{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T01:25:58Z","timestamp":1760145958832,"version":"build-2065373602"},"reference-count":35,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T00:00:00Z","timestamp":1726012800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cryptography"],"abstract":"<jats:p>Reversible data-hiding in encrypted images (RDHEI) plays a pivotal role in preserving privacy within images stored on cloud platforms. Recently, Wang et al. introduced a dual-stage permutation encryption scheme, which is highly compatible with RDHEI techniques. In this study, we undertake an exhaustive examination of the characteristics inherent to the dual-stage permutation scheme and propose two cryptanalysis schemes leveraging a large-kernel convolutional neural network (LKCNN) and a known plaintext attack (KPA) scheme, respectively. Our experimental findings demonstrate the effectiveness of our cryptanalysis schemes in breaking the dual-stage permutation encryption scheme. Based on our investigation, we highlight significant security vulnerabilities in the dual-stage permutation encryption scheme, raising concerns about its suitability for secure image storage and privacy protection in cloud environments.<\/jats:p>","DOI":"10.3390\/cryptography8030041","type":"journal-article","created":{"date-parts":[[2024,9,12]],"date-time":"2024-09-12T02:30:23Z","timestamp":1726108223000},"page":"41","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Cryptanalysis of Dual-Stage Permutation Encryption Using Large-Kernel Convolutional Neural Network and Known Plaintext Attack"],"prefix":"10.3390","volume":"8","author":[{"given":"Ching-Chun","family":"Chang","sequence":"first","affiliation":[{"name":"Information and Communication Security Research Center, Feng Chia University, Taichung 407102, Taiwan"}]},{"given":"Shuying","family":"Xu","sequence":"additional","affiliation":[{"name":"Department of Information Engineering and Computer Science, Feng Chia University, Taichung 407102, Taiwan"}]},{"given":"Kai","family":"Gao","sequence":"additional","affiliation":[{"name":"Department of Information Engineering and Computer Science, Feng Chia University, Taichung 407102, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7319-5780","authenticated-orcid":false,"given":"Chin-Chen","family":"Chang","sequence":"additional","affiliation":[{"name":"Department of Information Engineering and Computer Science, Feng Chia University, Taichung 407102, Taiwan"}]}],"member":"1968","published-online":{"date-parts":[[2024,9,11]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","article-title":"Reversible data hiding","volume":"16","author":"Ni","year":"2006","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"107288","DOI":"10.1016\/j.sigpro.2019.107288","article-title":"Reversible data hiding in encrypted images using adaptive reversible integer transformation","volume":"167","author":"Qiu","year":"2020","journal-title":"Signal Process."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"553","DOI":"10.1109\/TIFS.2013.2248725","article-title":"Reversible data hiding in encrypted images by reserving room before encryption","volume":"8","author":"Ma","year":"2013","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1016\/j.sigpro.2013.06.023","article-title":"Reversibility improved data hiding in encrypted images","volume":"94","author":"Zhang","year":"2014","journal-title":"Signal Process."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"1132","DOI":"10.1109\/TCYB.2015.2423678","article-title":"High capacity reversible data hiding in encrypted images by patch-level sparse representation","volume":"46","author":"Cao","year":"2015","journal-title":"IEEE Trans. Cybern."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1016\/j.sigpro.2016.10.017","article-title":"Binary-block embedding for reversible data hiding in encrypted images","volume":"133","author":"Yi","year":"2017","journal-title":"Signal Process."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"108200","DOI":"10.1016\/j.sigpro.2021.108200","article-title":"Secure reversible data hiding in encrypted images based on adaptive prediction-error labeling","volume":"188","author":"Wu","year":"2021","journal-title":"Signal Process."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"108146","DOI":"10.1016\/j.sigpro.2021.108146","article-title":"Reversible data hiding in encrypted images based on pixel prediction and multi-MSB planes rearrangement","volume":"187","author":"Yin","year":"2021","journal-title":"Signal Process."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1109\/LSP.2012.2187334","article-title":"An improved reversible data hiding in encrypted images using side match","volume":"19","author":"Hong","year":"2012","journal-title":"IEEE Signal Process. Lett."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1109\/LSP.2011.2114651","article-title":"Reversible data hiding in encrypted image","volume":"18","author":"Zhang","year":"2011","journal-title":"IEEE Signal Process. Lett."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"826","DOI":"10.1109\/TIFS.2011.2176120","article-title":"Separable reversible data hiding in encrypted image","volume":"7","author":"Zhang","year":"2011","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"636","DOI":"10.1109\/TCSVT.2015.2418611","article-title":"Reversible data hiding in encrypted images with distributed source encoding","volume":"26","author":"Qian","year":"2015","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1016\/j.sigpro.2014.04.032","article-title":"High-capacity reversible data hiding in encrypted images by prediction error","volume":"104","author":"Wu","year":"2014","journal-title":"Signal Process."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1016\/j.sigpro.2018.07.008","article-title":"Separable reversible data hiding in encrypted images via adaptive embedding strategy with block selection","volume":"153","author":"Qin","year":"2018","journal-title":"Signal Process."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"2777","DOI":"10.1109\/TIFS.2016.2598528","article-title":"New framework for reversible data hiding in encrypted domain","volume":"11","author":"Huang","year":"2016","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"2285","DOI":"10.1109\/TCSVT.2018.2863029","article-title":"A high capacity multi-level approach for reversible data hiding in encrypted images","volume":"29","author":"Ge","year":"2018","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1016\/j.patrec.2018.01.014","article-title":"An improved block based joint reversible data hiding in encrypted images by symmetric cryptosystem","volume":"139","author":"Bhardwaj","year":"2020","journal-title":"Pattern Recognit. Lett."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"102609","DOI":"10.1016\/j.displa.2023.102609","article-title":"Dual mode data hiding in fully encrypted images with pixel-shuffling for cloud applications","volume":"81","author":"Gao","year":"2024","journal-title":"Displays"},{"key":"ref_19","unstructured":"Data Encryption Standard (1977). Federal Infonnation Processing Standards Publication No. 46, National Bureau of Standards."},{"key":"ref_20","first-page":"71","article-title":"Image steganography based on chaos function and randomize function","volume":"4","author":"Mansoor","year":"2023","journal-title":"Iraqi J. Comput. Sci. Math."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"3726","DOI":"10.1109\/TCSI.2024.3407809","article-title":"Multi-image encryption algorithm based on novel spatiotemporal chaotic system and fractal geometry","volume":"71","author":"Huang","year":"2024","journal-title":"IEEE Trans. Circuits Syst. I: Regul. Pap."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"121088","DOI":"10.1016\/j.ins.2024.121088","article-title":"Chaotic image encryption algorithm based on bit-level feedback adjustment","volume":"679","author":"Su","year":"2024","journal-title":"Inf. Sci."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Dewangan, R.R., Soni, S., and Mishal, A. (2024). Optimized homomorphic encryption (OHE) algorithms for protecting sensitive image data in the cloud computing environment. Int. J. Inf. Technol., 1\u201311.","DOI":"10.1007\/s41870-024-01921-y"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"033002","DOI":"10.1117\/1.3167847","article-title":"Homomorphic image encryption","volume":"18","author":"Elashry","year":"2009","journal-title":"J. Electron. Imaging"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"7695751","DOI":"10.1155\/2017\/7695751","article-title":"An efficient secret key homomorphic encryption used in image processing service","volume":"2017","author":"Yang","year":"2017","journal-title":"Secur. Commun. Netw."},{"key":"ref_26","unstructured":"Fu, W., Lin, R., and Inge, D. (2018). Fully Homomorphic Image Processing. arXiv."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Wang, Y.M., Xiong, G.Q., and He, W.G. (2023). High-capacity reversible data hiding in encrypted images based on pixel-value-ordering and histogram shifting. Expert Syst. Appl., 211.","DOI":"10.1016\/j.eswa.2022.118600"},{"key":"ref_28","first-page":"2924","article-title":"Cryptanalysis of reversible data hiding in encrypted images by block permutation and co-modulation","volume":"24","author":"Qu","year":"2021","journal-title":"IEEE Trans. Multimed."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"74000","DOI":"10.1109\/ACCESS.2023.3291599","article-title":"APT adversarial defence mechanism for industrial IoT enabled cyber-physical system","volume":"11","author":"Javed","year":"2023","journal-title":"IEEE Access"},{"key":"ref_30","unstructured":"Chen, H., Ming, K., Wang, Y.W., and Wang, Z.J. (2019). A Deep Learning Based Attack for The Chaos-Based Image Encryption. arXiv."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"257","DOI":"10.62411\/jcta.9851","article-title":"Machine Learning and Cryptanalysis: An in-depth exploration of current practices and future potential","volume":"1","author":"Singh","year":"2021","journal-title":"J. Comput. Theor. Appl."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Kim, H., Lim, S., Kang, Y., Kim, W., Kim, D., Yoon, S., and Seo, H. (2023). Deep-learning-based cryptanalysis of lightweight block ciphers revisited. Entropy, 25.","DOI":"10.3390\/e25070986"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Bas, P., Filler, T., and Pevn\u00fd, T. (2011). Break our steganographic system\u2014The ins and outs of organizing BOSS. International Workshop on Information Hiding, Springer. Available online: http:\/\/dde.binghamton.edu\/download\/.","DOI":"10.1007\/978-3-642-24178-9_5"},{"key":"ref_34","unstructured":"Kingma, D.P., and Ba, J. (2014). Adam: A Method for Stochastic Optimization. arXiv."},{"key":"ref_35","unstructured":"Bas, P., and Furon, T. (2019, June 22). Image Database of BOWS-2. Available online: http:\/\/bows2.ec-lille.fr\/."}],"container-title":["Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2410-387X\/8\/3\/41\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T15:54:09Z","timestamp":1760111649000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2410-387X\/8\/3\/41"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,11]]},"references-count":35,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2024,9]]}},"alternative-id":["cryptography8030041"],"URL":"https:\/\/doi.org\/10.3390\/cryptography8030041","relation":{},"ISSN":["2410-387X"],"issn-type":[{"type":"electronic","value":"2410-387X"}],"subject":[],"published":{"date-parts":[[2024,9,11]]}}}