Skip to main content

Protection of Colour Images by Selective Encryption

  • Chapter
  • First Online:
Advanced Color Image Processing and Analysis

Abstract

This chapter presents methods for the protection of privacy associated with specific regions from colour images or colour image sequences. In the proposed approaches, regions of interest (ROI) are detected during the JPEG compression of the colour images and encrypted. The methodology presented in this book chapter performs simultaneously selective encryption (SE) and image compression. The SE is performed in a ROI and by using the Advanced Encryption Standard (AES) algorithm. The AES algorithm is used with the Cipher Feedback (CFB) mode and applied on a subset of the Huffman coefficients corresponding to the AC frequencies chosen according to the level of required security. In this study, we consider the encryption of colour images and image sequences compressed by JPEG and of image sequences compressed by motion JPEG. Our approach is performed without affecting the compression rate and by keeping the JPEG bitstream compliance. In the proposed method, the SE is performed in the Huffman coding stage of the JPEG algorithm without affecting the size of the compressed image. The most significant characteristic of the proposed method is the utilization of a single procedure to simultaneously perform the compression and the selective encryption rather than using two separate procedures. Our approach reduces the required computational complexity. We provide an experimental evaluation of the proposed method when applied on still colour images as well as on sequences of JPEG compressed images acquired with surveillance video cameras.

The courage to imagine the otherwise is our greatest resource, adding color and suspense to all our life

Daniel J. Boorstin

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    In order to display the image artifacts produced by our crypto-compression algorithm, we have cropped a sub-image of 416 ×200 pixels.

References

  1. Chai D, Ngan KN (1999) Face segmentation using skin-color map in videophone applications. IEEE Trans Circ Syst Video Tech 9(4):551–564

    Article  Google Scholar 

  2. Chang HT, Lin CC (2007) Intersecured joint image compression with encryption purpose based on fractal mating coding. Opt Eng 46(3):article no. 037002

    Google Scholar 

  3. Chen RJ, Horng SJ (2010) Novel SCAN-CA-based image security system using SCAN and 2-D Von Neumann cellular automata. Signal Process Image Comm 25(6):413–426

    Article  Google Scholar 

  4. Cheng H, Li X (2000) Partial encryption of compressed images and videos. IEEE Trans Signal Process 48(8):2439–2445

    Article  MathSciNet  Google Scholar 

  5. Daemen J, Rijmen V (2002) AES proposal: the Rijndael block cipher. Technical report, Proton World International, Katholieke Universiteit Leuven, ESAT-COSIC, Belgium

    MATH  Google Scholar 

  6. Van Droogenbroeck M, Benedett R (2002) Techniques for a selective encryption of uncompressed and compressed images. In: Proceedings of advanced concepts for intelligent vision systems (ACIVS) 2002, Ghent, Belgium, pp 90–97

    Google Scholar 

  7. Fisch MM, Stgner H, Uhl A (2004) Layered encryption techniques for DCT-coded visual data. In: Proceedings of the European signal processing conference (EUSIPCO) 2004, Vienna, Austria, pp 821–824

    Google Scholar 

  8. Imaizumi S, Watanabe O, Fujiyoshi M, Kiya H (2006) Generalized hierarchical encryption of JPEG2000 codestreams for access control. In: Proceedings of IEEE internatinoal conference on image processing, Atlanta, USA, pp 1094–1097

    Google Scholar 

  9. Kang I, Arce GR, Lee H-K (2011) Color extended visual cryptography using error diffusion. IEEE Trans Image Process 20(1):132–145

    Article  MathSciNet  Google Scholar 

  10. Leung BW, Ng FW, Wong DS (2009) On the security of a visual cryptography scheme for color images. Pattern Recognit 42(5):929–940

    Article  MATH  Google Scholar 

  11. Liao XF, Lay SY, Zhou Q (2010) A novel image encryption algorithm based on self-adaptive wave transmission. Signal Process 90(9):2714–2722

    Article  MATH  Google Scholar 

  12. Lin C-Y, Chen C-H (2007) An invisible hybrid color image system using spread vector quantization neural networks with penalized FCM. Pattern Recognit 40(6):1685–1694

    Article  MATH  Google Scholar 

  13. Lin ET, Eskicioglu AM, Lagendijk RL, Delp EJ. Advances in digital video content protection. Proc IEEE 93(1):171–183

    Google Scholar 

  14. Liu F, Wu CK, Lin XJ (2008) Colour visual cryptography schemes. IET Information Security 2(4):151–165

    Article  MathSciNet  Google Scholar 

  15. Liu JL (2006) Efficient selective encryption for JPEG2000 images using private initial table. Pattern Recognit 39(8):1509–1517

    Article  MATH  Google Scholar 

  16. Lookabaugh T, Sicker DC (2004) Selective encryption for consumer applications. IEEE Comm Mag 42(5):124–129

    Article  Google Scholar 

  17. Lukac R, Plataniotis KN (2005) Bit-level based secret sharing for image encryption. Pattern Recognit 38(5):767–772

    Article  MATH  Google Scholar 

  18. Martin K, Lukac R, Plataniotis KN (2005) Efficient encryption of wavelet-based coded color images. Pattern Recognit 38(7):1111–1115

    Article  MATH  Google Scholar 

  19. Ou SC, Chung HY, Sung WT (2006) Improving the compression and encryption of images using FPGA-based cryptosystems. Multimed Tool Appl 28(1):5–22

    Article  Google Scholar 

  20. Pennebaker WB, Mitchell JL (1993) JPEG: still image data compression standard. Van Nostrand Reinhold, San Jose, USA

    Google Scholar 

  21. Rodrigues J-M, Puech W, Bors AG (2006) A selective encryption for heterogenous color JPEG images based on VLC and AES stream cipher. In: Proceedings of the European conference on colour in graphics, imaging and vision (CGIV’06), Leeds, UK, pp 34–39

    Google Scholar 

  22. Rodrigues J-M, Puech W, Bors AG (2006) Selective encryption of human skin in JPEG images. In: Proceedings of IEEE international conference on image processing, Atlanta, USA, pp 1981–1984

    Google Scholar 

  23. Said A (2005) Measuring the strength of partial encryption scheme. In: Proceedings of the IEEE international conference on image processing, Genova, Italy, vol 2, pp 1126–1129

    Google Scholar 

  24. Schneier B (1995) Applied cryptography. Wiley, New York, USA

    Google Scholar 

  25. Seo YH, Choi HJ, Yoo JS, Kim DW (2010) Selective and adaptive signal hiding technique for security of JPEG2000. Int J Imag Syst Tech 20(3):277–284

    Article  Google Scholar 

  26. Serra J (1988) Image analysis and mathematical morphology. Academic Press, London

    Google Scholar 

  27. Shahid Z, Chaumont M, Puech W. Fast protection of H.264/AVC by selective encryption of CAVLC and CABAC for I and P frames. IEEE Trans Circ Syst Video Tech 21(5):565–576

    Google Scholar 

  28. Stinson DR (2005) Cryptography: theory and practice, (discrete mathematics and its applications). Chapman & Hall/CRC Press, New York

    Google Scholar 

  29. Tang L (1999) Methods for encrypting and decrypting MPEG video data efficiently. In: Proceedings of ACM Multimedia, vol 3, pp 219–229

    Google Scholar 

  30. Wen JT, Severa M, Zeng WJ, Luttrell MH, Jin WY (2002) A format-compliant configurable encryption framework for access control of video. IEEE Trans Circ Syst Video Tech 12(6):545–557

    Article  Google Scholar 

  31. Wu CP, Kuo CCJ (2005) Design of integrated multimedia compression and encryption systems IEEE Trans Multimed 7(5):828–839

    Google Scholar 

  32. Xiang T, Wong K, Liao X (2006) Selective image encryption using a spatiotemporal chaotic system. Chaos 17(3):article no. 023115

    Google Scholar 

  33. Yabuta K, Kitazawa H, Tanaka T (2005) A new concept of security camera monitoring with privacy protection by masking moving objects. In: Proceedings of Advances in Multimedia Information Processing, vol 1, pp 831–842

    Article  Google Scholar 

  34. Yang JH, Choi H, Kim T (2000) Noise estimation for blocking artifacts reduction in DCT coded images. IEEE Trans Circ Syst Video Tech 10(7):1116–1120

    Article  Google Scholar 

  35. Yeasin M, Polat E, Sharma R (2004) A multiobject tracking framework for interactive multimedia applications. IEEE Trans Multimed 6(3):398–405

    Article  Google Scholar 

  36. Zeng W, Lei S (1999) Efficient frequency domain video scrambling for content access control. In: Proceedings of ACM Multimedia, Orlando, FL, USA, pp 285–293

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to W. Puech .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media New York

About this chapter

Cite this chapter

Puech, W., Bors, A.G., Rodrigues, J.M. (2013). Protection of Colour Images by Selective Encryption. In: Fernandez-Maloigne, C. (eds) Advanced Color Image Processing and Analysis. Springer, New York, NY. https://doi.org/10.1007/978-1-4419-6190-7_12

Download citation

  • DOI: https://doi.org/10.1007/978-1-4419-6190-7_12

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4419-6189-1

  • Online ISBN: 978-1-4419-6190-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics