Abstract
In order to improve the security of reversible data hiding algorithm in encrypted images, Liu designed an image multi-permutation encryption algorithm. By combining bit-plane permutation with pixel-block permutation, the embedding capacity of the algorithm is improved, and the ability of the encryption algorithm to resist existing Ciphertext-Only and Known-Plaintext attack is effectively improved. To analyze the security performance of the encryption algorithm, a Known-plaintext attack method based on the Root Mean Square(RMS) of image block is proposed in this paper. Firstly, the permutation order of bit plane is estimated by using the invariant distribution ratio of 0 and 1 before and after image encryption, the original pixel values is restored. Then, according to the characteristics that the pixel values of the image remain unchanged during block permutation and intra-block pixel permutation, the image block RMS feature is defined to search and estimate the block permutation sequence. Image block RMS equivalence class is defined by the image block RMS value, the ratio of the maximum number of elements in the equivalence class to the total number of pixels is p, which determines the difficulty of known plaintext attack. For the common image test set, 96% of the images have a p-value of less than 0.1, and only 4% of the images have a p-value greater than 0.1. Experimental results show that, When p<0.1, under the condition of 2 × 2 block size, the attacker only needs to know one pair of plaintext-ciphertext to decode about 50% of the encrypted image content. For a few images with p > 0.1, the attacker can crack more than 80% of the image content by two pairs of plaintext and ciphertext.
Similar content being viewed by others
References
Hong W, Chen TS, Wu HY (2012) An improved reversible data hiding in encrypted images using side match. IEEE Signal Processing Letters 19(4):199–202
Jolfaei A, Wu X, Muthukkumarasamy V (2016) On the security of permutation-only image encryption schemes. IEEE Transactions on Information Forensics and Security 11(2):235–246
Khelifi F (2018) On the security of a stream cipher in reversible data hiding schemes operating in the encrypted domain. Signal Process 143:336–345
Li C (2009) Lo K T. Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks, Signal Processing Image Communication
Li S, Li C, Chen G et al (2008) A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Process Image Commun 23(3):212–223
Li S, Li C, Lo KT, Chen G (2008) Cryptanalysis of an image scrambling scheme without bandwidth expansion[J]. IEEE Transactions on Circuits and Systems for Video Technology 18(3):338–349
Li W, Yan Y, Yu N (2012) Breaking row-column shuffle based image cipher[C]// proceedings of the 20th ACM international conference on multimedia. ACM
Liu Z, Pun C (2018) Reversible data-hiding in encrypted images by redundant space transfer. Inf Sci 433–434:188–203
Ma K, Zhang W, Zhao X, Yu N, Li F (2013) Reversible data hiding in encrypted images by reserving room before encryption. IEEE Transactions on Information Forensics and Security 8(3):553–562
Qian Z, Zhang X (2016) Reversible data hiding in encrypted images with distributed source encoding. IEEE Transactions on Circuits and Systems for Video Technology 26(4):636–646
Qian Z, Zhang X, Feng G (2016) Reversible data hiding in encrypted images based on progressive recovery. IEEE Signal Processing Letters:1–1
Qian Z, Dai S, Jiang F, Zhang X (2016) Improved joint reversible data hiding in encrypted images. J Vis Commun Image Represent 40:732–738
Qin C, Zhang X (2015) Reversible data hiding in encrypted image with privacy protection for image content. Journal of Visual Communication & Image Representation 31(C):154–164
Qu L, He H, Chen F (2019) Reversible data hiding in encrypted image based on prediction error and classification scrambling. Journal of Optoelectronics and Laser 30(2):168–174
Shi YQ, Li X, Zhang X, Wu HT, Ma B (2016) Reversible data hiding: advances in the past two decades. IEEE Access 4:3210–3237
Wu X, Sun W (2014) High-capacity reversible data hiding in encrypted images by prediction error. Signal Process 104(6):387–400
Xu D, Wang R (2016) Separable and error-free reversible data hiding in encrypted images. Signal Process 123:9–21
Yin Z, Luo B, Hong W (2014) Separable and error-free reversible data hiding in encrypted image with high payload. Sci World J 2014(1):604876
Yin Z, Abel A, Zhang X et al (2016) Reversible data hiding in encrypted image based on block histogram shifting, IEEE international conference on acoustics. Speech and Signal Processing 2016:2129–2133
Yin Z, Abel A, Tang J et al (2017) Reversible data hiding in encrypted images based on multi-level encryption and block histogram modification. Multimedia Tools & Applications 76(3):1–22
Zhang X (2012) Separable reversible data hiding in encrypted image. IEEE Transactions on Information Forensics and Security 7(2):826–832
Zhang X, Qian Z, Feng G, Ren Y (2014) Efficient reversible data hiding in encrypted images. J Vis Commun Image Represent 25(2):322–328
Zhang W, Ma K, Yu N (2014) Reversibility improved data hiding in encrypted images. Signal Process 94(1):118–127
Zhou J, Sun W, Dong L, Liu X, Au OC, Tang YY (2016) Secure reversible imagedata hiding over encrypted domain via key modulation. IEEE Trans CircuitsSyst Video Technol 26:441–452
Acknowledgements
This work has been supported by the National Natural Science Foundation of China (61872303 and U1936113), the Science and Technology Innovation Talents Program of Sichuan Science and Technology Department (2018RZ0143) and the Key Project of Sichuan Science and Technology Innovation Pioneering Miaozi Project (19MZGC0163).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Lingfeng, Q., hongjie, H. & fan, C. Security analysis of multiple permutation encryption adopt in reversible data hiding. Multimed Tools Appl 79, 29451–29471 (2020). https://doi.org/10.1007/s11042-020-09379-3
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-020-09379-3