Exploring foci of:
ACM Transactions on Multimedia Computing Communications and Applications • Vol 21 • No 4
Counterfeiting Attacks on an RDH-EI Scheme Based on Block-Permutation and Co-XOR
February 2025 • Fan Chen, Lingfeng Qu, Hadi Amirpour, Christian Timmerer, Hongjie He
Reversible data hiding in encrypted images (RDH-EI) has gained widespread attention due to its potential applications in secure cloud storage. However, the security challenges of RDH-EI in cloud storage scenarios remain largely unexplored. In this article, we present a counterfeiting attack on RDH-EI schemes that utilize block-permutation and Co-XOR (BPCX) encryption. We demonstrate that ciphertext images generated by BPCX-based RDH-EI are easily tampered with to produce a counterfeit decrypted image with differen…
Computer Science
Theoretical Computer Science
Algorithm
Computer Security
Cryptography
Arithmetic
Mathematics
Combinatorics
Programming Language
Physics
Mathematical Analysis
Acoustics