Cryptanalysis and improvement of a reversible data-hiding scheme in encrypted images by redundant space transfer

Abstract Recently, a reversible data hiding scheme by redundant space transfer has been proposed by Liu et al. In this scheme, the encryption process consists of bit plane disordering, sub-block position disordering and different-time Arnold transform in each sub-block. Then, the additional data is embedded into the LSB planes of the encrypted image by compressing the redundant space. However, to transfer the redundancy of the plain image into encrypted image, this scheme essentially just performs three types of disorder operations, which is vulnerable to security analysis. In this paper, we firstly demonstrate that the encryption method of this scheme can be broken by chosen-plaintext attack (CPA). Furthermore, in order to achieve the resistance against CPA, we introduce 2-D Logistic-adjusted-sine map (2D-LASM) to produce the encryption sequences with the control parameters generated from the plain image. Apart from that, we also improve the sparse matrix compression to achieve a superior embedding capacity. Extensive experiments and analyses demonstrate that the proposed scheme outperforms the original one in terms of both security and embedding capacity.

[1]  Nora Cuppens-Boulahia,et al.  Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram Shifting , 2013, IEEE Transactions on Information Forensics and Security.

[2]  Tung-Shou Chen,et al.  Reversible data hiding using Delaunay triangulation and selective embedment , 2015, Inf. Sci..

[3]  Tung-Shou Chen,et al.  An Improved Reversible Data Hiding in Encrypted Images Using Side Match , 2012, IEEE Signal Processing Letters.

[4]  Zhenxing Qian,et al.  Reversible Data Hiding in Encrypted Images With Distributed Source Encoding , 2016, IEEE Transactions on Circuits and Systems for Video Technology.

[5]  Shaowei Weng,et al.  Dynamic improved pixel value ordering reversible data hiding , 2019, Inf. Sci..

[6]  Ki-Hyun Jung,et al.  Robust reversible data hiding scheme based on two-layer embedding strategy , 2020, Inf. Sci..

[7]  J. Morris Chang,et al.  Block-based reversible data embedding , 2009, Signal Process..

[8]  Yen-Ping Chu,et al.  Adaptive lossless steganographic scheme with centralized difference expansion , 2008, Pattern Recognit..

[9]  R. M. López-Gutiérrez,et al.  A RGB image encryption algorithm based on total plain image characteristics and chaos , 2015, Signal Process..

[10]  William Puech,et al.  An Efficient MSB Prediction-Based Method for High-Capacity Reversible Data Hiding in Encrypted Images , 2018, IEEE Transactions on Information Forensics and Security.

[11]  Hyoung Joong Kim,et al.  Skewed Histogram Shifting for Reversible Data Hiding Using a Pair of Extreme Predictions , 2019, IEEE Transactions on Circuits and Systems for Video Technology.

[12]  Xinpeng Zhang,et al.  Lossless and Reversible Data Hiding in Encrypted Images With Public-Key Cryptography , 2016, IEEE Transactions on Circuits and Systems for Video Technology.

[13]  Jiwu Huang,et al.  JPEG Image Encryption With Improved Format Compatibility and File Size Preservation , 2018, IEEE Transactions on Multimedia.

[14]  Chengqing Li,et al.  When an attacker meets a cipher-image in 2018: A Year in Review , 2019, J. Inf. Secur. Appl..

[15]  Beng Chin Ooi,et al.  Tailored reversible watermarking schemes for authentication of electronic clinical atlas , 2005, IEEE Transactions on Information Technology in Biomedicine.

[16]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[17]  Xinpeng Zhang,et al.  Reversible Data Hiding in Encrypted Images Based on Multi-MSB Prediction and Huffman Coding , 2018, IEEE Transactions on Multimedia.

[18]  Weiming Zhang,et al.  Minimum Rate Prediction and Optimized Histograms Modification for Reversible Data Hiding , 2015, IEEE Transactions on Information Forensics and Security.

[19]  Xiao Chen,et al.  A parallel and robust object tracking approach synthesizing adaptive Bayesian learning and improved incremental subspace learning , 2019, Frontiers of Computer Science.

[20]  Weiming Zhang,et al.  Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption , 2013, IEEE Transactions on Information Forensics and Security.

[21]  Xiaochun Cao,et al.  High Capacity Reversible Data Hiding in Encrypted Images by Patch-Level Sparse Representation , 2016, IEEE Transactions on Cybernetics.

[22]  S. Li,et al.  Cryptographic requirements for chaotic secure communications , 2003, nlin/0311039.

[23]  Fei Peng,et al.  Adaptive reversible data hiding scheme based on integer transform , 2012, Signal Process..

[24]  Fazhi He,et al.  Service-Oriented Feature-Based Data Exchange for Cloud-Based Design and Manufacturing , 2018, IEEE Transactions on Services Computing.

[25]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[26]  Yiteng Pan,et al.  Learning social representations with deep autoencoder for recommender system , 2020, World Wide Web.

[27]  A. Murat Tekalp,et al.  Lossless generalized-LSB data embedding , 2005, IEEE Transactions on Image Processing.

[28]  Syeda Iram Batool,et al.  A novel image encryption scheme based on Arnold scrambling and Lucas series , 2019, Multimedia Tools and Applications.

[29]  Weiming Zhang,et al.  Efficient Reversible Data Hiding Based on Multiple Histograms Modification , 2015, IEEE Transactions on Information Forensics and Security.

[30]  Cong Wang,et al.  Improved known-plaintext attack to permutation-only multimedia ciphers , 2018, Inf. Sci..

[31]  Jun Tian,et al.  Reversible data embedding using a difference expansion , 2003, IEEE Trans. Circuits Syst. Video Technol..

[32]  Weiming Zhang,et al.  Reversibility improved data hiding in encrypted images , 2014, Signal Process..

[33]  Manish Kumar,et al.  A cryptographic model for better information security , 2018, J. Inf. Secur. Appl..

[34]  Muhammad Arsalan,et al.  Intelligent reversible watermarking in integer wavelet domain for medical images , 2012, J. Syst. Softw..

[35]  Dongdong Lin,et al.  Cryptanalyzing an Image Encryption Algorithm Based on Autoblocking and Electrocardiography , 2017, IEEE MultiMedia.

[36]  Yicong Zhou,et al.  2D Sine Logistic modulation map for image encryption , 2015, Inf. Sci..

[37]  Weiming Zhang,et al.  Recursive Histogram Modification: Establishing Equivalency Between Reversible Data Hiding and Lossless Data Compression , 2013, IEEE Transactions on Image Processing.

[38]  Xinpeng Zhang,et al.  Reversible Data Hiding in Encrypted Image , 2011, IEEE Signal Processing Letters.

[39]  Xiaofeng Liao,et al.  Color image encryption based on chaotic systems and elliptic curve ElGamal scheme , 2017, Signal Process..

[40]  Chi-Man Pun,et al.  Reversible data-hiding in encrypted images by redundant space transfer , 2018, Inf. Sci..

[41]  Jessica J. Fridrich,et al.  Lossless data embedding for all image formats , 2002, IS&T/SPIE Electronic Imaging.

[42]  Weiming Zhang,et al.  A Secure and Privacy-Preserving Technique Based on Contrast-Enhancement Reversible Data Hiding and Plaintext Encryption for Medical Images , 2020, IEEE Signal Processing Letters.

[43]  Xinpeng Zhang,et al.  Separable Reversible Data Hiding in Encrypted Image , 2012, IEEE Transactions on Information Forensics and Security.

[44]  Sung-Hsien Hsieh,et al.  A New Reversible Data Hiding in Encrypted Image Based on Multi-Secret Sharing and Lightweight Cryptographic Algorithms , 2019, IEEE Transactions on Information Forensics and Security.

[45]  Gonzalo Álvarez,et al.  Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.

[46]  Amrtha Anand.K,et al.  Lossless and Reversible Data Hiding in Encrypted Images with Public Key Cryptography , 2016 .