Joint image compression and encryption based on order-8 alternating transforms

A joint image compression and encryption scheme based on JPEG is proposed.Encryption is mainly realized at JPEGs transformation stage.The scheme is format compliant to JPEG with tunable encryption parameters.Good encryption and compression performances can be achieved simultaneously. In this paper, we propose a novel joint image compression and encryption scheme based on JPEG standard. We realize image encryption at JPEGs transformation stage. Instead of only using 88 discrete cosine transform (DCT) for transformation, we generate new orthogonal transforms by embedding an extra rotation angle of to different stages butterflies in 88 DCTs flow-graph, and then apply them alternatively for transformation according to a predefined secret key. By carefully controlling the number of rotation angles embedded, the quality control of encrypted images can also be achieved. The encryption algorithm is further enhanced by performing block permutation before the entropy encoding stage. Extensive experiments have been conducted to show the good protection and compression performance of our encryption schemes. Finally, a detailed security analysis is provided to show the encryption schemes resistance to various cryptanalysis methods, such as brute-force attack, key sensitivity analysis, replacement attack and statistical attack.

[1]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice,Second Edition , 2002 .

[2]  Shuyuan Zhu,et al.  Perceptual video encryption using multiple 8×8 transforms in H.264 and MPEG-4 , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[3]  Christophe De Vleeschouwer,et al.  Overview on Selective Encryption of Image and Video: Challenges and Perspectives , 2008, EURASIP J. Inf. Secur..

[4]  R. A. Fisher,et al.  Statistical Tables for Biological, Agricultural and Medical Research , 1956 .

[5]  Balasubramanian Raman,et al.  Combinational domain encryption for still visual data , 2011, Multimedia Tools and Applications.

[6]  Lei Tang,et al.  Methods for encrypting and decrypting MPEG video data efficiently , 1997, MULTIMEDIA '96.

[7]  A. Nag,et al.  Image encryption using affine transform and XOR operation , 2011, 2011 International Conference on Signal Processing, Communication, Computing and Networking Technologies.

[8]  Shuyuan Zhu,et al.  Design of New Unitary Transforms for Perceptual Video Encryption , 2011, IEEE Transactions on Circuits and Systems for Video Technology.

[9]  Nenghai Yu,et al.  A robust chaos-based image encryption scheme , 2009, 2009 IEEE International Conference on Multimedia and Expo.

[10]  Abhijit Mitra,et al.  A New Image Encryption Approach using Combinational Permutation Techniques , 2008 .

[11]  C. Chui,et al.  A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .

[12]  Shuyuan Zhu,et al.  Partial Video Encryption Based on Alternating Transforms , 2009, IEEE Signal Processing Letters.

[13]  Wen-Hsiung Chen,et al.  A Fast Computational Algorithm for the Discrete Cosine Transform , 1977, IEEE Trans. Commun..

[14]  Moncef Gabbouj,et al.  Perceptual Encryption of H.264 Videos: Embedding Sign-Flips Into the Integer-Based Transforms , 2014, IEEE Transactions on Information Forensics and Security.

[15]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[16]  Sos S. Agaian,et al.  Logical Transform based encryption for multimedia systems , 2010, 2010 IEEE International Conference on Systems, Man and Cybernetics.

[17]  P. S. Avadhani,et al.  Permutation based Image Encryption Technique , 2011 .

[18]  C.-C. Jay Kuo,et al.  Fast encryption methods for audiovisual data confidentiality , 2001, SPIE Optics East.

[19]  C.-C. Jay Kuo,et al.  Design of integrated multimedia compression and encryption systems , 2005, IEEE Transactions on Multimedia.

[20]  Marc Van Droogenbroeck,et al.  Techniques for a selective encryption of uncompressed and compressed images , 2002 .

[21]  Aman Jantan,et al.  Image Encryption Using Block-Based Transformation Algorithm , 2008 .

[22]  Bruce Schneier,et al.  Applied cryptography : protocols, algorithms, and source codein C , 1996 .

[23]  Klara Nahrstedt,et al.  Is MPEG encryption by using random list instead of zigzag order secure? , 1997, ISCE '97. Proceedings of 1997 IEEE International Symposium on Consumer Electronics (Cat. No.97TH8348).

[24]  Majid Naderi,et al.  Encryption of multimedia content in partial encryption scheme of DCT transform coefficients using a lightweight stream algorithm , 2013 .

[25]  Shiguo Lian,et al.  Multimedia Content Encryption: Techniques and Applications , 2008 .

[26]  C.-C. Jay Kuo,et al.  Efficient multimedia encryption via entropy codec design , 2001, IS&T/SPIE Electronic Imaging.

[27]  Rodney Thayer,et al.  A Stream Cipher Encryption Algorithm 'Arcfour' , 1999 .

[28]  Aman Jantan,et al.  Image Encryption Using Block-Based Transformation Algorithm: Image Encryption and Decryption Process Using Block-Based Transformation Algorithm , 2011 .