Abstract
Recently, a JPEG encryption scheme with adaptive key is proposed to improve the security of encrypted images. However, it still has a security risk under chosen plaintext attack (CPA) since the adaptive key is generated by invariant characteristic of the number of AC codes (ACCs) in minimum coded units (MCUs) (NAM). This paper analyzes the possibility of ACCs encryption being attacked by the CPA from three stages: (1) the adaptive key can be forged from the NAM of encrypted image; (2) the diversity of run-length sequence in minimum coded units (MCUs) can realize the estimation of MCUs permutation sequence; (3) the plaintext images can be constructed with the unique ACCs in the same run-length to estimate ACCs permutation sequence. Therefore, this paper constructs plaintext images with same NAM and run-length sequence as encrypted image to achieve CPA attack. The estimation of the permutation sequences is based on the analyses of last two phases. Experimental results show that the higher the correct rate of MCUs permutation sequence, the higher the correct rate of ACCs permutation sequence. Texture images or images with higher quality factors are more likely to be completely attacked by the proposed CPA.
This work was supported in part by the National Natural Science Foundation of China (NSFC) under Grant U1936113 and 61872303.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Chang, J.C., Lu, Y.Z., Wu, H.L.: A separable reversible data hiding scheme for encrypted JPEG bitstreams. Sig. Process. 133, 135–143 (2017)
Independent JPEG Group, et al.: Independent JPEG group (1998). http://www.ijg.org/
He, J., Chen, J., Luo, W., Tang, S., Huang, J.: A novel high-capacity reversible data hiding scheme for encrypted JPEG bitstreams. IEEE Trans. Circ. Syst. Video Technol. 29(12), 3501–3515 (2019)
He, J., Huang, S., Tang, S., Huang, J.: JPEG image encryption with improved format compatibility and file size preservation. IEEE Trans. Multimedia 20(10), 2645–2658 (2018)
Huang, Y., Cao, X., Wu, H.T., Cheung, Y.: Reversible data hiding in JPEG images for privacy protection. In: ICASSP 2021–2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2715–2719. IEEE (2021)
Jolfaei, A., Wu, X.W., Muthukkumarasamy, V.: On the security of permutation-only image encryption schemes. IEEE Trans. Inf. Forensics Secur. 11(2), 235–246 (2016)
Li, P., Lo, K.T.: Survey on JPEG compatible joint image compression and encryption algorithms. IET Sig. Process. 14(8), 475–488 (2020)
Li, P., Meng, J., Sun, Z.: A new JPEG encryption scheme using adaptive block size. In: Pan, J.-S., Li, J., Namsrai, O.-E., Meng, Z., Savić, M. (eds.) Advances in Intelligent Information Hiding and Multimedia Signal Processing. SIST, vol. 211, pp. 140–147. Springer, Singapore (2021). https://doi.org/10.1007/978-981-33-6420-2_18
Li, W., Yuan, Y.: A leak and its remedy in JPEG image encryption. Int. J. Comput. Math. 84(9), 1367–1378 (2007)
Minemura, K., Moayed, Z., Wong, K., Qi, X., Tanaka, K.: JPEG image scrambling without expansion in bitstream size. In: 2012 19th IEEE International Conference on Image Processing, pp. 261–264. IEEE (2012)
Mitchell, J.: Digital compression and coding of continuous-tone still images: requirements and guidelines. ITU-T Recommendation T 81 (1992)
Niu, X., Zhou, C., Ding, J., Yang, B.: JPEG encryption with file size preservation. In: 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 308–311. IEEE (2008)
Ong, S.Y., Minemura, K., Wong, K.S.: Progressive quality degradation in JPEG compressed image using DC block orientation with rewritable data embedding functionality. In: 2013 IEEE International Conference on Image Processing, pp. 4574–4578. IEEE (2013)
Ong, S., Wong, K., Qi, X., Tanaka, K.: Beyond format-compliant encryption for JPEG image. Sig. Process. Image Commun. 31, 47–60 (2015)
Ong, S., Wong, K., Tanaka, K.: Scrambling-embedding for JPEG compressed image. Sig. Process. 109, 38–53 (2015)
Qian, Z., Xu, H., Luo, X., Zhang, X.: New framework of reversible data hiding in encrypted JPEG bitstreams. IEEE Trans. Circ. Syst. Video Technol. 29(2), 351–362 (2019)
Qian, Z., Zhang, X., Wang, S.: Reversible data hiding in encrypted JPEG bitstream. IEEE Trans. Multimedia 16(5), 1486–1491 (2014)
Qian, Z., Zhou, H., Zhang, X., Zhang, W.: Separable reversible data hiding in encrypted JPEG bitstreams. IEEE Trans. Dependable Secure Comput. 15(6), 1055–1067 (2016)
Shimizu, K., Wang, Q., Suzuki, T.: AC prediction error propagation-based encryption for texture protection of JPEG compressed images. In: 2021 Picture Coding Symposium (PCS), pp. 1–5. IEEE (2021)
ShreyamshaKumar, B., Patil, C.R.: JPEG image encryption using fuzzy PN sequences. SIViP 4(4), 419–427 (2010). https://doi.org/10.1007/s11760-009-0131-6
Zheng, M., Li, Z., Chen, T., Dong, M., He, H., Chen, F.: Larger-capacity reversible data hiding in encrypted JPEG bitstream. J. Cyber Secur. 3(6), 12 (2018)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Yuan, Y., He, H., Chen, F. (2022). On the Security of Encrypted JPEG Image with Adaptive Key Generated by Invariant Characteristic. In: Zhao, X., Piva, A., Comesaña-Alfaro, P. (eds) Digital Forensics and Watermarking. IWDW 2021. Lecture Notes in Computer Science(), vol 13180. Springer, Cham. https://doi.org/10.1007/978-3-030-95398-0_5
Download citation
DOI: https://doi.org/10.1007/978-3-030-95398-0_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-95397-3
Online ISBN: 978-3-030-95398-0
eBook Packages: Computer ScienceComputer Science (R0)