A Grayscale Based Block Scrambling Image Encryption to Enhance the Security of Encryption Then Compression for Jpeg Images
Abstract
A grayscale based
block scrambling image encryption scheme is presented to enhance the security
of Encryption then Compression systems, which are used to securely transmit
images through an un trusted social channel provider. This scheme is
implemented by using the small sized blocks and a large number of blocks than
the previously used encryption scheme. Due to the use of less color information
(I.e. we use the grayscale images) the encryption can be done securely. The
original image has three color channels (RGB) which decreases the security
against various attacks, such as jigsaw puzzle solver and brute force attacks.
This scheme allows the use of color sub sampling, which can improve the
compression performance, although the encrypted images have no color
information. In these schemes we upload the encrypted images and then download
from Social networking sites, and the results after that is effective for
Encryption then- Compression systems, while maintaining a high compression
performance using advance compression algorithm.
Country : India
1 Yeramala Kalavathi
Assistant Professor, Department of Electronics and Communication Engineering, Malla Reddy College of Engineering for Women, Hyderabad -500100, Telangana, India
IRJIET, Volume 1, Issue 2, November 2017 pp. 23-26
C. T. Huang, L. Huang, Z. Qin, H. Yuan, L. Zhou, V.
Varadharajan, and C.- C. J. Kuo, “Survey on securing data storage in the
cloud,” APSIPA Transactions on Signal and Information Processing, vol. 3, e7,
2014.
R. Lagendijk, Z. Erkin, and M. Barni, “Encrypted signal
processing for privacy protection: Conveying the utility of homomorphic
encryption and multiparty computation,” IEEE Signal Processing Magazine, vol.
30, no. 1, pp. 82–105, 2013.
J. Zhou, X. Liu, O. C. Au, and Y. Y. Tang, “Designing an
efficient image encryption-then-compression system via prediction error
clustering and random permutation,” IEEE Transactions on Information Forensics
and Security, vol. 9, no. 1, pp. 39–50, 2014.
M.-R. Ra, R. Govindan, and A. Ortega, “P3: Toward
privacy-preserving photo sharing,” in Proceedings of the 10th USENIX Conference
on Networked Systems Design and Implementation, 2013, pp. 515–528.
W. Zeng and S. Lei, “Efficient frequency domain selective
scrambling of digital video,” IEEE Transactions on Multimedia, vol. 5, no. 1,
pp. 118–129, 2003.
I.Ito and H. Kiya, “A new class of image registration for
guaranteeing secure data management,” in IEEE International Conference on Image
Processing (ICIP), 2008, pp. 269–272.
H. Kiya and I. Ito, “Image matching between scrambled images
for secure data management,” in 16th European Signal Processing Conference
(EUSIPCO), 2008, pp. 1–5.
H. Kiya, “One-time key based phase scrambling for phaseonly
correlation between visually protected images,” EURASIP Journal on Information
Security, vol. 2009, no. 841045, pp. 1–11, 2010.
Z. Tang, X. Zhang, and W. Lan, “Efficient image encryption
with block shuffling and chaotic map,” Multimedia Tools Applications, vol. 74,
no. 15, pp. 5429–5448, 2015.
C. Li, D. Lin, and J. Lu, “Cryptanalyzing an image-
scrambling encryption algorithm of pixel bits,” IEEE Transactions on
Multimedia, vol. 3, pp. 64–71, 2017.