Abstract
This chapter presents methods for the protection of privacy associated with specific regions from colour images or colour image sequences. In the proposed approaches, regions of interest (ROI) are detected during the JPEG compression of the colour images and encrypted. The methodology presented in this book chapter performs simultaneously selective encryption (SE) and image compression. The SE is performed in a ROI and by using the Advanced Encryption Standard (AES) algorithm. The AES algorithm is used with the Cipher Feedback (CFB) mode and applied on a subset of the Huffman coefficients corresponding to the AC frequencies chosen according to the level of required security. In this study, we consider the encryption of colour images and image sequences compressed by JPEG and of image sequences compressed by motion JPEG. Our approach is performed without affecting the compression rate and by keeping the JPEG bitstream compliance. In the proposed method, the SE is performed in the Huffman coding stage of the JPEG algorithm without affecting the size of the compressed image. The most significant characteristic of the proposed method is the utilization of a single procedure to simultaneously perform the compression and the selective encryption rather than using two separate procedures. Our approach reduces the required computational complexity. We provide an experimental evaluation of the proposed method when applied on still colour images as well as on sequences of JPEG compressed images acquired with surveillance video cameras.
The courage to imagine the otherwise is our greatest resource, adding color and suspense to all our life
Daniel J. Boorstin
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
In order to display the image artifacts produced by our crypto-compression algorithm, we have cropped a sub-image of 416 ×200 pixels.
References
Chai D, Ngan KN (1999) Face segmentation using skin-color map in videophone applications. IEEE Trans Circ Syst Video Tech 9(4):551–564
Chang HT, Lin CC (2007) Intersecured joint image compression with encryption purpose based on fractal mating coding. Opt Eng 46(3):article no. 037002
Chen RJ, Horng SJ (2010) Novel SCAN-CA-based image security system using SCAN and 2-D Von Neumann cellular automata. Signal Process Image Comm 25(6):413–426
Cheng H, Li X (2000) Partial encryption of compressed images and videos. IEEE Trans Signal Process 48(8):2439–2445
Daemen J, Rijmen V (2002) AES proposal: the Rijndael block cipher. Technical report, Proton World International, Katholieke Universiteit Leuven, ESAT-COSIC, Belgium
Van Droogenbroeck M, Benedett R (2002) Techniques for a selective encryption of uncompressed and compressed images. In: Proceedings of advanced concepts for intelligent vision systems (ACIVS) 2002, Ghent, Belgium, pp 90–97
Fisch MM, Stgner H, Uhl A (2004) Layered encryption techniques for DCT-coded visual data. In: Proceedings of the European signal processing conference (EUSIPCO) 2004, Vienna, Austria, pp 821–824
Imaizumi S, Watanabe O, Fujiyoshi M, Kiya H (2006) Generalized hierarchical encryption of JPEG2000 codestreams for access control. In: Proceedings of IEEE internatinoal conference on image processing, Atlanta, USA, pp 1094–1097
Kang I, Arce GR, Lee H-K (2011) Color extended visual cryptography using error diffusion. IEEE Trans Image Process 20(1):132–145
Leung BW, Ng FW, Wong DS (2009) On the security of a visual cryptography scheme for color images. Pattern Recognit 42(5):929–940
Liao XF, Lay SY, Zhou Q (2010) A novel image encryption algorithm based on self-adaptive wave transmission. Signal Process 90(9):2714–2722
Lin C-Y, Chen C-H (2007) An invisible hybrid color image system using spread vector quantization neural networks with penalized FCM. Pattern Recognit 40(6):1685–1694
Lin ET, Eskicioglu AM, Lagendijk RL, Delp EJ. Advances in digital video content protection. Proc IEEE 93(1):171–183
Liu F, Wu CK, Lin XJ (2008) Colour visual cryptography schemes. IET Information Security 2(4):151–165
Liu JL (2006) Efficient selective encryption for JPEG2000 images using private initial table. Pattern Recognit 39(8):1509–1517
Lookabaugh T, Sicker DC (2004) Selective encryption for consumer applications. IEEE Comm Mag 42(5):124–129
Lukac R, Plataniotis KN (2005) Bit-level based secret sharing for image encryption. Pattern Recognit 38(5):767–772
Martin K, Lukac R, Plataniotis KN (2005) Efficient encryption of wavelet-based coded color images. Pattern Recognit 38(7):1111–1115
Ou SC, Chung HY, Sung WT (2006) Improving the compression and encryption of images using FPGA-based cryptosystems. Multimed Tool Appl 28(1):5–22
Pennebaker WB, Mitchell JL (1993) JPEG: still image data compression standard. Van Nostrand Reinhold, San Jose, USA
Rodrigues J-M, Puech W, Bors AG (2006) A selective encryption for heterogenous color JPEG images based on VLC and AES stream cipher. In: Proceedings of the European conference on colour in graphics, imaging and vision (CGIV’06), Leeds, UK, pp 34–39
Rodrigues J-M, Puech W, Bors AG (2006) Selective encryption of human skin in JPEG images. In: Proceedings of IEEE international conference on image processing, Atlanta, USA, pp 1981–1984
Said A (2005) Measuring the strength of partial encryption scheme. In: Proceedings of the IEEE international conference on image processing, Genova, Italy, vol 2, pp 1126–1129
Schneier B (1995) Applied cryptography. Wiley, New York, USA
Seo YH, Choi HJ, Yoo JS, Kim DW (2010) Selective and adaptive signal hiding technique for security of JPEG2000. Int J Imag Syst Tech 20(3):277–284
Serra J (1988) Image analysis and mathematical morphology. Academic Press, London
Shahid Z, Chaumont M, Puech W. Fast protection of H.264/AVC by selective encryption of CAVLC and CABAC for I and P frames. IEEE Trans Circ Syst Video Tech 21(5):565–576
Stinson DR (2005) Cryptography: theory and practice, (discrete mathematics and its applications). Chapman & Hall/CRC Press, New York
Tang L (1999) Methods for encrypting and decrypting MPEG video data efficiently. In: Proceedings of ACM Multimedia, vol 3, pp 219–229
Wen JT, Severa M, Zeng WJ, Luttrell MH, Jin WY (2002) A format-compliant configurable encryption framework for access control of video. IEEE Trans Circ Syst Video Tech 12(6):545–557
Wu CP, Kuo CCJ (2005) Design of integrated multimedia compression and encryption systems IEEE Trans Multimed 7(5):828–839
Xiang T, Wong K, Liao X (2006) Selective image encryption using a spatiotemporal chaotic system. Chaos 17(3):article no. 023115
Yabuta K, Kitazawa H, Tanaka T (2005) A new concept of security camera monitoring with privacy protection by masking moving objects. In: Proceedings of Advances in Multimedia Information Processing, vol 1, pp 831–842
Yang JH, Choi H, Kim T (2000) Noise estimation for blocking artifacts reduction in DCT coded images. IEEE Trans Circ Syst Video Tech 10(7):1116–1120
Yeasin M, Polat E, Sharma R (2004) A multiobject tracking framework for interactive multimedia applications. IEEE Trans Multimed 6(3):398–405
Zeng W, Lei S (1999) Efficient frequency domain video scrambling for content access control. In: Proceedings of ACM Multimedia, Orlando, FL, USA, pp 285–293
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer Science+Business Media New York
About this chapter
Cite this chapter
Puech, W., Bors, A.G., Rodrigues, J.M. (2013). Protection of Colour Images by Selective Encryption. In: Fernandez-Maloigne, C. (eds) Advanced Color Image Processing and Analysis. Springer, New York, NY. https://doi.org/10.1007/978-1-4419-6190-7_12
Download citation
DOI: https://doi.org/10.1007/978-1-4419-6190-7_12
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4419-6189-1
Online ISBN: 978-1-4419-6190-7
eBook Packages: EngineeringEngineering (R0)