Abstract
An adaptive key of He’s scheme is generated based on the minimum coded unit histogram (MCUH) of an original image, which can improve the ability against the known-plaintext attack while achieving file size preservation and format compatibility. However, it is vulnerable to the chosen-plaintext attack (CPA) since the MCUH, which is unchanged during encryption, can be used to reproduce the adaptive key. To change the MCUH and reduce file size, some alternating current codes (ACCs) are randomly removed and reversibly embedded into the image by variable length code (VLC) mapping. Firstly, the threshold T, i.e., the maximum number of ACCs that can be removed while ensuring a reduced file size of encrypted JPEG image, is adaptively calculated after the monotonicity of VLC mapping is discussed. And then, according to the user’s key, the actual number of ACCs to be removed is randomly selected in the integer interval [1, T] to reduce the possibility of reproducing the adaptive key under CPA. Experimental results demonstrate that the proposed scheme effectively improves the ability against CPA since the adaptive-key reproduction probability of the proposed scheme is reduced from 100% of He’s scheme to smaller than \(1.15\times {10}^{-1398}\). Moreover, the file size of the encrypted JPEG generated by the proposed scheme is smaller than that of He’s scheme and the original image.
Similar content being viewed by others
Data availability
The datasets generated during and/or analyzed during the current study are available in the GitHub repository, https://github.com/ytuayuan/ChangeMCUH.
References
Zhang Q, Zhong H, Yang LT et al (2016) Pphocfs: Privacy preserving high-order cfs algorithm on the cloud for clustering multimedia data. ACM Trans Multimed Comput Commun Appl 12(4s):1–15
Singh S (2020) Adaptive pvd and lsb based high capacity data hiding scheme. Multimed Tools Appl 79(25–26):18815–18837
Mitchell J (1992) Digital compression and coding of continuous-tone still images: Requirements and guidelines. ITU-T Recommendation T
Sheidani S, Mahmoudi-Aznaveh A, Eslami Z (2021) Cpa-secure privacy-preserving reversible data hiding for jpeg images. IEEE Trans Inf Forensics Secur 16:3647–3661
Wright M (2001) The advanced encryption standard. Netw Secur 2001(10):11–13
Coppersmith D (1994) The data encryption standard (des) and its strength against attacks. IBM J Res Dev 38(3):243–250
Li P, Lo KT (2020) Survey on jpeg compatible joint image compression and encryption algorithms. IET Signal Process 14(8):475–488
He J, Huang S, Tang S et al (2018) Jpeg image encryption with improved format compatibility and file size preservation. IEEE Trans Multimedia 20(10):2645–2658
Chang J-C, Lu Y-Z, Wu H-L (2017) A separable reversible data hiding scheme for encrypted jpeg bitstreams. Signal Process 133:135–143
Cheng H, Zhang X, Yu J et al (2016) Encrypted jpeg image retrieval using block-wise feature comparison. J Vis Commun Image Represent 40(Part A):111–117
Niu X, Zhou C, Ding J et al (2008) Jpeg encryption with file size preservation. In: 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp 308–311.
Qian Z, Zhang X, Wang S (2014) Reversible data hiding in encrypted jpeg bitstream. IEEE Trans Multimedia 16(5):1486–1491
Qian Z, Zhou H, Zhang X et al (2018) Separable reversible data hiding in encrypted jpeg bitstreams. IEEE Trans Dependable Secure Comput 15(6):1055–1067
Shreyamshakumar B, Patil C (2009) Jpeg image encryption using fuzzy pn sequences. SIViP 4(4):419–427
Zheng M, Li Z, Chen T et al (2018) Larger-capacity reversible data hiding in encrypted jpeg bitstream. J Cyber Secur 3(6):55–66
Itier V, Puteaux P, Puech W (2020) Recompression of jpeg crypto-compressed images without a key. IEEE Trans Circuits Syst Video Technol 30(3):646–660
He J, Chen J, Luo W et al (2019) A novel high-capacity reversible data hiding scheme for encrypted jpeg bitstreams. IEEE Trans Circuits Syst Video Technol 29(12):3501–3515
Huang Y, Cao X, Wu H-T et al (2021) Reversible data hiding in jpeg images for privacy protection, ICASSP 2021 - 2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp 2715–2719
Li P, Lo K-T (2018) A content-adaptive joint image compression and encryption scheme. IEEE Trans Multimedia 20(8):1960–1972
Li P, Meng J, Sun Z (2021) A new jpeg encryption scheme using adaptive block size. In: Advances in Intelligent Information Hiding and Multimedia Signal Processing, pp 140–147
Li W, Yuan Y (2007) A leak and its remedy in jpeg image encryption. Int J Comput Math 84(9):1367–1378
Ong S, Wong K, Qi X et al (2015) Beyond format-compliant encryption for jpeg image. Signal Process 31:47–60
Qian Z, Xu H, Luo X et al (2019) New framework of reversible data hiding in encrypted jpeg bitstreams. IEEE Trans Circuits Syst Video Technol 29(2):351–362
Qin C, Hu J, Li F et al (2022) Jpeg image encryption with adaptive dc coefficient prediction and rs pair permutation. IEEE Trans Multimedia. https://doi.org/10.1109/TMM.2022.3148591
Minemura K, Moayed Z, Wong K, et al (2012) Jpeg image scrambling without expansion in bitstream size. In: 2012 IEEE International Conference on Image Processing, pp 261–264
Ong S, Minemura K, Wong K (2013) Progressive quality degradation in jpeg compressed image using dc block orientation with rewritable data embedding functionality. In: 2013 20th IEEE International Conference on Image Processing (ICIP 2013), pp 4574–4578.
Ong S, Wong K, Tanaka K (2015) Scrambling–embedding for jpeg compressed image. Signal Process 109:38–53
Hua Z, Wang Z, Zheng Y et al (2023) Enabling large-capacity reversible data hiding over encrypted jpeg bitstreams. IEEE Transactions on Circuits and Systems for Video Technology 33(3).
Li P, Sun Z, Situ Z et al (2022) Joint jpeg compression and encryption scheme based on order-8-16 block transform. IEEE Trans Intell Transp Syst. https://doi.org/10.1109/tits.2022.3217304
Qu L, Chen F, Zhang S et al (2022) Cryptanalysis of reversible data hiding in encrypted images by block permutation and co-modulation. IEEE Trans Multimedia 24:2924–2937
Yuan Y, Hongjie H, Fan C (2022) On the security of encrypted jpeg image with adaptive key generated by invariant characteristic. In: Digital Forensics and Watermarking 2021 (IWDW 2021) 13180 58–71
He H, Yuan Y, Ye Y et al (2023) Chosen plaintext attack on jpeg image encryption with adaptive key and run consistency. J Vis Commun Image Represent 90:1–11
Du Y, Yin Z, Zhang X (2022) High capacity lossless data hiding in jpeg bitstream based on general vlc mapping. IEEE Trans Dependable Secure Comput 19(2):1420–1433
Independent jpeg group, 2019. [Online]. Available: http://www.ijg.org/
Acknowledgements
This work was supported in part by the National Natural Science Foundation of China (NSFC) under Grant U1936113.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Competing Interests
All authors certify that they have no affiliations with or involvement in any organization or entity with any financial interest or non-financial interest in the subject matter or materials discussed in this manuscript.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Appendix
Appendix
The Abbreviations of this paper is summarized in Table 6
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Yuan, Y., He, H. & Chen, F. JPEG Bitstreams encryption with CPA-secure and file size reduction. Multimed Tools Appl 83, 44833–44856 (2024). https://doi.org/10.1007/s11042-023-17154-3
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-023-17154-3