Image manipulation on social media for encryption-then-compression systems

Encryption-then-Compression (EtC) systems have been proposed to securely transmit images through an untrusted channel provider. In this paper, the EtC systems are applied to social media like Twitter, that are known for carrying out some image manipulation. Block scrambling-based encryption schemes used in the EtC systems are evaluated in terms of the robustness against image manipulation on social media. This work aims to investigate how each social networking service (SNS) provider manipulates images, and to consider whether the encrypted images uploaded to SNS providers can avoid to include some distortion under the image manipulation. In the experiment, encrypted and non-encrypted JPEG images are uploaded to various SNS providers to confirm the robustness of EtC systems. It is shown that the EtC systems are applicable to almost all SNS providers.

[1]  Xiaolong Li,et al.  A new lossy compression scheme for encrypted gray-scale images , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[2]  Kalyani G. Nimbokar,et al.  A Survey based on Designing an Efficient Image Encryption-then-Compression System , 2014 .

[3]  Xinpeng Zhang,et al.  Lossy Compression and Iterative Reconstruction for Encrypted Image , 2011, IEEE Transactions on Information Forensics and Security.

[4]  Hitoshi Kiya,et al.  Image matching between scrambled images for secure data management , 2008, 2008 16th European Signal Processing Conference.

[5]  Vinod M. Prabhakaran,et al.  On compressing encrypted data , 2004, IEEE Transactions on Signal Processing.

[6]  Wenjun Zeng,et al.  Efficient frequency domain selective scrambling of digital video , 2003, IEEE Trans. Multim..

[7]  Hitoshi Kiya,et al.  A new class of image registration for guaranteeing secure data management , 2008, 2008 15th IEEE International Conference on Image Processing.

[8]  Hitoshi Kiya,et al.  An encryption-then-compression system for JPEG standard , 2015, 2015 Picture Coding Symposium (PCS).

[9]  Sebastiano Battiato,et al.  Image Manipulation on Facebook for Forensics Evidence , 2015, ICIAP.

[10]  Sebastiano Battiato,et al.  A Classification Engine for Image Ballistics of Social Data , 2016, ICIAP.

[11]  Vijay Varadharajan,et al.  Apsipa Transactions on Signal and Information Processing Additional Services for Apsipa Transactions on Signal and Information Processing: Survey on Securing Data Storage in the Cloud , 2022 .

[12]  Stefan Katzenbeisser,et al.  Protection and Retrieval of Encrypted Multimedia Content: When Cryptography Meets Signal Processing , 2007, EURASIP J. Inf. Secur..

[13]  Hitoshi Kiya,et al.  On the security of block scrambling-based ETC systems against jigsaw puzzle solver attacks , 2017, 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[14]  Hitoshi Kiya,et al.  Security evaluation for block scrambling-based ETC systems against extended jigsaw puzzle solver attacks , 2017, 2017 IEEE International Conference on Multimedia and Expo (ICME).

[15]  Roberto Caldelli,et al.  Image Origin Classification Based on Social Network Provenance , 2017, IEEE Transactions on Information Forensics and Security.

[16]  Touradj Ebrahimi,et al.  Ultra-eye: UHD and HD images eye tracking dataset , 2014, 2014 Sixth International Workshop on Quality of Multimedia Experience (QoMEX).

[17]  William T. Freeman,et al.  A probabilistic image jigsaw puzzle solver , 2010, 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition.

[18]  Hitoshi Kiya,et al.  An Encryption-then-Compression System for JPEG/Motion JPEG Standard , 2015, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[19]  Mauro Barni,et al.  Encrypted signal processing for privacy protection: Conveying the utility of homomorphic encryption and multiparty computation , 2013, IEEE Signal Processing Magazine.

[20]  Hitoshi Kiya,et al.  An Encryption-then-Compression system for JPEG 2000 standard , 2015, 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[21]  Zhenjun Tang,et al.  Efficient image encryption with block shuffling and chaotic map , 2014, Multimedia Tools and Applications.

[22]  Hitoshi Kiya,et al.  An Encryption-then-Compression System for Lossless Image Compression Standards , 2017, IEICE Trans. Inf. Syst..

[23]  Hitoshi Kiya,et al.  One-Time Key Based Phase Scrambling for Phase-Only Correlation between Visually Protected Images , 2009, EURASIP J. Inf. Secur..

[24]  Gregory K. Wallace,et al.  The JPEG still picture compression standard , 1992 .

[25]  Wenjun Zeng,et al.  Efficient Compression of Encrypted Grayscale Images , 2010, IEEE Transactions on Image Processing.

[26]  Yuan Yan Tang,et al.  Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering and Random Permutation , 2014, IEEE Transactions on Information Forensics and Security.

[27]  Hitoshi Kiya,et al.  An encryption-then-compression system for JPEG XR standard , 2016, 2016 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB).