应用科学学报 ›› 2019, Vol. 37 ›› Issue (5): 631-642.doi: 10.3969/j.issn.0255-8297.2019.05.005
屈凌峰, 陈帆, 和红杰, 袁源
收稿日期:
2019-07-30
修回日期:
2019-08-01
出版日期:
2019-09-30
发布日期:
2019-10-18
通信作者:
陈帆,副教授,研究方向:数字图像处理,E-mail:Fchen@swjtu.edu.cn.
E-mail:Fchen@swjtu.edu.cn
基金资助:
QU Lingfeng, CHEN fan, HE Hongjie, YUAN yuan
Received:
2019-07-30
Revised:
2019-08-01
Online:
2019-09-30
Published:
2019-10-18
摘要: 针对基于阿诺德变换的加密算法(Arnold transform-based encryption method,ATBEM)提出一种基于图像块均方根的已知明文攻击方法.首先利用加密前后明文图像0、1分布比例不变的特征估计出位平面置乱顺序,恢复原始像素的值;然后根据块置乱和块内像素置乱保持像素值恒定不变的特性,定义图像块均方根特征以查找和估计块置乱矩阵.分析讨论了图像块置乱加密的安全性能,结果表明:对于图像块置乱加密,图像越平滑分块越小,破解所需的明密文对数越多,已知明文攻击难度越大.实验结果验证了图像纹理越复杂,攻击效果越好,在分块大小为2×2的条件下,攻击者仅需已知一对明文-密文对即可破解块置乱加密50%以上的图像内容,因此ATBEM加密算法难以抵抗所提出的已知明文攻击.
中图分类号:
屈凌峰, 陈帆, 和红杰, 袁源. 基于位平面-块置乱的图像加密算法安全性分析[J]. 应用科学学报, 2019, 37(5): 631-642.
QU Lingfeng, CHEN fan, HE Hongjie, YUAN yuan. Security Analysis of Image Encryption Algorithm Based on Bit Plane-Pixel Block Scrambling[J]. Journal of Applied Sciences, 2019, 37(5): 631-642.
[1] Shi Y Q, Li X L, Zhang X P, et al. Reversible data hiding:advances in the past two decades[J]. IEEE Access, 2016(4):3210-3237. [2] Ma K, Zhang W M, Zhao X F, et al. Reversible data hiding in encrypted images by reserving room before encryption[J]. IEEE Transactions on Information Forensics and Security, 2013, 8(3):553-562. [3] Xu D, Wang R D. Separable and error-free reversible data hiding in encrypted images[J]. Signal Processing, 2016, 123:9-21. [4] Thaison N, Chang C, Chang W C. High capacity reversible data hiding scheme for encrypted images[J]. Signal Processing:Image Communication, 2016, 44:84-91. [5] Cao X, Du L, Wei X, et al. High capacity reversible data hiding in encrypted images by patchlevel sparse representation[J]. IEEE Transactions on Cybernetics, 2016, 46(5):1132-1143. [6] Yi S, Zhou Y C. Binary-block embedding for reversible data hiding in encrypted images[J]. Signal Processing, 2017, 133:40-51. [7] Chen Y, Yan S, He H, et al. Secure reversible data hiding in encrypted images based on MSB-flip prediction:China, 201810174576.8[P]. 2018-03-02. [8] Zhang X. Separable reversible data hiding in encrypted image[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(2):826-832. [9] Yin Z, Luo B, Hong W. Separable and error-free reversible data hiding in encrypted image with high payload[J]. The Scientific World Journal, 2014(1):1-8. [10] Yin Z X, Abel A, Zhang X P, et al. Reversible data hiding in encrypted image based on block histogram shifting[J]. IEEE International Conference on Acoustics, Speech and Signal Processing, 2016:2129-2133. [11] Yin Z X, Abel A, Tang J, et al. Reversible data hiding in encrypted images based on multilevel encryption and block histogram modification[J]. Multimedia Tools and Applications, 2017, 76(3):1-22. [12] Zhou J T, Sun W W, Dong L, et al. Secure reversible image data hiding over encrypted domain via key modulation[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2016, 26(3):441-452. [13] Qian Z, Zhang X. Reversible data hiding in encrypted images with distributed source encoding[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2016, 26(4):636-646. [14] Qin C, He Z, Luo X, et al. Reversible data hiding in encrypted image with separable capability and high embedding capacity[J]. Information Sciences, 2018, 465:285-304. [15] Qin C, Zhang W, Cao F, et al. Separable reversible data hiding in encrypted images via adaptive embedding strategy with block selection[J]. Signal Processing, 2018, 153:109-122. [16] Liu Z, Pun C. Reversible data-hiding in encrypted images by redundant space transfer[J]. Information Sciences, 2018, 433(1):188-203. [17] Khelifi F. On the security of a stream cipher in reversible data hiding schemes operating in the encrypted domain[J]. Signal Processing, 2018, 143:336-345. [18] Li S J, Li C Q, Chen G R, et al. A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks[J]. Signal Processing:Image Communication, 2008, 23(3):212-223. [19] Li C, Lo K T. Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks[J]. Signal Processing:Image Communication, 2009, 91(4):949-954. [20] Jolfaei A, Wu X, Muthukkumarasamy V. On the security of permutation-only image encryption schemes[J]. IEEE Transactions on Information Forensics and Security, 2016, 11(2):235-246. [21] Zhang W, Wong K W, Yu H, et al. A symmetric color image encryption algorithm using the intrinsic features of bit distributions[J]. Communications in Nonlinear Science and Numerical Simulation, 2013, 18(3):584-600. |
[1] | 姚汝婧, 杨磊, 杨涛, 胡应鑫, 田强, 吴偶. 基于改进Ising模型的心理量表大数据分析[J]. 应用科学学报, 2020, 38(3): 339-352. |
[2] | 蒋沁吟, 张熙. 基于特定主题的社交网络影响力评估方法[J]. 应用科学学报, 2020, 38(3): 353-366. |
[3] | 张彤彤, 董军宇, 赵浩然, 李琼, 孙鑫. 基于知识蒸馏的轻量型浮游植物检测网络[J]. 应用科学学报, 2020, 38(3): 367-376. |
[4] | 魏子洋, 赵志宏, 赵敬娇. 改进Faster R-CNN算法及其在车辆检测中的应用[J]. 应用科学学报, 2020, 38(3): 377-387. |
[5] | 孙容海, 施林甫, 俞春强, 劳欢, 唐振军. 面向密文图像信息隐藏的随机插值方法[J]. 应用科学学报, 2020, 38(3): 419-430. |
[6] | 王大千, 崔荣一, 金璟璇. 基于视觉关注模型与多尺度MSER的自然场景文本检测[J]. 应用科学学报, 2020, 38(3): 496-506. |
[7] | 杨高强, 李晟, 张新鹏. 基于方向场的形变指纹检测[J]. 应用科学学报, 2019, 37(6): 775-782. |
[8] | 余淑真, 欧巧凤, 熊邦书, 陈垚锋. 基于散焦图像的大视场立体视觉标定方法[J]. 应用科学学报, 2019, 37(6): 795-805. |
[9] | 崔三帅, 毛毛雨, 林晓丹, 康显桂. 图像视频中ENF信号的分析及应用综述[J]. 应用科学学报, 2019, 37(5): 573-589. |
[10] | 刘伟, 章琬苓, 项世军. 基于LBP-MDCT和CNN的人脸活体检测算法[J]. 应用科学学报, 2019, 37(5): 609-617. |
[11] | 赵琰, 周晓炜, 沈麒. 基于对立色与显著区域的紧凑图像哈希算法[J]. 应用科学学报, 2019, 37(5): 691-703. |
[12] | 张永胜, 田华伟, 肖延辉, 郝昕泽, 张明旺. 基于三方加权稀疏编码模型的PRNU提取算法[J]. 应用科学学报, 2019, 37(5): 704-710. |
[13] | 朱翌明, 陈帆, 和红杰, 陈鸿佑. 基于秘密信息驱动的正交GAN信息隐藏模型[J]. 应用科学学报, 2019, 37(5): 721-732. |
[14] | 王俊祥, 毛宁雄, 赵怡, 王春桃. 面向全容量的高性能彩色图像可逆信息隐藏算法[J]. 应用科学学报, 2019, 37(5): 744-760. |
[15] | 秦臻, 戴修斌, 谢理哲. 基于双层回归森林模型的头影测量图像结构特征点自动定位[J]. 应用科学学报, 2019, 37(4): 481-489. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||