Image Manipulation Specifications on Social Networking Services for Encryption-then-Compression Systems

Encryption-then-Compression (EtC) systems have been proposed to securely transmit images through an untrusted channel provider. In this study, EtC systems were applied to social media like Twitter that carry out image manipulations. The block scrambling-based encryption schemes used in EtC systems were evaluated in terms of their robustness against image manipulation on social media. The aim was to investigate how five social networking service (SNS) providers, Facebook, Twitter, Google+, Tumblr and Flickr, manipulate images and to determine whether the encrypted images uploaded to SNS providers can avoid being distorted by such manipulations. In an experiment, encrypted and non-encrypted JPEG images were uploaded to various SNS providers. The results show that EtC systems are applicable to the five SNS providers.

[1]  Wenjun Zeng,et al.  Efficient frequency domain selective scrambling of digital video , 2003, IEEE Trans. Multim..

[2]  Hitoshi Kiya,et al.  An encryption-then-compression system for JPEG XR standard , 2016, 2016 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB).

[3]  Vijay Varadharajan,et al.  Apsipa Transactions on Signal and Information Processing Additional Services for Apsipa Transactions on Signal and Information Processing: Survey on Securing Data Storage in the Cloud , 2022 .

[4]  Hitoshi Kiya,et al.  On the Security of Block Scrambling-Based EtC Systems against Extended Jigsaw Puzzle Solver Attacks , 2018, IEICE Trans. Inf. Syst..

[5]  Roberto Caldelli,et al.  Image Origin Classification Based on Social Network Provenance , 2017, IEEE Transactions on Information Forensics and Security.

[6]  Kalyani G. Nimbokar,et al.  A Survey based on Designing an Efficient Image Encryption-then-Compression System , 2014 .

[7]  Gregory K. Wallace,et al.  The JPEG still picture compression standard , 1992 .

[8]  Wenjun Zeng,et al.  Efficient Compression of Encrypted Grayscale Images , 2010, IEEE Transactions on Image Processing.

[9]  Yuan Yan Tang,et al.  Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering and Random Permutation , 2014, IEEE Transactions on Information Forensics and Security.

[10]  Zhenjun Tang,et al.  Efficient image encryption with block shuffling and chaotic map , 2014, Multimedia Tools and Applications.

[11]  Hitoshi Kiya,et al.  An Encryption-then-Compression System for JPEG/Motion JPEG Standard , 2015, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[12]  Hitoshi Kiya,et al.  A new class of image registration for guaranteeing secure data management , 2008, 2008 15th IEEE International Conference on Image Processing.

[13]  Hitoshi Kiya,et al.  An encryption-then-compression system for JPEG standard , 2015, 2015 Picture Coding Symposium (PCS).

[14]  Mauro Barni,et al.  Encrypted signal processing for privacy protection: Conveying the utility of homomorphic encryption and multiparty computation , 2013, IEEE Signal Processing Magazine.

[15]  Sebastiano Battiato,et al.  A Classification Engine for Image Ballistics of Social Data , 2016, ICIAP.

[16]  Stefan Katzenbeisser,et al.  Protection and Retrieval of Encrypted Multimedia Content: When Cryptography Meets Signal Processing , 2007, EURASIP J. Inf. Secur..

[17]  Vinod M. Prabhakaran,et al.  On compressing encrypted data , 2004, IEEE Transactions on Signal Processing.

[18]  Hitoshi Kiya,et al.  An Encryption-then-Compression system for JPEG 2000 standard , 2015, 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[19]  Hitoshi Kiya,et al.  Image matching between scrambled images for secure data management , 2008, 2008 16th European Signal Processing Conference.

[20]  Sebastiano Battiato,et al.  Image Manipulation on Facebook for Forensics Evidence , 2015, ICIAP.

[21]  Hitoshi Kiya,et al.  An Encryption-then-Compression System for Lossless Image Compression Standards , 2017, IEICE Trans. Inf. Syst..

[22]  Hitoshi Kiya,et al.  On the security of block scrambling-based ETC systems against jigsaw puzzle solver attacks , 2017, 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[23]  Hitoshi Kiya,et al.  Security evaluation for block scrambling-based ETC systems against extended jigsaw puzzle solver attacks , 2017, 2017 IEEE International Conference on Multimedia and Expo (ICME).

[24]  Hitoshi Kiya,et al.  One-Time Key Based Phase Scrambling for Phase-Only Correlation between Visually Protected Images , 2009, EURASIP J. Inf. Secur..

[25]  Xinpeng Zhang,et al.  Lossy Compression and Iterative Reconstruction for Encrypted Image , 2011, IEEE Transactions on Information Forensics and Security.

[26]  Xiaolong Li,et al.  A new lossy compression scheme for encrypted gray-scale images , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[27]  Touradj Ebrahimi,et al.  Ultra-eye: UHD and HD images eye tracking dataset , 2014, 2014 Sixth International Workshop on Quality of Multimedia Experience (QoMEX).