Selective Robust Image Encryption for Social Networks

  • Ahmet Emir Dirik
  • Nasir Memon
Part of the Communications in Computer and Information Science book series (CCIS, volume 368)


Current image encryption schemes do not achieve robustness to lossy compression and downsizing without sacrificing image quality. In this paper, we introduce a selective robust image encryption scheme for online social networks that provides a trade-off between robustness and security. With the selective encryption property, users have an option to share a blurred version of the original image and only a specific group of people having the right key can access the full content. Our method is based on the fact that image resizing and compression can be modeled as a low pass process which alters and/or removes high frequency components of image pixels. We achieve robustness to compression and downsizing by adjusting and shuffling DCT coefficients. Experimental results show that the proposed method can be applied in real world applications and social networks with satisfactory image quality.


image encryption robustness privacy social networks 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Chen, G., Mao, Y., Chui, C.: A symmetric image encryption scheme based on 3d chaotic cat maps. Chaos, Solitons & Fractals 21(3), 749–761 (2004)MathSciNetMATHCrossRefGoogle Scholar
  2. 2.
    Dirik, A.E.: Image encryption scheme for print and scan channel. In: International Conference on Applied and Computational Mathematics, ICACM (2012)Google Scholar
  3. 3.
    Gao, H., Zhang, Y., Liang, S., Li, D.: A new chaotic algorithm for image encryption. Chaos, Solitons & Fractals 29(2), 393–399 (2006)MATHCrossRefGoogle Scholar
  4. 4.
    Guan, Z., Huang, F., Guan, W.: Chaos-based image encryption algorithm. Physics Letters A 346(1), 153–157 (2005)MATHCrossRefGoogle Scholar
  5. 5.
    Guo, J., et al.: A new chaotic key-based design for image encryption and decryption. In: Proceedings of the 2000 IEEE International Symposium on Circuits and Systems, ISCAS 2000, vol. 4, pp. 49–52. IEEE (2000)Google Scholar
  6. 6.
    Haas, B., Dirik, A.E., Nawaz, Y.: Image encryption for print-and-scan channels using pixel position permutation, US Patent App. 12/317,955 (December 31, 2008)Google Scholar
  7. 7.
    Hassinen, M., Mussalo, P.: Client controlled security for web applications. In: 30th Anniversary The IEEE Conference on Local Computer Networks, pp. 810–816. IEEE (2005)Google Scholar
  8. 8.
    Li, S., Zheng, X.: Cryptanalysis of a chaotic image encryption method. In: IEEE International Symposium on Circuits and Systems, ISCAS 2002, vol. 2, pp. II-708–II-711. IEEE (2002)Google Scholar
  9. 9.
    Li, W., Yu, N.: A robust chaos-based image encryption scheme. In: IEEE International Conference on Multimedia and Expo., ICME 2009, pp. 1034–1037. IEEE (2009)Google Scholar
  10. 10.
    Liu, X., Eskicioglu, A.: Selective encryption of multimedia content in distribution networks: Challenges and new directions. In: IASTED Communications, Internet & Information Technology (CIIT), USA (2003)Google Scholar
  11. 11.
    Podesser, M., Schmidt, H., Uhl, A.: Selective bitplane encryption for secure transmission of image data in mobile environments. In: Proceedings of the 5th IEEE Nordic Signal Processing Symposium (NORSIG 2002), pp. 4–6 (2002)Google Scholar
  12. 12.
    Poller, A., Steinebach, M., Liu, H.: Robust image obfuscation for privacy protection in web 2.0 applications. In: Society of Photo-Optical Instrumentation Engineers (SPIE). Conference Series, vol. 8303, p. 1 (2012)Google Scholar
  13. 13.
    Yekkala, A., Veni Madhavan, C.: Bit plane encoding and encryption. Pattern Recognition and Machine Intelligence, 103–110 (2007)Google Scholar
  14. 14.
    Zhang, L., Liao, X., Wang, X.: An image encryption approach based on chaotic maps. Chaos, Solitons & Fractals 24(3), 759–765 (2005)MathSciNetMATHCrossRefGoogle Scholar
  15. 15.
    Zhou, Y., Panetta, K., Agaian, S.: Image encryption using discrete parametric cosine transform. In: 2009 Conference Record of the Forty-Third Asilomar Conference on Signals, Systems and Computers, pp. 395–399. IEEE (2009)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Ahmet Emir Dirik
    • 1
    • 2
  • Nasir Memon
    • 2
    • 3
  1. 1.Electronic Engineering Dept., Faculty of Engineering and ArchitectureUludag UniversityBursaTurkey
  2. 2.Center for Interdisciplinary Studies in Security and PrivacyNYUAbu DhabiUAE
  3. 3.Computer Science & Engineering Dept.Polytechnic Institute of NYUUSA

Personalised recommendations