Cryptanalysis of Reversible Data Hiding in Encrypted Images Based on the VQ Attack

被引:0
|
作者
Gao, Kai [1 ]
Chang, Chin-Chen [1 ]
Lin, Chia-Chen [2 ]
机构
[1] Feng Chia Univ, Dept Informat Engn & Comp Sci, Taichung 407, Taiwan
[2] Natl Chin Yi Univ Technol, Dept Comp Sci & Informat Engn, Taichung 411, Taiwan
来源
SYMMETRY-BASEL | 2023年 / 15卷 / 01期
关键词
reversible data hiding; co-modulation; vector quantization; block permutation and co-modulation; cryptanalysis; PERMUTATION; SECURITY;
D O I
10.3390/sym15010189
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Reversible data hiding in encrypted images (RDHEI) is commonly used for privacy protection in images stored on cloud storage. Currently, block permutation and co-modulation (BPCM) encryption is commonly utilized in most existing RDHEI schemes to generate encrypted images. In this paper, we analyze the vulnerabilities of RDHEI based on BPCM encryption and then propose a cryptanalysis method based on the vector quantization (VQ) attack. Unlike the existing cryptanalysis method, our method does not require the help of a plaintext image instead of adopting the symmetric property between the original cover image and the encrypted cover image. To obtain the pixel-changing pattern of a block before and after co-modulation, the concept of a pixel difference block (PDB) is first defined. Then, the VQ technique is used to estimate the content of the ciphertext block. Finally, we propose a sequence recovery method to help obtain the final recovered image based on the premise that the generator is compromised. The experimental results demonstrate that when the block size is 4 x 4, our proposed cryptanalysis method can decrypt the contents of the ciphertext image well. The average similarity can exceed 75% when comparing the edge information of the estimated image and the original image. It is concluded from our study that the BPCM encryption algorithm is not robust enough.
引用
收藏
页数:17
相关论文
共 50 条
  • [1] Separable Reversible Data Hiding in Encrypted VQ-Encoded Images
    Cao, Fang
    Fu, Yujie
    Yao, Heng
    Zou, Mian
    Li, Jian
    Qin, Chuan
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [2] Cryptanalysis of Reversible Data Hiding in Encrypted Images by Block Permutation and Co-Modulation
    Qu, Lingfeng
    Chen, Fan
    Zhang, Shanjun
    He, Hongjie
    [J]. IEEE TRANSACTIONS ON MULTIMEDIA, 2022, 24 : 2924 - 2937
  • [3] Reversible Data Hiding Scheme Based on VQ Prediction and Adaptive Parametric Binary Tree Labeling for Encrypted Images
    Xu, Shuying
    Horng, Ji-Hwei
    Chang, Chin-Chen
    [J]. IEEE ACCESS, 2021, 9 : 55191 - 55204
  • [4] Reversible Contrast Mapping based Reversible Data Hiding in Encrypted Images
    Qiu, Yingqiang
    Wang, Hangxing
    Wang, Zichi
    Qian, Zhenxing
    Feng, Gui
    Zhang, Xinpeng
    [J]. 2018 10TH IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS), 2018,
  • [5] Reversible Data Hiding in Encrypted Images Based on Image Interpolation
    Han, Xiyu
    Qian, Zhenxing
    Feng, Guorui
    Zhang, Xinpeng
    [J]. INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2014, 6 (03) : 16 - 29
  • [6] Mean value based reversible data hiding in encrypted images
    Agrawal, Smita
    Kumar, Manoj
    [J]. OPTIK, 2017, 130 : 922 - 934
  • [7] Reversible Data Hiding in Encrypted Images Based on Progressive Recovery
    Qian, Zhenxing
    Zhang, Xinpeng
    Feng, Guorui
    [J]. IEEE SIGNAL PROCESSING LETTERS, 2016, 23 (11) : 1672 - 1676
  • [8] Dynamic Programming Based Encrypted Reversible Data Hiding in Images
    Joseph, Linda
    Renjit, J. Arokia
    Kumar, P. Mohan
    [J]. JOURNAL OF APPLIED SECURITY RESEARCH, 2013, 8 (04) : 467 - 476
  • [9] PVO-BASED REVERSIBLE DATA HIDING FOR ENCRYPTED IMAGES
    Ou, Bo
    Li, Xiaolong
    Zhang, Weiming
    [J]. 2015 IEEE CHINA SUMMIT & INTERNATIONAL CONFERENCE ON SIGNAL AND INFORMATION PROCESSING, 2015, : 831 - 835
  • [10] A reversible data hiding method for encrypted images
    Puech, W.
    Chaumont, M.
    Strauss, O.
    [J]. SECURITY, FORENSICS, STEGANOGRAPHY, AND WATERMARKING OF MULTIMEDIA CONTENTS X, 2008, 6819