Perceptual Visual Security Index Based on Edge and Texture Similarities

With the development in recent decades of various efficient image encryption algorithms, such as selective encryption, a great demand has arisen for methods of evaluating the visual security of encrypted images. Existing solutions usually adopt well-known metrics of visual quality assessment to measure the quality of encrypted images, but they often exhibit undesired behavior on perceptually encrypted images of low quality. In this paper, we propose a novel visual security index (VSI) based on the human visual system. The proposed VSI evaluates two aspects of the content similarity between plain and encrypted images: the edge similarity extracted via multi-threshold edge detection and the texture similarity measured by means of the co-occurrence matrix. These two components are further integrated to obtain the proposed VSI through adaptive similarity weighting. Extensive experiments were performed on two publicly available image databases. Our experimental results demonstrate that compared with many existing state-of-the-art visual security metrics, the proposed VSI exhibits a better performance and stability on low-quality images.

[1]  Andreas Uhl,et al.  Selective encryption of the MC-EZBC bitstream and residual information , 2010, 2010 18th European Signal Processing Conference.

[2]  C. Chui,et al.  A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .

[3]  Weisi Lin,et al.  Image Quality Assessment Based on Gradient Similarity , 2012, IEEE Transactions on Image Processing.

[4]  Alan C. Bovik,et al.  A Statistical Evaluation of Recent Full Reference Image Quality Assessment Algorithms , 2006, IEEE Transactions on Image Processing.

[5]  Enrico Magli,et al.  Multimedia Selective Encryption by Means of Randomized Arithmetic Coding , 2006, IEEE Transactions on Multimedia.

[6]  Xiaojun Tong,et al.  Image encryption scheme based on 3D baker with dynamical compound chaotic sequence cipher generator , 2009, Signal Process..

[7]  Alan C. Bovik,et al.  Image information and visual quality , 2004, 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[8]  Min Wu,et al.  A joint signal processing and cryptographic approach to multimedia encryption , 2006, IEEE Transactions on Image Processing.

[9]  Wenjun Zeng,et al.  Efficient frequency domain selective scrambling of digital video , 2003, IEEE Trans. Multim..

[10]  Andreas Uhl,et al.  Selective encryption of the MC EZBC bitstream for DRM scenarios , 2009, MM&Sec '09.

[11]  Zhu Liu,et al.  Multimedia content analysis-using both audio and visual clues , 2000, IEEE Signal Process. Mag..

[12]  Sheila S. Hemami,et al.  THE ROLE OF EDGE INFORMATION TO ESTIMATE THE PERCEIVED UTILITY OF NATURAL IMAGES , 2009 .

[13]  Lei Zhang,et al.  Gradient Magnitude Similarity Deviation: A Highly Efficient Perceptual Image Quality Index , 2013, IEEE Transactions on Image Processing.

[14]  J. Fridrich Symmetric Ciphers Based on Two-Dimensional Chaotic Maps , 1998 .

[15]  Xinpeng Zhang,et al.  Separable Reversible Data Hiding in Encrypted Image , 2012, IEEE Transactions on Information Forensics and Security.

[16]  Jieying Zhu,et al.  Image Quality Assessment by Visual Gradient Similarity , 2012, IEEE Transactions on Image Processing.

[17]  C.-C. Jay Kuo,et al.  Design of integrated multimedia compression and encryption systems , 2005, IEEE Transactions on Multimedia.

[18]  Leen-Kiat Soh,et al.  Texture analysis of SAR sea ice imagery using gray level co-occurrence matrices , 1999, IEEE Trans. Geosci. Remote. Sens..

[19]  Nariman Farvardin,et al.  A perceptually motivated three-component image model-Part I: description of the model , 1995, IEEE Trans. Image Process..

[20]  Mihir Bellare,et al.  Lecture Notes on Cryptography , 2001 .

[21]  Mahmood Fathy,et al.  A classified and comparative study of edge detection algorithms , 2002, Proceedings. International Conference on Information Technology: Coding and Computing.

[22]  Weiming Ke,et al.  Probability, Statistics, and Reliability for Engineers and Scientists , 2008, Technometrics.

[23]  Robert M. Haralick,et al.  Textural Features for Image Classification , 1973, IEEE Trans. Syst. Man Cybern..

[24]  Yuan Yan Tang,et al.  Scalable Compression of Stream Cipher Encrypted Images Through Context-Adaptive Sampling , 2014, IEEE Transactions on Information Forensics and Security.

[25]  David M. Rouse,et al.  Estimating the usefulness of distorted natural images using an image contour degradation measure. , 2011, Journal of the Optical Society of America. A, Optics, image science, and vision.

[26]  Moncef Gabbouj,et al.  Perceptual Encryption of H.264 Videos: Embedding Sign-Flips Into the Integer-Based Transforms , 2014, IEEE Transactions on Information Forensics and Security.

[27]  Xiaobo Li,et al.  Partial encryption of compressed images and videos , 2000, IEEE Trans. Signal Process..

[28]  Andreas Uhl,et al.  Visual quality indices and lowquality images , 2010, 2010 2nd European Workshop on Visual Information Processing (EUVIP).

[29]  Sheila S. Hemami,et al.  Natural image utility assessment using image contours , 2009, 2009 16th IEEE International Conference on Image Processing (ICIP).

[30]  Sheila S. Hemami,et al.  VSNR: A Wavelet-Based Visual Signal-to-Noise Ratio for Natural Images , 2007, IEEE Transactions on Image Processing.

[31]  Heinz Hofbauer Visual evaluation, scaling and transport of secure videos , 2013 .

[32]  Eero P. Simoncelli,et al.  Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.

[33]  Shiguo Lian,et al.  Secure advanced video coding based on selective encryption algorithms , 2006, IEEE Trans. Consumer Electron..

[34]  Yongdong Zhang,et al.  Visual security evaluation for video encryption , 2010, ACM Multimedia.

[35]  Min Wu,et al.  Security evaluation for communication-friendly encryption of multimedia , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..