
  article-title: An efficient reversible data hiding scheme for encrypted images
  publication-title: Int. J. Digit. Crime Forensics
  doi: 10.4018/IJDCF.2018040101
  contributor:
    fullname: Kai
– ident: ref26
  doi: 10.1007/s11042-020-09379-3
SSID ssj0014507
Score 2.4516563
Snippet Reversible data hiding in encrypted images (RDH-EI) technology is commonly used in cloud storage images for privacy protection. Most existing RDH-EI techniques...
SourceID proquest
crossref
ieee
SourceType Aggregation Database
Publisher
StartPage 2924
SubjectTerms Algorithms
block permutation and co-modulation
Ciphers
Cloud computing
Cryptography
Encryption
Estimation
known plaintext attack
Modulation
Permutations
Resists
Reversible data hiding
Security
security analysis
Streaming media
Title Cryptanalysis of Reversible Data Hiding in Encrypted Images by Block Permutation and Co-Modulation
URI https://ieeexplore.ieee.org/document/9460756
https://www.proquest.com/docview/2675043439
Volume 24
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Nb9QwEB21PcGB0hbEQql86AWJbL2Ok9hHWFotlYIQaqXeonE8kaqWpGqzh_LrGTvJgoADlygHW7I8tt-bb4BjhsC8VlSwkmNcopV3iXH80Q02lDs0FO0d5Zd8danPr7KrLXi_yYUhohh8RvPwG335vqvXwVR2YnXOCJdvw7aRasjV2ngMdBZToxmOZGJZj5lcktKeXJQlK4JqMU-llVnssfILgmJPlb8e4oguZ7tQTusagkpu5uvezesff5Rs_N-FP4dnI80UH4ZzsQdb1O7D7tTCQYw3eh-e_laP8ADc8v7xjtniUKdEdI34RjFsw92S-IQ9itV1wDpx3YrTtg6DyYvP3_lNehDuUXxkZLwRX_mxXw8efoGtF8suKTs_tgl7AZdnpxfLVTI2YUhqJfM-0cQUL0dqGmZqLpWm1pIw2JI9M0tkbSvVDh1mC8_cy2d-gXURkFFhgaia9CXstF1Lr0CkyGTAFtQY12hniOcbW2QWbSYxtWYG7ya5VHdDrY0q6ijSVizDKsiwGmU4g4OwzZtx4w7P4HASZDVexodK5aGGfcrU6_W_Z72BJypkNUTLyiHs9Pdrestco3dH8ZD9BJQ_0LU
link.rule.ids 315,786,790,802,4043,27954,27955,27956,55107
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT9wwEB5ROLQ9FAqtui1QH7ggNYs3cR4-tgtoaQlC1SJxi8bxREK0CYLsgf76jp1kQS0HLlEOtmR5bH_fvAH2GAKTMqSUlZzMBCq0JsgMf1SFFSUGM_L2jvwsmV2o75fx5Qp8WebCEJEPPqOx-_W-fNuUC2cqO9AqYYRLXsAa47xMu2ytpc9AxT45mgFJBpo1mcEpKfXBPM9ZFQwn40hqGfsuKw8g5Luq_PcUe3w5Xod8WFkXVnI9XrRmXP75p2jjc5e-AW96oim-difjLaxQvQnrQxMH0d_pTXj9qCLhFpjp7f0N88WuUoloKvGTfOCG-UXiEFsUsyuHduKqFkd16QaTFSe_-VW6E-ZefGNsvBbn_NwvOh-_wNqKaRPkje0bhb2Di-Oj-XQW9G0YgjKUSRsoYpKXIFUVczUTyaxUktBZky1zS2R9K1IGDcYTy-zLxnaCZeqwMcQUMayi97BaNzV9ABEh0wGdUpWZSpmMeH6m01ijjiVGOhvB_iCX4qartlF4LUXqgmVYOBkWvQxHsOW2eTmu3-ERbA-CLPrreFeEiatiHzH5-vj0rM_wcjbPT4vTk7Mfn-BV6HIcvJ1lG1bb2wXtMPNoza4_cH8Bvt_UCQ
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Cryptanalysis+of+Reversible+Data+Hiding+in+Encrypted+Images+by+Block+Permutation+and+Co-Modulation&rft.jtitle=IEEE+transactions+on+multimedia&rft.au=Lingfeng%2C+Qu&rft.au=Fan%2C+Chen&rft.au=Shanjun%2C+Zhang&rft.au=He%2C+Hongjie&rft.date=2022&rft.pub=IEEE&rft.issn=1520-9210&rft.eissn=1941-0077&rft.volume=24&rft.spage=2924&rft.epage=2937&rft_id=info:doi/10.1109%2FTMM.2021.3090588&rft.externalDocID=9460756
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1520-9210&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1520-9210&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1520-9210&client=summon