A new encryption-then-compression algorithm using the rate-distortion optimization

Compressing the encrypted data remains a challenging task in many service-oriented scenarios like distributed processing and cloud computing. This paper presents a new encryption-then-compression scheme using the rate-distortion optimization. The original image is first decomposed via the lifting scheme (LS) into a wavelet pyramid, and the coarsest and detail subbands are then encrypted with the stream and permutation ciphers, respectively. The encrypted coarsest subband is compressed using a lossless technique by the third party like network or storage service providers, while the scrambled detail subbands are compressed through the successive quantization and adaptive arithmetic coding (AC), in which quantization steps are optimized with the rate-distortion theory. Upon receiving the encrypted and compressed sequence, the receiver conducts the sequential decompression, decryption, and inverse LS to reconstruct the original image. Security analysis shows that the proposed method is able to achieve a reasonable high-level security. Experimental simulations demonstrate that the proposed scheme has a low computational cost, and it outperforms the pixel-domain permutation-based prior art and obtains the rate-distortion performance comparable to the conventional JPEG with original, unencrypted images as input. We propose an encryption-then-compression scheme using the lifting scheme.We obtain the optimum quantization step via the rate-distortion optimization.The proposed scheme outperforms the pixel-domain permutation-based prior art.It obtains the rate-distortion performance comparable to the conventional JPEG.The developed scheme has a low computational cost.

[1]  Anamitra Makur,et al.  Distributed source coding based encryption and lossless compression of gray scale and color images , 2008, 2008 IEEE 10th Workshop on Multimedia Signal Processing.

[2]  Xiaolong Li,et al.  A new lossy compression scheme for encrypted gray-scale images , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[3]  Vinod M. Prabhakaran,et al.  On compressing encrypted data , 2004, IEEE Transactions on Signal Processing.

[4]  Hugo Krawczyk,et al.  On Compression of Data Encrypted with Block Ciphers , 2009, DCC.

[5]  Xinpeng Zhang,et al.  Lossy Compression and Iterative Reconstruction for Encrypted Image , 2011, IEEE Transactions on Information Forensics and Security.

[6]  Yuan Yan Tang,et al.  Scalable Compression of Stream Cipher Encrypted Images Through Context-Adaptive Sampling , 2014, IEEE Transactions on Information Forensics and Security.

[7]  Toby Berger,et al.  Rate distortion theory : a mathematical basis for data compression , 1971 .

[8]  E.J. Candes,et al.  An Introduction To Compressive Sampling , 2008, IEEE Signal Processing Magazine.

[9]  Chuohao Yeo,et al.  Toward Compression of Encrypted Images and Video Sequences , 2008, IEEE Transactions on Information Forensics and Security.

[10]  Nan Liu,et al.  Compressing Encrypted Data and Permutation Cipher , 2014, ArXiv.

[11]  Y. Sermadevi,et al.  Convexity results for a predictive video coder , 2004, Conference Record of the Thirty-Eighth Asilomar Conference on Signals, Systems and Computers, 2004..

[12]  Xiaochun Cao,et al.  Performing scalable lossy compression on pixel encrypted images , 2013, EURASIP Journal on Image and Video Processing.

[13]  David L Donoho,et al.  Compressed sensing , 2006, IEEE Transactions on Information Theory.

[14]  I. Daubechies,et al.  Factoring wavelet transforms into lifting steps , 1998 .

[15]  Zhenxing Qian,et al.  Compressing Encrypted Images With Auxiliary Information , 2014, IEEE Transactions on Multimedia.

[16]  Zhenxing Qian,et al.  Compressing Encrypted Image Using Compressive Sensing , 2011, 2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[17]  Wenjun Zeng,et al.  Efficient Compression of Encrypted Grayscale Images , 2010, IEEE Transactions on Image Processing.

[18]  Yuan Yan Tang,et al.  Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering and Random Permutation , 2014, IEEE Transactions on Information Forensics and Security.

[19]  Laura Igual,et al.  Robust gait-based gender classification using depth cameras , 2013, EURASIP Journal on Image and Video Processing.

[20]  Kannan Ramchandran,et al.  On Compression of Encrypted Images , 2006, 2006 International Conference on Image Processing.

[21]  Xinpeng Zhang,et al.  Compression of encrypted images with multi-layer decomposition , 2013, Multimedia Tools and Applications.

[22]  Nan Liu,et al.  Compressing encrypted data: A permutation approach , 2012, 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[23]  Zhenxing Qian,et al.  Scalable Coding of Encrypted Images , 2012, IEEE Trans. Image Process..

[24]  Kannan Ramchandran,et al.  On Blind Compression of Encrypted Correlated Data Approaching The Source Entropy Rate , 2005 .

[25]  Wim Sweldens,et al.  The lifting scheme: a construction of second generation wavelets , 1998 .

[26]  Mauro Barni,et al.  Lossless compression of encrypted grey-level and color images , 2008, 2008 16th European Signal Processing Conference.

[27]  K. Ramchandran,et al.  Distributed source coding using syndromes (DISCUS): design and construction , 1999, Proceedings DCC'99 Data Compression Conference (Cat. No. PR00096).

[28]  Stefan Katzenbeisser,et al.  Protection and Retrieval of Encrypted Multimedia Content: When Cryptography Meets Signal Processing , 2007, EURASIP J. Inf. Secur..