Skip to main content

On the Security of Encrypted JPEG Image with Adaptive Key Generated by Invariant Characteristic

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 13180))

Abstract

Recently, a JPEG encryption scheme with adaptive key is proposed to improve the security of encrypted images. However, it still has a security risk under chosen plaintext attack (CPA) since the adaptive key is generated by invariant characteristic of the number of AC codes (ACCs) in minimum coded units (MCUs) (NAM). This paper analyzes the possibility of ACCs encryption being attacked by the CPA from three stages: (1) the adaptive key can be forged from the NAM of encrypted image; (2) the diversity of run-length sequence in minimum coded units (MCUs) can realize the estimation of MCUs permutation sequence; (3) the plaintext images can be constructed with the unique ACCs in the same run-length to estimate ACCs permutation sequence. Therefore, this paper constructs plaintext images with same NAM and run-length sequence as encrypted image to achieve CPA attack. The estimation of the permutation sequences is based on the analyses of last two phases. Experimental results show that the higher the correct rate of MCUs permutation sequence, the higher the correct rate of ACCs permutation sequence. Texture images or images with higher quality factors are more likely to be completely attacked by the proposed CPA.

This work was supported in part by the National Natural Science Foundation of China (NSFC) under Grant U1936113 and 61872303.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   54.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Chang, J.C., Lu, Y.Z., Wu, H.L.: A separable reversible data hiding scheme for encrypted JPEG bitstreams. Sig. Process. 133, 135–143 (2017)

    Article  Google Scholar 

  2. Independent JPEG Group, et al.: Independent JPEG group (1998). http://www.ijg.org/

  3. He, J., Chen, J., Luo, W., Tang, S., Huang, J.: A novel high-capacity reversible data hiding scheme for encrypted JPEG bitstreams. IEEE Trans. Circ. Syst. Video Technol. 29(12), 3501–3515 (2019)

    Article  Google Scholar 

  4. He, J., Huang, S., Tang, S., Huang, J.: JPEG image encryption with improved format compatibility and file size preservation. IEEE Trans. Multimedia 20(10), 2645–2658 (2018)

    Article  Google Scholar 

  5. Huang, Y., Cao, X., Wu, H.T., Cheung, Y.: Reversible data hiding in JPEG images for privacy protection. In: ICASSP 2021–2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2715–2719. IEEE (2021)

    Google Scholar 

  6. Jolfaei, A., Wu, X.W., Muthukkumarasamy, V.: On the security of permutation-only image encryption schemes. IEEE Trans. Inf. Forensics Secur. 11(2), 235–246 (2016)

    Article  Google Scholar 

  7. Li, P., Lo, K.T.: Survey on JPEG compatible joint image compression and encryption algorithms. IET Sig. Process. 14(8), 475–488 (2020)

    Article  Google Scholar 

  8. Li, P., Meng, J., Sun, Z.: A new JPEG encryption scheme using adaptive block size. In: Pan, J.-S., Li, J., Namsrai, O.-E., Meng, Z., Savić, M. (eds.) Advances in Intelligent Information Hiding and Multimedia Signal Processing. SIST, vol. 211, pp. 140–147. Springer, Singapore (2021). https://doi.org/10.1007/978-981-33-6420-2_18

    Chapter  Google Scholar 

  9. Li, W., Yuan, Y.: A leak and its remedy in JPEG image encryption. Int. J. Comput. Math. 84(9), 1367–1378 (2007)

    Article  MathSciNet  Google Scholar 

  10. Minemura, K., Moayed, Z., Wong, K., Qi, X., Tanaka, K.: JPEG image scrambling without expansion in bitstream size. In: 2012 19th IEEE International Conference on Image Processing, pp. 261–264. IEEE (2012)

    Google Scholar 

  11. Mitchell, J.: Digital compression and coding of continuous-tone still images: requirements and guidelines. ITU-T Recommendation T 81 (1992)

    Google Scholar 

  12. Niu, X., Zhou, C., Ding, J., Yang, B.: JPEG encryption with file size preservation. In: 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 308–311. IEEE (2008)

    Google Scholar 

  13. Ong, S.Y., Minemura, K., Wong, K.S.: Progressive quality degradation in JPEG compressed image using DC block orientation with rewritable data embedding functionality. In: 2013 IEEE International Conference on Image Processing, pp. 4574–4578. IEEE (2013)

    Google Scholar 

  14. Ong, S., Wong, K., Qi, X., Tanaka, K.: Beyond format-compliant encryption for JPEG image. Sig. Process. Image Commun. 31, 47–60 (2015)

    Article  Google Scholar 

  15. Ong, S., Wong, K., Tanaka, K.: Scrambling-embedding for JPEG compressed image. Sig. Process. 109, 38–53 (2015)

    Article  Google Scholar 

  16. Qian, Z., Xu, H., Luo, X., Zhang, X.: New framework of reversible data hiding in encrypted JPEG bitstreams. IEEE Trans. Circ. Syst. Video Technol. 29(2), 351–362 (2019)

    Article  Google Scholar 

  17. Qian, Z., Zhang, X., Wang, S.: Reversible data hiding in encrypted JPEG bitstream. IEEE Trans. Multimedia 16(5), 1486–1491 (2014)

    Article  Google Scholar 

  18. Qian, Z., Zhou, H., Zhang, X., Zhang, W.: Separable reversible data hiding in encrypted JPEG bitstreams. IEEE Trans. Dependable Secure Comput. 15(6), 1055–1067 (2016)

    Article  Google Scholar 

  19. Shimizu, K., Wang, Q., Suzuki, T.: AC prediction error propagation-based encryption for texture protection of JPEG compressed images. In: 2021 Picture Coding Symposium (PCS), pp. 1–5. IEEE (2021)

    Google Scholar 

  20. ShreyamshaKumar, B., Patil, C.R.: JPEG image encryption using fuzzy PN sequences. SIViP 4(4), 419–427 (2010). https://doi.org/10.1007/s11760-009-0131-6

    Article  MATH  Google Scholar 

  21. Zheng, M., Li, Z., Chen, T., Dong, M., He, H., Chen, F.: Larger-capacity reversible data hiding in encrypted JPEG bitstream. J. Cyber Secur. 3(6), 12 (2018)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fan Chen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yuan, Y., He, H., Chen, F. (2022). On the Security of Encrypted JPEG Image with Adaptive Key Generated by Invariant Characteristic. In: Zhao, X., Piva, A., Comesaña-Alfaro, P. (eds) Digital Forensics and Watermarking. IWDW 2021. Lecture Notes in Computer Science(), vol 13180. Springer, Cham. https://doi.org/10.1007/978-3-030-95398-0_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-95398-0_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-95397-3

  • Online ISBN: 978-3-030-95398-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics