A Selective Image Encryption Scheme Based on JPEG2000 Codec

  • Shiguo Lian
  • Jinsheng Sun
  • Dengfeng Zhang
  • Zhiquan Wang
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3332)

Abstract

In this paper, a novel image encryption scheme based on JPEG2000 is proposed, which encrypts some sensitive frequency subbands, bit-planes or encoding-passes selectively and partially. It is secure against such attack as known-plaintext attack or replacement attack. It is of low cost, keeps file format and compression ratio unchanged, supports direct bit-rate control, and does not degrade the original error-robustness. These properties make it suitable for real-time applications with direct bit-rate control requirement, such as web imaging, image communication, mobile or wireless multimedia, and so on.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    ISO/IEC 15444-1: Information Technology-JPEG 2000 Image Coding System-Part 1: Core Coding System (2000)Google Scholar
  2. 2.
    Grosbois, R., Gerbelot, P., Ebrahimi, T.: Authentication And Access Control in the JPEG2000 Compressed Domain. In: Proc. SPIE 46th Annual Meeting, Applications of Digital Image Processing XXIV, San Diego, vol. 4472, pp. 95–104 (2001)Google Scholar
  3. 3.
    Ando, K., Watanabe, O., Kiya, H.: Partial-Scrambling of Still Images Based on JPEG2000. In: Proceeding of the International Conference on Information, Communications, and Signal Processing, Singapore (2001)Google Scholar
  4. 4.
    Ando, K., Watanabe, O., Kiya, H.: Partial-Scrambling of Images Encoded by JPEG2000. IEICE Trans. J85-D-11(2), 282–290 (2002)Google Scholar
  5. 5.
    Fukuhara, T., Ando, K., Watanabe, O., Kiya, H.: Partial-Scrambling of JPEG2000 Images for Security Applications. ISO/IEC JTC 1/SC29/WG1, N2430Google Scholar
  6. 6.
    Qiao, L., Nahrstedt, K.: A New Algorithm for MPEG Video Encryption. In: Proceeding of the First International Conference on Imaging Science, Systems and Technology (CISST 1997), Las Vegas, Nevada, pp. 21–29 (1997)Google Scholar
  7. 7.
    Qiao, L., Nahrstedt, K.: Comparison of MPEG Encryption Algorithm. International Journal on Computers and Graphics 22(4), 437–448 (1998)CrossRefGoogle Scholar
  8. 8.
    Wee, S., Apostolopoulos, J.: Secure Scalable Streaming and Secure Transcoding with JPEG-2000. Technical Report, HPL-2003-117 (2003)Google Scholar
  9. 9.
    Pommer, A., Uhl, A.: Selective Encryption ofWavelet-Packet Encoded Image Data: Efficiency and Security. Communications and Multimedia Security, 194–204 (2003)Google Scholar
  10. 10.
    Norcen, R., Uhl, A.: Selective Encryption of the JPEG2000 Bitstream. In: Lioy, A., Mazzocchi, D. (eds.) CMS 2003. LNCS, vol. 2828, pp. 194–204. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  11. 11.
    Taubman, D.: High Performance Scalable Image Compression with EBCOT. IEEE Trans. on Image Processing 9(7), 1158–1170 (2000)CrossRefGoogle Scholar
  12. 12.
    Buchmann, J.A.: Introduction to Cryptography. Springer, New York (2001)MATHGoogle Scholar
  13. 13.
    Chang, C.C., Yu, T.X.: Cryptanalysis of An Encryption Scheme for Binary Images. Pattern Recognition Letters 23(14), 1847–1852 (2002)MATHCrossRefGoogle Scholar
  14. 14.
    Podesser, M., Schmidt, H.P., Uhl, A.: Selective Bitplane Encryption for Secure Transmission of Image Data in Mobile Environments. In: CD-ROM Proceedings of the 5th IEEE Nordic Signal Processing Symposium (NORSIG 2002), Tromso- Trondheim, Norway (2002)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2004

Authors and Affiliations

  • Shiguo Lian
    • 1
  • Jinsheng Sun
    • 1
  • Dengfeng Zhang
    • 2
  • Zhiquan Wang
    • 1
  1. 1.Department of AutomationNanjing University of Science & TechnologyNanjingChina
  2. 2.School of Mechanical EngineeringNanjing University of Science & TechnologyNanjingChina

Personalised recommendations