Abstract
To ensure confidentiality and efficient network bandwidth, digital data must be compressed and encrypted. In most communication systems, these two factors are critical for information processing. Image compression and encryption may result in lower restoration quality and performance. Secure-JPEG is an effort to create a compression and encryption technique for digital data. This approach is based on the JPEG compression standard, which is the most extensively used lossy compression scheme. It enhances the usual JPEG compression algorithm to encrypt data during compression. The Secure-JPEG approach encrypts the data while it is compressed, and it may be easily modified to offer near lossless compression. Lossless compression, on the other hand, has a lower compression ratio and is only useful in certain situations. The paper addresses the issue of insufficient security as a result of the usage of a simple random number generator that is not cryptographically safe. The enhanced security characteristics are provided via the Generalized Bernoulli Shift Map, which has a chaotic system with proven security. Several cryptographic tests are used to validate the algorithm's security, and the chaotic system's behavior is also examined.
Similar content being viewed by others
Data Availability
The data used for experiments is publically available at: https://github.com/nisarahmedrana/Compression-Friendly-Image-Encryption/upload/main/ImageSet
Code availability
The source code of the project will be made public after acceptance of the manuscript.
References
Lu, Q., et al. (2008). Low-complexity and energy efficient image compression scheme for wireless sensor networks. Computer Networks, 52(13), 2594–2603.
Lian, S., D. Kanellopoulos, and G. Ruffo, Recent advances in multimedia information system security. Informatica, 2009. 33(1)
Smith, D. R., & Palmer, J. T. (1979). Universal fixed messages and the Rivest-Shamir-Adleman cryptosystem. Mathematika, 26(01), 44–52.
Selent, D. (2010). Advanced encryption standard. Rivier Academic Journal, 6(2), 1–14.
Lian, S., Multimedia content encryption: techniques and applications. 2008: CRC press.
Furht, B., D. Socek, and A.M. Eskicioglu, Fundamentals of multimedia encryption techniques. Multimedia Security Handbook, 2004. 4.
Van Droogenbroeck, M. and R. Benedett. Techniques for a selective encryption of uncompressed and compressed images. in Advanced Concepts for Intelligent Vision Systems (ACIVS). 2002.
Sudharsanan, S. (2005). Shared key encryption of JPEG color images. Consumer Electronics, IEEE Transactions on, 51(4), 1204–1211.
Ahmed, N., et al. (2015). A Novel Image Encryption Scheme Based on Orthogonal Vectors. Nucleus, 52(2), 71–78.
Maqbool, S., et al. Simultaneous Encryption and Compression of Digital Images Based on Secure-JPEG Encoding. in Mexican Conference on Pattern Recognition. 2016. Springer.
Ahmed, N., Asif, H. M. S., & Saleem, G. (2016). A benchmark for performance evaluation and security assessment of image encryption schemes. International Journal of Computer Network and Information Security (IJCNIS), 8(12), 18–29.
Ye, R. (2011). An image encryption scheme with efficient permutation and diffusion processes. Advances in computer science and education applications (pp. 32–39). Springer.
Grigoras, V. and C. Grigoras. Chaos encryption method based on large signal modulation in additive nonlinear discrete-time systems. in Proceedings of the 5th WSEAS international conference on Non-linear analysis, non-linear systems and chaos. 2006. World Scientific and Engineering Academy and Society (WSEAS).
Philip, M. and A. Das (2011) Survey Image encryption using chaotic cryptography schemes. IJCA Special Issue on “Computational Science-New Dimensions & Perspectives” NCCSE, 1: 77-83
Wei-bin, C. and Z. Xin. Image encryption algorithm based on Henon chaotic system. in Image Analysis and Signal Processing, 2009. IASP 2009. International Conference on. 2009. IEEE.
Shum, H.-Y., Kang, S. B., & Chan, S.-C. (2003). Survey of image-based representations and compression techniques. Circuits and Systems for Video Technology, IEEE Transactions on, 13(11), 1020–1037.
Khan, M., & Munir, N. (2019). A novel image encryption technique based on generalized advanced encryption standard based on field of any characteristic. Wireless Personal Communications, 109(2), 849–867.
Hossein, M., S. Mahmud, and N. Biswas, Image Compression and Encryption. International Journal of ElectroComputational World & Knowledge Interface, 2011. 1(3).
Zhou, N., et al. (2015). Image compression and encryption scheme based on 2D compressive sensing and fractional Mellin transform. Optics Communications, 343, 10–21.
Alfalou, A., Brosseau, C., & Abdallah, N. (2015). Simultaneous compression and encryption of color video images. Optics Communications, 338, 371–379.
Tong, X.-J., et al. (2013). A new algorithm of the combination of image compression and encryption technology based on cross chaotic map. Nonlinear Dynamics, 72(1–2), 229–241.
Karmakar, J., Nandi, D., & Mandal, M. (2020). A novel hyper-chaotic image encryption with sparse-representation based compression. Multimedia Tools and Applications, 79(37), 28277–28300.
Yang, Y.-G., et al. (2021). Double image compression-encryption algorithm based on fractional order hyper chaotic system and DNA approach. Multimedia Tools and Applications, 80(1), 691–710.
Zhou, J., et al. (2014). Designing an efficient image encryption-then-compression system via prediction error clustering and random permutation. Information Forensics and Security, IEEE Transactions on, 9(1), 39–50.
Zhou, J., X. Liu, and O.C. Au. On the design of an efficient encryption-then-compression system. in Acoustics, Speech and Signal Processing (ICASSP), 2013 IEEE International Conference on. 2013. IEEE.
Bansal, R. and M.R. Sharma, Designing an Efficient Image Encryption-Compression System Using A New Haar Wavelet. 2014.
Saleem, G., et al., Design and Analysis of a Robust Compression Friendly Image Encryption Scheme. algorithms, 2017 8(2): 1-18
Zhu, H., Zhao, C., & Zhang, X. (2013). A novel image encryption–compression scheme using hyper-chaos and Chinese remainder theorem. Signal Processing: Image Communication, 28(6), 670–680.
Aldossari, M., Alfalou, A., & Brosseau, C. (2014). Simultaneous compression and encryption of closely resembling images: Application to video sequences and polarimetric images. Optics express, 22(19), 22349–22368.
Zhou, N., et al. (2014). Novel image compression–encryption hybrid algorithm based on key-controlled measurement matrix in compressive sensing. Optics & Laser Technology, 62, 152–160.
Matsumoto, M., & Nishimura, T. (1998). Mersenne twister: A 623-dimensionally equidistributed uniform pseudo-random number generator. ACM Transactions on Modeling and Computer Simulation (TOMACS), 8(1), 3–30.
Matsumoto, M., et al., Cryptographic Mersenne Twister and Fubuki stream/block cipher. Cryptology ePrint Archive, 2005.
Jagannatam, A. (2008). Mersenne Twister–A Pseudo random number generator and its variants. George Mason University.
Ojha, A. and S. Sanyal, An Overview of Cryptographic Hash Functions. 2002.
Abinaya, N. and P. Prakasam. Performance analysis of maximum length LFSR and BBS method for cryptographic application. in 2014 International Conference on Electronics and Communication Systems (ICECS). 2014. IEEE.
Ahmed, N., et al. (2015). A novel image encryption scheme based on orthogonal vectors. The Nucleus, 52(2), 71–78.
Wang, Z., et al. (2004). Image quality assessment: From error visibility to structural similarity. IEEE transactions on image processing, 13(4), 600–612.
Ahmed, N., et al., Deep ensembling for perceptual image quality assessment. Soft Computing, 2022: p. 1–22.
Ahmed, N., Asif, H. M. S., & Khalid, H. (2021). PIQI: Perceptual image quality index based on ensemble of Gaussian process regression. Multimedia Tools and Applications, 80(10), 15677–15700.
Khalid, H., Ali, M., & Ahmed, N. (2021). Gaussian Process-based Feature-Enriched Blind Image Quality Assessment. Journal of Visual Communication and Image Representation, 77, 103092.
Ahmed, N., & Asif, H. M. S. (2020). Perceptual Quality Assessment of Digital Images Using Deep Features. Computing and Informatics, 39(3), 385–409.
Ahmed, N., H.M.S. Asif, and H. Khalid, PIQI: perceptual image quality index based on ensemble of Gaussian process regression. Multimedia Tools and Applications, 2021: p. 1–24.
Funding
There are no funding sources for this project.
Author information
Authors and Affiliations
Contributions
The contributions of the authors are listed below: N. Ahmed: Conception, coding, experimentations and writeup. M. U. Younus: Coding, experimentations, writeup and review. Muhammad Rizwan Anjum: Writeup and review. G. Saleem: Coding, experimentations, writeup and review. Z. A. Gondal: Coding and experimentations. Sanam Narejo: Proof read and reviewed the manuscript.
Corresponding author
Ethics declarations
Conflicts of interest
It is declared that there is no financial and other competing conflicts of interests.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Ahmad, N., Younus, M.U., Anjum, M.R. et al. Efficient JPEG Encoding Using Bernoulli Shift Map for Secure Communication. Wireless Pers Commun 125, 3405–3424 (2022). https://doi.org/10.1007/s11277-022-09717-8
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-022-09717-8