Abstract
In recent years, reversible data hiding in encrypted images (RDH-EI) has attracted more and more attention, and many RDH-EI algorithms have been proposed. Scholars focus on improving embedded capacity and decreasing bit error rate, but the security issue of algorithms has not been paid enough attention to. However, the security of algorithms is a core problem. Recently, a RDH-EI algorithm based on compressed sensing and discrete wavelet transform is proposed. And considering the watermark embedding position keystream is related to the plain-image, the proposed algorithm is supposed to have high security. However, we find its security flaw, and by using chosen-plaintext attacks and differential cryptanalysis, we can extract all the encryption keys and all the embedding keys with merely 14 spatial images. In particular, compared with other methods, the number of images required in our method is independent of image size, which means that it requires less cost to break the algorithm. Finally, to resist the proposed attack, two improved suggestions are put forward. Simulation results demonstrate that the security of the improved algorithm is enhanced.
Similar content being viewed by others
References
Ahmad M, AlSharari HD (2017) On the security of chaos-based watermarking scheme for secure communication. In Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications, p 313–3212
Bouslimi D, Bellafqira R, Coatrieux G (2016) Data hiding in homomorphically encrypted medical images for verifying their reliability in both encrypted and spatial domains. Engineering in Medicine & Biology Society. Conf Proc IEEE Eng Med Biol Soc 2016:2496
Chen L, Wang S (2016) Differential cryptanalysis of a medical image cryptosystem with multiple rounds. Comput Biol Med 65:69–75
Chen YC, Shiu CW, Horng G (2014) Encrypted signal-based reversible data hiding with public key cryptosystem. J Vis Commun Image Represent 25(5):1164–1170
Chen L, Ma B, Zhao X, Wang S (2017) Differential cryptanalysis of a novel image encryption algorithm based on chaos and line map. Nonlinear Dynamics 87(3):1797–1807
Di F, Huang F, Zhang M, Liu J (2017) Reversible data hiding in encrypted images with high capacity by bitplane operations and adaptive embedding. Multimedia Tools & Applications 5:1–19
Guo J, Zheng P, Huang J (2015) Secure watermarking scheme against watermark attacks in the encrypted domain. J Vis Commun Image Represent 30:125–135
Hong W, Chen TS, Wu HY (2012) An improved reversible data hiding in encrypted images using side match. IEEE Signal Process Lett 19(4):199–202
Li C, Lo KT (2011) Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Process 91(4):949–954
Li S, Li C, Chen G, Bourbakis NG, Lo KT (2008) A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Process Image Commun 23(3):212–223
Ma K, Zhang W, Zhao X, Yu N, Li F (2014) Reversible data hiding in encrypted images by reserving room before encryption. IEEE Transactions on Information Forensics & Security 3(8):553–562
Ong SY, Wong KS, Tanaka K (2014) A scalable reversible data embedding method with progressive quality degradation functionality. Signal Process Image Commun 29(1):135–149
Qian Z, Zhang X (2016) Reversible data hiding in encrypted images based on progressive recovery. IEEE Signal Processing Letters 23(11):1672–1676
Qian Z, Zhang X, Wang S (2014) Reversible data hiding in encrypted jpeg bitstream. IEEE Transactions on Multimedia 16(5):1486–1491
Qian Z, Zhang X, Ren Y, Feng G (2016) Block cipher based separable reversible data hiding in encrypted images. Multimedia Tools & Applications 75(21):13749–13763
Rad RM, Wong K, Guo JM (2014) A unified data embedding and scrambling method. IEEE Trans Image Process 23(4):1463–1475
Shin SH, Jung KH (2017) Reversible data hiding method using meaningful encrypted images. Multimedia Tools & Applications 8:1–17
Topak E, Voloshynovskiy S, Koval O, Mihcak MK, Pun T (2005) Security analysis of robust data-hiding with geometrically structured codebooks. In Security, Steganography, and Watermarking of Multimedia Contents VII, International Society for Optics and Photonics 5681:709–721
Wang X, Han X, Xi J, Wang S (2016) Reversible data hiding in encrypted image with separable data extraction from image decryption. Multimedia Tools & Applications 2016:1–16
Xiao D, Chang Y, Xiang T, Bai S (2017) A watermarking algorithm in encrypted image based on compressive sensing with high quality image reconstruction and watermark performance. Multimedia Tools and Applications 76(7):9265–9296
Yi S, Zhou Y (2017) Binary-block embedding for reversible data hiding in encrypted images. Signal Process 133:40–51
Yin Z, Abel A, Tang J, Zhang X (2017) Reversible data hiding in encrypted images based on multi-level encryption and block histogram modification. Multimedia Tools & Applications 76(3):1–22
Zhang X (2011) Reversible data hiding in encrypted images. IEEE Trans Inf Forensics Secur 18(4):255–258
Zhang X (2012) Separable reversible data hiding in encrypted image. IEEE Trans Inf Forensics Secur 7(2):826–832
Zhang W, Ma K, Yu N (2014) Reversibility improved data hiding in encrypted images. Signal Process 94(1):118–127
Zhang X, Long J, Wang Z, Cheng H (2016) Lossless and reversible data hiding in encrypted images with public-key cryptography. IEEE Transactions on Circuits & Systems for Video Technology 26(9):1622–1631
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Ma, L., Chen, L. & Wang, S. Security analysis of a reversible watermarking algorithm for encrypted images in wavelet domain. Multimed Tools Appl 78, 9827–9843 (2019). https://doi.org/10.1007/s11042-018-6598-9
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-018-6598-9