Abstract
Current image encryption schemes do not achieve robustness to lossy compression and downsizing without sacrificing image quality. In this paper, we introduce a selective robust image encryption scheme for online social networks that provides a trade-off between robustness and security. With the selective encryption property, users have an option to share a blurred version of the original image and only a specific group of people having the right key can access the full content. Our method is based on the fact that image resizing and compression can be modeled as a low pass process which alters and/or removes high frequency components of image pixels. We achieve robustness to compression and downsizing by adjusting and shuffling DCT coefficients. Experimental results show that the proposed method can be applied in real world applications and social networks with satisfactory image quality.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Chen, G., Mao, Y., Chui, C.: A symmetric image encryption scheme based on 3d chaotic cat maps. Chaos, Solitons & Fractals 21(3), 749–761 (2004)
Dirik, A.E.: Image encryption scheme for print and scan channel. In: International Conference on Applied and Computational Mathematics, ICACM (2012)
Gao, H., Zhang, Y., Liang, S., Li, D.: A new chaotic algorithm for image encryption. Chaos, Solitons & Fractals 29(2), 393–399 (2006)
Guan, Z., Huang, F., Guan, W.: Chaos-based image encryption algorithm. Physics Letters A 346(1), 153–157 (2005)
Guo, J., et al.: A new chaotic key-based design for image encryption and decryption. In: Proceedings of the 2000 IEEE International Symposium on Circuits and Systems, ISCAS 2000, vol. 4, pp. 49–52. IEEE (2000)
Haas, B., Dirik, A.E., Nawaz, Y.: Image encryption for print-and-scan channels using pixel position permutation, US Patent App. 12/317,955 (December 31, 2008)
Hassinen, M., Mussalo, P.: Client controlled security for web applications. In: 30th Anniversary The IEEE Conference on Local Computer Networks, pp. 810–816. IEEE (2005)
Li, S., Zheng, X.: Cryptanalysis of a chaotic image encryption method. In: IEEE International Symposium on Circuits and Systems, ISCAS 2002, vol. 2, pp. II-708–II-711. IEEE (2002)
Li, W., Yu, N.: A robust chaos-based image encryption scheme. In: IEEE International Conference on Multimedia and Expo., ICME 2009, pp. 1034–1037. IEEE (2009)
Liu, X., Eskicioglu, A.: Selective encryption of multimedia content in distribution networks: Challenges and new directions. In: IASTED Communications, Internet & Information Technology (CIIT), USA (2003)
Podesser, M., Schmidt, H., Uhl, A.: Selective bitplane encryption for secure transmission of image data in mobile environments. In: Proceedings of the 5th IEEE Nordic Signal Processing Symposium (NORSIG 2002), pp. 4–6 (2002)
Poller, A., Steinebach, M., Liu, H.: Robust image obfuscation for privacy protection in web 2.0 applications. In: Society of Photo-Optical Instrumentation Engineers (SPIE). Conference Series, vol. 8303, p. 1 (2012)
Yekkala, A., Veni Madhavan, C.: Bit plane encoding and encryption. Pattern Recognition and Machine Intelligence, 103–110 (2007)
Zhang, L., Liao, X., Wang, X.: An image encryption approach based on chaotic maps. Chaos, Solitons & Fractals 24(3), 759–765 (2005)
Zhou, Y., Panetta, K., Agaian, S.: Image encryption using discrete parametric cosine transform. In: 2009 Conference Record of the Forty-Third Asilomar Conference on Signals, Systems and Computers, pp. 395–399. IEEE (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Emir Dirik, A., Memon, N. (2013). Selective Robust Image Encryption for Social Networks. In: Dziech, A., Czyżewski, A. (eds) Multimedia Communications, Services and Security. MCSS 2013. Communications in Computer and Information Science, vol 368. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38559-9_7
Download citation
DOI: https://doi.org/10.1007/978-3-642-38559-9_7
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-38558-2
Online ISBN: 978-3-642-38559-9
eBook Packages: Computer ScienceComputer Science (R0)