Beyond format-compliant encryption for JPEG image

نویسندگان

  • Simying Ong
  • KokSheik Wong
  • Xiaojun Qi
  • Kiyoshi Tanaka
چکیده

In this work, a format-compliant encryption method with the data embedding feature for JPEG compressed image is proposed. First, DC coefficients are encoded based on the regions induced by the textural information carried by AC coefficients. Second, AC coefficients are scanned in eight different orders and the order that results in the smallest bitstream size is selected. Next, AC coefficients from each block are extracted in the form of Run/Size and Value, and manipulated to significantly increase the scope of permutation. Then the virtual queue decomposition is proposed to embed external information. All the processes are completely reversible where the embedded information can be extracted and the original content can be perfectly reconstructed from its processed counterpart. The performance of the proposed method is verified through experiments using various standard test images and the UCID dataset. The proposed method is also compared against the conventional format-compliant encryption methods, where its superiority in terms of robustness against sketch attacks, suppression of bitstream size increment, and data embedding are highlighted. In the best case scenario, the proposed method is able to generate an encrypted image of the same size as the original image (e.g., 512 512) with more than 5800 bits of additionally embedded information while achieving a compression

برای دسترسی به متن کامل این مقاله و 10 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Format-Compliant JPEG2000 Encryption in JPSEC: Security, Applicability, and the Impact of Compression Parameters

JPEG2000 encryption has become a widely discussed topic and quite a number of contributions have been made. However, little is known about JPEG2000 compression parameters and their influence on the security and performance of format, compliant encryption schemes. In this work, a thorough analysis of this topic is presented with a focus on format-compliant packet body encryption as sketched in t...

متن کامل

Partial Encryption of Images for Real-time Applications

Multimedia systems mostly base security on a restricted access to services. In the context of real-time imaging applications, this model suffers several drawbacks. Applications become vulnerable to password attacks and once exposed attackers have access to all the data. An alternative consists of the systematic encryption of all data. When dealing with images, this approach is inconvenient beca...

متن کامل

JPEG image encryption using fuzzy PN sequences

The recent explosion in multimedia and networking application places a great demand on efficient transmission of images at low bit rate with high security. Mixing several existing standard encryption techniques with image encoding tends to change the compression ratio greatly. In this paper, a novel image encryption algorithm is embedded as a part of JPEG image encoding scheme to meet three maj...

متن کامل

Efficient and Syntax-Compliant JPEG 2000 Encryption Preserving Original Fine Granularity of Scalability

A novel syntax-compliant encryption primitive and an efficient syntax-compliant JPEG 2000 encryption scheme are presented in this paper. The syntax-compliant encryption primitive takes, as input, syntax-compliant plaintext and produces syntax-compliant ciphertext. It is faster than all the other syntax-compliant encryption primitives we know. Our JPEG 2000 encryption scheme encrypts independent...

متن کامل

An encryption scheme for JPEG2000 codestream based on packets header information and data encryption for confidentential medical images transmission

In this paper, a novel selective encryption scheme for JPEG2000 codestream is proposed. Many of proposals format compliant encryption schemes for JPEG2000 that have been made encrypt packet body data, but leave header packet in plaintext. Our proposed scheme encrypts code-blocks data corresponding to some sensitive precincts. This encryption is combined to a cyclic permutation of all packets he...

متن کامل

افزودن به منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی راحت تر خواهید کرد

برای دسترسی به متن کامل این مقاله و 10 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Sig. Proc.: Image Comm.

دوره 31  شماره 

صفحات  -

تاریخ انتشار 2015