期刊文献+

基于有序等价划分的冗余空间转移图像加密安全性分析 被引量:3

Ordered Equivalence Division Based Cryptanalysis of Redundant-Space-Transfer Image Encryption
下载PDF
导出
摘要 现有的冗余空间转移(RST)图像加密算法有效提高了加密图像可逆数据隐藏的隐藏容量和抵抗现有已知明文攻击的能力.在分析RST图像加密三个密钥特性和定义有序等价集的基础上,提出一种基于有序等价划分的已知明文攻击方法.对得到的明-密图像对(原始图像及其加密图像),首先基于直方图距离比较重建原始图像的位平面置乱图像(BPSI),然后对BPSI的每个图像块,在加密图像划分得到的有序等价集中查找并推断该图像块的块置乱密钥(BSK).推导给出了BSK估计准确率与分块大小、图像块个数和有序等价集个数的关系.实验结果表明,对512×512的测试图像,当分块大小不小于4×4时,BSK估计准确率超过0.95;不同BSK估计准确率得到解密图像的视觉效果表明,即使BSK估计准确率低至0.50,也可能导致原始图像的内容信息泄露. The existing redundant-space transfer(RST)image encryption method adopted in the reversible data hiding in encrypted images scheme improved the embedding capacity and the ability against the existing known plaintext attacks.To address the RST image encryption,based on the analysis of three key characteristics of RST image encryption and the definition of ordered equivalence set(OES),the ordered equivalence division-based known plaintext attack method is proposed.For the obtained plain-cipher image pair,i.e.,original image and its corresponding encrypted image,the bit-plane scrambling image(BPSI)of the original image is first reconstructed based on the histogram distance comparison.And then for each block in the BPSI,the block scrambling key(BSK)of it is searched and inferred in the OESs obtained by dividing all blocks of encrypted image.We make an analysis on the relation of the SK estimation accuracy with block size,image block number and ordered equivalence set number.Experimental results demonstrate that the BSK estimation accuracy is not less than 0.95 when block size is not less than 4×4 for the test images of 512×512 pixels.Also,the visual effect on the decrypted images obtained from the BSK estimation accuracy of 0.51 to 0.94 shows that the content information of the original image may be leaked even when the BSK estimation accuracy is as low as about 0.50.
作者 陈帆 屈凌峰 原长琦 和红杰 CHEN Fan;QU Ling-feng;YUAN Chang-qi;HE Hong-jie(School of Information Science and Technology,Southwest Jiaotong University,Chengdu,Sichuan 611756,China;Beijing Institute of Electronics Technology and Application,Beijing 100091,China)
出处 《电子学报》 EI CAS CSCD 北大核心 2021年第4期665-671,共7页 Acta Electronica Sinica
基金 国家自然科学基金(No.61872303,No.U936113)。
关键词 可逆信息隐藏 图像加密 有序等价划分 冗余空间转移 reversible data hiding image encryption ordered equivalent division redundant space transfer
  • 相关文献

参考文献5

二级参考文献36

  • 1王英,郑德玲,鞠磊.基于Lorenz混沌系统的数字图像加密算法[J].北京科技大学学报,2004,26(6):678-682. 被引量:43
  • 2武相军,王兴元.基于非线性控制的超混沌Chen系统混沌同步[J].物理学报,2006,55(12):6261-6266. 被引量:32
  • 3Chen J X, Zhu Z L, Fu C, et al. A fast chaos-based image encryption scheme with a dynamic state variables selection mechanism. Commun Nonlinear Sci Numer Simul, 2015, 20:846-860.
  • 4Fridrich J. Symmetric ciphers based on two-dimensional chaotic maps. lnt J Bifurcat Chaos, 1998, 08:1259-1284.
  • 5Solak E, Gokal C, Yildiz O T, et al. Cryptanalysis of Fridrich's chaotic image encryption. Int J Bifurcat Chaos, 2010, 20:1405-1413.
  • 6Rhouma R, Solak E, Belghith S. Cryptanalysis of a new substitution-diffusion based image cipher. Commun Nonlinear Sci Numer Simul, 2010, 15:1887-1892.
  • 7Li C, Li S, Asim M, et al. On the security defects of an image encryption scheme, Image Vis Comput, 2009, 27:1371-1381.
  • 8Arroyo D, Li S, Amig6 J M, et al. Comment on "Image encryption with chaotically coupled chaotic maps". Phys D, 2010, 239:1002-1006.
  • 9Gokal C, Solak E. Cryptanalysis of a chaos,based image encryption algorithm. Phys Lett A, 2009, 373:1357-1360.
  • 10Wang K, Pei K, Zou L, et al. On the security of 3D Cat map based symmetric image encryption scheme; Phys Lett A, 2005, 343:432-439.

共引文献151

同被引文献28

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部