An objective visual security assessment for cipher-images based on local entropy

In recent years, many practical algorithms have been put forward for images and videos encryption. Security analysis on these encryption algorithms focuses research on cryptographic security, and few work relate to visual security. Visual security means that the encrypted video content is unintelligible to human vision. The higher visual security the encryption algorithm can provide, the less information an attacker from the cipher-images to obtain, the greater the difficulty of attack is. Therefore, visual security assessment for cipher-images is a very important indicator in security evaluation of visual media. So far, systematic research on visual security assessment for cipher-images is far from enough. Moreover, there are no practical objective indicators or evaluation methods on visual security have been proposed at present. According to the changes on image information entropy between cipher-images and original images, we present a visual security assessment algorithm based on local entropy. The experiments result shows that the scheme can provide an efficient objective assessment which is match up to subjective assessment, and is also suitable for security assessment of other selective encryption algorithms.

[1]  Thierry Pun,et al.  A new method for grey-level picture thresholding using the entropy of the histogram , 1980 .

[2]  Sankar K. Pal,et al.  Entropy: a new definition and its applications , 1991, IEEE Trans. Syst. Man Cybern..

[3]  Richard Mollin An introduction to cryptography , 2001, CRC Press series on discrete mathematics and its applications.

[4]  A. Bovik,et al.  OBJECTIVE VIDEO QUALITY ASSESSMENT , 2003 .

[5]  Alan C. Bovik,et al.  41 OBJECTIVE VIDEO QUALITY ASSESSMENT , 2003 .

[6]  Byeungwoo Jeon,et al.  Digital Video Scrambling Method Using Intra Prediction Mode , 2004, PCM.

[7]  Zhou Wang,et al.  Video quality assessment based on structural distortion measurement , 2004, Signal Process. Image Commun..

[8]  Bharat K. Bhargava,et al.  MPEG Video Encryption Algorithms , 2004, Multimedia Tools and Applications.

[9]  Byeungwoo Jeon,et al.  Digital Video Scrambling Using Motion Vector and Slice Relocation , 2005, ICIAR.

[10]  Shiguo Lian,et al.  Selective Video Encryption Based on Advanced Video Coding , 2005, PCM.

[11]  Wen Gao,et al.  H.264 video encryption scheme adaptive to DRM , 2006, IEEE Transactions on Consumer Electronics.

[12]  Sang Joon Kim,et al.  A Mathematical Theory of Communication , 2006 .

[13]  Richard A. Mollin,et al.  An Introduction to Cryptography, Second Edition (Discrete Mathematics and Its Applications) , 2006 .

[14]  Thomas Stütz,et al.  On efficient transparent jpeg2000 encryption , 2007, MM&Sec.

[15]  Shiguo Lian,et al.  Efficient video encryption scheme based on advanced video coding , 2007, Multimedia Tools and Applications.

[16]  Oscar C. Au,et al.  Security Analysis of Multimedia Encryption Schemes Based on Multiple Huffman Table , 2007, IEEE Signal Processing Letters.

[17]  Guanrong Chen,et al.  Cryptanalysis of an Image Scrambling Scheme Without Bandwidth Expansion , 2008, IEEE Transactions on Circuits and Systems for Video Technology.

[18]  Shiguo Lian,et al.  Multimedia Content Encryption: Techniques and Applications , 2008 .

[19]  Nikolaos G. Bourbakis,et al.  A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks , 2008, Signal Process. Image Commun..

[20]  Zhengquan Xu,et al.  Visual Security Assessment for Cipher-Images based on Neighborhood Similarity , 2009, Informatica.