Special Issue: Information Security of Multimedia

Security Analysis of Image Encryption Algorithm Based on Bit Plane-Pixel Block Scrambling

Expand
  • College of Information Science and Technology, Southwest Jiaotong University, Chengdu 610031, China

Received date: 2019-07-30

  Revised date: 2019-08-01

  Online published: 2019-10-18

Abstract

In this paper, a known plaintext attack method based on the root mean square (RMS) of image block is proposed for ATBEM. Firstly, the scrambling sequence of bit planes is estimated to restore the original pixel value by using the invariant distribution ratio of 0 and 1 of plaintext images before and after encryption. Then, according to the characteristics of block scrambling and intra-block scrambling, which keeps the pixel value constant, a root mean square (RMS) feature of image block is defined to find and estimate the block scrambling matrix. The security performance of image block scrambling encryption is analyzed and discussed. The analysis results show that the smoother the image is, the smaller the blocks are, the more plaintext logarithms are needed to crack, and the more difficult the known plaintext attack is. Experimental results verify that the more texture the image is, the better the attack effect is. Under the condition of 2×2 block size, the attacker can crack more than 50% of the ciphertext image content with only one pair of known plaintext-ciphertext pairs known. And ATBEM encryption algorithm is difficult to resist the proposed known plaintext attack.

Cite this article

QU Lingfeng, CHEN fan, HE Hongjie, YUAN yuan . Security Analysis of Image Encryption Algorithm Based on Bit Plane-Pixel Block Scrambling[J]. Journal of Applied Sciences, 2019 , 37(5) : 631 -642 . DOI: 10.3969/j.issn.0255-8297.2019.05.005

References

[1] Shi Y Q, Li X L, Zhang X P, et al. Reversible data hiding:advances in the past two decades[J]. IEEE Access, 2016(4):3210-3237.
[2] Ma K, Zhang W M, Zhao X F, et al. Reversible data hiding in encrypted images by reserving room before encryption[J]. IEEE Transactions on Information Forensics and Security, 2013, 8(3):553-562.
[3] Xu D, Wang R D. Separable and error-free reversible data hiding in encrypted images[J]. Signal Processing, 2016, 123:9-21.
[4] Thaison N, Chang C, Chang W C. High capacity reversible data hiding scheme for encrypted images[J]. Signal Processing:Image Communication, 2016, 44:84-91.
[5] Cao X, Du L, Wei X, et al. High capacity reversible data hiding in encrypted images by patchlevel sparse representation[J]. IEEE Transactions on Cybernetics, 2016, 46(5):1132-1143.
[6] Yi S, Zhou Y C. Binary-block embedding for reversible data hiding in encrypted images[J]. Signal Processing, 2017, 133:40-51.
[7] Chen Y, Yan S, He H, et al. Secure reversible data hiding in encrypted images based on MSB-flip prediction:China, 201810174576.8[P]. 2018-03-02.
[8] Zhang X. Separable reversible data hiding in encrypted image[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(2):826-832.
[9] Yin Z, Luo B, Hong W. Separable and error-free reversible data hiding in encrypted image with high payload[J]. The Scientific World Journal, 2014(1):1-8.
[10] Yin Z X, Abel A, Zhang X P, et al. Reversible data hiding in encrypted image based on block histogram shifting[J]. IEEE International Conference on Acoustics, Speech and Signal Processing, 2016:2129-2133.
[11] Yin Z X, Abel A, Tang J, et al. Reversible data hiding in encrypted images based on multilevel encryption and block histogram modification[J]. Multimedia Tools and Applications, 2017, 76(3):1-22.
[12] Zhou J T, Sun W W, Dong L, et al. Secure reversible image data hiding over encrypted domain via key modulation[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2016, 26(3):441-452.
[13] Qian Z, Zhang X. Reversible data hiding in encrypted images with distributed source encoding[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2016, 26(4):636-646.
[14] Qin C, He Z, Luo X, et al. Reversible data hiding in encrypted image with separable capability and high embedding capacity[J]. Information Sciences, 2018, 465:285-304.
[15] Qin C, Zhang W, Cao F, et al. Separable reversible data hiding in encrypted images via adaptive embedding strategy with block selection[J]. Signal Processing, 2018, 153:109-122.
[16] Liu Z, Pun C. Reversible data-hiding in encrypted images by redundant space transfer[J]. Information Sciences, 2018, 433(1):188-203.
[17] Khelifi F. On the security of a stream cipher in reversible data hiding schemes operating in the encrypted domain[J]. Signal Processing, 2018, 143:336-345.
[18] Li S J, Li C Q, Chen G R, et al. A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks[J]. Signal Processing:Image Communication, 2008, 23(3):212-223.
[19] Li C, Lo K T. Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks[J]. Signal Processing:Image Communication, 2009, 91(4):949-954.
[20] Jolfaei A, Wu X, Muthukkumarasamy V. On the security of permutation-only image encryption schemes[J]. IEEE Transactions on Information Forensics and Security, 2016, 11(2):235-246.
[21] Zhang W, Wong K W, Yu H, et al. A symmetric color image encryption algorithm using the intrinsic features of bit distributions[J]. Communications in Nonlinear Science and Numerical Simulation, 2013, 18(3):584-600.
Outlines

/