On the Security of Bitstream-level JPEG Encryption with Restart Markers

Mare Hirose,Shoko Imaizumi,Hitoshi Kiya
2024-10-09
Abstract:This paper aims to evaluate the security of a bitstream-level JPEG encryption method using restart (RST) markers, where encrypted image can keep the JPEG file format with the same file size as non-encrypted image. Data encrypted using this method can be decoded without altering header information by employing a standard JPEG decoder. Moreover, the use of RST markers enables the definition of extended blocks divided by the markers, so spatially partial encryption and block-permutation-based encryption can be carried out. However, the security of the method was evaluated only with respect to the key space analysis for brute-force attacks and other limited attacks. Accordingly, in this paper, we evaluated the security of the method with respect to robustness against ciphertext-only attacks including state-of-the-art attacks. In experiments, the method is compared with conventional encryption methods, and it is confirmed to be robust against ciphertext-only attacks if parameters used for image encryption are carefully chosen.
Cryptography and Security
What problem does this paper attempt to address?
The problem that this paper attempts to solve is to evaluate the security of an encryption method based on the JPEG bit - stream level, especially its robustness in ciphertext - only attacks (COAs). This encryption method utilizes the restart (RST) marker and can encrypt an image while keeping the JPEG file format and file size unchanged, and it can be decoded by a standard JPEG decoder. ### Problem Background With the popularization of social network services, the usage amount of JPEG images is continuously increasing. However, these platforms usually limit the use of file formats and there are security problems such as information leakage. Therefore, many studies have proposed encryption methods that maintain the JPEG format to ensure the security of images. Recently, a JPEG encryption method based on the bit - stream level has been proposed, which can encrypt an image without changing the file format and size. However, the security of this method has not been fully verified, especially in terms of robustness when facing various attacks. ### Paper Objectives The objective of this paper is to evaluate the security of the bit - stream - level JPEG encryption method based on the RST marker when facing COA. Specifically, the paper evaluates the security of this method through the following aspects of analysis: 1. **Key Space Analysis**: Calculate the number of all possible patterns that the encryption algorithm can generate. 2. **Key Sensitivity Analysis**: Evaluate the sensitivity of the encryption method to minor changes in the key. 3. **Non - Zero Count Attack (NZCA)**: Evaluate whether the encrypted image can resist the attack of recovering the original image contour from the ciphertext. 4. **Histogram Analysis**: Evaluate the pixel frequency distribution of the encrypted image to ensure that it has a significant difference from the histogram of the original image. ### Experimental Results Through experiments, the paper draws the following conclusions: - **Visual Information Protection**: This method can effectively protect the visual information of the image, and the generated encrypted image cannot recognize the original content. - **Key Sensitivity**: This method is very sensitive to changes in the key. Even if the key is only one bit different, the encrypted or decrypted image will be completely different. - **NZCA Resistance**: The encryption method using the RST marker can effectively prevent NZCA attacks, but under a larger restart interval (RI), the contours of some areas may be exposed. - **Histogram Analysis**: The RGB channel histograms of the encrypted image are similar, and they have a significant difference from the histogram of the original image, indicating that this method can provide an effective encryption effect. ### Conclusions Through a series of experiments and analyses, this paper has confirmed that the bit - stream - level JPEG encryption method based on the RST marker has relatively high security when facing COA. In addition, this method is superior to traditional JPEG encryption methods in some important aspects. However, the choice of restart interval (RI) has an important impact on attack resistance, so it needs to be carefully selected. ### Formula Summary 1. **Minimum and Maximum Key Space**: \[ S_{\text{encmin}} = 2^T \] \[ S_{\text{encmax}} = 2^{7T} \] \[ S_{\text{bp}} = \left( \left\lfloor \frac{M}{16} \right\rfloor \times \left\lfloor \frac{N}{16} \right\rfloor \times \frac{1}{r} \right)! \] \[ S_{\text{min}} = S_{\text{encmin}} \times S_{\text{bp}} \] \[ S_{\text{max}} = S_{\text{encmax}} \times S_{\text{bp}} \] 2. **Example Key Space Calculation**: \[ S_{\text{min}} = 2^{37031} \times \left( \left\lfloor \frac{384}{16} \right\rfloor \times \cdots \right)