Comprehensive Analysis of Compressible Perceptual Encryption Methods—Compression and Encryption Perspectives

Perceptual encryption (PE) hides the identifiable information of an image in such a way that its intrinsic characteristics remain intact. This recognizable perceptual quality can be used to enable computation in the encryption domain. A class of PE algorithms based on block-level processing has recently gained popularity for their ability to generate JPEG-compressible cipher images. A tradeoff in these methods, however, is between the security efficiency and compression savings due to the chosen block size. Several methods (such as the processing of each color component independently, image representation, and sub-block-level processing) have been proposed to effectively manage this tradeoff. The current study adapts these assorted practices into a uniform framework to provide a fair comparison of their results. Specifically, their compression quality is investigated under various design parameters, such as the choice of colorspace, image representation, chroma subsampling, quantization tables, and block size. Our analyses have shown that at best the PE methods introduce a decrease of 6% and 3% in the JPEG compression performance with and without chroma subsampling, respectively. Additionally, their encryption quality is quantified in terms of several statistical analyses. The simulation results show that block-based PE methods exhibit several favorable properties for the encryption-then-compression schemes. Nonetheless, to avoid any pitfalls, their principal design should be carefully considered in the context of the applications for which we outlined possible future research directions.

[1]  Ijaz Ahmad,et al.  Perceptual Encryption-based Privacy-Preserving Deep Learning for Medical Image Analysis , 2023, 2023 International Conference on Information Networking (ICOIN).

[2]  Ijaz Ahmad,et al.  Perceptual Encryption-based Privacy-Preserving Deep Learning in Internet of Things Applications , 2022, 2022 13th International Conference on Information and Communication Technology Convergence (ICTC).

[3]  Ijaz Ahmad,et al.  IIB–CPE: Inter and Intra Block Processing-Based Compressible Perceptual Encryption Method for Privacy-Preserving Deep Learning , 2022, Sensors.

[4]  H. Kiya,et al.  A Reversible Data-Hiding Method with Prediction-Error Expansion in Compressible Encrypted Images , 2022, Applied Sciences.

[5]  Ijaz Ahmad,et al.  A Perceptual Encryption-Based Image Communication System for Deep Learning-Based Tuberculosis Diagnosis Using Healthcare Cloud Services , 2022, Electronics.

[6]  Suk-seung Hwang,et al.  Privacy-Preserving Surveillance for Smart Cities , 2022, 2022 Thirteenth International Conference on Ubiquitous and Future Networks (ICUFN).

[7]  Takeshi Koshiba,et al.  Chaotic Image Encryption: State-of-the-Art, Ecosystem, and Future Roadmap , 2022, Applied System Innovation.

[8]  H. Kiya,et al.  Privacy-Preserving Image Classification Using an Isotropic Network , 2022, IEEE MultiMedia.

[9]  H. Kiya,et al.  A Privacy-Preserving Image Retrieval Scheme with a Mixture of Plain and EtC Images , 2022, 2022 IEEE 4th Global Conference on Life Sciences and Technologies (LifeTech).

[10]  H. Kiya,et al.  An Overview of Compressible and Learnable Image Transformation with Secret Key and Its Applications , 2022, APSIPA Transactions on Signal and Information Processing.

[11]  Ijaz Ahmad,et al.  Encryption-then-Compression System for Cloud-based Medical Image Services , 2022, 2022 International Conference on Information Networking (ICOIN).

[12]  Hitoshi Kiya,et al.  A Reversible Data Hiding Method in Encrypted Images for Controlling Trade-Off between Hiding Capacity and Compression Efficiency , 2021, J. Imaging.

[13]  A. Alfalou,et al.  Privacy-Preserving Deep Neural Network Methods: Computational and Perceptual Methods—An Overview , 2021 .

[14]  Hitoshi Kiya,et al.  Privacy-preserving Image Retrieval Scheme Allowing Mixed Use of Lossless and JPEG Compressed Images , 2021, 2021 IEEE 3rd Global Conference on Life Sciences and Technologies (LifeTech).

[15]  Hitoshi Kiya,et al.  A Content-based Image Retrieval Scheme Using Compressible Encrypted Images , 2021, 2020 28th European Signal Processing Conference (EUSIPCO).

[16]  Ruifeng Li,et al.  A Scheme of Reversible Data Hiding for the Encryption-Then-Compression System , 2021, IEICE Trans. Inf. Syst..

[17]  Seokjoo Shin,et al.  A novel hybrid image encryption-compression scheme by combining chaos theory and number theory , 2021, Signal Process. Image Commun..

[18]  H. Kiya,et al.  Flexible Data Hiding and Extraction in EtC Images , 2020, 2020 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC).

[19]  H. Kiya,et al.  A Reversible Data Hiding Method in Compressible Encrypted Images , 2020, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[20]  Ijaz Ahmad,et al.  Region-based Selective Compression and Selective Encryption of Medical Images , 2020, SMA.

[21]  Kwok-Tung Lo,et al.  Survey on JPEG compatible joint image compression and encryption algorithms , 2020, IET Signal Process..

[22]  Hitoshi Kiya,et al.  A Privacy-Preserving Machine Learning Scheme Using EtC Images , 2020, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[23]  Somaia SerElkhetm,et al.  A Survey study on Joint Image Compression - Encryption Methods , 2020, 2020 International Conference on Innovative Trends in Communication and Computer Engineering (ITCE).

[24]  Hitoshi Kiya,et al.  Privacy-preserving machine learning using EtC images , 2019, Other Conferences.

[25]  H. Kiya,et al.  Image Identification of Encrypted JPEG Images for Privacy-Preserving Photo Sharing Services , 2019, IEICE Trans. Inf. Syst..

[26]  Hitoshi Kiya,et al.  Privacy-Preserving Content-Based Image Retrieval Using Compressible Encrypted Images , 2020, IEEE Access.

[27]  Hitoshi Kiya,et al.  Image Identification of Grayscale-Based JPEG Images for Privacy-Preserving Photo Sharing Services , 2019, 2019 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC).

[28]  Pratistha Mathur,et al.  Paradigms of Image Compression and Encryption: A Review , 2019, 2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT).

[29]  Hitoshi Kiya,et al.  An Image Identification Scheme Of Encrypted Jpeg Images For Privacy-Preserving Photo Sharing Services , 2019, 2019 IEEE International Conference on Image Processing (ICIP).

[30]  Chengqing Li,et al.  When an attacker meets a cipher-image in 2018: A Year in Review , 2019, J. Inf. Secur. Appl..

[31]  Hitoshi Kiya,et al.  Grayscale-based block scrambling image encryption using YCbCr color space for encryption-then-compression systems , 2019, APSIPA Transactions on Signal and Information Processing.

[32]  Hitoshi Kiya,et al.  Encryption-Then-Compression Systems Using Grayscale-Based Image Encryption for JPEG Images , 2018, IEEE Transactions on Information Forensics and Security.

[33]  Hitoshi Kiya,et al.  Image Manipulation Specifications on Social Networking Services for Encryption-then-Compression Systems , 2018, IEICE Trans. Inf. Syst..

[34]  Hitoshi Kiya,et al.  A Block-Permutation-Based Encryption Scheme with Independent Processing of RGB Components , 2018, IEICE Trans. Inf. Syst..

[35]  Hang Zhou,et al.  Separable Reversible Data Hiding in Encrypted JPEG Bitstreams , 2018, IEEE Transactions on Dependable and Secure Computing.

[36]  Hitoshi Kiya,et al.  Grayscale-Based Image Encryption Considering Color Sub-sampling Operation for Encryption-then-Compression Systems , 2018, 2018 IEEE 7th Global Conference on Consumer Electronics (GCCE).

[37]  Hitoshi Kiya,et al.  Security Evaluation for Block Scrambling-Based Image Encryption Including JPEG Distortion against Jigsaw Puzzle Solver Attacks , 2018, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[38]  Kwok-Tung Lo,et al.  A Content-Adaptive Joint Image Compression and Encryption Scheme , 2018, IEEE Transactions on Multimedia.

[39]  Bruno Carpentieri,et al.  Efficient Compression and Encryption for Digital Data Transmission , 2018, Secur. Commun. Networks.

[40]  Yong Zhang,et al.  Test and Verification of AES Used for Image Encryption , 2018 .

[41]  Hitoshi Kiya,et al.  Image manipulation on social media for encryption-then-compression systems , 2017, 2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC).

[42]  Masaaki Fujiyoshi,et al.  Encryption-then-Compression-Based Copyright- and Privacy-Protected Image Trading System , 2017, ICAIP.

[43]  Hitoshi Kiya,et al.  Block-Permutation-Based Encryption Scheme with Enhanced Color Scrambling , 2017, SCIA.

[44]  Hitoshi Kiya,et al.  An Encryption-then-Compression System for Lossless Image Compression Standards , 2017, IEICE Trans. Inf. Syst..

[45]  Hitoshi Kiya,et al.  An encryption-then-compression system for JPEG XR standard , 2016, 2016 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB).

[46]  Kun He,et al.  Robust and Secure Image Encryption Schemes During JPEG Compression Process , 2016, IMAWM.

[47]  Hitoshi Kiya,et al.  An Encryption-then-Compression System for JPEG/Motion JPEG Standard , 2015, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[48]  Hitoshi Kiya,et al.  A perceptual encryption scheme for Motion JPEG 2000 standard , 2015, 2015 15th International Symposium on Communications and Information Technologies (ISCIT).

[49]  Hitoshi Kiya,et al.  An encryption-then-compression system for JPEG standard , 2015, 2015 Picture Coding Symposium (PCS).

[50]  Sen Bai,et al.  A new security solution to JPEG using hyper-chaotic system and modified zigzag scan coding , 2015, Commun. Nonlinear Sci. Numer. Simul..

[51]  Hitoshi Kiya,et al.  An Encryption-then-Compression system for JPEG 2000 standard , 2015, 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[52]  Kiyoshi Tanaka,et al.  Beyond format-compliant encryption for JPEG image , 2015, Signal Process. Image Commun..

[53]  Stefan Jaeger,et al.  Two public chest X-ray datasets for computer-aided screening of pulmonary diseases. , 2014, Quantitative imaging in medicine and surgery.

[54]  Vijay Varadharajan,et al.  Apsipa Transactions on Signal and Information Processing Additional Services for Apsipa Transactions on Signal and Information Processing: Survey on Securing Data Storage in the Cloud , 2022 .

[55]  Xiaolong Li,et al.  A new lossy compression scheme for encrypted gray-scale images , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[56]  Zhenxing Qian,et al.  Reversible Data Hiding in Encrypted JPEG Bitstream , 2014, IEEE Transactions on Multimedia.

[57]  Zhenxing Qian,et al.  Compressing Encrypted Images With Auxiliary Information , 2014, IEEE Transactions on Multimedia.

[58]  Yuan Yan Tang,et al.  Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering and Random Permutation , 2014, IEEE Transactions on Information Forensics and Security.

[59]  Nicola Asuni,et al.  TESTIMAGES: a Large-scale Archive for Testing Visual Devices and Basic Image Processing Algorithms , 2014, STAG.

[60]  Xiaochun Cao,et al.  Performing scalable lossy compression on pixel encrypted images , 2013, EURASIP J. Image Video Process..

[61]  Andrew C. Gallagher Jigsaw puzzles with pieces of unknown orientation , 2012, 2012 IEEE Conference on Computer Vision and Pattern Recognition.

[62]  Xinpeng Zhang,et al.  Scalable Coding of Encrypted Images , 2012, IEEE Trans. Image Process..

[63]  Shuyuan Zhu,et al.  Perceptual video encryption using multiple 8×8 transforms in H.264 and MPEG-4 , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[64]  Xinpeng Zhang,et al.  Lossy Compression and Iterative Reconstruction for Encrypted Image , 2011, IEEE Transactions on Information Forensics and Security.

[65]  William T. Freeman,et al.  A probabilistic image jigsaw puzzle solver , 2010, 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition.

[66]  Wenjun Zeng,et al.  Efficient Compression of Encrypted Grayscale Images , 2010, IEEE Transactions on Image Processing.

[67]  Anamitra Makur,et al.  Distributed source coding based encryption and lossless compression of gray scale and color images , 2008, 2008 IEEE 10th Workshop on Multimedia Signal Processing.

[68]  Mauro Barni,et al.  Lossless compression of encrypted grey-level and color images , 2008, 2008 16th European Signal Processing Conference.

[69]  K. P. Subbalakshmi,et al.  Cryptanalysis of Some Multimedia Encryption Schemes , 2008, IEEE Transactions on Multimedia.

[70]  C.-C. Jay Kuo,et al.  Design of integrated multimedia compression and encryption systems , 2005, IEEE Transactions on Multimedia.

[71]  William Puech,et al.  Crypto-compression of medical images by selective encryption of DCT , 2005, 2005 13th European Signal Processing Conference.

[72]  Kannan Ramchandran,et al.  On blind compression of encrypted data approaching the source entropy rate , 2005, 2005 13th European Signal Processing Conference.

[73]  Vinod M. Prabhakaran,et al.  On compressing encrypted data , 2004, IEEE Transactions on Signal Processing.

[74]  Nikolaos G. Bourbakis,et al.  Image and video encryption using SCAN patterns , 2004, Pattern Recognit..

[75]  G. Bjontegaard,et al.  Calculation of Average PSNR Differences between RD-curves , 2001 .

[76]  Gregory K. Wallace,et al.  The JPEG still picture compression standard , 1991, CACM.

[77]  N. Ahmed,et al.  Discrete Cosine Transform , 1996 .