Cryptanalysis of Reversible Data Hiding in Encrypted Images by Block Permutation and Co-Modulation
Reversible data hiding in encrypted images (RDH-EI) technology is commonly used in cloud storage images for privacy protection. Most existing RDH-EI techniques reported in the literature applied block permutation and co-modulation (BPCM) encryption to generate encrypted images. This work analyses th...
Saved in:
Published in | IEEE transactions on multimedia Vol. 24; pp. 2924 - 2937 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
Piscataway
IEEE
2022
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Reversible data hiding in encrypted images (RDH-EI) technology is commonly used in cloud storage images for privacy protection. Most existing RDH-EI techniques reported in the literature applied block permutation and co-modulation (BPCM) encryption to generate encrypted images. This work analyses the security of the RDH-EI algorithm based on BPCM encryption under known plaintext attacks (KPAs). Different from the existing KPAs, this paper considers that attackers can perform KPAs based on marked encrypted images and shows that BPCM encryption has the risk of information leakage. To find the constant features of a block before and after co-modulation, the first-pixel difference block (FDB) of a block is first defined. Then, a pseudo cypher difference image of the cyphertext image is constructed to eliminate the changed FDBs so that the differences in the cyphertext FDBs are the same as the FDBs in the corresponding plaintext difference image. Finally, we design an FDB-based block permutation key estimation method according to the plaintext difference image and pseudocyphertext difference image. The influence of block size on key estimation accuracy and the time complexity of the proposed KPA algorithm are analysed and discussed. Experimental results show that the correct rate of key estimation is positively correlated with the block size and the number of plain-cyphertext pairs. The average correct rate of key estimation reaches 63% when the block size is greater than 3×3. |
---|---|
AbstractList | Reversible data hiding in encrypted images (RDH-EI) technology is commonly used in cloud storage images for privacy protection. Most existing RDH-EI techniques reported in the literature applied block permutation and co-modulation (BPCM) encryption to generate encrypted images. This work analyses the security of the RDH-EI algorithm based on BPCM encryption under known plaintext attacks (KPAs). Different from the existing KPAs, this paper considers that attackers can perform KPAs based on marked encrypted images and shows that BPCM encryption has the risk of information leakage. To find the constant features of a block before and after co-modulation, the first-pixel difference block (FDB) of a block is first defined. Then, a pseudo cypher difference image of the cyphertext image is constructed to eliminate the changed FDBs so that the differences in the cyphertext FDBs are the same as the FDBs in the corresponding plaintext difference image. Finally, we design an FDB-based block permutation key estimation method according to the plaintext difference image and pseudocyphertext difference image. The influence of block size on key estimation accuracy and the time complexity of the proposed KPA algorithm are analysed and discussed. Experimental results show that the correct rate of key estimation is positively correlated with the block size and the number of plain-cyphertext pairs. The average correct rate of key estimation reaches 63% when the block size is greater than 3×3. |
Author | He, Hongjie Fan, Chen Lingfeng, Qu Shanjun, Zhang |
Author_xml | – sequence: 1 givenname: Qu orcidid: 0000-0002-2544-4324 surname: Lingfeng fullname: Lingfeng, Qu email: 792443987@qq.com organization: Key Laboratory of Signal & Information Processing, Southwest Jiaotong University, Chengdu, China – sequence: 2 givenname: Chen orcidid: 0000-0002-2909-0295 surname: Fan fullname: Fan, Chen email: fchen@swjtu.edu.cn organization: School of Computing and Artificial Intelligence, Southwest Jiaotong University, Chengdu, China – sequence: 3 givenname: Zhang surname: Shanjun fullname: Shanjun, Zhang email: zhang@info.kanagawa-u.ac.jp organization: Department of Information Science, the Faculty of Science, Kanagawa University, Kanazawa, Japan – sequence: 4 givenname: Hongjie orcidid: 0000-0003-2683-0419 surname: He fullname: He, Hongjie email: hjhe@swjtu.edu.cn organization: Key Laboratory of Signal & Information Processing, Southwest Jiaotong University, Chengdu, China |
BookMark | eNo9kE1Lw0AQhhepYFu9C14WPKfOfiXdo9ZqCy2K1PMySTYlNc3W3UTIvze1xdO8DM87MM-IDGpXW0JuGUwYA_2wWa8nHDibCNCgptMLMmRasgggSQZ9VhwizRlckVEIOwAmFSRDks58d2iwxqoLZaCuoB_2x_pQppWlz9ggXZR5WW9pWdN5nR1hm9PlHrc20LSjT5XLvui79fu2waZ0NcU6pzMXrV3eVn-ba3JZYBXszXmOyefLfDNbRKu31-XscRVlHOImkpZpEaMtCsV5KmCaSbCouIBcsxhZLIVMMUXFcsVkrnKGWSKZAI4JIi_EmNyf7h68-25taMzOtb7_LBgeJwr6vtA9BScq8y4Ebwtz8OUefWcYmKNJ05s0R5PmbLKv3J0qpbX2H9cyhkTF4hdljnCm |
CODEN | ITMUF8 |
CitedBy_id | crossref_primary_10_1109_TCSVT_2023_3298803 crossref_primary_10_1109_TIFS_2023_3280341 crossref_primary_10_1145_3638771 crossref_primary_10_1109_TCSVT_2022_3163905 crossref_primary_10_1016_j_jisa_2024_103771 crossref_primary_10_1109_TMM_2021_3132168 crossref_primary_10_1109_TCSVT_2023_3270882 crossref_primary_10_1016_j_jvcir_2023_103975 crossref_primary_10_1109_TMM_2023_3314975 crossref_primary_10_1145_3672568 crossref_primary_10_1007_s11042_023_17154_3 crossref_primary_10_1109_TMM_2023_3342700 crossref_primary_10_1109_TDSC_2022_3218570 crossref_primary_10_1109_TCSVT_2022_3208030 crossref_primary_10_1016_j_jksuci_2023_101752 |
Cites_doi | 10.1109/TCSVT.2020.2992817 10.1109/TIFS.2015.2489178 10.1155/2019/7480147 10.1109/TIFS.2020.3006382 10.1109/ACCESS.2016.2573308 10.1109/TIFS.2011.2176120 10.1109/ICIP.2017.8297098 10.1109/LSP.2011.2114651 10.1007/1-4020-0613-6_4267 10.1016/j.sigpro.2010.09.014 10.1016/j.sigpro.2017.09.020 10.1109/ACCESS.2020.2972622 10.1109/TMM.2016.2569497 10.1016/j.sigpro.2015.12.012 10.1109/TIFS.2013.2248725 10.1109/TMM.2020.2985537 10.1109/TMM.2019.2952979 10.1109/ICASSP.2016.7472053 10.1109/TMM.2019.2936314 10.1155/2018/1734961 10.1109/TIFS.2016.2598528 10.1016/j.ins.2017.12.044 10.1109/TCSVT.2015.2418611 10.1007/978-3-319-31960-5_30 10.1109/TCSVT.2018.2863029 10.1016/j.sigpro.2018.04.016 10.1016/j.image.2008.01.003 10.1109/TIFS.2018.2799381 10.1007/s11042-016-4049-z 10.1016/j.ins.2017.11.021 10.1109/TMM.2018.2844679 10.4018/IJDCF.2018040101 10.1007/s11042-020-09379-3 |
ContentType | Journal Article |
Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022 |
Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022 |
DBID | 97E RIA RIE AAYXX CITATION 7SC 7SP 8FD JQ2 L7M L~C L~D |
DOI | 10.1109/TMM.2021.3090588 |
DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005-present IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE/IET Electronic Library (IEL) CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
DatabaseTitle | CrossRef Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
DatabaseTitleList | Technology Research Database |
Database_xml | – sequence: 1 dbid: RIE name: IEEE/IET Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering Computer Science |
EISSN | 1941-0077 |
EndPage | 2937 |
ExternalDocumentID | 10_1109_TMM_2021_3090588 9460756 |
Genre | orig-research |
GrantInformation_xml | – fundername: Technology Department of Sichuan Province grantid: 2021004 – fundername: National Natural Science Foundation of China grantid: U1936113; 61872303 funderid: 10.13039/501100001809 |
GroupedDBID | -~X 0R~ 29I 4.4 5GY 5VS 6IK 97E AAJGR AASAJ ABQJQ ABTAH ABVLG ACGFO ACGFS ACIWK AENEX AETIX AI. AIBXA AKJIK ALLEH ALMA_UNASSIGNED_HOLDINGS ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 EBS EJD HZ~ H~9 IFIPE IFJZH IPLJI JAVBF LAI M43 O9- OCL P2P PQQKQ RIA RIE RNS TN5 VH1 XFK ZY4 AAYXX CITATION 7SC 7SP 8FD JQ2 L7M L~C L~D |
ID | FETCH-LOGICAL-c206t-4e1936aeff522b308c40ea5230d916a16434baba51d514d5d1ac741302a7aa2f3 |
IEDL.DBID | RIE |
ISSN | 1520-9210 |
IngestDate | Thu Oct 10 17:36:45 EDT 2024 Fri Aug 23 01:41:48 EDT 2024 Wed Jun 26 19:24:58 EDT 2024 |
IsPeerReviewed | true |
IsScholarly | true |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c206t-4e1936aeff522b308c40ea5230d916a16434baba51d514d5d1ac741302a7aa2f3 |
ORCID | 0000-0002-2544-4324 0000-0002-2909-0295 0000-0003-2683-0419 |
PQID | 2675043439 |
PQPubID | 75737 |
PageCount | 14 |
ParticipantIDs | crossref_primary_10_1109_TMM_2021_3090588 ieee_primary_9460756 proquest_journals_2675043439 |
PublicationCentury | 2000 |
PublicationDate | 20220000 2022-00-00 20220101 |
PublicationDateYYYYMMDD | 2022-01-01 |
PublicationDate_xml | – year: 2022 text: 20220000 |
PublicationDecade | 2020 |
PublicationPlace | Piscataway |
PublicationPlace_xml | – name: Piscataway |
PublicationTitle | IEEE transactions on multimedia |
PublicationTitleAbbrev | TMM |
PublicationYear | 2022 |
Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
References | ref13 ref12 ref34 ref15 ref14 ref31 ref30 ref11 ref33 ref10 ref32 ref2 ref1 ref17 ref16 ref19 ref18 ref24 ref23 ref26 ref25 ref20 ref22 ref21 ref28 ref27 ref7 ref9 ref4 ref3 ref6 Chen (ref8) 2018; 56 ref5 Kai (ref29) 2018; 10 Kerckhoffs (ref35) 1883; IX |
References_xml | – volume: IX start-page: 161 year: 1883 ident: ref35 article-title: La cryptographie militaire publication-title: J. Des Sci. Militaires contributor: fullname: Kerckhoffs – ident: ref9 doi: 10.1109/TCSVT.2020.2992817 – ident: ref19 doi: 10.1109/TIFS.2015.2489178 – ident: ref31 doi: 10.1155/2019/7480147 – ident: ref22 doi: 10.1109/TIFS.2020.3006382 – ident: ref2 doi: 10.1109/ACCESS.2016.2573308 – ident: ref12 doi: 10.1109/TIFS.2011.2176120 – ident: ref32 doi: 10.1109/ICIP.2017.8297098 – ident: ref11 doi: 10.1109/LSP.2011.2114651 – ident: ref20 doi: 10.1007/1-4020-0613-6_4267 – ident: ref24 doi: 10.1016/j.sigpro.2010.09.014 – ident: ref21 doi: 10.1016/j.sigpro.2017.09.020 – ident: ref34 doi: 10.1109/ACCESS.2020.2972622 – ident: ref1 doi: 10.1109/TMM.2016.2569497 – ident: ref28 doi: 10.1016/j.sigpro.2015.12.012 – ident: ref3 doi: 10.1109/TIFS.2013.2248725 – ident: ref5 doi: 10.1109/TMM.2020.2985537 – ident: ref6 doi: 10.1109/TMM.2019.2952979 – ident: ref16 doi: 10.1109/ICASSP.2016.7472053 – ident: ref4 doi: 10.1109/TMM.2019.2936314 – volume: 56 start-page: 299 issue: 2 year: 2018 ident: ref8 article-title: Reversible data hiding in classification-scrambling encrypted-image based on iterative recovery publication-title: Comput., Mater. Continua contributor: fullname: Chen – ident: ref30 doi: 10.1155/2018/1734961 – ident: ref14 doi: 10.1109/TIFS.2016.2598528 – ident: ref17 doi: 10.1016/j.ins.2017.12.044 – ident: ref13 doi: 10.1109/TCSVT.2015.2418611 – ident: ref27 doi: 10.1007/978-3-319-31960-5_30 – ident: ref18 doi: 10.1109/TCSVT.2018.2863029 – ident: ref33 doi: 10.1016/j.sigpro.2018.04.016 – ident: ref23 doi: 10.1016/j.image.2008.01.003 – ident: ref7 doi: 10.1109/TIFS.2018.2799381 – ident: ref15 doi: 10.1007/s11042-016-4049-z – ident: ref25 doi: 10.1016/j.ins.2017.11.021 – ident: ref10 doi: 10.1109/TMM.2018.2844679 – volume: 10 start-page: 1 issue: 2 year: 2018 ident: ref29 article-title: An efficient reversible data hiding scheme for encrypted images publication-title: Int. J. Digit. Crime Forensics doi: 10.4018/IJDCF.2018040101 contributor: fullname: Kai – ident: ref26 doi: 10.1007/s11042-020-09379-3 |
SSID | ssj0014507 |
Score | 2.4516563 |
Snippet | Reversible data hiding in encrypted images (RDH-EI) technology is commonly used in cloud storage images for privacy protection. Most existing RDH-EI techniques... |
SourceID | proquest crossref ieee |
SourceType | Aggregation Database Publisher |
StartPage | 2924 |
SubjectTerms | Algorithms block permutation and co-modulation Ciphers Cloud computing Cryptography Encryption Estimation known plaintext attack Modulation Permutations Resists Reversible data hiding Security security analysis Streaming media |
Title | Cryptanalysis of Reversible Data Hiding in Encrypted Images by Block Permutation and Co-Modulation |
URI | https://ieeexplore.ieee.org/document/9460756 https://www.proquest.com/docview/2675043439 |
Volume | 24 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Nb9QwEB21PcGB0hbEQql86AWJbL2Ok9hHWFotlYIQaqXeonE8kaqWpGqzh_LrGTvJgoADlygHW7I8tt-bb4BjhsC8VlSwkmNcopV3iXH80Q02lDs0FO0d5Zd8danPr7KrLXi_yYUhohh8RvPwG335vqvXwVR2YnXOCJdvw7aRasjV2ngMdBZToxmOZGJZj5lcktKeXJQlK4JqMU-llVnssfILgmJPlb8e4oguZ7tQTusagkpu5uvezesff5Rs_N-FP4dnI80UH4ZzsQdb1O7D7tTCQYw3eh-e_laP8ADc8v7xjtniUKdEdI34RjFsw92S-IQ9itV1wDpx3YrTtg6DyYvP3_lNehDuUXxkZLwRX_mxXw8efoGtF8suKTs_tgl7AZdnpxfLVTI2YUhqJfM-0cQUL0dqGmZqLpWm1pIw2JI9M0tkbSvVDh1mC8_cy2d-gXURkFFhgaia9CXstF1Lr0CkyGTAFtQY12hniOcbW2QWbSYxtWYG7ya5VHdDrY0q6ijSVizDKsiwGmU4g4OwzZtx4w7P4HASZDVexodK5aGGfcrU6_W_Z72BJypkNUTLyiHs9Pdrestco3dH8ZD9BJQ_0LU |
link.rule.ids | 315,786,790,802,4043,27954,27955,27956,55107 |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT9wwEB5ROLQ9FAqtui1QH7ggNYs3cR4-tgtoaQlC1SJxi8bxREK0CYLsgf76jp1kQS0HLlEOtmR5bH_fvAH2GAKTMqSUlZzMBCq0JsgMf1SFFSUGM_L2jvwsmV2o75fx5Qp8WebCEJEPPqOx-_W-fNuUC2cqO9AqYYRLXsAa47xMu2ytpc9AxT45mgFJBpo1mcEpKfXBPM9ZFQwn40hqGfsuKw8g5Luq_PcUe3w5Xod8WFkXVnI9XrRmXP75p2jjc5e-AW96oim-difjLaxQvQnrQxMH0d_pTXj9qCLhFpjp7f0N88WuUoloKvGTfOCG-UXiEFsUsyuHduKqFkd16QaTFSe_-VW6E-ZefGNsvBbn_NwvOh-_wNqKaRPkje0bhb2Di-Oj-XQW9G0YgjKUSRsoYpKXIFUVczUTyaxUktBZky1zS2R9K1IGDcYTy-zLxnaCZeqwMcQUMayi97BaNzV9ABEh0wGdUpWZSpmMeH6m01ijjiVGOhvB_iCX4qartlF4LUXqgmVYOBkWvQxHsOW2eTmu3-ERbA-CLPrreFeEiatiHzH5-vj0rM_wcjbPT4vTk7Mfn-BV6HIcvJ1lG1bb2wXtMPNoza4_cH8Bvt_UCQ |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Cryptanalysis+of+Reversible+Data+Hiding+in+Encrypted+Images+by+Block+Permutation+and+Co-Modulation&rft.jtitle=IEEE+transactions+on+multimedia&rft.au=Lingfeng%2C+Qu&rft.au=Fan%2C+Chen&rft.au=Shanjun%2C+Zhang&rft.au=He%2C+Hongjie&rft.date=2022&rft.pub=IEEE&rft.issn=1520-9210&rft.eissn=1941-0077&rft.volume=24&rft.spage=2924&rft.epage=2937&rft_id=info:doi/10.1109%2FTMM.2021.3090588&rft.externalDocID=9460756 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1520-9210&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1520-9210&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1520-9210&client=summon |