Skip to main content

Transparent Image Encryption Using Progressive JPEG

  • Conference paper
Information Security (ISC 2006)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4176))

Included in the following conference series:

Abstract

Many application scenarios do not demand confidential encryption of visual data, but on the contrary require that certain image information is public (transparent encryption). One scenario is e.g., Pay-TV, where a low quality version should become public to attract possible customers. Transparent encryption can be implemented most efficiently in case of scalable bitstreams by encrypting enhancement layer data and baseline JPEG is therefore not well suited for designing such encryption schemes in an efficient manner. This paper investigates how transparent encryption can be realized through selective encryption of the progressive JPEG modes. The traditional approach which encrypts enhancement layers starting at the end of the bitstream suffers from high computational load. Encryption schemes with significantly reduced encryption effort are shown to deliver equivalent image quality and security.

The work described in this paper is partially supported by the Austrain Science Fund, project no. 15170 and by the Austrian Grid Project, funded by the Austrian BMBWK (Federal Ministry for Education, Science and Culture) under contract GZ 4003/2-VI/4c/2004.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bodo, Y., Laurent, N., Degelay, J.-L.: A scrambling method based on disturbance of motion vector. In: Proceedings of ACM Multimedia 2002, Juan Le Pins, France, December 2003, pp. 89–90 (2003)

    Google Scholar 

  2. Cheng, H., Li, X.: On the application of image decomposition to image compression and encryption. In: Horster, P. (ed.) Communications and Multimedia Security II, IFIP TC6/TC11 Second Joint Working Conference on Communications and Multimedia Security, CMS 1996, Essen, Germany, pp. 116–127. Chapman & Hall, Boca Raton (September 1996)

    Google Scholar 

  3. Dittmann, J., Steinmetz, R.: Enabling technology for the trading of MPEG-encoded video. In: Mu, Y., Pieprzyk, J.P., Varadharajan, V. (eds.) ACISP 1997. LNCS, vol. 1270, pp. 314–324. Springer, Heidelberg (1997)

    Chapter  Google Scholar 

  4. Dittmann, J., Steinmetz, R.: A technical approach to the transparent encryption of MPEG-2 video. In: Katsikas, S.K. (ed.) Communications and Multimedia Security, IFIP TC6/TC11 Third Joint Working Conference, CMS 1997, Athens, Greece, September 1997, pp. 215–226. Chapman and Hall, Boca Raton (1997)

    Google Scholar 

  5. Van Droogenbroeck, M.: Partial encryption of images for real-time applications. In: Proceedings of the 4th 2004 Benelux Signal Processing Symposium, Hilvarenbeek, The Netherlands (April 2004), pp. 11–15 (2004)

    Google Scholar 

  6. Van Droogenbroeck, M., Benedett, R.: Techniques for a selective encryption of uncompressed and compressed images. In: Proceedings of ACIVS (Advanced Concepts for Intelligent Vision Systems), Ghent University, Belgium, pp. 90–97 (September 2002)

    Google Scholar 

  7. Fisch, M.M., Stögner, H., Uhl, A.: Layered encryption techniques for DCT-coded visual data. In: Proceedings (CD-ROM) of the European Signal Processing Conference, EUSIPCO 2004, Vienna, Austria (September 2004) (paper cr1361)

    Google Scholar 

  8. Kunkelmann, T., Horn, U.: Partial video encryption based on scalable coding. In: 5th International Workshop on Systems, Signals and Image Processing (IWSSIP 1998), Zagreb, Croatia, pp. 215–218 (1998)

    Google Scholar 

  9. Kunkelmann, T.: Applying encryption to video communication. In: Proceedings of the Multimedia and Security Workshop at ACM Multimedia 1998, Bristol, England, pp. 41–47 (1998)

    Google Scholar 

  10. Macq, B., Quisquater, J.J.: Digital images multiresolution encryption. The Journal of the Interactive Multimedia Association Intellectual Property Project 1(1), 179–206 (1994)

    Google Scholar 

  11. Macq, B.M., Quisquater, J.-J.: Cryptology for digital TV broadcasting. Proceedings of the IEEE 83(6), 944–957 (1995)

    Article  Google Scholar 

  12. Mao, Y., Wu, M.: Security evaluation for communication-friendly encryption of multimedia. In: Proceedings of the IEEE International Conference on Image Processing (ICIP 2004), Singapore, IEEE Signal Processing Society (October 2004)

    Google Scholar 

  13. Pennebaker, W.B., Mitchell, J.L.: JPEG – Still image compression standard, Van Nostrand Reinhold, New York (1993)

    Google Scholar 

  14. Podesser, M., Schmidt, H.-P., Uhl, A.: Selective bitplane encryption for secure transmission of image data in mobile environments. In: CD-ROM Proceedings of the 5th IEEE Nordic Signal Processing Symposium (NORSIG 2002), Tromso-Trondheim, Norway, IEEE Norway Section. file cr1037.pdf (October 2002)

    Google Scholar 

  15. Stütz, T., Uhl, A.: Image confidentiality using progressive JPEG. In: Proceedings of Fifth International Conference on Information, Communication and Signal Processing, ICICS 2005, Bangkok, Thailand, pp. 1107–1111 (December 2005)

    Google Scholar 

  16. Uhl, A., Obermair, C.: Transparent encryption of JPEG2000 bitstreams. In: Podhradsky, P., et al. (eds.) Proceedings EC-SIP-M 2005 (5th EURASIP Conference focused on Speech and Image Processing, Multimedia Communications and Services), Smolenice, Slovak Republic, pp. 322–327 (2005)

    Google Scholar 

  17. Uhl, A., Pommer, A.: Image and Video Encryption. From Digital Rights Management to Secured Personal Communication. Advances in Information Security, vol. 15. Springer, Heidelberg (2005)

    MATH  Google Scholar 

  18. Wen, J., Severa, M., Zeng, W., Luttrell, M., Jin, W.: A format-compliant configurable encryption framework for access control of video. IEEE Transactions on Circuits and Systems for Video Technology 12(6), 545–557 (2002)

    Article  Google Scholar 

  19. Yuan, C., Zhu, B.B., Su, M., Wang, Y., Li, S., Zhong, Y.: Layered access control for MPEG-4 FGS. In: Proceedings of the IEEE International Conference on Image Processing (ICIP 2003), Barcelona, Spain (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Stütz, T., Uhl, A. (2006). Transparent Image Encryption Using Progressive JPEG. In: Katsikas, S.K., López, J., Backes, M., Gritzalis, S., Preneel, B. (eds) Information Security. ISC 2006. Lecture Notes in Computer Science, vol 4176. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11836810_21

Download citation

  • DOI: https://doi.org/10.1007/11836810_21

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-38341-3

  • Online ISBN: 978-3-540-38343-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics