Skip to main content

Selective Encryption of Visual Data

Classification of Application Scenarios and Comparison of Techniques for Lossless Environments

  • Chapter

Part of the IFIP — The International Federation for Information Processing book series (IFIPAICT,volume 100)

Abstract

We discuss techniques for selective encryption of visual data. After introducing a classification of application scenarios for selective encryption we derive conditions for the sensible employment of such an approach in each scenario. Finally, we propose and evaluate experimentally several selective encryption approaches for a specific lossless application scenario.

Keywords

  • Selective image encryption
  • partial or soft encryption

This artificial name represents a group of students working on this project in the framework of the multimedia 1 laboratory (winterterm 2001/2002).

This work has been partially supported by the Austrian Science Fund, project no. 15170

The original version of this chapter was revised: The copyright line was incorrect. This has been corrected. The Erratum to this chapter is available at DOI: 10.1007/978-0-387-35612-9_23

References

  1. A. M. Alattar, G. I. Al-Regib, and S. A. Al-Semari. Improved selective encryption techniques for secure transmission of MPEG video bit-streams. In Proceedings of the 1999 IEEE International Conference on Image Processing (ICIP ‘89). IEEE Signal Processing Society, 1999.

    Google Scholar 

  2. H. Cheng and X. Li. Partial encryption of compressed images and videos. IEEE Transactions on Signal Processing, 48 (8): 2439–2451, 2000.

    CrossRef  Google Scholar 

  3. Ingemar J. Cox, Joe Kilian, Tom Leighton, and Talal G. Shamoon. Secure spread spectrum watermarking for multimedia. In Proceedings of the IEEE International Conference on Image Processing, ICIP ‘87, volume 6, pages 16731687, Santa Barbara, California, USA, October 1997.

    Google Scholar 

  4. Raphaël Grosbois, Pierre Gerbelot, and Touradj Ebrahimi. Authentication and access control in the JPEG 2000 compressed domain. In A.G. Tescher, editor, Applications of Digital Image Processing XXIV, volume 4472 of Proceedings of SPIE, San Diego, CA, USA, July 2001.

    Google Scholar 

  5. Thomas Kunkelmann. Applying encryption to video communication. In Proceedings of the Multimedia and Security Workshop at ACM Multimedia ‘88, pages 41–47, Bristol, England, September 1998.

    Google Scholar 

  6. Benoit M. Macq and Jean-Jacques Quisquater. Cryptology for digital TV broadcasting. Proceedings of the IEEE, 83 (6): 944–957, June 1995.

    CrossRef  Google Scholar 

  7. P. Meerwald and A. Uhl. A survey of wavelet-domain watermarking algorithms. In Ping Wah Wong and Edward J. Delp, editors, Proceedings of SPIE, Electronic Imaging, Security and Watermarking of Multimedia Contents III, volume 4314, San Jose, CA, USA, January 2001. SPIE.

    Google Scholar 

  8. A. Pommer and A. Uhl. Wavelet packet methods for multimedia compression and encryption. In Proceedings of the 2001 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing,pages 1–4, Victoria, Canada, August 2001. IEEE Signal Processing Society.

    Google Scholar 

  9. A. Pommer and A. Uhl. Selective encryption of wavelet packet subb and structures for obscured transmission of visual data. In Proceedings of the 3rd IEEE Benelux Signal Processing Symposium (SPS 2002),pages 25–28, Leuven, Belgium, March 2002. IEEE Benelux Signal Processing Chapter.

    Google Scholar 

  10. Lintian Qiao and Klara Nahrstedt. Comparison of MPEG encryption algorithms. International Journal on Computers and Graphics (Special Issue on Data Security in Image Communication and Networks), 22 (3): 437–444, 1998.

    Google Scholar 

  11. C. Shi and B. Bhargava. A fast MPEG video encryption algorithm. In Proceedings of the ACM Multimedia 1998, pages 81–88, Boston, USA, 1998.

    Google Scholar 

  12. L. Tang. Methods for encrypting and decrypting MPEG video data efficiently. In Proceedings of the ACM Multimedia 1996, pages 219–229, Boston, USA, November 1996.

    Google Scholar 

  13. T. Uehara, R. Safavi-Naini, and P. Ogunbona. Securing wavelet compression with random permutations. In Proceedings of the 2000 IEEE Pacific Rim Conference on Multimedia, pages 332–335, Sydney, December 2000. IEEE Signal Processing Society.

    Google Scholar 

  14. S. Wong, L. Zaremba, D. Gooden, and H.K. Huang. Radiologic image compression — a review. Proceedings of the IEEE, 83 (2): 194–219, 1995.

    CrossRef  Google Scholar 

  15. Wenjun Zeng and Shawmin Lei. Efficient frequency domain video scrambling for content access control. In Proceedings of ACM Multimedia 1999, pages 285–293, Orlando, FL, USA, November 1999.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2002 IFIP International Federation for Information Processing

About this chapter

Cite this chapter

Skrepth, C.J., Uhl, A. (2002). Selective Encryption of Visual Data. In: Jerman-Blažič, B., Klobučar, T. (eds) Advanced Communications and Multimedia Security. IFIP — The International Federation for Information Processing, vol 100. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-35612-9_16

Download citation

  • DOI: https://doi.org/10.1007/978-0-387-35612-9_16

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-1-4757-4405-7

  • Online ISBN: 978-0-387-35612-9

  • eBook Packages: Springer Book Archive