Fast Encryption of JPEG 2000 Images in Wireless Multimedia Sensor Networks

  • Tao Xiang
  • Chenyun Yu
  • Fei Chen
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7992)


A selective encryption algorithm joint with compression coding is proposed to protect JPEG 2000 images in wireless multimedia sensor networks (WMSN). The algorithm selectively encrypts the lookup table of probability model in MQ coding. As the size of lookup table is fixed and only such one table is used for an image, the proposed algorithm is fairly efficient and thus can perform fast encryption on large volume of JPEG 2000 images in WMSN. Experimental results and their analysis show that the algorithm is secure and energy saving, meanwhile, it does not impair the compression performance of JPEG 2000 coding obviously.


Sensor Node Wireless Sensor Network Lookup Table Encryption Algorithm Encrypt Image 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Akyildiz, I., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Computer Networks 38(4), 393–422 (2002)CrossRefGoogle Scholar
  2. 2.
    Akyildiz, I., Melodia, T., Chowdhury, K.R.: A survey on wireless multimedia sensor networks. Computer Networks 51(4), 921–960 (2007)CrossRefGoogle Scholar
  3. 3.
    Cheng, H., Li, X.: Partial encryption of compressed images and videos. IEEE Transactions on Signal Processing 48(8), 2439–2451 (2000)MathSciNetCrossRefGoogle Scholar
  4. 4.
    Podesser, M., Schmidt, H.P., Uhl, A.: Selective bitplane encryption for secure transmission of image data in mobile environments. In: IEEE Nordic Signal Processing Symposium (NORSIG 2002), Tromso-Trondheim, Norway (2002)Google Scholar
  5. 5.
    Sadourny, Y., Conan, V.: A proposal for supporting selective encryption in JPSEC. IEEE Transactions on Consumer Electronics 49(4), 846–849 (2003)CrossRefGoogle Scholar
  6. 6.
    Pfarrhofer, R., Uhl, A.: Selective image encryption using JBIG. In: Dittmann, J., Katzenbeisser, S., Uhl, A. (eds.) CMS 2005. LNCS, vol. 3677, pp. 98–107. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  7. 7.
    Grangetto, M., Magli, E., Olmo, G.: Multimedia selective encryption by means of randomized arithmetic coding. IEEE Transactions on Multimedia 8(5), 905–917 (2006)CrossRefGoogle Scholar
  8. 8.
    Liu, J.L.: Efficient selective encryption for JPEG 2000 images using private initial table. Pattern Recognition 39(8), 1509–1517 (2006)zbMATHCrossRefGoogle Scholar
  9. 9.
    Christopoulos, C., Skodras, A., Ebrahimi, T.: The JPEG2000 still image coding system: an overview. IEEE Transactions on Consumer Electronics 46(4), 1103–1127 (2000)CrossRefGoogle Scholar
  10. 10.
    Chang, H.K.C., Liu, J.L.: A linear quadtree compression scheme for image encryption. Signal Processing: Image Communication 10(4), 279–290 (1997)CrossRefGoogle Scholar
  11. 11.
    Lian, S., Sun, J., Wang, Z.: Perceptual cryptography on SPIHT compressed images or videos. In: IEEE International Conference on Multimedia and Expo (ICME 2004), Taipei, Taiwan, pp. 2195–2198 (2004)Google Scholar
  12. 12.
    Lian, S., Sun, J., Wang, Z.: A secure 3D-SPIHT codec. In: European Signal Processing Conference (EUSIPCO 2004), Vienna, Austria, pp. 813–816 (2004)Google Scholar
  13. 13.
    Wu, C.P., Kuo, C.C.J.: Design of integrated multimedia compression and encryption systems. IEEE Transactions on Multimedia 7(5), 828–839 (2005)CrossRefGoogle Scholar
  14. 14.
    Martin, K., Lukac, R., Plataniotis, K.N.: Efficient encryption of wavelet-based coded color images. Pattern Recognition 38(7), 1111–1115 (2005)zbMATHCrossRefGoogle Scholar
  15. 15.
    Wen, J., Kim, H., Villasenor, J.D.: Binary arithmetic coding with key-based interval splitting. IEEE Signal Processing Letters 13(2), 69–72 (2006)CrossRefGoogle Scholar
  16. 16.
    Kim, H., Wen, J., Villasenor, J.D.: Secure arithmetic coding. IEEE Transactions on Signal Processing 55(5), 2263–2272 (2007)MathSciNetCrossRefGoogle Scholar
  17. 17.
    Martin, K., Member, S., Plataniotis, K.N.: Privacy protected surveillance using secure visual object coding. IEEE Transactions on Circuits and Systems for Video Technology 18(8), 1152–1162 (2008)CrossRefGoogle Scholar
  18. 18.
    Li, H., Zhang, J.: A secure and efficient entropy coding based on arithmetic coding. Communications in Nonlinear Science and Numerical Simulation 14(12), 4304–4318 (2009)MathSciNetzbMATHCrossRefGoogle Scholar
  19. 19.
    Taneja, N., Raman, B., Gupta, I.: Partial encryption on SPIHT compressed images. In: Chaudhury, S., Mitra, S., Murthy, C.A., Sastry, P.S., Pal, S.K. (eds.) PReMI 2009. LNCS, vol. 5909, pp. 426–431. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  20. 20.
    Hermassi, H., Rhouma, R., Belghith, S.: Joint compression and encryption using chaotically mutated Huffman trees. Communications in Nonlinear Science and Numerical Simulation 15(10), 2987–2999 (2010)MathSciNetzbMATHCrossRefGoogle Scholar
  21. 21.
    Wong, K.W., Lin, Q., Chen, J.: Simultaneous arithmetic coding and encryption using chaotic maps. IEEE Transactions on Circuits and Systems Part II: Express Briefs 57(2), 146–150 (2010)CrossRefGoogle Scholar
  22. 22.
    Wang, W., Peng, D., Wang, H., Sharif, H.: A cross layer resource allocation scheme for secure image delivery in wireless sensor networks. In: 2007 International Conference on Wireless Communications and Mobile Computing (IWCMC 2007), Hawaii, USA, pp. 152–157 (2007)Google Scholar
  23. 23.
    Wang, W., Peng, D., Wang, H., Sharif, H., Chen, H.H.: Energy-constrained quality optimization for secure image transmission in wireless sensor networks. Advances in Multimedia 1, 1–9 (2007)Google Scholar
  24. 24.
    Wang, W., Peng, D., Wang, H., Sharif, H.: An adaptive approach for image encryption and secure transmission over multirate wireless sensor networks. Wireless Communications and Mobile Computing 9, 383–393 (2009)CrossRefGoogle Scholar
  25. 25.
    Wang, H., Hempel, M., Peng, D., Wang, W., Sharif, H., Chen, H.H.: Index-based selective audio encryption for wireless multimedia sensor networks. IEEE Transactions on Multimedia 12(3), 215–223 (2010)CrossRefGoogle Scholar
  26. 26.
    Wang, H., Hempel, M., Peng, D., Wang, W., Sharif, H., Chen, H.H.: On energy efficient encryption for video streaming in wireless sensor networks. IEEE Transactions on Multimedia 12(5), 417–426 (2010)CrossRefGoogle Scholar
  27. 27.
    Taubman, D.S., Marcellin, M.W.: JPEG2000: Compression Fundamentals, Standards and Practice. Kluwer Academic Publishers (2002)Google Scholar
  28. 28.

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Tao Xiang
    • 1
  • Chenyun Yu
    • 1
  • Fei Chen
    • 2
  1. 1.College of Computer ScienceChongqing UniversityChongqingChina
  2. 2.Department of Computer Science and EngineeringThe Chinese University of Hong KongHong KongChina

Personalised recommendations