Abstract
Many application scenarios do not demand confidential encryption of visual data, but on the contrary require that certain image information is public (transparent encryption). One scenario is e.g., Pay-TV, where a low quality version should become public to attract possible customers. Transparent encryption can be implemented most efficiently in case of scalable bitstreams by encrypting enhancement layer data and baseline JPEG is therefore not well suited for designing such encryption schemes in an efficient manner. This paper investigates how transparent encryption can be realized through selective encryption of the progressive JPEG modes. The traditional approach which encrypts enhancement layers starting at the end of the bitstream suffers from high computational load. Encryption schemes with significantly reduced encryption effort are shown to deliver equivalent image quality and security.
The work described in this paper is partially supported by the Austrain Science Fund, project no. 15170 and by the Austrian Grid Project, funded by the Austrian BMBWK (Federal Ministry for Education, Science and Culture) under contract GZ 4003/2-VI/4c/2004.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Bodo, Y., Laurent, N., Degelay, J.-L.: A scrambling method based on disturbance of motion vector. In: Proceedings of ACM Multimedia 2002, Juan Le Pins, France, December 2003, pp. 89–90 (2003)
Cheng, H., Li, X.: On the application of image decomposition to image compression and encryption. In: Horster, P. (ed.) Communications and Multimedia Security II, IFIP TC6/TC11 Second Joint Working Conference on Communications and Multimedia Security, CMS 1996, Essen, Germany, pp. 116–127. Chapman & Hall, Boca Raton (September 1996)
Dittmann, J., Steinmetz, R.: Enabling technology for the trading of MPEG-encoded video. In: Mu, Y., Pieprzyk, J.P., Varadharajan, V. (eds.) ACISP 1997. LNCS, vol. 1270, pp. 314–324. Springer, Heidelberg (1997)
Dittmann, J., Steinmetz, R.: A technical approach to the transparent encryption of MPEG-2 video. In: Katsikas, S.K. (ed.) Communications and Multimedia Security, IFIP TC6/TC11 Third Joint Working Conference, CMS 1997, Athens, Greece, September 1997, pp. 215–226. Chapman and Hall, Boca Raton (1997)
Van Droogenbroeck, M.: Partial encryption of images for real-time applications. In: Proceedings of the 4th 2004 Benelux Signal Processing Symposium, Hilvarenbeek, The Netherlands (April 2004), pp. 11–15 (2004)
Van Droogenbroeck, M., Benedett, R.: Techniques for a selective encryption of uncompressed and compressed images. In: Proceedings of ACIVS (Advanced Concepts for Intelligent Vision Systems), Ghent University, Belgium, pp. 90–97 (September 2002)
Fisch, M.M., Stögner, H., Uhl, A.: Layered encryption techniques for DCT-coded visual data. In: Proceedings (CD-ROM) of the European Signal Processing Conference, EUSIPCO 2004, Vienna, Austria (September 2004) (paper cr1361)
Kunkelmann, T., Horn, U.: Partial video encryption based on scalable coding. In: 5th International Workshop on Systems, Signals and Image Processing (IWSSIP 1998), Zagreb, Croatia, pp. 215–218 (1998)
Kunkelmann, T.: Applying encryption to video communication. In: Proceedings of the Multimedia and Security Workshop at ACM Multimedia 1998, Bristol, England, pp. 41–47 (1998)
Macq, B., Quisquater, J.J.: Digital images multiresolution encryption. The Journal of the Interactive Multimedia Association Intellectual Property Project 1(1), 179–206 (1994)
Macq, B.M., Quisquater, J.-J.: Cryptology for digital TV broadcasting. Proceedings of the IEEE 83(6), 944–957 (1995)
Mao, Y., Wu, M.: Security evaluation for communication-friendly encryption of multimedia. In: Proceedings of the IEEE International Conference on Image Processing (ICIP 2004), Singapore, IEEE Signal Processing Society (October 2004)
Pennebaker, W.B., Mitchell, J.L.: JPEG – Still image compression standard, Van Nostrand Reinhold, New York (1993)
Podesser, M., Schmidt, H.-P., Uhl, A.: Selective bitplane encryption for secure transmission of image data in mobile environments. In: CD-ROM Proceedings of the 5th IEEE Nordic Signal Processing Symposium (NORSIG 2002), Tromso-Trondheim, Norway, IEEE Norway Section. file cr1037.pdf (October 2002)
Stütz, T., Uhl, A.: Image confidentiality using progressive JPEG. In: Proceedings of Fifth International Conference on Information, Communication and Signal Processing, ICICS 2005, Bangkok, Thailand, pp. 1107–1111 (December 2005)
Uhl, A., Obermair, C.: Transparent encryption of JPEG2000 bitstreams. In: Podhradsky, P., et al. (eds.) Proceedings EC-SIP-M 2005 (5th EURASIP Conference focused on Speech and Image Processing, Multimedia Communications and Services), Smolenice, Slovak Republic, pp. 322–327 (2005)
Uhl, A., Pommer, A.: Image and Video Encryption. From Digital Rights Management to Secured Personal Communication. Advances in Information Security, vol. 15. Springer, Heidelberg (2005)
Wen, J., Severa, M., Zeng, W., Luttrell, M., Jin, W.: A format-compliant configurable encryption framework for access control of video. IEEE Transactions on Circuits and Systems for Video Technology 12(6), 545–557 (2002)
Yuan, C., Zhu, B.B., Su, M., Wang, Y., Li, S., Zhong, Y.: Layered access control for MPEG-4 FGS. In: Proceedings of the IEEE International Conference on Image Processing (ICIP 2003), Barcelona, Spain (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Stütz, T., Uhl, A. (2006). Transparent Image Encryption Using Progressive JPEG. In: Katsikas, S.K., López, J., Backes, M., Gritzalis, S., Preneel, B. (eds) Information Security. ISC 2006. Lecture Notes in Computer Science, vol 4176. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11836810_21
Download citation
DOI: https://doi.org/10.1007/11836810_21
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-38341-3
Online ISBN: 978-3-540-38343-7
eBook Packages: Computer ScienceComputer Science (R0)