JPEG encryption for image rescaling in the encrypted domain

The JPEG encryption protocol is suitable for image rescaling in encrypted domain.Privacy of the original image can be preserved when transmitted to the server.The encrypted JPEG image can be rescaled by the service provider.On the recipient side, the rescaled image can be decrypted with good quality. This work proposes a novel protocol of encrypting the JPEG image suitable for image rescaling in the encrypted domain. To protect the privacy of original content, the image owner perturbs the texture and randomizes the structure of the JPEG image by enciphering the quantized Discrete Cosine Transform (DCT) coefficients. After receiving the encrypted JPEG image, the service provider generates a rescaled JPEG image by down-sampling the encrypted DCT coefficients. On the recipient side, the encrypted JPEG image rescaled by the service provider can be decrypted to a plaintext image with a lower resolution with the aid of encryption keys. Experimental results show that the proposed method has a good capability of rescaling the privacy-protected JPEG file.

[1]  Zhenxing Qian,et al.  Scalable Coding of Encrypted Images , 2012, IEEE Trans. Image Process..

[2]  Tung-Shou Chen,et al.  An Improved Reversible Data Hiding in Encrypted Images Using Side Match , 2012, IEEE Signal Processing Letters.

[3]  Xuelong Li,et al.  A local Tchebichef moments-based robust image watermarking , 2009, Signal Process..

[4]  Xinpeng Zhang,et al.  Separable Reversible Data Hiding in Encrypted Image , 2012, IEEE Transactions on Information Forensics and Security.

[5]  Wenjun Zeng,et al.  Efficient Compression of Encrypted Grayscale Images , 2010, IEEE Transactions on Image Processing.

[6]  Neri Merhav,et al.  Fast algorithms for DCT-domain image downsampling and for inverse motion compensation , 1997, IEEE Trans. Circuits Syst. Video Technol..

[7]  Mauro Barni,et al.  Encrypted signal processing for privacy protection: Conveying the utility of homomorphic encryption and multiparty computation , 2013, IEEE Signal Processing Magazine.

[8]  Stefan Katzenbeisser,et al.  Inspiring New Research in the Field of Signal Processing in the Encrypted Domain [From the Guest Editors] , 2013, IEEE Signal Process. Mag..

[9]  Nasir D. Memon,et al.  A buyer-seller watermarking protocol , 2001, IEEE Trans. Image Process..

[10]  Xinpeng Zhang,et al.  Lossy Compression and Iterative Reconstruction for Encrypted Image , 2011, IEEE Transactions on Information Forensics and Security.

[11]  Xinpeng Zhang,et al.  Reversible Data Hiding in Encrypted Image , 2011, IEEE Signal Processing Letters.

[12]  Vinod M. Prabhakaran,et al.  On compressing encrypted data , 2004, IEEE Transactions on Signal Processing.

[13]  Zhenxing Qian,et al.  Reversible Data Hiding in Encrypted JPEG Bitstream , 2014, IEEE Transactions on Multimedia.

[14]  Gerald Schaefer,et al.  UCID: an uncompressed color image database , 2003, IS&T/SPIE Electronic Imaging.

[15]  Xuelong Li,et al.  Geometric Distortion Insensitive Image Watermarking in Affine Covariant Regions , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[16]  Stefan Katzenbeisser,et al.  Protection and Retrieval of Encrypted Multimedia Content: When Cryptography Meets Signal Processing , 2007, EURASIP J. Inf. Secur..

[17]  Weiming Zhang,et al.  Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption , 2013, IEEE Transactions on Information Forensics and Security.

[18]  H. Vincent Poor,et al.  The Role of Signal Processing in Meeting Privacy Challenges: An Overview , 2013, IEEE Signal Processing Magazine.

[19]  Cynthia Dwork,et al.  Differential Privacy , 2006, ICALP.

[20]  Alessandro Piva,et al.  An efficient buyer-seller watermarking protocol based on composite signal representation , 2009, MM&Sec '09.