An Encryption-then-Compression System for JPEG/Motion JPEG Standard

被引:73
作者
Kurihara, Kenta [1 ]
Kikuchi, Masanori [1 ]
Imaizumi, Shoko [2 ]
Shiota, Sayaka [1 ]
Kiya, Hitoshi [1 ]
机构
[1] Tokyo Metropolitan Univ, Fac Syst Design, Hino, Tokyo 1910065, Japan
[2] Chiba Univ, Grad Sch Adv Integrat Sci, Chiba 2638522, Japan
关键词
Encryption-then-Compression system; perceptual encryption; JPEG; color image; cryptographic hash function;
D O I
10.1587/transfun.E98.A.2238
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In many multimedia applications, image encryption has to be conducted prior to image compression. This paper proposes a JPEG-friendly perceptual encryption method, which enables to be conducted prior to JPEG and Motion JPEG compressions. The proposed encryption scheme can provides approximately the same compression performance as that of JPEG compression without any encryption, where both gray scale images and color ones are considered. It is also shown that the proposed scheme consists of four block-based encryption steps, and provide a reasonably high level of security. Most of conventional perceptual encryption schemes have not been designed for international compression standards, but this paper focuses on applying the JPEG and Motion JPEG standards, as one of the most widely used image compression standards. In addition, this paper considers an efficient key management scheme, which enables an encryption with multiple keys to be easy to manage its keys.
引用
收藏
页码:2238 / 2245
页数:8
相关论文
共 26 条
[1]  
[Anonymous], 2013, 1SC29WG1N6402 ISOIEC
[2]   Assessing JPEG2000 encryption with key-dependent wavelet packets [J].
Engel, Dominik ;
Stuetz, Thomas ;
Uhl, Andreas .
EURASIP JOURNAL ON INFORMATION SECURITY, 2012, 2012 (01)
[3]   A survey on JPEG2000 encryption [J].
Engel, Dominik ;
Stuetz, Thomas ;
Uhl, Andreas .
MULTIMEDIA SYSTEMS, 2009, 15 (04) :243-270
[4]   Encryption of composite multimedia contents for access control [J].
Fujiyoshi, Masaaki ;
Imaizumi, Shoko ;
Kiya, Hitoshi .
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2007, E90A (03) :590-596
[5]   Survey on securing data storage in the cloud [J].
Huang, Chun-Ting ;
Huang, Lei ;
Qin, Zhongyuan ;
Yuan, Hang ;
Zhou, Lan ;
Varadharajan, Vijay ;
Kuo, C. C. Jay .
APSIPA TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING, 2014, 3
[6]  
Imaizumi S., 2007, IM PROC 2007 ICIP 20, V2, pII
[7]   Efficient Collusion Attack-Free Access Control for Multidimensionally Hierarchical Scalability Content [J].
Imaizumi, Shoko ;
Fujiyoshi, Masaaki ;
Kiya, Hitoshi .
ISCAS: 2009 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS 1-5, 2009, :505-+
[8]   One-time key based phase scrambling for phase-only correlation between visually protected images [J].
Kiya H. ;
Ito I. .
EURASIP Journal on Information Security, 2009 (1)
[9]  
Ito I, 2008, IEEE IMAGE PROC, P269, DOI 10.1109/ICIP.2008.4711743
[10]   Biometric template security [J].
Jain, Anil K. ;
Nandakumar, Karthik ;
Nagar, Abhishek .
EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2008,