Security analysis of multiple permutation encryption adopt in reversible data hiding
- PDF / 2,876,194 Bytes
- 21 Pages / 439.37 x 666.142 pts Page_size
- 92 Downloads / 177 Views
Security analysis of multiple permutation encryption adopt in reversible data hiding Qu Lingfeng 1
1
& He hongjie & Chen fan
1
Received: 11 September 2019 / Revised: 5 June 2020 / Accepted: 16 July 2020 # Springer Science+Business Media, LLC, part of Springer Nature 2020
Abstract
In order to improve the security of reversible data hiding algorithm in encrypted images, Liu designed an image multi-permutation encryption algorithm. By combining bit-plane permutation with pixel-block permutation, the embedding capacity of the algorithm is improved, and the ability of the encryption algorithm to resist existing Ciphertext-Only and Known-Plaintext attack is effectively improved. To analyze the security performance of the encryption algorithm, a Known-plaintext attack method based on the Root Mean Square(RMS) of image block is proposed in this paper. Firstly, the permutation order of bit plane is estimated by using the invariant distribution ratio of 0 and 1 before and after image encryption, the original pixel values is restored. Then, according to the characteristics that the pixel values of the image remain unchanged during block permutation and intra-block pixel permutation, the image block RMS feature is defined to search and estimate the block permutation sequence. Image block RMS equivalence class is defined by the image block RMS value, the ratio of the maximum number of elements in the equivalence class to the total number of pixels is p, which determines the difficulty of known plaintext attack. For the common image test set, 96% of the images have a p-value of less than 0.1, and only 4% of the images have a p-value greater than 0.1. Experimental results show that, When p 0.1, the attacker can crack more than 80% of the image content by two pairs of plaintext and ciphertext. Keywords Reversible data hiding . Multiple permutation encryption . Known plaintext attack . Security analysis
* Chen fan [email protected]
1
Southwest Jiaotong University, Chengdu 610031 Sichuan, China
Multimedia Tools and Applications
1 Introduction With rapid development of digital information technology, image data is transmitted over all kinds of wired/wireless channels more and more frequently. Image confidentiality, identity authentication and integrity are often threatened by illegal activities such as hackers, copying or malicious use, encryption is an effective and popular solution. On the one hand, the confidentiality and privacy of image data can be preserved by encrypting the image because it converts the original, meaningful image content into incomprehensible, noise-like content. On the other hand, in the process of encrypted image storage or archiving, it is inevitable to analyze and process the encrypted image without knowing its original content. As a result, the reversible data hiding(RDH) in encrypted images (RDH-EI) technique has attracted great attention [15]. Except for a few recent attempts, reported recently in [3, 24], all existing data hiding techniques in the encrypted domain have been assessed on the
Data Loading...