Abstract
For the sake of image security, confidentiality and integrity are always the first two concerns and can be further guaranteed by image encryption and authentication techniques, respectively. However, traditional image encryption and authentication for low dynamic range (LDR) images are not suitable to protect high dynamic range (HDR) images directly. Thus, encryption and authentication of HDR images should be redesigned and tailor-made. In this paper, a commutative HDR image encryption and authentication scheme is proposed to protect the promising one of HDR image formats, i.e., OpenEXR. Each HDR pixel value, which is recorded by 16-bit half floating-point numbers in the chunks part of the OpenEXR file layout, is split into the confidentiality part and the integrity part of the images. The most significant part is encrypted for confidentiality and the least significant one is used to embed the authentication bits. The proposed scheme not only guarantees the confidentiality and integrity of HDR images but also achieves format-compliance. To the best of our knowledge, this is the first attempt of research in terms of commutative encryption and authentication to HDR images. It enables the convenience or flexibility of verifying the integrity before/after decryption such that the proposed scheme is practical in real applications. The experimental results and theoretical analyses demonstrate that the proposed scheme does work well.
Similar content being viewed by others
References
Adobe Photoshop, http://www.adobe.com/. Accessed 31 January 2021
Anand, A., Raj, A., Kohli, R., & Bibhu, V. (2016, February). Proposed symmetric key cryptography algorithm for data security. In 2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH) (pp. 159-162). IEEE.
Autodesk 3ds Max, https://www.autodesk.com/. Accessed 31 January 2021
Autrusseau, F., & Goudia, D. (2013, September). Non linear hybrid watermarking for high dynamic range images. In 2013 IEEE International Conference on Image Processing (pp. 4527-4531). IEEE.
Brooker D (2012) Essential CG lighting techniques with 3ds Max. CRC Press
Chang CC, Nguyen TS, Lin CC (2013) Distortion-free data embedding scheme for high dynamic range images. J Electron Sci Technol 11(1):20–26
Chang CC, Nguyen TS, Lin CC (2016) A new distortion-free data embedding scheme for high-dynamic range images. Multimed Tools Appl 75(1):145–163
Chen TH, Chang SS (2014) Image encryption on HDR images for OpenEXR format. Int J Sci Eng 4(4):19–23
Chen TS, Chang CC, Hwang MS (1998) A virtual image cryptosystem based upon vector quantization. IEEE Trans Image Process 7(10):1485–1488
Chen WH, Luo S, Zheng WX (2016) Impulsive synchronization of reaction–diffusion neural networks with mixed delays and its application to image encryption. IEEE Trans Neural Netw Learning Syst 27(12):2696–2710
Cheng YM, Wang CM (2009) A novel approach to steganography in high-dynamic-range images. IEEE Comput Archit Lett 16(03):70–80
Cryptography Stack Exchange, https://crypto.stackexchange.com/questions/9603/why-should-i-make-my-cipher-public. Accessed 31 January 2021
Gong X, Chen L, Yu F, Zhao X, Wang S (2020) A secure image authentication scheme based on dual fragile watermark. Multimed Tools Appl 79(25):18071–18088
Guerrini F, Okuda M, Adami N, Leonardi R (2011) High dynamic range image watermarking robust against tone-mapping operators. IEEE Trans Inform Forensics Secur 6(2):283–295
Hoefflinger B (2007) High-dynamic-range (HDR) vision. Springer, Berlin Heidelberg
Huang Y, Huang L, Wang Y, Peng Y, Yu F (2020) Shape synchronization in driver-response of 4-D chaotic system and its application in image encryption. IEEE Access 8:135308–135319
Kahan W (1996) IEEE standard 754 for binary floating-point arithmetic. Lecture Notes on the Status of IEEE 754(94720–1776):11
Kainz F, Bogart R, Stanczyk P (2009) Technical introduction to OpenEXR. Industrial light and magic, 21. ISO 690.
Kamili A, Hurrah NN, Parah SA, Bhat GM, Muhammad K (2020) DWFCAT: dual watermarking framework for industrial image authentication and tamper localization. IEEE Trans Indust Inform 17:5108–5117. https://doi.org/10.1109/TII.2020.3028612
Khurana M, Singh H (2020) Two level phase retrieval in fractional Hartley domain for secure image encryption and authentication using digital signatures. Multimed Tools Appl 79(19):13967–13986
Kwon HJ, Lee SH (2019) CAM-based HDR image reproduction using CA–TC decoupled JCh decomposition. Signal Process Image Commun 70:1–13
Larson GW (1998) Logluv encoding for full-gamut, high-dynamic range images. Journal of Graphics Tools 3(1):15–31
LaserSoft Imaging SilverFast, http://www.silverfast.com/. Accessed 31 January 2021
Li MT, Huang NC, Wang CM (2011) A data hiding scheme for high dynamic range images. International Journal of Innovative Computing Information and Control (IJICIC) 7(5A):2021–2035
Li X, Sun X, Liu Q (2014) Image integrity authentication scheme based on fixed point theory. IEEE Trans Image Process 24(2):632–645
Li Z, Wei Z, Wen C, Zheng J (2017) Detail-enhanced multi-scale exposure fusion. IEEE Trans Image Process 26(3):1243–1252
Lin PY, Lee JS, Chang CC (2011) Protecting the content integrity of digital imagery with fidelity preservation. ACM Trans Multimed Comput Commun Appl (TOMM) 7(3):1–20
Lin KS, Chen TH, Lin CH, Chang SS (2014) A tailor-made encryption scheme for high-dynamic range images, In genetic and evolutionary computing (pp. 183–192). Springer, Cham
Lin YT, Wang CM, Chen WS, Lin FP, Lin W (2016) A novel data hiding algorithm for high dynamic range images. IEEE Trans Multimed 19(1):196–211
Lo CC, Hu YC (2014) A novel reversible image authentication scheme for digital images. Signal Process 98:174–185
Mahmalat S, Aydın TO, Smolic A (2017) Pipelines for HDR video coding based on luminance independent chromaticity preprocessing. IEEE Trans Circ Syst Video Technol 28(12):3467–3477
Matsumoto M, Nishimura T (1998) Mersenne twister: a 623-dimensionally equidistributed uniform pseudo-random number generator. ACM Trans Model Comput Simul (TOMACS) 8(1):3–30
Niu Y, Zhou Z, Zhang X (2020) An image encryption approach based on chaotic maps and genetic operations. Multimed Tools Appl 79(35):25613–25633
NVIDA developer, https://developer.nvidia.com/high-dynamic-range-display-development. Accessed 31 January 2021
OpenEXR downloads, http://www.openexr.com/downloads.html. Accessed 31 January 2021
Rajesh S, Paul V, Menon VG, Khosravi MR (2019) A secure and efficient lightweight symmetric encryption scheme for transfer of text files between embedded IoT devices. Symmetry 11(2):293
Reinhard E, Heidrich W, Debevec P, Pattanaik S, Ward G, Myszkowski K (2010) High dynamic range imaging: acquisition, display, and image-based lighting. Morgan Kaufmann
Stallings W (2013) Cryptography and network security: principles and practice. Pearson, sixth edition.
Voyatzis, G., & Pitas, I. (1996, September). Applications of toral automorphisms in image watermarking. In proceedings of 3rd IEEE International Conference on Image Processing (Vol. 2, pp. 237-240). IEEE.
Ward G (1991) Real pixels. Graphic gems II, edited by J. Arvo, academic press, Boston, MA.
Yan, J. Y., Chen, T. H., & Lin, C. H. (2013, October). Encryption in high dynamic range images for RGBE format. In 2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (pp. 493-496). IEEE.
Yan J.Y., Jeng F.G. & Chen T.H. (2014) An image authentication scheme for high dynamic range images. Proceedings of the 5th international conference on systematic innovation (ICSI).
Yu CM, Wu KC, Wang CM (2011) A distortion-free data hiding scheme for high dynamic range images. Displays 32(5):225–236
Zhang LY, Liu Y, Pareschi F, Zhang Y, Wong KW, Rovatti R, Setti G (2017) On the security of a class of diffusion mechanisms for image encryption. IEEE Trans Cybern 48(4):1163–1175
Acknowledgments
This work was supported in part by the Ministry of Science and Technology of Taiwan under grant MOST 107-2221-E-415 -001 -MY3.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Chen, TH., Yan, JY. Commutative encryption and authentication for OpenEXR high dynamic range images. Multimed Tools Appl 80, 27807–27828 (2021). https://doi.org/10.1007/s11042-021-11002-y
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-021-11002-y