Full Text:   <3466>

Summary:  <1865>

CLC number: TP309

On-line Access: 2014-06-06

Received: 2013-09-18

Revision Accepted: 2014-01-22

Crosschecked: 2014-05-04

Cited: 6

Clicked: 8327

Citations:  Bibtex RefMan EndNote GB/T7714

-   Go to

Article info.
1. Reference List
Open peer comments

Journal of Zhejiang University SCIENCE C 2014 Vol.15 No.6 P.435-444

http://doi.org/10.1631/jzus.C1300262


Performance study of selective encryption in comparison to full encryption for still visual images


Author(s):  Osama A. Khashan, Abdullah M. Zin, Elankovan A. Sundararajan

Affiliation(s):  Centre for Software Technology and Management, Faculty of Information Science and Technology, National University of Malaysia (UKM), Bangi 43600, Selangor, Malaysia

Corresponding email(s):   o_khashan@yahoo.com, amz@ftsm.ukm.my, elan@ftsm.ukm.my

Key Words:  Selective image encryption, Edge detection, Face detection


Osama A. Khashan, Abdullah M. Zin, Elankovan A. Sundararajan. Performance study of selective encryption in comparison to full encryption for still visual images[J]. Journal of Zhejiang University Science C, 2014, 15(6): 435-444.

@article{title="Performance study of selective encryption in comparison to full encryption for still visual images",
author="Osama A. Khashan, Abdullah M. Zin, Elankovan A. Sundararajan",
journal="Journal of Zhejiang University Science C",
volume="15",
number="6",
pages="435-444",
year="2014",
publisher="Zhejiang University Press & Springer",
doi="10.1631/jzus.C1300262"
}

%0 Journal Article
%T Performance study of selective encryption in comparison to full encryption for still visual images
%A Osama A. Khashan
%A Abdullah M. Zin
%A Elankovan A. Sundararajan
%J Journal of Zhejiang University SCIENCE C
%V 15
%N 6
%P 435-444
%@ 1869-1951
%D 2014
%I Zhejiang University Press & Springer
%DOI 10.1631/jzus.C1300262

TY - JOUR
T1 - Performance study of selective encryption in comparison to full encryption for still visual images
A1 - Osama A. Khashan
A1 - Abdullah M. Zin
A1 - Elankovan A. Sundararajan
J0 - Journal of Zhejiang University Science C
VL - 15
IS - 6
SP - 435
EP - 444
%@ 1869-1951
Y1 - 2014
PB - Zhejiang University Press & Springer
ER -
DOI - 10.1631/jzus.C1300262


Abstract: 
Securing digital images is becoming an important concern in today’s information security due to the extensive use of secure images that are either transmitted over a network or stored on disks. Image encryption is the most effective way to fulfil confidentiality and protect the privacy of images. Nevertheless, owing to the large size and complex structure of digital images, the computational overhead and processing time needed to carry out full image encryption prove to be limiting factors that inhibit it of being used more heavily in real time. To solve this problem, many recent studies use the selective encryption approach to encrypt significant parts of images with a hope to reduce the encryption overhead. However, it is necessary to realistically evaluate its performance compared to full encryption. In this paper, we study the performance and efficiency of image segmentation methods used in the selective encryption approach, such as edges and face detection methods, in determining the most important parts of visual images. Experiments were performed to analyse the computational results obtained by selective image encryption compared to full image encryption using symmetric encryption algorithms. Experiment results have proven that the selective encryption approach based on edge and face detection can significantly reduce the time of encrypting still visual images as compared to full encryption. Thus, this approach can be considered a good alternative in the implementation of real-time applications that require adequate security levels.

静态视觉图像全加密与选择加密性能比较研究

研究目的:安全图像的广泛使用,使得数字图像安全防护成为信息安全领域的一个重要关注点。图像加密是保障机密、保护隐私最为有效的方法。然而,数字图像的大尺寸和复杂结构,使得图像全加密耗费巨大计算量和处理时间,不利于其在实时系统中频繁使用。因此,许多近期研究采用选择加密,只对图像重要部分加密,以降低加密成本。相比全加密,选择加密性能如何?有必要加以评估。
研究方法:本文研究了选择加密方法中运用的图像分割方法(如边缘检测和人脸检测)在视觉图像重要部分判定上的性能和效率。通过实验,对采用对称加密算法的选择加密和全加密的运算结果进行比较。
重要结论:实验结果证实,较之全加密,基于边缘和人脸检测的选择加密方法显著减少静态视觉图像的加密时间。选择加密适合于对安全等级有适当要求的实时应用。

关键词:选择性图像加密;边缘检测;人脸检测

Darkslateblue:Affiliate; Royal Blue:Author; Turquoise:Article

Reference

[1]Amigó, J.M., Kocarev, L., Szczepanski, J., 2007. Theory and practice of chaotic cryptography. Phys. Lett. A, 366(3):211-216.

[2]Bhatnagar, G., Wu, Q.M., 2012. Selective image encryption based on pixels of interest and singular value decomposition. Dig. Signal Process., 22:648-663.

[3]Chen, T.S., Chang, C.C., Hwang, M.S., 1998. A virtual image cryptosystem based upon vector quantization. IEEE Trans. Image Process., 7(10):1485-1488.

[4]Cheng, H., Li, X., 2000. Partial encryption of compressed images and videos. IEEE Trans. Signal Process., 48(8):2439-2451.

[5]Droogenbroeck, M.V., Benedett, R., 2002. Techniques for a selective encryption of uncompressed and compressed images. Proc. Advanced Concepts for Intelligent Vision Systems, p.90-97.

[6]El-Fishawy, N., Abu Zaid, O.M., 2007. Quality of encryption measurement of bitmap images with RC6, MRC6, and Rijndael block cipher algorithms. Int. J. Network Secur., 5(3):241-251.

[7]Flayh, N.A., Parveen, R., Ahson, S.I., 2009. Wavelet based partial image encryption. Proc. Int. Multimedia, Signal Processing and Communication Technologies, p.32-35.

[8]Khashan, O.A., Zin, A.M., 2013. An efficient adaptive of transparent spatial digital image encryption. Proc. 4th Int. Conf. on Electrical Engineering and Informatics, p.288-297.

[9]Krikor, L., Baba, S., Arif, T., et al., 2009. Image encryption using DCT and stream cipher. Eur. J. Sci. Res., 32(1):48-58.

[10]Kulkarni , N.S., Raman, B., Gupta, I., 2009. Multimedia encryption: a brief overview. Recent Advances in Multimedia Signal Processing and Communications Studies in Computational Intelligence. In: Grgic, M., Delac, K., Ghanbari, M. (Eds.), Studies in Computational Intelligence, Springer Heidelberg, 231:417-449.

[11]Li, C., Lo, K., 2011. Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Process., 91(4):949-954.

[12]Li, S., Li, C., Chen, G., et al., 2008. A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Process. Image Commun., 23(3):212-223.

[13]Lian, S., Chen, X., 2013. On the design of partial encryption scheme for multimedia content. Math. Comput. Model., 57(11-12):2613-2624.

[14]Liu, H.J., Wang, X.Y., 2010. Color image encryption based on one-time keys and robust chaotic maps. Comput. Math. Appl., 59(10):3320-3327.

[15]Maini, R., Sohal, J.S., 2006. Performance evaluation of Prewitt edge detector for noisy images. Int. J. Graph. Vis. Image Process., 6(3):39-46.

[16]Martin, K., Lukac, R., Plataniotis, K., 2005. Efficient encryption of wavelet-based coded color images. Pattern Recogn., 38(7):1111-1115.

[17]Norcen, R., Podesser, M., Pommer, A., et al., 2003. Confidential storage and transmission of medical image data. Comput. Biol. Med., 33(3):277-292.

[18]OpenCV, 2013. Open Source Computer Vision Library. Available from http://opencv.org/.

[19]Podesser, M., Schmidt, H.P., Uhl, A., 2002. Selective bitplane encryption for secure transmission of image data in mobile environments. Proc. 5th Nordic Signal Processing Symp., p.1034-1037.

[20]Prewitt, J.M.S., 1970. Object Enhancement and Extraction: Picture Processing and Psychopictorics. Academic Press Inc., USA, p.75-150.

[21]Puech, W., Bors, A.G., Rodrigues, J.M., 2013. Protection of colour images by selective encryption. Adv. Color Image Process. Anal., p.397-421.

[22]Shekhar, S., Srivastava, H., Dutta, M.K., 2012. An efficient adaptive encryption algorithm for digital images. Int. J. Comput. Electr. Eng., 4(3):380-383.

[23]Stutz, T., Uhl, A., 2006. Transparent image encryption using progressive JPEG. LNCS, 4176:286-298.

[24]Subba Rao, Y.V., Mitra, A., Mahadeva Prasanna, S.R., 2006. A partial image encryption method with pseudo random sequences. LNCS, 4332:315-325.

[25]Tolba, A.S., El-Baz, A.H., El-Harby, A.A., 2006. Face recognition: a literature review. Int. J. Signal Process., 2(2):88-103.

[26]Verma, O.P., Agarwal, R., Dafouti, D., et al., 2011. Performance analysis of data encryption algorithms. 3rd IEEE Int. Conf. on Electronics Computer Technology, p.399-403.

[27]Viola, P., Jones, M., 2001. Rapid object detection using a boosted cascade of simple features. IEEE Computer Society Conf. on Computer Vision and Pattern Recognition, p.511-518.

[28]Zhang, D., Zhang, F., 2013. Chaotic encryption and decryption of JPEG image. Optik-Int. J. Light Electron Opt., 125(2):717-720.

[29]Zhang, X., Wang, X., 2013. Chaos-based partial encryption of SPIHT coded color images. Signal Process., 93(9):2422-2431.

[30]Zhang, Y., Xiao, D., Wen, W., et al., 2013a. Vulnerability to chosen-plaintext attack of a general optical encryption model with the architecture of scrambling-then-double random phase encoding. Opt. Lett., 38(21):4506-4509.

[31]Zhang, Y., Xiao, D., Wen, W., et al., 2013b. Edge-based lightweight image encryption using chaos-based reversible hidden transform and multiple-order discrete fractional cosine transform. Opt. Laser Technol., 54:1-6.

[32]Zhang, Y., Xiao, D., Liu, H., et al., 2013c. GLS coding based security solution to JPEG with the structure of aggregated compression and encryption. Commun. Nonl. Sci. Numer. Simul., 19(5):1366-1374.

[33]Zhao, X.Y., Chen, G., Zhang, D., et al., 2004. Decryption of pure-position permutation algorithms. J. Zhejiang Univ. Sci., 5(7):803-809.

[34]Zhou, Y., Panetta, K., Agaian, S., 2009. A lossless encryption method for medical images using edge maps. 31st Annual Int. Conf. on IEEE Engineering in Medicine & Biology Society, p.3707-3710.

Open peer comments: Debate/Discuss/Question/Opinion

<1>

Please provide your name, email address and a comment





Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2024 Journal of Zhejiang University-SCIENCE