Skip to main content
Log in

Security analysis of a reversible watermarking algorithm for encrypted images in wavelet domain

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In recent years, reversible data hiding in encrypted images (RDH-EI) has attracted more and more attention, and many RDH-EI algorithms have been proposed. Scholars focus on improving embedded capacity and decreasing bit error rate, but the security issue of algorithms has not been paid enough attention to. However, the security of algorithms is a core problem. Recently, a RDH-EI algorithm based on compressed sensing and discrete wavelet transform is proposed. And considering the watermark embedding position keystream is related to the plain-image, the proposed algorithm is supposed to have high security. However, we find its security flaw, and by using chosen-plaintext attacks and differential cryptanalysis, we can extract all the encryption keys and all the embedding keys with merely 14 spatial images. In particular, compared with other methods, the number of images required in our method is independent of image size, which means that it requires less cost to break the algorithm. Finally, to resist the proposed attack, two improved suggestions are put forward. Simulation results demonstrate that the security of the improved algorithm is enhanced.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Ahmad M, AlSharari HD (2017) On the security of chaos-based watermarking scheme for secure communication. In Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications, p 313–3212

  2. Bouslimi D, Bellafqira R, Coatrieux G (2016) Data hiding in homomorphically encrypted medical images for verifying their reliability in both encrypted and spatial domains. Engineering in Medicine & Biology Society. Conf Proc IEEE Eng Med Biol Soc 2016:2496

  3. Chen L, Wang S (2016) Differential cryptanalysis of a medical image cryptosystem with multiple rounds. Comput Biol Med 65:69–75

    Article  Google Scholar 

  4. Chen YC, Shiu CW, Horng G (2014) Encrypted signal-based reversible data hiding with public key cryptosystem. J Vis Commun Image Represent 25(5):1164–1170

    Article  Google Scholar 

  5. Chen L, Ma B, Zhao X, Wang S (2017) Differential cryptanalysis of a novel image encryption algorithm based on chaos and line map. Nonlinear Dynamics 87(3):1797–1807

    Article  Google Scholar 

  6. Di F, Huang F, Zhang M, Liu J (2017) Reversible data hiding in encrypted images with high capacity by bitplane operations and adaptive embedding. Multimedia Tools & Applications 5:1–19

    Google Scholar 

  7. Guo J, Zheng P, Huang J (2015) Secure watermarking scheme against watermark attacks in the encrypted domain. J Vis Commun Image Represent 30:125–135

    Article  Google Scholar 

  8. Hong W, Chen TS, Wu HY (2012) An improved reversible data hiding in encrypted images using side match. IEEE Signal Process Lett 19(4):199–202

    Article  Google Scholar 

  9. Li C, Lo KT (2011) Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Process 91(4):949–954

    Article  Google Scholar 

  10. Li S, Li C, Chen G, Bourbakis NG, Lo KT (2008) A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Process Image Commun 23(3):212–223

    Article  Google Scholar 

  11. Ma K, Zhang W, Zhao X, Yu N, Li F (2014) Reversible data hiding in encrypted images by reserving room before encryption. IEEE Transactions on Information Forensics & Security 3(8):553–562

    Google Scholar 

  12. Ong SY, Wong KS, Tanaka K (2014) A scalable reversible data embedding method with progressive quality degradation functionality. Signal Process Image Commun 29(1):135–149

    Article  Google Scholar 

  13. Qian Z, Zhang X (2016) Reversible data hiding in encrypted images based on progressive recovery. IEEE Signal Processing Letters 23(11):1672–1676

    Article  Google Scholar 

  14. Qian Z, Zhang X, Wang S (2014) Reversible data hiding in encrypted jpeg bitstream. IEEE Transactions on Multimedia 16(5):1486–1491

    Article  Google Scholar 

  15. Qian Z, Zhang X, Ren Y, Feng G (2016) Block cipher based separable reversible data hiding in encrypted images. Multimedia Tools & Applications 75(21):13749–13763

    Article  Google Scholar 

  16. Rad RM, Wong K, Guo JM (2014) A unified data embedding and scrambling method. IEEE Trans Image Process 23(4):1463–1475

    Article  MathSciNet  Google Scholar 

  17. Shin SH, Jung KH (2017) Reversible data hiding method using meaningful encrypted images. Multimedia Tools & Applications 8:1–17

    Google Scholar 

  18. Topak E, Voloshynovskiy S, Koval O, Mihcak MK, Pun T (2005) Security analysis of robust data-hiding with geometrically structured codebooks. In Security, Steganography, and Watermarking of Multimedia Contents VII, International Society for Optics and Photonics 5681:709–721

  19. Wang X, Han X, Xi J, Wang S (2016) Reversible data hiding in encrypted image with separable data extraction from image decryption. Multimedia Tools & Applications 2016:1–16

  20. Xiao D, Chang Y, Xiang T, Bai S (2017) A watermarking algorithm in encrypted image based on compressive sensing with high quality image reconstruction and watermark performance. Multimedia Tools and Applications 76(7):9265–9296

    Article  Google Scholar 

  21. Yi S, Zhou Y (2017) Binary-block embedding for reversible data hiding in encrypted images. Signal Process 133:40–51

    Article  Google Scholar 

  22. Yin Z, Abel A, Tang J, Zhang X (2017) Reversible data hiding in encrypted images based on multi-level encryption and block histogram modification. Multimedia Tools & Applications 76(3):1–22

    Article  Google Scholar 

  23. Zhang X (2011) Reversible data hiding in encrypted images. IEEE Trans Inf Forensics Secur 18(4):255–258

    Google Scholar 

  24. Zhang X (2012) Separable reversible data hiding in encrypted image. IEEE Trans Inf Forensics Secur 7(2):826–832

    Article  Google Scholar 

  25. Zhang W, Ma K, Yu N (2014) Reversibility improved data hiding in encrypted images. Signal Process 94(1):118–127

    Article  Google Scholar 

  26. Zhang X, Long J, Wang Z, Cheng H (2016) Lossless and reversible data hiding in encrypted images with public-key cryptography. IEEE Transactions on Circuits & Systems for Video Technology 26(9):1622–1631

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shihong Wang.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ma, L., Chen, L. & Wang, S. Security analysis of a reversible watermarking algorithm for encrypted images in wavelet domain. Multimed Tools Appl 78, 9827–9843 (2019). https://doi.org/10.1007/s11042-018-6598-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-018-6598-9

Keywords

Navigation