Skip to main content

Selective Robust Image Encryption for Social Networks

  • Conference paper
Book cover Multimedia Communications, Services and Security (MCSS 2013)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 368))

Abstract

Current image encryption schemes do not achieve robustness to lossy compression and downsizing without sacrificing image quality. In this paper, we introduce a selective robust image encryption scheme for online social networks that provides a trade-off between robustness and security. With the selective encryption property, users have an option to share a blurred version of the original image and only a specific group of people having the right key can access the full content. Our method is based on the fact that image resizing and compression can be modeled as a low pass process which alters and/or removes high frequency components of image pixels. We achieve robustness to compression and downsizing by adjusting and shuffling DCT coefficients. Experimental results show that the proposed method can be applied in real world applications and social networks with satisfactory image quality.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Chen, G., Mao, Y., Chui, C.: A symmetric image encryption scheme based on 3d chaotic cat maps. Chaos, Solitons & Fractals 21(3), 749–761 (2004)

    Article  MathSciNet  MATH  Google Scholar 

  2. Dirik, A.E.: Image encryption scheme for print and scan channel. In: International Conference on Applied and Computational Mathematics, ICACM (2012)

    Google Scholar 

  3. Gao, H., Zhang, Y., Liang, S., Li, D.: A new chaotic algorithm for image encryption. Chaos, Solitons & Fractals 29(2), 393–399 (2006)

    Article  MATH  Google Scholar 

  4. Guan, Z., Huang, F., Guan, W.: Chaos-based image encryption algorithm. Physics Letters A 346(1), 153–157 (2005)

    Article  MATH  Google Scholar 

  5. Guo, J., et al.: A new chaotic key-based design for image encryption and decryption. In: Proceedings of the 2000 IEEE International Symposium on Circuits and Systems, ISCAS 2000, vol. 4, pp. 49–52. IEEE (2000)

    Google Scholar 

  6. Haas, B., Dirik, A.E., Nawaz, Y.: Image encryption for print-and-scan channels using pixel position permutation, US Patent App. 12/317,955 (December 31, 2008)

    Google Scholar 

  7. Hassinen, M., Mussalo, P.: Client controlled security for web applications. In: 30th Anniversary The IEEE Conference on Local Computer Networks, pp. 810–816. IEEE (2005)

    Google Scholar 

  8. Li, S., Zheng, X.: Cryptanalysis of a chaotic image encryption method. In: IEEE International Symposium on Circuits and Systems, ISCAS 2002, vol. 2, pp. II-708–II-711. IEEE (2002)

    Google Scholar 

  9. Li, W., Yu, N.: A robust chaos-based image encryption scheme. In: IEEE International Conference on Multimedia and Expo., ICME 2009, pp. 1034–1037. IEEE (2009)

    Google Scholar 

  10. Liu, X., Eskicioglu, A.: Selective encryption of multimedia content in distribution networks: Challenges and new directions. In: IASTED Communications, Internet & Information Technology (CIIT), USA (2003)

    Google Scholar 

  11. Podesser, M., Schmidt, H., Uhl, A.: Selective bitplane encryption for secure transmission of image data in mobile environments. In: Proceedings of the 5th IEEE Nordic Signal Processing Symposium (NORSIG 2002), pp. 4–6 (2002)

    Google Scholar 

  12. Poller, A., Steinebach, M., Liu, H.: Robust image obfuscation for privacy protection in web 2.0 applications. In: Society of Photo-Optical Instrumentation Engineers (SPIE). Conference Series, vol. 8303, p. 1 (2012)

    Google Scholar 

  13. Yekkala, A., Veni Madhavan, C.: Bit plane encoding and encryption. Pattern Recognition and Machine Intelligence, 103–110 (2007)

    Google Scholar 

  14. Zhang, L., Liao, X., Wang, X.: An image encryption approach based on chaotic maps. Chaos, Solitons & Fractals 24(3), 759–765 (2005)

    Article  MathSciNet  MATH  Google Scholar 

  15. Zhou, Y., Panetta, K., Agaian, S.: Image encryption using discrete parametric cosine transform. In: 2009 Conference Record of the Forty-Third Asilomar Conference on Signals, Systems and Computers, pp. 395–399. IEEE (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Emir Dirik, A., Memon, N. (2013). Selective Robust Image Encryption for Social Networks. In: Dziech, A., Czyżewski, A. (eds) Multimedia Communications, Services and Security. MCSS 2013. Communications in Computer and Information Science, vol 368. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38559-9_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-38559-9_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-38558-2

  • Online ISBN: 978-3-642-38559-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics