A Grayscale Based Block Scrambling Image Encryption to Enhance the Security of Encryption Then Compression for Jpeg Images

Abstract

A grayscale based block scrambling image encryption scheme is presented to enhance the security of Encryption then Compression systems, which are used to securely transmit images through an un trusted social channel provider. This scheme is implemented by using the small sized blocks and a large number of blocks than the previously used encryption scheme. Due to the use of less color information (I.e. we use the grayscale images) the encryption can be done securely. The original image has three color channels (RGB) which decreases the security against various attacks, such as jigsaw puzzle solver and brute force attacks. This scheme allows the use of color sub sampling, which can improve the compression performance, although the encrypted images have no color information. In these schemes we upload the encrypted images and then download from Social networking sites, and the results after that is effective for Encryption then- Compression systems, while maintaining a high compression performance using advance compression algorithm.

Country : India

1 Yeramala Kalavathi

  1. Assistant Professor, Department of Electronics and Communication Engineering, Malla Reddy College of Engineering for Women, Hyderabad -500100, Telangana, India

IRJIET, Volume 1, Issue 2, November 2017 pp. 23-26

.

References

  1. C. T. Huang, L. Huang, Z. Qin, H. Yuan, L. Zhou, V. Varadharajan, and C.- C. J. Kuo, “Survey on securing data storage in the cloud,” APSIPA Transactions on Signal and Information Processing, vol. 3, e7, 2014.
  2. R. Lagendijk, Z. Erkin, and M. Barni, “Encrypted signal processing for privacy protection: Conveying the utility of homomorphic encryption and multiparty computation,” IEEE Signal Processing Magazine, vol. 30, no. 1, pp. 82–105, 2013.
  3. J. Zhou, X. Liu, O. C. Au, and Y. Y. Tang, “Designing an efficient image encryption-then-compression system via prediction error clustering and random permutation,” IEEE Transactions on Information Forensics and Security, vol. 9, no. 1, pp. 39–50, 2014.
  4. M.-R. Ra, R. Govindan, and A. Ortega, “P3: Toward privacy-preserving photo sharing,” in Proceedings of the 10th USENIX Conference on Networked Systems Design and Implementation, 2013, pp. 515–528.
  5. W. Zeng and S. Lei, “Efficient frequency domain selective scrambling of digital video,” IEEE Transactions on Multimedia, vol. 5, no. 1, pp. 118–129, 2003.
  6. I.Ito and H. Kiya, “A new class of image registration for guaranteeing secure data management,” in IEEE International Conference on Image Processing (ICIP), 2008, pp. 269–272.
  7. H. Kiya and I. Ito, “Image matching between scrambled images for secure data management,” in 16th European Signal Processing Conference (EUSIPCO), 2008, pp. 1–5.
  8. H. Kiya, “One-time key based phase scrambling for phaseonly correlation between visually protected images,” EURASIP Journal on Information Security, vol. 2009, no. 841045, pp. 1–11, 2010.
  9. Z. Tang, X. Zhang, and W. Lan, “Efficient image encryption with block shuffling and chaotic map,” Multimedia Tools Applications, vol. 74, no. 15, pp. 5429–5448, 2015.
  10. C. Li, D. Lin, and J. Lu, “Cryptanalyzing an image- scrambling encryption algorithm of pixel bits,” IEEE Transactions on Multimedia, vol. 3, pp. 64–71, 2017.