J Shanghai Jiaotong Univ Sci ›› 2025, Vol. 30 ›› Issue (5): 976-987.doi: 10.1007/s12204-023-2676-x
收稿日期:
2023-05-15
接受日期:
2023-08-07
出版日期:
2025-09-26
发布日期:
2023-12-12
李珊珊,郭亚丽,黄佳鑫,高若云
Received:
2023-05-15
Accepted:
2023-08-07
Online:
2025-09-26
Published:
2023-12-12
摘要: 对于传统的JPEG图像加密,区块位置洗牌可以达到更好的加密效果并且可以抵抗非零计数攻击。但是区块位置洗牌并不改变8×8子块内非零系数的个数。针对这个缺陷,提出了一种基于块间洗牌和非零量化离散余弦变换系数攻击的 JPEG 图像加密的快速攻击算法。该算法通过设计的明文图像检测一张图像的像素值,分析加密前后图像块位置映射关系。然后通过逆映射得到图像块的初步攻击结果,最后根据初步攻击结果中每个8×8块中的非零系数个数生成算法的最终攻击结果。在设计的明文中,每个8×8块的位置都与其非零离散余弦变换系数的个数相关。经过验证,在不了解加密算法和密钥的情况下,可以在较短时间内获得原始图像的主要内容。
中图分类号:
. 使用区块位置洗牌的 JPEG 图像加密快速攻击算法[J]. J Shanghai Jiaotong Univ Sci, 2025, 30(5): 976-987.
LI Shanshan, GUO Yali, HUANG Jiaxin, GAO Ruoyun. Fast Attack Algorithm for JPEG Image Encryption with Block Position Shuffle[J]. J Shanghai Jiaotong Univ Sci, 2025, 30(5): 976-987.
[1] XUE F, LU W, REN H L, et al. Forensics of visual privacy protection in digital images [J]. Multimedia Tools and Applications, 2020, 79(17/18): 12427-12445. [2] MANGA I, GARBA E J, AHMADU A S. Enhanced image compression and processing scheme [J]. Current Journal of Applied Science and Technology, 2021, 40(38): 1-11. [3] DIMILILER K. DCT-based medical image compression using machine learning [J]. Signal, Image and Video Processing, 2022, 16(1): 55-62. [4] MEI Y X, LI L, LI Z, et al. Learning-based scalable image compression with latent-feature reuse and prediction [J]. IEEE Transactions on Multimedia, 2022, 24: 4143-4157. [5] ANNALAKSHMI N. Lossy image compression techniques [J]. International Journal of Computer Applications, 2021, 183(20): 30-34. [6] HUSSAIN A J, AL-FAYADH A, RADI N. Image compression techniques: A survey in lossless and lossy algorithms [J]. Neurocomputing, 2018, 300: 44-69. [7] BULL D R, ZHANG F. Digital picture formats and representations [M]//Intelligent image and video compression. Amsterdam: Elsevier, 2021: 107-142. [8] NAVEEN KUMAR S, VAMSHI BHARADWAJ M V, SUBBARAYAPPA S. Performance comparison of jpeg, jpeg XT, jpeg LS, jpeg 2000, jpeg XR, HEVC, EVC and VVC for images [C]//2021 6th International Conference for Convergence in Technology. Maharashtra: IEEE, 2021: 1-8. [9] AHMAD N, YOUNUS M U, ANJUM M R, et al. Efficient JPEG encoding using bernoulli shift map for secure communication [J]. Wireless Personal Communications, 2022, 125(4): 3405-3424. [10] RAMADHAN M K, AL-RAMMAHI A. Image cryptography with least squares approximations [J]. Journal of Computer Science, 2019, 15(11): 1659-1668. [11] YANG N, ZHANG S X, BAI M D, et al. Medical image encryption based on Josephus traversing and hyperchaotic Lorenz system [J]. Journal of Shanghai Jiao Tong University (Science), 2022. https://doi.org/10.1007/s12204-022-2555-x [12] DENG Z J, ZHONG S J. A digital image encryption algorithm based on chaotic mapping [J]. Journal of Algorithms & Computational Technology, 2019, 13: 174830261985347. [13] ZHUANG Z B, WANG J, LIU J Y, et al. A new digital image encryption algorithm based on improved logistic mapping and Josephus circle [J]. Journal of Computer and Communications, 2018, 6(6): 31-44. [14] SUN S L. A novel hyperchaotic image encryption scheme based on DNA encoding, pixel-level scrambling and bit-level scrambling [J]. IEEE Photonics Journal, 2018, 10(2): 1-14. [15] HUANG J X, GUO Y L, GAO R Y, et al. Medical image encryption based on fisher-yates scrambling and filter diffusion [J]. Journal of Shanghai Jiao Tong University (Science), 2023. https://doi.org/10.1007/s12204-023-2618-7 [16] KANG S W, CHOI U S, CHO S J. Fast image encryption algorithm based on (n, m, k)-PCMLCA [J]. Multimedia Tools and Applications, 2022, 81(1): 1209-1235. [17] YANG X L, WU H Z, YIN Y K, et al. Multiple-image encryption base on compressed coded aperture imaging [J]. Optics and Lasers in Engineering, 2020, 127: 105976. [18] MOUSSA M I, ABD EL-LATIF E I, ABU EL-ATTA A H. Diagonalize three-dimensional nonlinear chaotic map to encrypt color image [J]. Egyptian Informatics Journal, 2023, 24(3): 100376. [19] CHEN B J, YU M, TIAN Y H, et al. Multiple-parameter fractional quaternion Fourier transform and its application in colour image encryption [J]. IET Image Processing, 2018, 12(12): 2238-2249. [20] WANG X Y, SU Y N. Color image encryption based on chaotic compressed sensing and two-dimensional fractional Fourier transform [J]. Scientific Reports, 2020, 10: 18556. [21] ZHANG L Z, ZHOU Y Y, HUO D M, et al. Multiple-image encryption based on double random phase encoding and compressive sensing by using a measurement array preprocessed with orthogonal-basis matrices [J]. Optics & Laser Technology, 2018, 105: 162-170. [22] LI P Y, LO K T. Survey on JPEG compatible joint image compression and encryption algorithms [J]. IET Signal Processing, 2020, 14(8): 475-488. [23] QIN C, HU J C, LI F Y, et al. JPEG image encryption with adaptive DC coefficient prediction and RS pair permutation [J]. IEEE Transactions on Multimedia, 2023, 25: 2528-2542. [24] HE H J, YUAN Y, YE Y Y, et al. Chosen plaintext attack on JPEG image encryption with adaptive key and Run consistency [J]. Journal of Visual Communication and Image Representation, 2023, 90: 103733. [25] PHATAK A G. A non-format compliant scalable RSA-based JPEG encryption algorithm [J]. International Journal of Image, Graphics and Signal Processing, 2016, 8(6): 64-71. [26] HERNÁNDEZ-DÍAZ E, PÉREZ-MEANA H, SILVA-GARCÍA V, et al. JPEG images encryption scheme using elliptic curves and A new S-box generated by chaos [J]. Electronics, 2021, 10(4): 413. [27] DIAB H, EL-SEMARY A M. Secure image cryptosystem with unique key streams via hyper-chaotic system [J]. Signal Processing, 2018, 142: 53-68. [28] JIAO S M, LEI T, GAO Y, et al. Known-plaintext attack and ciphertext-only attack for encrypted single-pixel imaging [J]. IEEE Access, 2019, 7: 119557-119565. [29] YE G D. Image scrambling encryption algorithm of pixel bit based on chaos map [J]. Pattern Recognition Letters, 2010, 31(5): 347-354. [30] LI C Q, LIN D D, LÜ J H. Cryptanalyzing an image-scrambling encryption algorithm of pixel bits [J]. IEEE MultiMedia, 2017, 24(3): 64-71. [31] LI M, LU D D, XIANG Y, et al. Cryptanalysis and improvement in a chaotic image cipher using two-round permutation and diffusion [J]. Nonlinear Dynamics, 2019, 96(1): 31-47. [32] LI S S, MA R L, ZHANG H L. Enhancing security for JPEG image against mosaic attack using inter-block shuffle encryption [J]. IEEE Access, 2019, 7: 72696-72702. [33] ÖZTÜRK E, MESUT A. Performance evaluation of JPEG standards, WebP and PNG in terms of compression ratio and time for lossless encoding [C]//2021 6th International Conference on Computer Science and Engineering. Ankara: IEEE, 2021: 15-20. [34] CHEN C H, SHI Y Q. JPEG image steganalysis utilizing both intrablock and interblock correlations [C]//2008 IEEE International Symposium on Circuits and Systems. Seattle: IEEE, 2008: 3029-3032. [35] LI J X, LU W, WENG J, et al. Double JPEG compression detection based on block statistics [J]. Multimedia Tools and Applications, 2018, 77(24): 31895-31910. [36] ALZAIN M A. Efficient scrambling-substitution image security scheme using chaotic arnold-logistic maps in the discrete cosine transform [J]. International Journal of Computer Networks & Communications, 2022, 14(6): 67-79. [37] ZHU L Y, LUO X Y, YANG C F, et al. Invariances of JPEG-quantized DCT coefficients and their application in robust image steganography [J]. Signal Processing, 2021, 183: 108015. [38] SUN M D, HE X H, XIONG S H, et al. Reduction of JPEG compression artifacts based on DCT coefficients prediction [J]. Neurocomputing, 2020, 384: 335-345. [39] KO H J, HUANG C T, HORNG G, et al. Robust and blind image watermarking in DCT domain using inter-block coefficient correlation [J]. Information Sciences, 2020, 517: 128-147. [40] BASHIR T, USMAN I, ALBESHER A A, et al. A DCT domain smart vicinity reliant fragile watermarking technique for DIBR 3D-TV [J]. Automatika, 2020, 61(1): 58-65. [41] WANG Y Y, NI R R, ZHAO Y. A novel block sorting scheme for reversible data hiding in JPEG images [C]//2018 14th IEEE International Conference on Signal Processing. Beijing: IEEE, 2018: 389-394. [42] LIAO X, YIN J J, GUO S J, et al. Medical JPEG image steganography based on preserving inter-block dependencies [J]. Computers & Electrical Engineering, 2018, 67: 320-329. [43] ABDMOULEH M K, KHALFALLAH A, BOUHLEL M S. A novel selective encryption scheme for medical images transmission based-on JPEG compression algorithm [J]. Procedia Computer Science, 2017, 112: 369-376. [44] ONG S, WONG K, QI X J, et al. Beyond format-compliant encryption for JPEG image [J]. Signal Processing: Image Communication, 2015, 31: 47-60. [45] QIAN Z X, ZHANG X P, REN Y L. JPEG encryption for image rescaling in the encrypted domain [J]. Journal of Visual Communication and Image Representation, 2015, 26: 9-13. [46] ZHANG Y S, XIAO D, LIU H, et al. GLS coding based security solution to JPEG with the structure of aggregated compression and encryption [J]. Communications in Nonlinear Science and Numerical Simulation, 2014, 19(5): 1366-1374. [47] LI W H, YUAN Y A. A leak and its remedy in JPEG image encryption [J]. International Journal of Computer Mathematics, 2007, 84(9): 1367-1378. |
[1] | . 基于多尺度融合和自适应标签相关性的多标签图像分类模型[J]. J Shanghai Jiaotong Univ Sci, 2025, 30(5): 889-898. |
[2] | . 基于多注意力机制的轻量化人体姿态估计[J]. J Shanghai Jiaotong Univ Sci, 2025, 30(5): 899-910. |
[3] | . 基于改进CLRNet的铁轨线检测算法[J]. J Shanghai Jiaotong Univ Sci, 2025, 30(5): 923-934. |
[4] | . MAGPNet: 基于多域注意力引导的红外弱小目标检测网络[J]. J Shanghai Jiaotong Univ Sci, 2025, 30(5): 935-951. |
[5] | . 基于非抽样双树-复小波变换与模糊聚类的声呐图像去噪技术[J]. J Shanghai Jiaotong Univ Sci, 2025, 30(5): 998-1008. |
[6] | . CenterRCNN:基于中心关键点区域候选网络的两阶段无锚框目标检测[J]. J Shanghai Jiaotong Univ Sci, 2025, 30(5): 1028-1036. |
[7] | . CSC-YOLO:一种铜板带表面缺陷检测的图像识别模型[J]. J Shanghai Jiaotong Univ Sci, 2025, 30(5): 1037-1049. |
[8] | . 面向太阳能电池复杂缺陷检测的新型多步深度学习方法[J]. J Shanghai Jiaotong Univ Sci, 2025, 30(5): 1050-1064. |
[9] | . 基于ALBERT的中国诗酒文化命名实体识别[J]. J Shanghai Jiaotong Univ Sci, 2025, 30(5): 1065-1072. |
[10] | . 非视域成像技术研究进展[J]. J Shanghai Jiaotong Univ Sci, 2025, 30(5): 833-854. |
[11] | . CT-MFENet:基于全局-局部特征融合的用于视网膜血管分割的上下文Transformer和多尺度特征提取网络[J]. J Shanghai Jiaotong Univ Sci, 2025, 30(4): 668-682. |
[12] | . 基于短时长毫米波雷达回波序列的心率感知方法[J]. J Shanghai Jiaotong Univ Sci, 2025, 30(4): 683-692. |
[13] | . 用于半监督医学图像分割的多一致性训练[J]. J Shanghai Jiaotong Univ Sci, 2025, 30(4): 800-814. |
[14] | . 血管介入手术路径规划及三维视觉导航[J]. J Shanghai Jiaotong Univ Sci, 2025, 30(3): 472-481. |
[15] | . 基于毫米波雷达的智能心率提取方法[J]. J Shanghai Jiaotong Univ Sci, 2025, 30(3): 493-498. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||