[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ Skip to main content

Advertisement

Log in

Commutative encryption and authentication for OpenEXR high dynamic range images

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

For the sake of image security, confidentiality and integrity are always the first two concerns and can be further guaranteed by image encryption and authentication techniques, respectively. However, traditional image encryption and authentication for low dynamic range (LDR) images are not suitable to protect high dynamic range (HDR) images directly. Thus, encryption and authentication of HDR images should be redesigned and tailor-made. In this paper, a commutative HDR image encryption and authentication scheme is proposed to protect the promising one of HDR image formats, i.e., OpenEXR. Each HDR pixel value, which is recorded by 16-bit half floating-point numbers in the chunks part of the OpenEXR file layout, is split into the confidentiality part and the integrity part of the images. The most significant part is encrypted for confidentiality and the least significant one is used to embed the authentication bits. The proposed scheme not only guarantees the confidentiality and integrity of HDR images but also achieves format-compliance. To the best of our knowledge, this is the first attempt of research in terms of commutative encryption and authentication to HDR images. It enables the convenience or flexibility of verifying the integrity before/after decryption such that the proposed scheme is practical in real applications. The experimental results and theoretical analyses demonstrate that the proposed scheme does work well.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (United Kingdom)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Adobe Photoshop, http://www.adobe.com/. Accessed 31 January 2021

  2. Anand, A., Raj, A., Kohli, R., & Bibhu, V. (2016, February). Proposed symmetric key cryptography algorithm for data security. In 2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH) (pp. 159-162). IEEE.

  3. Autodesk 3ds Max, https://www.autodesk.com/. Accessed 31 January 2021

  4. Autrusseau, F., & Goudia, D. (2013, September). Non linear hybrid watermarking for high dynamic range images. In 2013 IEEE International Conference on Image Processing (pp. 4527-4531). IEEE.

  5. Brooker D (2012) Essential CG lighting techniques with 3ds Max. CRC Press

  6. Chang CC, Nguyen TS, Lin CC (2013) Distortion-free data embedding scheme for high dynamic range images. J Electron Sci Technol 11(1):20–26

    Google Scholar 

  7. Chang CC, Nguyen TS, Lin CC (2016) A new distortion-free data embedding scheme for high-dynamic range images. Multimed Tools Appl 75(1):145–163

    Article  Google Scholar 

  8. Chen TH, Chang SS (2014) Image encryption on HDR images for OpenEXR format. Int J Sci Eng 4(4):19–23

    Google Scholar 

  9. Chen TS, Chang CC, Hwang MS (1998) A virtual image cryptosystem based upon vector quantization. IEEE Trans Image Process 7(10):1485–1488

    Article  MathSciNet  Google Scholar 

  10. Chen WH, Luo S, Zheng WX (2016) Impulsive synchronization of reaction–diffusion neural networks with mixed delays and its application to image encryption. IEEE Trans Neural Netw Learning Syst 27(12):2696–2710

    Article  Google Scholar 

  11. Cheng YM, Wang CM (2009) A novel approach to steganography in high-dynamic-range images. IEEE Comput Archit Lett 16(03):70–80

    Google Scholar 

  12. Cryptography Stack Exchange, https://crypto.stackexchange.com/questions/9603/why-should-i-make-my-cipher-public. Accessed 31 January 2021

  13. Gong X, Chen L, Yu F, Zhao X, Wang S (2020) A secure image authentication scheme based on dual fragile watermark. Multimed Tools Appl 79(25):18071–18088

    Article  Google Scholar 

  14. Guerrini F, Okuda M, Adami N, Leonardi R (2011) High dynamic range image watermarking robust against tone-mapping operators. IEEE Trans Inform Forensics Secur 6(2):283–295

    Article  Google Scholar 

  15. Hoefflinger B (2007) High-dynamic-range (HDR) vision. Springer, Berlin Heidelberg

  16. Huang Y, Huang L, Wang Y, Peng Y, Yu F (2020) Shape synchronization in driver-response of 4-D chaotic system and its application in image encryption. IEEE Access 8:135308–135319

    Article  Google Scholar 

  17. Kahan W (1996) IEEE standard 754 for binary floating-point arithmetic. Lecture Notes on the Status of IEEE 754(94720–1776):11

    Google Scholar 

  18. Kainz F, Bogart R, Stanczyk P (2009) Technical introduction to OpenEXR. Industrial light and magic, 21. ISO 690.

  19. Kamili A, Hurrah NN, Parah SA, Bhat GM, Muhammad K (2020) DWFCAT: dual watermarking framework for industrial image authentication and tamper localization. IEEE Trans Indust Inform 17:5108–5117. https://doi.org/10.1109/TII.2020.3028612

    Article  Google Scholar 

  20. Khurana M, Singh H (2020) Two level phase retrieval in fractional Hartley domain for secure image encryption and authentication using digital signatures. Multimed Tools Appl 79(19):13967–13986

    Article  Google Scholar 

  21. Kwon HJ, Lee SH (2019) CAM-based HDR image reproduction using CA–TC decoupled JCh decomposition. Signal Process Image Commun 70:1–13

    Article  Google Scholar 

  22. Larson GW (1998) Logluv encoding for full-gamut, high-dynamic range images. Journal of Graphics Tools 3(1):15–31

    Article  Google Scholar 

  23. LaserSoft Imaging SilverFast, http://www.silverfast.com/. Accessed 31 January 2021

  24. Li MT, Huang NC, Wang CM (2011) A data hiding scheme for high dynamic range images. International Journal of Innovative Computing Information and Control (IJICIC) 7(5A):2021–2035

    Google Scholar 

  25. Li X, Sun X, Liu Q (2014) Image integrity authentication scheme based on fixed point theory. IEEE Trans Image Process 24(2):632–645

    MathSciNet  MATH  Google Scholar 

  26. Li Z, Wei Z, Wen C, Zheng J (2017) Detail-enhanced multi-scale exposure fusion. IEEE Trans Image Process 26(3):1243–1252

    Article  MathSciNet  Google Scholar 

  27. Lin PY, Lee JS, Chang CC (2011) Protecting the content integrity of digital imagery with fidelity preservation. ACM Trans Multimed Comput Commun Appl (TOMM) 7(3):1–20

    Article  Google Scholar 

  28. Lin KS, Chen TH, Lin CH, Chang SS (2014) A tailor-made encryption scheme for high-dynamic range images, In genetic and evolutionary computing (pp. 183–192). Springer, Cham

  29. Lin YT, Wang CM, Chen WS, Lin FP, Lin W (2016) A novel data hiding algorithm for high dynamic range images. IEEE Trans Multimed 19(1):196–211

    Article  Google Scholar 

  30. Lo CC, Hu YC (2014) A novel reversible image authentication scheme for digital images. Signal Process 98:174–185

    Article  Google Scholar 

  31. Mahmalat S, Aydın TO, Smolic A (2017) Pipelines for HDR video coding based on luminance independent chromaticity preprocessing. IEEE Trans Circ Syst Video Technol 28(12):3467–3477

    Article  Google Scholar 

  32. Matsumoto M, Nishimura T (1998) Mersenne twister: a 623-dimensionally equidistributed uniform pseudo-random number generator. ACM Trans Model Comput Simul (TOMACS) 8(1):3–30

    Article  Google Scholar 

  33. Niu Y, Zhou Z, Zhang X (2020) An image encryption approach based on chaotic maps and genetic operations. Multimed Tools Appl 79(35):25613–25633

    Article  Google Scholar 

  34. NVIDA developer, https://developer.nvidia.com/high-dynamic-range-display-development. Accessed 31 January 2021

  35. OpenEXR downloads, http://www.openexr.com/downloads.html. Accessed 31 January 2021

  36. Rajesh S, Paul V, Menon VG, Khosravi MR (2019) A secure and efficient lightweight symmetric encryption scheme for transfer of text files between embedded IoT devices. Symmetry 11(2):293

    Article  Google Scholar 

  37. Reinhard E, Heidrich W, Debevec P, Pattanaik S, Ward G, Myszkowski K (2010) High dynamic range imaging: acquisition, display, and image-based lighting. Morgan Kaufmann

  38. Stallings W (2013) Cryptography and network security: principles and practice. Pearson, sixth edition.

  39. Voyatzis, G., & Pitas, I. (1996, September). Applications of toral automorphisms in image watermarking. In proceedings of 3rd IEEE International Conference on Image Processing (Vol. 2, pp. 237-240). IEEE.

  40. Ward G (1991) Real pixels. Graphic gems II, edited by J. Arvo, academic press, Boston, MA.

  41. Yan, J. Y., Chen, T. H., & Lin, C. H. (2013, October). Encryption in high dynamic range images for RGBE format. In 2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (pp. 493-496). IEEE.

  42. Yan J.Y., Jeng F.G. & Chen T.H. (2014) An image authentication scheme for high dynamic range images. Proceedings of the 5th international conference on systematic innovation (ICSI).

  43. Yu CM, Wu KC, Wang CM (2011) A distortion-free data hiding scheme for high dynamic range images. Displays 32(5):225–236

    Article  Google Scholar 

  44. Zhang LY, Liu Y, Pareschi F, Zhang Y, Wong KW, Rovatti R, Setti G (2017) On the security of a class of diffusion mechanisms for image encryption. IEEE Trans Cybern 48(4):1163–1175

    Article  Google Scholar 

Download references

Acknowledgments

This work was supported in part by the Ministry of Science and Technology of Taiwan under grant MOST 107-2221-E-415 -001 -MY3.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tzung-Her Chen.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chen, TH., Yan, JY. Commutative encryption and authentication for OpenEXR high dynamic range images. Multimed Tools Appl 80, 27807–27828 (2021). https://doi.org/10.1007/s11042-021-11002-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-021-11002-y

Keywords

Navigation