Partial Encryption on SPIHT Compressed Images

  • Nidhi Taneja
  • Balasubramanian Raman
  • Indra Gupta
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5909)


Recently, Multimedia security paradigm has shifted towards encryption techniques combined with compression systems to meet the constraints of wireless networks. Several techniques of encryption with compression have been proposed to reduce processing time, but either they are insecure or computationally intensive. An efficient partial encryption technique based on SPIHT compressed bitstream is thus proposed to provide an efficient encryption for digital images. A satisfactory level of security is achieved with encryption of less than 0.5% of data for image encoded at 0.8 bpp by encrypting the bits as well as their locations. The proposed technique has large key space and can withstand approximation and brute force attacks.


Vector Versus Enhancement Layer Cipher Image Encryption Technique Brute Force Attack 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Cheng, H., Li, X.: Partial encryption of compressed images and videos. IEEE Trans. Signal Process. 48(8), 2439–2451 (2000)CrossRefMathSciNetGoogle Scholar
  2. 2.
    Said, A., Pearlman, W.A.: A new, fast, and efficient image codec based on set partitioning in hierarchical trees. IEEE Trans. Circuits & Systems Video Tech. 6, 243–250 (1996)CrossRefGoogle Scholar
  3. 3.
    Said, A.: Measuring the strength of partial encryption schemes. In: IEEE Int. Conf. Image Process., vol. 2, pp. 1126–1129 (2005)Google Scholar
  4. 4.
    Martin, K., Lukac, R., Plataniotis, K.N.: Efficient encryption of wavelet-based coded color images. Patt. Recogn. 38, 1111–1115 (2005)zbMATHCrossRefGoogle Scholar
  5. 5.
    Norcen, R., Uhl, A.: Encryption of wavelet-coded imagery using random permutations. In: Proc. IEEE Int. Conf. Image Process., pp. 3431–3434 (2004)Google Scholar
  6. 6.
    Lian, S., Sun, J., Wang, Z.: A secure 3D-SPIHT codec. In: Proc. European Signal Process. Conf., pp. 813–816 (2004)Google Scholar
  7. 7.
    Mao, Y., Wu, M.: A joint signal processing and cryptographic approach to multimedia encryption. IEEE Trans. Image Process. 15(7), 2061–2075 (2006)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Nidhi Taneja
    • 1
  • Balasubramanian Raman
    • 2
  • Indra Gupta
    • 1
  1. 1.Department of Electrical EngineeringIIT RoorkeeIndia
  2. 2.Department of MathematicsIIT RoorkeeIndia

Personalised recommendations