J Shanghai Jiaotong Univ Sci››2025,Vol. 30››Issue (5): 976-987.doi:10.1007/s12204-023-2676-x
收稿日期:2023-05-15接受日期:2023-08-07出版日期:2025-09-26发布日期:2023-12-12李珊珊,郭亚丽,黄佳鑫,高若云
Received:2023-05-15Accepted:2023-08-07Online:2025-09-26Published:2023-12-12摘要:对于传统的JPEG图像加密,区块位置洗牌可以达到更好的加密效果并且可以抵抗非零计数攻击。但是区块位置洗牌并不改变8×8子块内非零系数的个数。针对这个缺陷,提出了一种基于块间洗牌和非零量化离散余弦变换系数攻击的 JPEG 图像加密的快速攻击算法。该算法通过设计的明文图像检测一张图像的像素值,分析加密前后图像块位置映射关系。然后通过逆映射得到图像块的初步攻击结果,最后根据初步攻击结果中每个8×8块中的非零系数个数生成算法的最终攻击结果。在设计的明文中,每个8×8块的位置都与其非零离散余弦变换系数的个数相关。经过验证,在不了解加密算法和密钥的情况下,可以在较短时间内获得原始图像的主要内容。
中图分类号:
. 使用区块位置洗牌的 JPEG 图像加密快速攻击算法[J]. J Shanghai Jiaotong Univ Sci, 2025, 30(5): 976-987.
LI Shanshan, GUO Yali, HUANG Jiaxin, GAO Ruoyun. Fast Attack Algorithm for JPEG Image Encryption with Block Position Shuffle[J]. J Shanghai Jiaotong Univ Sci, 2025, 30(5): 976-987.
[1] XUE F, LU W, REN H L, et al. Forensics of visual privacy protection in digital images [J].Multimedia Tools and Applications, 2020,79(17/18): 12427-12445. [2] MANGA I, GARBA E J, AHMADU A S. Enhanced image compression and processing scheme [J].Current Journal of Applied Science and Technology, 2021,40(38): 1-11. [3] DIMILILER K. DCT-based medical image compression using machine learning [J].Signal,Image and Video Processing, 2022,16(1): 55-62. [4] MEI Y X, LI L, LI Z, et al. Learning-based scalable image compression with latent-feature reuse and prediction [J].IEEE Transactions on Multimedia, 2022,24: 4143-4157. [5] ANNALAKSHMI N. Lossy image compression techniques [J].International Journal of Computer Applications, 2021,183(20): 30-34. [6] HUSSAIN A J, AL-FAYADH A, RADI N. Image compression techniques: A survey in lossless and lossy algorithms [J].Neurocomputing, 2018,300: 44-69. [7] BULL D R, ZHANG F. Digital picture formats and representations [M]//Intelligent image and video compression. Amsterdam: Elsevier, 2021: 107-142. [8] NAVEEN KUMAR S, VAMSHI BHARADWAJ M V, SUBBARAYAPPA S. Performance comparison of jpeg, jpeg XT, jpeg LS, jpeg 2000, jpeg XR, HEVC, EVC and VVC for images [C]//2021 6th International Conference for Convergence in Technology. Maharashtra: IEEE, 2021: 1-8. [9] AHMAD N, YOUNUS M U, ANJUM M R, et al. Efficient JPEG encoding using bernoulli shift map for secure communication [J].Wireless Personal Communications, 2022,125(4): 3405-3424. [10] RAMADHAN M K, AL-RAMMAHI A. Image cryptography with least squares approximations [J].Journal of Computer Science, 2019,15(11): 1659-1668. [11] YANG N, ZHANG S X, BAI M D, et al. Medical image encryption based on Josephus traversing and hyperchaotic Lorenz system [J].Journal of ShanghaiJiao Tong University(Science), 2022.https://doi.org/10.1007/s12204-022-2555-x [12] DENG Z J, ZHONG S J. A digital image encryption algorithm based on chaotic mapping [J].Journal of Algorithms & Computational Technology, 2019,13: 174830261985347. [13] ZHUANG Z B, WANG J, LIU J Y, et al. A new digital image encryption algorithm based on improved logistic mapping and Josephus circle [J].Journal of Computer and Communications, 2018,6(6): 31-44. [14] SUN S L. A novel hyperchaotic image encryption scheme based on DNA encoding, pixel-level scrambling and bit-level scrambling [J].IEEE Photonics Journal, 2018,10(2): 1-14. [15] HUANG J X, GUO Y L, GAO R Y, et al. Medical image encryption based on fisher-yates scrambling and filter diffusion [J].Journal of ShanghaiJiao TongUniversity(Science), 2023.https://doi.org/10.1007/s12204-023-2618-7 [16] KANG S W, CHOI U S, CHO S J. Fast image encryption algorithm based on (n, m, k)-PCMLCA [J].Multimedia Tools and Applications, 2022,81(1): 1209-1235. [17] YANG X L, WU H Z, YIN Y K, et al. Multiple-image encryption base on compressed coded aperture imaging [J].Optics and Lasers in Engineering, 2020,127: 105976. [18] MOUSSA M I, ABD EL-LATIF E I, ABU EL-ATTA A H. Diagonalize three-dimensional nonlinear chaotic map to encrypt color image [J].Egyptian Informatics Journal, 2023,24(3): 100376. [19] CHEN B J, YU M, TIAN Y H, et al. Multiple-parameter fractional quaternion Fourier transform and its application in colour image encryption [J].IET Image Processing, 2018,12(12): 2238-2249. [20] WANG X Y, SU Y N. Color image encryption based on chaotic compressed sensing and two-dimensional fractional Fourier transform [J].Scientific Reports, 2020,10: 18556. [21] ZHANG L Z, ZHOU Y Y, HUO D M, et al. Multiple-image encryption based on double random phase encoding and compressive sensing by using a measurement array preprocessed with orthogonal-basis matrices [J].Optics&Laser Technology, 2018,105: 162-170. [22] LI P Y, LO K T. Survey on JPEG compatible joint image compression and encryption algorithms [J].IET Signal Processing, 2020,14(8): 475-488. [23] QIN C, HU J C, LI F Y, et al. JPEG image encryption with adaptive DC coefficient prediction and RS pair permutation [J].IEEE Transactions on Multimedia, 2023,25: 2528-2542. [24] HE H J, YUAN Y, YE Y Y, et al. Chosen plaintext attack on JPEG image encryption with adaptive key and Run consistency [J].Journal of Visual Communication and Image Representation, 2023,90: 103733. [25] PHATAK A G. A non-format compliant scalable RSA-based JPEG encryption algorithm [J].International Journal of Image,Graphics and Signal Processing, 2016,8(6): 64-71. [26] HERNÁNDEZ-DÍAZ E, PÉREZ-MEANA H, SILVA-GARCÍA V, et al. JPEG images encryption scheme using elliptic curves and A new S-box generated by chaos [J].Electronics, 2021,10(4): 413. [27] DIAB H, EL-SEMARY A M. Secure image cryptosystem with unique key streams via hyper-chaotic system [J].Signal Processing, 2018,142: 53-68. [28] JIAO S M, LEI T, GAO Y, et al. Known-plaintext attack and ciphertext-only attack for encrypted single-pixel imaging [J].IEEE Access, 2019,7: 119557-119565. [29] YE G D. Image scrambling encryption algorithm of pixel bit based on chaos map [J].Pattern Recognition Letters, 2010,31(5): 347-354. [30] LI C Q, LIN D D, LÜ J H. Cryptanalyzing an image-scrambling encryption algorithm of pixel bits [J].IEEE MultiMedia, 2017,24(3): 64-71. [31] LI M, LU D D, XIANG Y, et al. Cryptanalysis and improvement in a chaotic image cipher using two-round permutation and diffusion [J].NonlinearDynamics, 2019,96(1): 31-47. [32] LI S S, MA R L, ZHANG H L. Enhancing security for JPEG image against mosaic attack using inter-block shuffle encryption [J].IEEE Access, 2019,7: 72696-72702. [33] ÖZTÜRK E, MESUT A. Performance evaluation of JPEG standards, WebP and PNG in terms of compression ratio and time for lossless encoding [C]//2021 6th International Conference on Computer Science and Engineering. Ankara: IEEE, 2021: 15-20. [34] CHEN C H, SHI Y Q. JPEG image steganalysis utilizing both intrablock and interblock correlations [C]//2008 IEEE International Symposium on Circuits and Systems. Seattle: IEEE, 2008: 3029-3032. [35] LI J X, LU W, WENG J, et al. Double JPEG compression detection based on block statistics [J].Multimedia Toolsand Applications, 2018,77(24): 31895-31910. [36] ALZAIN M A. Efficient scrambling-substitution image security scheme using chaotic arnold-logistic maps in the discrete cosine transform [J].International Journal of Computer Networks&Communications, 2022,14(6): 67-79. [37] ZHU L Y, LUO X Y, YANG C F, et al. Invariances of JPEG-quantized DCT coefficients and their application in robust image steganography [J].Signal Processing, 2021,183: 108015. [38] SUN M D, HE X H, XIONG S H, et al. Reduction of JPEG compression artifacts based on DCT coefficients prediction [J].Neurocomputing, 2020,384: 335-345. [39] KO H J, HUANG C T, HORNG G, et al. Robust and blind image watermarking in DCT domain using inter-block coefficient correlation [J].Information Sciences, 2020,517: 128-147. [40] BASHIR T, USMAN I, ALBESHER A A, et al. A DCT domain smart vicinity reliant fragile watermarking technique for DIBR 3D-TV [J].Automatika, 2020,61(1): 58-65. [41] WANG Y Y, NI R R, ZHAO Y. A novel block sorting scheme for reversible data hiding in JPEG images [C]//2018 14th IEEE International Conference on Signal Processing. Beijing: IEEE, 2018: 389-394. [42] LIAO X, YIN J J, GUO S J, et al. Medical JPEG image steganography based on preserving inter-block dependencies [J].Computers&Electrical Engineering, 2018,67: 320-329. [43] ABDMOULEH M K, KHALFALLAH A, BOUHLEL M S. A novel selective encryption scheme for medical images transmission based-on JPEG compression algorithm [J].Procedia Computer Science, 2017,112: 369-376. [44] ONG S, WONG K, QI X J, et al. Beyond format-compliant encryption for JPEG image [J].Signal Processing:Image Communication, 2015,31: 47-60. [45] QIAN Z X, ZHANG X P, REN Y L. JPEG encryption for image rescaling in the encrypted domain [J].Journal of Visual Communication and Image Representation, 2015,26: 9-13. [46] ZHANG Y S, XIAO D, LIU H, et al. GLS coding based security solution to JPEG with the structure of aggregated compression and encryption [J].Communications in Nonlinear Science and Numerical Simulation, 2014,19(5): 1366-1374. [47] LI W H, YUAN Y A. A leak and its remedy in JPEG image encryption [J].International Journal of Computer Mathematics, 2007,84(9): 1367-1378. |
| [1] | .基于多尺度融合和自适应标签相关性的多标签图像分类模型[J]. J Shanghai Jiaotong Univ Sci, 2025, 30(5): 889-898. |
| [2] | .基于多注意力机制的轻量化人体姿态估计[J]. J Shanghai Jiaotong Univ Sci, 2025, 30(5): 899-910. |
| [3] | .基于改进CLRNet的铁轨线检测算法[J]. J Shanghai Jiaotong Univ Sci, 2025, 30(5): 923-934. |
| [4] | .MAGPNet: 基于多域注意力引导的红外弱小目标检测网络[J]. J Shanghai Jiaotong Univ Sci, 2025, 30(5): 935-951. |
| [5] | .基于非抽样双树-复小波变换与模糊聚类的声呐图像去噪技术[J]. J Shanghai Jiaotong Univ Sci, 2025, 30(5): 998-1008. |
| [6] | .CenterRCNN:基于中心关键点区域候选网络的两阶段无锚框目标检测[J]. J Shanghai Jiaotong Univ Sci, 2025, 30(5): 1028-1036. |
| [7] | .CSC-YOLO:一种铜板带表面缺陷检测的图像识别模型[J]. J Shanghai Jiaotong Univ Sci, 2025, 30(5): 1037-1049. |
| [8] | .面向太阳能电池复杂缺陷检测的新型多步深度学习方法[J]. J Shanghai Jiaotong Univ Sci, 2025, 30(5): 1050-1064. |
| [9] | .基于ALBERT的中国诗酒文化命名实体识别[J]. J Shanghai Jiaotong Univ Sci, 2025, 30(5): 1065-1072. |
| [10] | .非视域成像技术研究进展[J]. J Shanghai Jiaotong Univ Sci, 2025, 30(5): 833-854. |
| [11] | .CT-MFENet:基于全局-局部特征融合的用于视网膜血管分割的上下文Transformer和多尺度特征提取网络[J]. J Shanghai Jiaotong Univ Sci, 2025, 30(4): 668-682. |
| [12] | .基于短时长毫米波雷达回波序列的心率感知方法[J]. J Shanghai Jiaotong Univ Sci, 2025, 30(4): 683-692. |
| [13] | .用于半监督医学图像分割的多一致性训练[J]. J Shanghai Jiaotong Univ Sci, 2025, 30(4): 800-814. |
| [14] | .血管介入手术路径规划及三维视觉导航[J]. J Shanghai Jiaotong Univ Sci, 2025, 30(3): 472-481. |
| [15] | .基于毫米波雷达的智能心率提取方法[J]. J Shanghai Jiaotong Univ Sci, 2025, 30(3): 493-498. |
| 阅读次数 | ||||||
| 全文 |
|
|||||
| 摘要 |
|
|||||