Grayscale-Based Block Scrambling Image Encryption for Social Networking Services

This paper proposes a new block scrambling encryption scheme that enhances the security of encryption-then-compression (EtC) systems for JPEG images, which are used, for example, to securely transmit images through an untrusted channel provider. The proposed method allows the use of a smaller block size and a larger number of blocks than the conventional ones. Moreover, images encrypted using proposed scheme include less color information due to the use of grayscale even when the original image has three color channels. These features enhance security against various attacks such as jigsaw puzzle solver and brute-force attacks. The results of an experiment in which encrypted images were uploaded to and then downloaded from Twitter and Facebook demonstrated the effectiveness of the proposed scheme for EtC systems.

[1]  Wenjun Zeng,et al.  Efficient frequency domain selective scrambling of digital video , 2003, IEEE Trans. Multim..

[2]  Hitoshi Kiya,et al.  An Encryption-then-Compression System for JPEG/Motion JPEG Standard , 2015, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[3]  Mauro Barni,et al.  Encrypted signal processing for privacy protection: Conveying the utility of homomorphic encryption and multiparty computation , 2013, IEEE Signal Processing Magazine.

[4]  Wenjun Zeng,et al.  Efficient Compression of Encrypted Grayscale Images , 2010, IEEE Transactions on Image Processing.

[5]  Ayellet Tal,et al.  Solving multiple square jigsaw puzzles with missing pieces , 2015, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[6]  Dongdong Lin,et al.  Cryptanalyzing an Image-Scrambling Encryption Algorithm of Pixel Bits , 2016, IEEE MultiMedia.

[7]  Yuan Yan Tang,et al.  Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering and Random Permutation , 2014, IEEE Transactions on Information Forensics and Security.

[8]  Vijay Varadharajan,et al.  Apsipa Transactions on Signal and Information Processing Additional Services for Apsipa Transactions on Signal and Information Processing: Survey on Securing Data Storage in the Cloud , 2022 .

[9]  Vinod M. Prabhakaran,et al.  On compressing encrypted data , 2004, IEEE Transactions on Signal Processing.

[10]  Hitoshi Kiya,et al.  On the security of block scrambling-based image encryption including JPEG distorsion against jigsaw puzzle solver attacks , 2017, 2017 Eighth International Workshop on Signal Design and Its Applications in Communications (IWSDA).

[11]  Hitoshi Kiya,et al.  An Encryption-then-Compression System for Lossless Image Compression Standards , 2017, IEICE Trans. Inf. Syst..

[12]  Xiaolong Li,et al.  A new lossy compression scheme for encrypted gray-scale images , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[13]  Nathan S. Netanyahu,et al.  A Generalized Genetic Algorithm-Based Solver for Very Large Jigsaw Puzzles of Complex Types , 2014, AAAI.

[14]  Hitoshi Kiya,et al.  An encryption-then-compression system for JPEG XR standard , 2016, 2016 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB).

[15]  Touradj Ebrahimi,et al.  Ultra-eye: UHD and HD images eye tracking dataset , 2014, 2014 Sixth International Workshop on Quality of Multimedia Experience (QoMEX).

[16]  William T. Freeman,et al.  A probabilistic image jigsaw puzzle solver , 2010, 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition.

[17]  Hitoshi Kiya,et al.  One-Time Key Based Phase Scrambling for Phase-Only Correlation between Visually Protected Images , 2009, EURASIP J. Inf. Secur..

[18]  Hitoshi Kiya,et al.  On the security of block scrambling-based ETC systems against jigsaw puzzle solver attacks , 2017, 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[19]  Hitoshi Kiya,et al.  Security evaluation for block scrambling-based ETC systems against extended jigsaw puzzle solver attacks , 2017, 2017 IEEE International Conference on Multimedia and Expo (ICME).

[20]  Xinpeng Zhang,et al.  Lossy Compression and Iterative Reconstruction for Encrypted Image , 2011, IEEE Transactions on Information Forensics and Security.

[21]  Gabriel Taubin,et al.  PSQP: Puzzle Solving by Quadratic Programming , 2017, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[22]  David B. Cooper,et al.  Solving Square Jigsaw Puzzles with Loop Constraints , 2014, ECCV.

[23]  Nathan S. Netanyahu,et al.  An automatic solver for very large jigsaw puzzles using genetic algorithms , 2016, Genetic Programming and Evolvable Machines.

[24]  Hitoshi Kiya,et al.  A new class of image registration for guaranteeing secure data management , 2008, 2008 15th IEEE International Conference on Image Processing.

[25]  Hitoshi Kiya,et al.  An encryption-then-compression system for JPEG standard , 2015, 2015 Picture Coding Symposium (PCS).

[26]  Sebastiano Battiato,et al.  A Classification Engine for Image Ballistics of Social Data , 2016, ICIAP.

[27]  Stefan Katzenbeisser,et al.  Protection and Retrieval of Encrypted Multimedia Content: When Cryptography Meets Signal Processing , 2007, EURASIP J. Inf. Secur..

[28]  David B. Cooper,et al.  Solving Small-Piece Jigsaw Puzzles by Growing Consensus , 2016, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[29]  Andrew C. Gallagher Jigsaw puzzles with pieces of unknown orientation , 2012, 2012 IEEE Conference on Computer Vision and Pattern Recognition.

[30]  Kalyani G. Nimbokar,et al.  A Survey based on Designing an Efficient Image Encryption-then-Compression System , 2014 .

[31]  Hitoshi Kiya,et al.  Image matching between scrambled images for secure data management , 2008, 2008 16th European Signal Processing Conference.

[32]  Hitoshi Kiya,et al.  Image manipulation on social media for encryption-then-compression systems , 2017, 2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC).

[33]  Sebastiano Battiato,et al.  Image Manipulation on Facebook for Forensics Evidence , 2015, ICIAP.

[34]  Hitoshi Kiya,et al.  An Encryption-then-Compression system for JPEG 2000 standard , 2015, 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).