Skip to main content
Log in

JPEG Bitstreams encryption with CPA-secure and file size reduction

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

An adaptive key of He’s scheme is generated based on the minimum coded unit histogram (MCUH) of an original image, which can improve the ability against the known-plaintext attack while achieving file size preservation and format compatibility. However, it is vulnerable to the chosen-plaintext attack (CPA) since the MCUH, which is unchanged during encryption, can be used to reproduce the adaptive key. To change the MCUH and reduce file size, some alternating current codes (ACCs) are randomly removed and reversibly embedded into the image by variable length code (VLC) mapping. Firstly, the threshold T, i.e., the maximum number of ACCs that can be removed while ensuring a reduced file size of encrypted JPEG image, is adaptively calculated after the monotonicity of VLC mapping is discussed. And then, according to the user’s key, the actual number of ACCs to be removed is randomly selected in the integer interval [1, T] to reduce the possibility of reproducing the adaptive key under CPA. Experimental results demonstrate that the proposed scheme effectively improves the ability against CPA since the adaptive-key reproduction probability of the proposed scheme is reduced from 100% of He’s scheme to smaller than \(1.15\times {10}^{-1398}\). Moreover, the file size of the encrypted JPEG generated by the proposed scheme is smaller than that of He’s scheme and the original image.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Algorithm 1
Fig. 1
Algorithm 2
Algorithm 3
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

Data availability

The datasets generated during and/or analyzed during the current study are available in the GitHub repository, https://github.com/ytuayuan/ChangeMCUH.

References

  1. Zhang Q, Zhong H, Yang LT et al (2016) Pphocfs: Privacy preserving high-order cfs algorithm on the cloud for clustering multimedia data. ACM Trans Multimed Comput Commun Appl 12(4s):1–15

    Article  Google Scholar 

  2. Singh S (2020) Adaptive pvd and lsb based high capacity data hiding scheme. Multimed Tools Appl 79(25–26):18815–18837

    Article  Google Scholar 

  3. Mitchell J (1992) Digital compression and coding of continuous-tone still images: Requirements and guidelines. ITU-T Recommendation T

  4. Sheidani S, Mahmoudi-Aznaveh A, Eslami Z (2021) Cpa-secure privacy-preserving reversible data hiding for jpeg images. IEEE Trans Inf Forensics Secur 16:3647–3661

    Article  Google Scholar 

  5. Wright M (2001) The advanced encryption standard. Netw Secur 2001(10):11–13

    Article  Google Scholar 

  6. Coppersmith D (1994) The data encryption standard (des) and its strength against attacks. IBM J Res Dev 38(3):243–250

    Article  Google Scholar 

  7. Li P, Lo KT (2020) Survey on jpeg compatible joint image compression and encryption algorithms. IET Signal Process 14(8):475–488

    Article  Google Scholar 

  8. He J, Huang S, Tang S et al (2018) Jpeg image encryption with improved format compatibility and file size preservation. IEEE Trans Multimedia 20(10):2645–2658

    Article  Google Scholar 

  9. Chang J-C, Lu Y-Z, Wu H-L (2017) A separable reversible data hiding scheme for encrypted jpeg bitstreams. Signal Process 133:135–143

    Article  Google Scholar 

  10. Cheng H, Zhang X, Yu J et al (2016) Encrypted jpeg image retrieval using block-wise feature comparison. J Vis Commun Image Represent 40(Part A):111–117

    Article  Google Scholar 

  11. Niu X, Zhou C, Ding J et al (2008) Jpeg encryption with file size preservation. In: 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp 308–311.

  12. Qian Z, Zhang X, Wang S (2014) Reversible data hiding in encrypted jpeg bitstream. IEEE Trans Multimedia 16(5):1486–1491

    Article  Google Scholar 

  13. Qian Z, Zhou H, Zhang X et al (2018) Separable reversible data hiding in encrypted jpeg bitstreams. IEEE Trans Dependable Secure Comput 15(6):1055–1067

    Article  Google Scholar 

  14. Shreyamshakumar B, Patil C (2009) Jpeg image encryption using fuzzy pn sequences. SIViP 4(4):419–427

    Article  Google Scholar 

  15. Zheng M, Li Z, Chen T et al (2018) Larger-capacity reversible data hiding in encrypted jpeg bitstream. J Cyber Secur 3(6):55–66

    Google Scholar 

  16. Itier V, Puteaux P, Puech W (2020) Recompression of jpeg crypto-compressed images without a key. IEEE Trans Circuits Syst Video Technol 30(3):646–660

    Article  Google Scholar 

  17. He J, Chen J, Luo W et al (2019) A novel high-capacity reversible data hiding scheme for encrypted jpeg bitstreams. IEEE Trans Circuits Syst Video Technol 29(12):3501–3515

    Article  Google Scholar 

  18. Huang Y, Cao X, Wu H-T et al (2021) Reversible data hiding in jpeg images for privacy protection, ICASSP 2021 - 2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp 2715–2719

  19. Li P, Lo K-T (2018) A content-adaptive joint image compression and encryption scheme. IEEE Trans Multimedia 20(8):1960–1972

    Article  Google Scholar 

  20. Li P, Meng J, Sun Z (2021) A new jpeg encryption scheme using adaptive block size. In: Advances in Intelligent Information Hiding and Multimedia Signal Processing, pp 140–147

  21. Li W, Yuan Y (2007) A leak and its remedy in jpeg image encryption. Int J Comput Math 84(9):1367–1378

    Article  MathSciNet  Google Scholar 

  22. Ong S, Wong K, Qi X et al (2015) Beyond format-compliant encryption for jpeg image. Signal Process 31:47–60

    Google Scholar 

  23. Qian Z, Xu H, Luo X et al (2019) New framework of reversible data hiding in encrypted jpeg bitstreams. IEEE Trans Circuits Syst Video Technol 29(2):351–362

    Article  Google Scholar 

  24. Qin C, Hu J, Li F et al (2022) Jpeg image encryption with adaptive dc coefficient prediction and rs pair permutation. IEEE Trans Multimedia. https://doi.org/10.1109/TMM.2022.3148591

    Article  Google Scholar 

  25. Minemura K, Moayed Z, Wong K, et al (2012) Jpeg image scrambling without expansion in bitstream size. In: 2012 IEEE International Conference on Image Processing, pp 261–264

  26. Ong S, Minemura K, Wong K (2013) Progressive quality degradation in jpeg compressed image using dc block orientation with rewritable data embedding functionality. In: 2013 20th IEEE International Conference on Image Processing (ICIP 2013), pp 4574–4578.

  27. Ong S, Wong K, Tanaka K (2015) Scrambling–embedding for jpeg compressed image. Signal Process 109:38–53

    Article  Google Scholar 

  28. Hua Z, Wang Z, Zheng Y et al (2023) Enabling large-capacity reversible data hiding over encrypted jpeg bitstreams. IEEE Transactions on Circuits and Systems for Video Technology 33(3).

  29. Li P, Sun Z, Situ Z et al (2022) Joint jpeg compression and encryption scheme based on order-8-16 block transform. IEEE Trans Intell Transp Syst. https://doi.org/10.1109/tits.2022.3217304

    Article  Google Scholar 

  30. Qu L, Chen F, Zhang S et al (2022) Cryptanalysis of reversible data hiding in encrypted images by block permutation and co-modulation. IEEE Trans Multimedia 24:2924–2937

    Article  Google Scholar 

  31. Yuan Y, Hongjie H, Fan C (2022) On the security of encrypted jpeg image with adaptive key generated by invariant characteristic. In: Digital Forensics and Watermarking 2021 (IWDW 2021) 13180 58–71

  32. He H, Yuan Y, Ye Y et al (2023) Chosen plaintext attack on jpeg image encryption with adaptive key and run consistency. J Vis Commun Image Represent 90:1–11

    Article  Google Scholar 

  33. Du Y, Yin Z, Zhang X (2022) High capacity lossless data hiding in jpeg bitstream based on general vlc mapping. IEEE Trans Dependable Secure Comput 19(2):1420–1433

    Google Scholar 

  34. Independent jpeg group, 2019. [Online]. Available: http://www.ijg.org/ 

Download references

Acknowledgements

This work was supported in part by the National Natural Science Foundation of China (NSFC) under Grant U1936113.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fan Chen.

Ethics declarations

Competing Interests

All authors certify that they have no affiliations with or involvement in any organization or entity with any financial interest or non-financial interest in the subject matter or materials discussed in this manuscript.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Appendix

Appendix

The Abbreviations of this paper is summarized in Table 6

Table 6 Abbreviations list

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yuan, Y., He, H. & Chen, F. JPEG Bitstreams encryption with CPA-secure and file size reduction. Multimed Tools Appl 83, 44833–44856 (2024). https://doi.org/10.1007/s11042-023-17154-3

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-17154-3

Keywords

Navigation