Joint image encryption and compression schemes based on 16 × 16 DCT

Abstract Joint image encryption and compression schemes have shown their great potential values in protecting compressed images. To achieve the protection, a trade-off between encryption power and compression ability needs to be considered. In this paper, we propose two new joint encryption and compression schemes, where one scheme emphasizes compression performance, another highlights protection performance. For a given plain-image, we first raster scan it into non-overlapping 16  ×  16 blocks, then apply various encryption techniques to it. In the first scheme, encryption operations are conducted at the transformation stage and quantization stage of JPEG. As for the second scheme, we add the run/size and value (RSV) pairs’ shuffling operation at JPEG’s entropy coding stage after first scheme’s encryption operations. Performance evaluations using various criteria are conducted to show that the first scheme has better compression efficiency, while the second scheme has better defense ability against the statistical attack.

[1]  Shuyuan Zhu,et al.  Design of New Unitary Transforms for Perceptual Video Encryption , 2011, IEEE Transactions on Circuits and Systems for Video Technology.

[2]  Osama S. Faragallah Efficient confusion–diffusion chaotic image cryptosystem using enhanced standard map , 2015, Signal Image Video Process..

[3]  Balasubramanian Raman,et al.  Combinational domain encryption for still visual data , 2011, Multimedia Tools and Applications.

[4]  A. Jantan,et al.  An Image Encryption Approach Using a Combination of Permutation Technique Followed by Encryption , 2008 .

[5]  Christophe De Vleeschouwer,et al.  Overview on Selective Encryption of Image and Video: Challenges and Perspectives , 2008, EURASIP J. Inf. Secur..

[6]  Sen Bai,et al.  A new security solution to JPEG using hyper-chaotic system and modified zigzag scan coding , 2015, Commun. Nonlinear Sci. Numer. Simul..

[7]  Shuyuan Zhu,et al.  Partial Video Encryption Based on Alternating Transforms , 2009, IEEE Signal Processing Letters.

[8]  Moncef Gabbouj,et al.  Perceptual Encryption of H.264 Videos: Embedding Sign-Flips Into the Integer-Based Transforms , 2014, IEEE Transactions on Information Forensics and Security.

[9]  Oscar C. Au,et al.  Security Analysis of Multimedia Encryption Schemes Based on Multiple Huffman Table , 2007, IEEE Signal Processing Letters.

[10]  Kavitha Chandranbabu,et al.  Crypt analysis of an image encryption algorithm and an enhanced scheme , 2016 .

[11]  A. Bovik,et al.  A universal image quality index , 2002, IEEE Signal Processing Letters.

[12]  Hang Zhou,et al.  Separable Reversible Data Hiding in Encrypted JPEG Bitstreams , 2018, IEEE Transactions on Dependable and Secure Computing.

[13]  Hitoshi Kiya,et al.  On the security of block scrambling-based ETC systems against jigsaw puzzle solver attacks , 2017, 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[14]  Yuan Yan Tang,et al.  Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering and Random Permutation , 2014, IEEE Transactions on Information Forensics and Security.

[15]  Zhenxing Qian,et al.  Reversible Data Hiding in Encrypted JPEG Bitstream , 2014, IEEE Transactions on Multimedia.

[16]  Gerald Schaefer,et al.  UCID: an uncompressed color image database , 2003, IS&T/SPIE Electronic Imaging.

[17]  Hitoshi Kiya,et al.  An encryption-then-compression system for JPEG standard , 2015, 2015 Picture Coding Symposium (PCS).

[18]  K. P. Subbalakshmi,et al.  Cryptanalysis of Some Multimedia Encryption Schemes , 2008, IEEE Transactions on Multimedia.

[19]  Hitoshi Kiya,et al.  An Encryption-then-Compression System for JPEG/Motion JPEG Standard , 2015, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[20]  Z. Guan,et al.  Chaos-based image encryption algorithm ✩ , 2005 .

[21]  Shiguo Lian,et al.  Multimedia Content Encryption: Techniques and Applications , 2008 .

[22]  Shuyuan Zhu,et al.  Perceptual video encryption using multiple 8×8 transforms in H.264 and MPEG-4 , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[23]  Kwok-Tung Lo,et al.  A Content-Adaptive Joint Image Compression and Encryption Scheme , 2018, IEEE Transactions on Multimedia.

[24]  Abhijit Mitra,et al.  A New Image Encryption Approach using Combinational Permutation Techniques , 2008 .

[25]  Kiyoshi Tanaka,et al.  Beyond format-compliant encryption for JPEG image , 2015, Signal Process. Image Commun..

[26]  Weihai Li,et al.  A leak and its remedy in JPEG image encryption , 2007, Int. J. Comput. Math..

[27]  Kwok-Tung Lo,et al.  Joint image compression and encryption based on alternating transforms with quality control , 2015, 2015 Visual Communications and Image Processing (VCIP).

[28]  Kwok-Tung Lo,et al.  Joint image compression and encryption based on order-8 alternating transforms , 2017, J. Vis. Commun. Image Represent..

[29]  Manish Kumar,et al.  An RGB image encryption using diffusion process associated with chaotic map , 2015, J. Inf. Secur. Appl..

[30]  Nikolaos G. Bourbakis,et al.  Image and video encryption using SCAN patterns , 2004, Pattern Recognit..

[31]  P. S. Avadhani,et al.  Permutation based Image Encryption Technique , 2011 .

[32]  C.-C. Jay Kuo,et al.  Design of integrated multimedia compression and encryption systems , 2005, IEEE Transactions on Multimedia.

[33]  Guanrong Chen,et al.  YET ANOTHER CHAOTIC ATTRACTOR , 1999 .

[34]  Shaoming Pan,et al.  A content security protection scheme in JPEG compressed domain , 2014, J. Vis. Commun. Image Represent..

[35]  Di Xiao,et al.  GLS coding based security solution to JPEG with the structure of aggregated compression and encryption , 2014, Commun. Nonlinear Sci. Numer. Simul..

[36]  Kun He,et al.  Robust and Secure Image Encryption Schemes During JPEG Compression Process , 2016, IMAWM.