• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Qu Lingfeng, He Hongjie, Chen Fan, Zhang Shanjun. Security Analysis of Image Encryption Algorithm Based on Block Modulation-Scrambling[J]. Journal of Computer Research and Development, 2021, 58(4): 849-861. DOI: 10.7544/issn1000-1239.2021.20200011
Citation: Qu Lingfeng, He Hongjie, Chen Fan, Zhang Shanjun. Security Analysis of Image Encryption Algorithm Based on Block Modulation-Scrambling[J]. Journal of Computer Research and Development, 2021, 58(4): 849-861. DOI: 10.7544/issn1000-1239.2021.20200011

Security Analysis of Image Encryption Algorithm Based on Block Modulation-Scrambling

Funds: This work was supported by the National Natural Science Foundation of China (61872303, U1936113) and the Science and Technology Innovation Talents Program of Sichuan Science and Technology Department (2018RZ0143).
More Information
  • Published Date: March 31, 2021
  • Block modulation-scrambling image encryption is one of the common encryption methods for reversible data hiding in encrypted image(RDH-EI). It can effectively improve the embedding capacity of the algorithm and resist the existing ciphertext only and known plaintext attacks. For block modulation-scrambling image encryption, a key stream estimation method under known plaintext attack is proposed in this paper. First of all, the definition of image difference block is given, and it is pointed out that the ciphertext block generated by block modulation keeps the difference block unchanged with high probability. On this basis, a fast block scrambling key estimation method based on pseudo difference image construction and difference cube mean index search is proposed. The relationship between the cube mean distribution of the difference block and the block size and the accuracy of the scrambling key estimation is discussed. Finally, the possible solutions to improve the security of image encryption are given. The texture complexity and block size of the plaintext image are the main factors that affect the block scrambling key estimation accuracy and algorithm time complexity. When the block size is larger than 3×3, the accuracy of all test image block scrambling secret key estimation is more than 70%, at this time, the content information of ciphertext image is seriously leaked.
  • Related Articles

    [1]Luo Yating, He Hongjie, Chen Fan, Qu Lingfeng. Security Analysis of Image Encryption for Redundant Transfer Based on Non-Zero-Bit Number Feature[J]. Journal of Computer Research and Development, 2022, 59(11): 2606-2617. DOI: 10.7544/issn1000-1239.20210558
    [2]Liu Qixu, Jin Ze, Chen Canhua, Gao Xinbo, Zheng Ningjun, Fang Yiwei, Feng Yun. Survey on Internet of Things Access Control Security[J]. Journal of Computer Research and Development, 2022, 59(10): 2190-2211. DOI: 10.7544/issn1000-1239.20220510
    [3]Wang Huijiao, Cong Peng, Jiang Hua, Wei Yongzhuang. Security Analysis of SIMON32/64 Based on Deep Learning[J]. Journal of Computer Research and Development, 2021, 58(5): 1056-1064. DOI: 10.7544/issn1000-1239.2021.20200900
    [4]Wang Lina, Wang Kaige, Xu Yibo, Tang Benxiao, Tan Xuanze. An Evaluation of Carrier Security for Image Steganography Based on Residual Co-Occurrence Probability[J]. Journal of Computer Research and Development, 2018, 55(12): 2664-2673. DOI: 10.7544/issn1000-1239.2018.20170757
    [5]Yin Jun, Ma Chuyan, Song Jian, Zeng Guang, Ma Chuangui. Security Analysis of Lightweight Block Cipher ESF[J]. Journal of Computer Research and Development, 2017, 54(10): 2224-2231. DOI: 10.7544/issn1000-1239.2017.20170455
    [6]Lu Yemian, Ying Lingyun, Su Purui, Feng Dengguo, Jing Erxia, Gu Yacong. Security Analysis and Evaluation for the Usage of Settings Mechanism in Android[J]. Journal of Computer Research and Development, 2016, 53(10): 2248-2261. DOI: 10.7544/issn1000-1239.2016.20160449
    [7]Li Pengwei, Fu Jianming, Li Shuanbao, Lü Shaoqing, Sha Letian. Elastic Mobile Cloud Computing:State of the Art and Security Analysis[J]. Journal of Computer Research and Development, 2015, 52(6): 1362-1377. DOI: 10.7544/issn1000-1239.2015.20140227
    [8]Xu Shiwei, Zhang Huanguo. Formal Security Analysis on Trusted Platform Module Based on Applied π Calculus[J]. Journal of Computer Research and Development, 2011, 48(8): 1421-1429.
    [9]Han Xiaoxi, Yao Gang. The Combined Use of FAPKC Without Compromising the Security of the Cryptosystem[J]. Journal of Computer Research and Development, 2005, 42(10): 1692-1697.
    [10]Zhuo Jiliang, Li Xianxian, Li Jianxin, and Huai Jinpeng. A New Taxonomy of Attacks on Security Protocols and Their Security Evaluation[J]. Journal of Computer Research and Development, 2005, 42(7): 1100-1107.
  • Cited by

    Periodical cited type(7)

    1. 洪炎,王艺杭,苏静明,温言. 基于行列异或的Arnold双置乱图像加密方法. 科学技术与工程. 2024(02): 649-657 .
    2. WANG Chenglong,MA Yi,WANG Xia. Double random number encryption blind watermarking technique based on DWT-DCT domain. Optoelectronics Letters. 2024(10): 614-622 .
    3. 李华艳. 基于混沌理论和DNA序列运算的古籍数字化版权保护及实现. 情报探索. 2022(02): 117-123 .
    4. 武晓帅,徐明,乔通,潘彬民,廖鑫. 图像空域可逆信息隐藏研究进展. 中国图象图形学报. 2022(01): 125-149 .
    5. 佘晓萌 ,杜洋 ,马文静 ,殷赵霞 . 基于像素预测和块标记的图像密文可逆信息隐藏. 计算机研究与发展. 2022(09): 2089-2100 . 本站查看
    6. 罗雅婷,和红杰,陈帆,屈凌峰. 基于非0比特个数特征的冗余转移图像加密安全性分析. 计算机研究与发展. 2022(11): 2606-2617 . 本站查看
    7. 王纪. 一种基于分块置乱和混合混沌的图像加密算法. 长江信息通信. 2021(10): 64-66 .

    Other cited types(8)

Catalog

    Article views (596) PDF downloads (167) Cited by(15)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return