Transparent Image Encryption Using Progressive JPEG

  • Thomas Stütz
  • Andreas Uhl
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4176)


Many application scenarios do not demand confidential encryption of visual data, but on the contrary require that certain image information is public (transparent encryption). One scenario is e.g., Pay-TV, where a low quality version should become public to attract possible customers. Transparent encryption can be implemented most efficiently in case of scalable bitstreams by encrypting enhancement layer data and baseline JPEG is therefore not well suited for designing such encryption schemes in an efficient manner. This paper investigates how transparent encryption can be realized through selective encryption of the progressive JPEG modes. The traditional approach which encrypts enhancement layers starting at the end of the bitstream suffers from high computational load. Encryption schemes with significantly reduced encryption effort are shown to deliver equivalent image quality and security.


Base Layer Encryption Scheme Successive Approximation Visual Data Enhancement Layer 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Bodo, Y., Laurent, N., Degelay, J.-L.: A scrambling method based on disturbance of motion vector. In: Proceedings of ACM Multimedia 2002, Juan Le Pins, France, December 2003, pp. 89–90 (2003)Google Scholar
  2. 2.
    Cheng, H., Li, X.: On the application of image decomposition to image compression and encryption. In: Horster, P. (ed.) Communications and Multimedia Security II, IFIP TC6/TC11 Second Joint Working Conference on Communications and Multimedia Security, CMS 1996, Essen, Germany, pp. 116–127. Chapman & Hall, Boca Raton (September 1996)Google Scholar
  3. 3.
    Dittmann, J., Steinmetz, R.: Enabling technology for the trading of MPEG-encoded video. In: Mu, Y., Pieprzyk, J.P., Varadharajan, V. (eds.) ACISP 1997. LNCS, vol. 1270, pp. 314–324. Springer, Heidelberg (1997)CrossRefGoogle Scholar
  4. 4.
    Dittmann, J., Steinmetz, R.: A technical approach to the transparent encryption of MPEG-2 video. In: Katsikas, S.K. (ed.) Communications and Multimedia Security, IFIP TC6/TC11 Third Joint Working Conference, CMS 1997, Athens, Greece, September 1997, pp. 215–226. Chapman and Hall, Boca Raton (1997)Google Scholar
  5. 5.
    Van Droogenbroeck, M.: Partial encryption of images for real-time applications. In: Proceedings of the 4th 2004 Benelux Signal Processing Symposium, Hilvarenbeek, The Netherlands (April 2004), pp. 11–15 (2004)Google Scholar
  6. 6.
    Van Droogenbroeck, M., Benedett, R.: Techniques for a selective encryption of uncompressed and compressed images. In: Proceedings of ACIVS (Advanced Concepts for Intelligent Vision Systems), Ghent University, Belgium, pp. 90–97 (September 2002)Google Scholar
  7. 7.
    Fisch, M.M., Stögner, H., Uhl, A.: Layered encryption techniques for DCT-coded visual data. In: Proceedings (CD-ROM) of the European Signal Processing Conference, EUSIPCO 2004, Vienna, Austria (September 2004) (paper cr1361)Google Scholar
  8. 8.
    Kunkelmann, T., Horn, U.: Partial video encryption based on scalable coding. In: 5th International Workshop on Systems, Signals and Image Processing (IWSSIP 1998), Zagreb, Croatia, pp. 215–218 (1998)Google Scholar
  9. 9.
    Kunkelmann, T.: Applying encryption to video communication. In: Proceedings of the Multimedia and Security Workshop at ACM Multimedia 1998, Bristol, England, pp. 41–47 (1998)Google Scholar
  10. 10.
    Macq, B., Quisquater, J.J.: Digital images multiresolution encryption. The Journal of the Interactive Multimedia Association Intellectual Property Project 1(1), 179–206 (1994)Google Scholar
  11. 11.
    Macq, B.M., Quisquater, J.-J.: Cryptology for digital TV broadcasting. Proceedings of the IEEE 83(6), 944–957 (1995)CrossRefGoogle Scholar
  12. 12.
    Mao, Y., Wu, M.: Security evaluation for communication-friendly encryption of multimedia. In: Proceedings of the IEEE International Conference on Image Processing (ICIP 2004), Singapore, IEEE Signal Processing Society (October 2004)Google Scholar
  13. 13.
    Pennebaker, W.B., Mitchell, J.L.: JPEG – Still image compression standard, Van Nostrand Reinhold, New York (1993)Google Scholar
  14. 14.
    Podesser, M., Schmidt, H.-P., Uhl, A.: Selective bitplane encryption for secure transmission of image data in mobile environments. In: CD-ROM Proceedings of the 5th IEEE Nordic Signal Processing Symposium (NORSIG 2002), Tromso-Trondheim, Norway, IEEE Norway Section. file cr1037.pdf (October 2002)Google Scholar
  15. 15.
    Stütz, T., Uhl, A.: Image confidentiality using progressive JPEG. In: Proceedings of Fifth International Conference on Information, Communication and Signal Processing, ICICS 2005, Bangkok, Thailand, pp. 1107–1111 (December 2005)Google Scholar
  16. 16.
    Uhl, A., Obermair, C.: Transparent encryption of JPEG2000 bitstreams. In: Podhradsky, P., et al. (eds.) Proceedings EC-SIP-M 2005 (5th EURASIP Conference focused on Speech and Image Processing, Multimedia Communications and Services), Smolenice, Slovak Republic, pp. 322–327 (2005)Google Scholar
  17. 17.
    Uhl, A., Pommer, A.: Image and Video Encryption. From Digital Rights Management to Secured Personal Communication. Advances in Information Security, vol. 15. Springer, Heidelberg (2005)MATHGoogle Scholar
  18. 18.
    Wen, J., Severa, M., Zeng, W., Luttrell, M., Jin, W.: A format-compliant configurable encryption framework for access control of video. IEEE Transactions on Circuits and Systems for Video Technology 12(6), 545–557 (2002)CrossRefGoogle Scholar
  19. 19.
    Yuan, C., Zhu, B.B., Su, M., Wang, Y., Li, S., Zhong, Y.: Layered access control for MPEG-4 FGS. In: Proceedings of the IEEE International Conference on Image Processing (ICIP 2003), Barcelona, Spain (2003)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Thomas Stütz
    • 1
  • Andreas Uhl
    • 1
  1. 1.Department of Computer SciencesSalzburg UniversityAustria

Personalised recommendations