[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ Skip to main content
Log in

Compression of encrypted images with multi-layer decomposition

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

This work proposes a novel scheme of lossy compression for encrypted gray images. In the encryption phase, the original image is decomposed into a sub-image and several layers of prediction errors, and the sub-image and prediction errors are encrypted using an exclusive-or operation and a pseudo-random permutation, respectively. Although a channel provider does not know the cryptographic key and the original content, he can still effectively reduce the amount of encrypted data by quantizing the permuted prediction errors on various layers, and an optimization method with rate-distortion criteria can be employed to select the values of quantization steps. At receiver side with the knowledge of cryptographic key, a decoder integrating dequantization, decryption and image reconstruction functions is used to retrieve the principal content of original image from the compressed data. Experimental result shows the rate-distortion performance of the proposed scheme is significantly better than that of previous technique.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (United Kingdom)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Bianchi T, Piva A, Barni M (2009) On the implementation of the discrete fourier transform in the encrypted domain. IEEE Trans Inf Forensic Secur 4(1):86–97

    Article  Google Scholar 

  2. Bianchi T, Piva A, Barni M (2010) Composite signal representation for fast and storage-efficient processing of encrypted signals. IEEE Trans Inf Forensic Secur 5(1):180–187

    Article  Google Scholar 

  3. Erkin Z, Piva A, Katzenbeisser S, Lagendijk RL, Shokrollahi J, Neven G, Barni M (2007) Protection and retrieval of encrypted multimedia content: When cryptography meets signal processing. EURASIP J Inf Secur 2007:20. doi:10.1155/2007/78943

  4. Gallager RG (1963) Low density parity check codes. Ph.D. dissertation, Mass. Inst. Technol., Cambridge, MA, USA

  5. Johnson M, Ishwar P, Prabhakaran VM, Schonberg D, Ramchandran K (2004) On compressing encrypted data. IEEE Trans Sign Process 52(10):2992–3006

    Article  MathSciNet  Google Scholar 

  6. Kumar A, Makur A (2009) Lossy compression of encrypted image by compressing sensing technique. Proceedings of TENCON 2009 IEEE Region 10 Conference, pp 1–6

  7. Lazzeretti R, Barni M (2008) Lossless compression of encrypted grey-level and color images. Proceeding of 16th European Signal Processing Conference (EUSIPCO 2008), Lausanne, Switzerland, August, 2008. http://www.eurasip.org/Proceedings/Eusipco/Eusipco2008/papers/1569105134.pdf

  8. Liu W, Zeng W, Dong L, Yao Q (2010) Efficient compression of encrypted grayscale images. IEEE Trans Image Process 19(4):1097–1102

    Article  MathSciNet  Google Scholar 

  9. Lu W, Varna AL, Swaminathan A, Wu M (2009) Secure image retrieval through feature protection. In: Proceeding of IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp 1533–1536

  10. Schonberg D, Draper SC, Ramchandran K (2005) On blind compression of encrypted correlated data approaching the source entropy rate. Proceedings of the 43rd Annual Allerton Conf., Allerton, IL

  11. Schonberg D, Draper SC, Yeo C, Ramchandran K (2008) Toward compression of encrypted images and video sequences. IEEE Trans Inf Forensic Secur 3(4):749–762

    Article  Google Scholar 

  12. Troncoso-Pastoriza JR, Pérez-González F (2011) Secure adaptive filtering. IEEE Trans Inf Forensic Secur 6(2):469–485

    Article  Google Scholar 

  13. Zhang X (2011) Reversible data hiding in encrypted image. IEEE Signal Process Lett 18(4):255–258

    Article  Google Scholar 

  14. Zhang X (2011) Lossy compression and iterative reconstruction for encrypted image. IEEE Trans Inf Forensic Secur 6(1):53–58

    Article  Google Scholar 

Download references

Acknowledgments

This work was supported by the National Natural Science Foundation of China under Grant 61073190, by the Research Fund for the Doctoral Program of Higher Education of China under Grant 20113108110010, and by the Program for Professor of Special Appointment (Eastern Scholar) at Shanghai Institutions of Higher Learning.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xinpeng Zhang.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Zhang, X., Sun, G., Shen, L. et al. Compression of encrypted images with multi-layer decomposition. Multimed Tools Appl 72, 489–502 (2014). https://doi.org/10.1007/s11042-013-1392-1

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-013-1392-1

Keywords

Navigation