On the security of a stream cipher in reversible data hiding schemes operating in the encrypted domain

Abstract Reversible data hiding in encrypted images has recently emerged as an effective approach to embed and extract a message in the encrypted domain and losslessly recover the host data while maintaining its confidentiality through encryption. That is, the data hider can embed and extract additional data without knowing the image. This approach can be used in cloud applications where the service provider, i.e., the data hider, is not authorized to access the visual content of the host data for security and privacy purposes. Most existing techniques that have been reported in the literature apply a bit-wise encryption method, also known as the stream cipher, prior to data hiding. However, because of the spatial redundancy that characterizes natural images, the security of such an encryption could be compromised. This work is the first one that analyzes reversible data hiding in encrypted images from a security perspective. It proposes a Ciphertext-Only Attack (COA) and highlights the weakness of current state-of-the-art data hiding systems in the encrypted domain. We particularly show how the data hider can break the security of the encryption system and consequently discloses the visual content of encrypted images. Finally, possible solutions to combat COA with existing systems are discussed.

[1]  P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .

[2]  Nikolaos G. Bourbakis,et al.  A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks , 2008, Signal Process. Image Commun..

[3]  Weiming Zhang,et al.  Reversibility improved data hiding in encrypted images , 2014, Signal Process..

[4]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[5]  Zhenxing Qian,et al.  Reversible Data Hiding in Encrypted Images With Distributed Source Encoding , 2016, IEEE Transactions on Circuits and Systems for Video Technology.

[6]  Zhenxing Qian,et al.  Improved joint reversible data hiding in encrypted images , 2016, J. Vis. Commun. Image Represent..

[7]  Ernest F. Brickell,et al.  Cryptanalysis of Video Encryption Based on Space-Filling Curves , 1990, EUROCRYPT.

[8]  Yun Q. Shi,et al.  Reversible Data Hiding , 2003, IWDW.

[9]  Jessica J. Fridrich,et al.  Invertible authentication , 2001, Security and Watermarking of Multimedia Contents.

[10]  Guanrong Chen,et al.  Cryptanalysis of an Image Scrambling Scheme Without Bandwidth Expansion , 2008, IEEE Transactions on Circuits and Systems for Video Technology.

[11]  Zhenxing Qian,et al.  Efficient reversible data hiding in encrypted images , 2014, J. Vis. Commun. Image Represent..

[12]  Vinod M. Prabhakaran,et al.  On compressing encrypted data , 2004, IEEE Transactions on Signal Processing.

[13]  Wenjun Zeng,et al.  Efficient Compression of Encrypted Grayscale Images , 2010, IEEE Transactions on Image Processing.

[14]  Li Dong,et al.  Secure Reversible Image Data Hiding Over Encrypted Domain via Key Modulation , 2016, IEEE Transactions on Circuits and Systems for Video Technology.

[15]  Rangding Wang,et al.  Separable and error-free reversible data hiding in encrypted images , 2016, Signal Process..

[16]  Xinpeng Zhang,et al.  Effective reversible data hiding in encrypted image with privacy protection for image content , 2015, J. Vis. Commun. Image Represent..

[17]  Weiming Zhang,et al.  Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption , 2013, IEEE Transactions on Information Forensics and Security.

[18]  Kwok-Tung Lo,et al.  Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks , 2011, Signal Process..

[19]  Zhenxing Qian,et al.  Block cipher based separable reversible data hiding in encrypted images , 2016, Multimedia Tools and Applications.

[20]  Xinpeng Zhang,et al.  Reversible Data Hiding in Encrypted Image , 2011, IEEE Signal Processing Letters.

[21]  Zhenxing Qian,et al.  Reversible Data Hiding in Encrypted JPEG Bitstream , 2014, IEEE Transactions on Multimedia.

[22]  Shiguo Lian,et al.  Commutative Encryption and Watermarking in Video Compression , 2007, IEEE Transactions on Circuits and Systems for Video Technology.

[23]  Mauro Barni,et al.  Composite Signal Representation for Fast and Storage-Efficient Processing of Encrypted Signals , 2010, IEEE Transactions on Information Forensics and Security.

[24]  Weiming Zhang,et al.  Efficient Reversible Data Hiding Based on Multiple Histograms Modification , 2015, IEEE Transactions on Information Forensics and Security.

[25]  Xinpeng Zhang,et al.  Separable Reversible Data Hiding in Encrypted Image , 2012, IEEE Transactions on Information Forensics and Security.

[26]  Xiaochun Cao,et al.  High Capacity Reversible Data Hiding in Encrypted Images by Patch-Level Sparse Representation , 2016, IEEE Transactions on Cybernetics.

[27]  C. Moler,et al.  Advances in Cryptology , 2000, Lecture Notes in Computer Science.

[28]  Wei Sun,et al.  High-capacity reversible data hiding in encrypted images by prediction error , 2014, Signal Process..

[29]  D G Gibson,et al.  How high can a correlation coefficient be? Effects of limited reproducibility of common cardiological measures. , 1999, International journal of cardiology.

[30]  Gwoboa Horng,et al.  Encrypted signal-based reversible data hiding with public key cryptosystem , 2014, J. Vis. Commun. Image Represent..

[31]  Min Wu,et al.  Unicity Distance of Robust Image Hashing , 2007, IEEE Transactions on Information Forensics and Security.

[32]  Zhenxing Qian,et al.  Reversible Data Hiding in Encrypted Images Based on Progressive Recovery , 2016, IEEE Signal Processing Letters.

[33]  Fouad Khelifi,et al.  Analysis of the Security of Perceptual Image Hashing Based on Non-Negative Matrix Factorization , 2010, IEEE Signal Processing Letters.

[34]  Nenghai Yu,et al.  Breaking row-column shuffle based image cipher , 2012, ACM Multimedia.

[35]  Marc Chaumont,et al.  A reversible data hiding method for encrypted images , 2008, Electronic Imaging.

[36]  Mauro Barni,et al.  On the Implementation of the Discrete Fourier Transform in the Encrypted Domain , 2009, IEEE Transactions on Information Forensics and Security.

[37]  Eyal Kushilevitz,et al.  From Differential Cryptanalysis to Ciphertext-Only Attacks , 1998, CRYPTO.

[38]  Tung-Shou Chen,et al.  An Improved Reversible Data Hiding in Encrypted Images Using Side Match , 2012, IEEE Signal Processing Letters.

[39]  Xin-Wen Wu,et al.  On the Security of Permutation-Only Image Encryption Schemes , 2016, IEEE Transactions on Information Forensics and Security.

[40]  Fernando Pérez-González,et al.  Security of Lattice-Based Data Hiding Against the Known Message Attack , 2006, IEEE Transactions on Information Forensics and Security.