Skip to main content
Log in

Security analysis of multiple permutation encryption adopt in reversible data hiding

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In order to improve the security of reversible data hiding algorithm in encrypted images, Liu designed an image multi-permutation encryption algorithm. By combining bit-plane permutation with pixel-block permutation, the embedding capacity of the algorithm is improved, and the ability of the encryption algorithm to resist existing Ciphertext-Only and Known-Plaintext attack is effectively improved. To analyze the security performance of the encryption algorithm, a Known-plaintext attack method based on the Root Mean Square(RMS) of image block is proposed in this paper. Firstly, the permutation order of bit plane is estimated by using the invariant distribution ratio of 0 and 1 before and after image encryption, the original pixel values is restored. Then, according to the characteristics that the pixel values of the image remain unchanged during block permutation and intra-block pixel permutation, the image block RMS feature is defined to search and estimate the block permutation sequence. Image block RMS equivalence class is defined by the image block RMS value, the ratio of the maximum number of elements in the equivalence class to the total number of pixels is p, which determines the difficulty of known plaintext attack. For the common image test set, 96% of the images have a p-value of less than 0.1, and only 4% of the images have a p-value greater than 0.1. Experimental results show that, When p<0.1, under the condition of 2 × 2 block size, the attacker only needs to know one pair of plaintext-ciphertext to decode about 50% of the encrypted image content. For a few images with p > 0.1, the attacker can crack more than 80% of the image content by two pairs of plaintext and ciphertext.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Hong W, Chen TS, Wu HY (2012) An improved reversible data hiding in encrypted images using side match. IEEE Signal Processing Letters 19(4):199–202

    Article  Google Scholar 

  2. Jolfaei A, Wu X, Muthukkumarasamy V (2016) On the security of permutation-only image encryption schemes. IEEE Transactions on Information Forensics and Security 11(2):235–246

    Article  Google Scholar 

  3. Khelifi F (2018) On the security of a stream cipher in reversible data hiding schemes operating in the encrypted domain. Signal Process 143:336–345

    Article  Google Scholar 

  4. Li C (2009) Lo K T. Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks, Signal Processing Image Communication

    Google Scholar 

  5. Li S, Li C, Chen G et al (2008) A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Process Image Commun 23(3):212–223

    Article  MathSciNet  Google Scholar 

  6. Li S, Li C, Lo KT, Chen G (2008) Cryptanalysis of an image scrambling scheme without bandwidth expansion[J]. IEEE Transactions on Circuits and Systems for Video Technology 18(3):338–349

    Article  Google Scholar 

  7. Li W, Yan Y, Yu N (2012) Breaking row-column shuffle based image cipher[C]// proceedings of the 20th ACM international conference on multimedia. ACM

  8. Liu Z, Pun C (2018) Reversible data-hiding in encrypted images by redundant space transfer. Inf Sci 433–434:188–203

    Article  MathSciNet  Google Scholar 

  9. Ma K, Zhang W, Zhao X, Yu N, Li F (2013) Reversible data hiding in encrypted images by reserving room before encryption. IEEE Transactions on Information Forensics and Security 8(3):553–562

    Article  Google Scholar 

  10. Qian Z, Zhang X (2016) Reversible data hiding in encrypted images with distributed source encoding. IEEE Transactions on Circuits and Systems for Video Technology 26(4):636–646

    Article  Google Scholar 

  11. Qian Z, Zhang X, Feng G (2016) Reversible data hiding in encrypted images based on progressive recovery. IEEE Signal Processing Letters:1–1

  12. Qian Z, Dai S, Jiang F, Zhang X (2016) Improved joint reversible data hiding in encrypted images. J Vis Commun Image Represent 40:732–738

    Article  Google Scholar 

  13. Qin C, Zhang X (2015) Reversible data hiding in encrypted image with privacy protection for image content. Journal of Visual Communication & Image Representation 31(C):154–164

    Article  Google Scholar 

  14. Qu L, He H, Chen F (2019) Reversible data hiding in encrypted image based on prediction error and classification scrambling. Journal of Optoelectronics and Laser 30(2):168–174

    Google Scholar 

  15. Shi YQ, Li X, Zhang X, Wu HT, Ma B (2016) Reversible data hiding: advances in the past two decades. IEEE Access 4:3210–3237

    Article  Google Scholar 

  16. Wu X, Sun W (2014) High-capacity reversible data hiding in encrypted images by prediction error. Signal Process 104(6):387–400

    Article  Google Scholar 

  17. Xu D, Wang R (2016) Separable and error-free reversible data hiding in encrypted images. Signal Process 123:9–21

    Article  Google Scholar 

  18. Yin Z, Luo B, Hong W (2014) Separable and error-free reversible data hiding in encrypted image with high payload. Sci World J 2014(1):604876

    Google Scholar 

  19. Yin Z, Abel A, Zhang X et al (2016) Reversible data hiding in encrypted image based on block histogram shifting, IEEE international conference on acoustics. Speech and Signal Processing 2016:2129–2133

    Google Scholar 

  20. Yin Z, Abel A, Tang J et al (2017) Reversible data hiding in encrypted images based on multi-level encryption and block histogram modification. Multimedia Tools & Applications 76(3):1–22

    Article  Google Scholar 

  21. Zhang X (2012) Separable reversible data hiding in encrypted image. IEEE Transactions on Information Forensics and Security 7(2):826–832

    Article  Google Scholar 

  22. Zhang X, Qian Z, Feng G, Ren Y (2014) Efficient reversible data hiding in encrypted images. J Vis Commun Image Represent 25(2):322–328

    Article  Google Scholar 

  23. Zhang W, Ma K, Yu N (2014) Reversibility improved data hiding in encrypted images. Signal Process 94(1):118–127

    Article  Google Scholar 

  24. Zhou J, Sun W, Dong L, Liu X, Au OC, Tang YY (2016) Secure reversible imagedata hiding over encrypted domain via key modulation. IEEE Trans CircuitsSyst Video Technol 26:441–452

    Article  Google Scholar 

Download references

Acknowledgements

This work has been supported by the National Natural Science Foundation of China (61872303 and U1936113), the Science and Technology Innovation Talents Program of Sichuan Science and Technology Department (2018RZ0143) and the Key Project of Sichuan Science and Technology Innovation Pioneering Miaozi Project (19MZGC0163).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chen fan.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Lingfeng, Q., hongjie, H. & fan, C. Security analysis of multiple permutation encryption adopt in reversible data hiding. Multimed Tools Appl 79, 29451–29471 (2020). https://doi.org/10.1007/s11042-020-09379-3

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-09379-3

Keywords

Navigation