Region of interest signalling for encrypted JPEG images

We propose and evaluate different methods to signal position and size of encrypted RoIs (Regions of Interest) in JPEG images. After discussing various design choices regarding the encoding of RoI coordinates with a minimal amount of bits, we discuss both, existing and newly proposed approaches to signal the encoded coordinates inside JPEG images. By evaluating the different signalling methods on various data sets, we show that several of our proposed encoding methods outperform JBIG in this special use case. Furthermore, we show that one of our proposed signalling methods allows length-preserving lossless signalling, i.e., storing RoI coordinates in a format-compliant way inside the JPEG images without quality loss or change of file size.

[1]  Itu-T and Iso Iec Jtc Advanced video coding for generic audiovisual services , 2010 .

[2]  Jessica J. Fridrich,et al.  Steganalysis of JPEG Images: Breaking the F5 Algorithm , 2002, Information Hiding.

[3]  Tomás Pevný,et al.  Statistically undetectable jpeg steganography: dead ends challenges, and opportunities , 2007, MM&Sec.

[4]  Heiko Schwarz,et al.  Context-based adaptive binary arithmetic coding in the H.264/AVC video compression standard , 2003, IEEE Trans. Circuits Syst. Video Technol..

[5]  Aamir Saeed Malik,et al.  On Perceptual Encryption: Variants of DCT Block Scrambling Scheme for JPEG Compressed Images , 2010, FGIT-SIP/MulGraB.

[6]  Georgios Kalogridis,et al.  Smart Grid Privacy via Anonymization of Smart Metering Data , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[7]  Ian H. Witten,et al.  Arithmetic coding for data compression , 1987, CACM.

[8]  Lih-Chyau Wuu,et al.  High Embedding Reversible Data Hiding Scheme for JPEG , 2010, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[9]  Andreas Westfeld,et al.  F5-A Steganographic Algorithm , 2001, Information Hiding.

[10]  Andreas Uhl,et al.  Length-preserving bit-stream-based JPEG encryption , 2012, MM&Sec '12.

[11]  Michael D. Adams The JPEG-2000 Still Image Compression Standard � ( Last Revised : June 30 , 2001 ) , 2001 .

[12]  Ping-Sing Tsai,et al.  JPEG: Still Image Compression Standard , 2005 .

[13]  Touradj Ebrahimi,et al.  The JPEG 2000 still image compression standard , 2001, IEEE Signal Process. Mag..

[14]  Dominik Engel,et al.  Methods for the anisotropic wavelet packet transform , 2008 .

[15]  C. Kailasanathan,et al.  Compression performance of JPEG encryption scheme , 2002, 2002 14th International Conference on Digital Signal Processing Proceedings. DSP 2002 (Cat. No.02TH8628).

[16]  Kevin Curran,et al.  Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..

[17]  Prashant J. Shenoy,et al.  Private memoirs of a smart meter , 2010, BuildSys '10.

[18]  Gregory K. Wallace,et al.  The JPEG Still Image Compression Standard , 1991 .

[19]  Dominik Engel Conditional access smart meter privacy based on multi-resolution wavelet analysis , 2011, ISABEL '11.

[20]  Chia-Chen Lin,et al.  DCT-based Reversible Data Hiding Scheme , 2010 .

[21]  Hari Kalva,et al.  Compression Independent Reversible Encryption for Privacy in Video Surveillance , 2009, EURASIP J. Inf. Secur..

[22]  Alan C. Bovik,et al.  A Statistical Evaluation of Recent Full Reference Image Quality Assessment Algorithms , 2006, IEEE Transactions on Image Processing.

[23]  Andreas Westfeld,et al.  F5—A Steganographic Algorithm High Capacity Despite Better Steganalysis , 2001 .

[24]  T.E. Boult,et al.  PICO: Privacy through Invertible Cryptographic Obscuration , 2005, Computer Vision for Interactive and Intelligent Environment (CVIIE'05).