Compression of Encrypted Visual Data

  • Michael Gschwandtner
  • Andreas Uhl
  • Peter Wild
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4237)


Chaotic mixing based encryption schemes for visual data are shown to be robust to lossy compression as long as the security requirements are not too high. This property facilitates the application of these ciphers in scenarios where lossy compression is applied to encrypted material – which is impossible in case traditional ciphers should be employed. If high security is required chaotic mixing loses its robustness to compression, still the lower computational demand may be an argument in favor of chaotic mixing as compared to traditional ciphers when visual data is to be encrypted.


Compression Ratio Encryption Scheme Block Cipher Image Encryption Visual Data 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Avcibas, I., Sankur, B., Sayood, K.: Statistical evaluation of image quality measures. Journal of Electronic Imaging 11(2), 206–223 (2002)CrossRefGoogle Scholar
  2. 2.
    Chen, G., Mao, Y., Chui, C.K.: A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons and Fractals 21, 749–761 (2004)MathSciNetCrossRefzbMATHGoogle Scholar
  3. 3.
    Daemen, J., Rijmen, V.: The Design of Rijndael: AES — The Advanced Encryption Standard. Springer, Heidelberg (2002)CrossRefzbMATHGoogle Scholar
  4. 4.
    Eskicioglu, A.: Quality measurement for monochrome compressed images in the past 25 years. In: Proceedings of the International Conference on Acoustics, Speech and Signal Processing, pp. 1907–1910 (2000)Google Scholar
  5. 5.
    Fridrich, J.: Symmetric ciphers based on two-dimensional chaotic maps. Int. J. of Bifurcation and Chaos 8(6), 1259–1284 (1998)MathSciNetCrossRefzbMATHGoogle Scholar
  6. 6.
    Furht, B., Kirovski, D. (eds.): Multimedia Security Handbook. CRC Press, Boca Raton, Florida (2005)Google Scholar
  7. 7.
    Norcen, R., Uhl, A.: Encryption of wavelet-coded imagery using random permutations. In: Proceedings of the IEEE International Conference on Image Processing (ICIP 2004), Singapore, IEEE Signal Processing Society (October 2004)Google Scholar
  8. 8.
    Scharinger, J.: Fast encryption of image data using chaotic Kolmogorov flows. Journal of Electorinic Imaging 7(2), 318–325 (1998)CrossRefGoogle Scholar
  9. 9.
    Tosun, A.S., Feng, W.C.: On error preserving encryption algorithms for wireless video transmission. In: Proceedings of the ninth ACM Multimedia Conference 2001, pp. 302–307, Ottawa, Canada (October 2001)Google Scholar
  10. 10.
    Uhl, A., Pommer, A.: Image and Video Encryption. From Digital Rights Management to Secured Personal Communication. In: Advances in Information Security, vol. 15, Springer, Heidelberg (2005)Google Scholar
  11. 11.
    Wen, J., Severa, M., Zeng, W., Luttrell, M., Jin, W.: A format-compliant configurable encryption framework for access control of video. IEEE Transactions on Circuits and Systems for Video Technology 12(6), 545–557 (2002)CrossRefGoogle Scholar
  12. 12.
    Zeng, W., Wen, J., Severa, M.: Fast self-synchronous content scrambling by spatially shuffling codewords of compressed bitstreams. In: Proceedings of the IEEE International Conference on Image Processing (ICIP 2002) (September 2002)Google Scholar
  13. 13.
    Zeng, W., Lei, S.: Efficient frequency domain selective scrambling of digital video. IEEE Transactions on Multimedia 5(1), 118–129 (2003)MathSciNetCrossRefGoogle Scholar

Copyright information

© IFIP International Federation for Information Processing 2006

Authors and Affiliations

  • Michael Gschwandtner
    • 1
  • Andreas Uhl
    • 1
  • Peter Wild
    • 1
  1. 1.Department of Computer SciencesSalzburg UniversityAustria

Personalised recommendations