Abstract
Selective encryption techniques of JBIG encoded visual data are discussed. We are able to show attack resistance against common image processing attacks and replacement attacks even in case of restricting the amount of encryption to 1% – 2% of the data. The low encryption effort required is due to the exploitation of the interdependencies among resolution layers in the JBIG hierarchical progressive coding mode.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Bhargava, B., Shi, C., Wang, Y.: MPEG video encryption algorithms. Multimedia Tools and Applications 24(1), 57–79 (2004)
But, J.: Limitations of existing MPEG-1 ciphers for streaming video. Technical Report CAIA 040429A, Swinburne University, Australia (April 2004)
Chen, T.S., Chang, C.C., Hwang, M.S.: Virtual image cryptosystem based upon vector quantization. IEEE Transactions on Image Processing 7(10), 1485–1488 (1998)
Cheng, H., Li, X.: Partial encryption of compressed images and videos. IEEE Transactions on Signal Processing 48(8), 2439–2451 (2000)
Dittmann, J., Steinmetz, R.: Enabling technology for the trading of MPEG-encoded video. In: Mu, Y., Pieprzyk, J.P., Varadharajan, V. (eds.) ACISP 1997. LNCS, vol. 1270, pp. 314–324. Springer, Heidelberg (1997)
Van Droogenbroeck, M., Benedett, R.: Techniques for a selective encryption of uncompressed and compressed images. In: Proceedings of ACIVS (Advanced Concepts for Intelligent Vision Systems), Ghent University, Belgium, September 2002, pp. 90–97 (2002)
Eskicioglu, A., Delp, E.J.: An integrated approach to encrypting scalable video. In: Proceedings of the IEEE International Conference on Multimedia and Expo, ICME 2002, Laussanne, Switzerland (August 2002)
Fisch, M.M., Stögner, H., Uhl, A.: Layered encryption techniques for DCT-coded visual data. In: Proceedings (CD-ROM) of the European Signal Processing Conference, EUSIPCO 2004, Vienna, Austria (September 2004) paper cr1361
Furht, B., Kirovski, D. (eds.): Multimedia Security Handbook. CRC Press, Boca Raton (2005)
Grosbois, R., Gerbelot, P., Ebrahimi, T.: Authentication and access control in the JPEG 2000 compressed domain. In: Tescher, A.G. (ed.) Applications of Digital Image Processing XXIV, Proceedings of SPIE, San Diego, CA, USA, July 2001, vol. 4472, pp. 95–104 (2001)
Kunkelmann, T.: Sicherheit für Videodaten. Vieweg Verlag (1998)
Kunkelmann, T.: Applying encryption to video communication. In: Proceedings of the Multimedia and Security Workshop at ACM Multimedia 1998, Bristol, England, September 1998, pp. 41–47 (1998)
Li, X., Knipe, J., Cheng, H.: Image compression and encryption using tree structure. Pattern Recognition Letters 18, 1253–1259 (1997)
Lookabaugh, T.D., Sicker, D.C.: Selective encryption for consumer applications. IEEE Communications Magazine 42(5), 124–129 (2004)
Lookabaugh, T.D., Sicker, D.C., Keaton, D.M., Guo, W.Y., Vedula, I.: Security analysis of selectiveley encrypted MPEG-2 streams. In: Multimedia Systems and Applications VI, Proceedings of SPIE, September 2003, vol. 5241, pp. 10–21 (2003)
Lu, X., Eskicioglu, A.M.: Selective encryption of multimedia content in distribution networks: Challenges and new directions. In: Proceedings of the IASTED International Conference on Communications, Internet and Information Technology (CIIT 2003), Scottsdale, AZ, USA (November 2003)
Macq, B.M., Quisquater, J.-J.: Cryptology for digital TV broadcasting. Proceedings of the IEEE 83(6), 944–957 (1995)
Norcen, R., Uhl, A.: Selective encryption of the JPEG2000 bitstream. In: Lioy, A., Mazzocchi, D. (eds.) CMS 2003. LNCS, vol. 2828, pp. 194–204. Springer, Heidelberg (2003)
Podesser, M., Schmidt, H.-P., Uhl, A.: Selective bitplane encryption for secure transmission of image data in mobile environments. In: CD-ROM Proceedings of the 5th IEEE Nordic Signal Processing Symposium (NORSIG 2002), Tromso-Trondheim, Norway, October 2002. IEEE Norway Section (2002) file cr1037.pdf.
Pommer, A., Uhl, A.: Application scenarios for selective encryption of visual data. In: Dittmann, J., Fridrich, J., Wohlmacher, P. (eds.) Multimedia and Security Workshop, ACM Multimedia, Juan-les-Pins, France, December 2002, pp. 71–74 (2002)
Pommer, A., Uhl, A.: Selective encryption of wavelet-packet encoded image data — efficiency and security. ACM Multimedia Systems (Special issue on Multimedia Security) 9(3), 279–287 (2003)
Qiao, L., Nahrstedt, K.: Comparison of MPEG encryption algorithms. International Journal on Computers and Graphics (Special Issue on Data Security in Image Communication and Networks) 22(3), 437–444 (1998)
Roche, S., Dugelay, J.-L., Molva, R.: Multi-resolution access control algorithm based on fractal coding. In: Proceedings of the IEEE International Conference on Image Processing (ICIP 1996), Lausanne, Switzerland, pp. 235–238. IEEE Computer Society Press, Los Alamitos (1996)
Uhl, A., Pommer, A.: Image and Video Encryption. From Digital Rights Management to Secured Personal Communication. Advances in Information Security, vol. 15. Springer, Heidelberg (2005)
Yuan, C., Zhu, B.B., Wang, Y., Li, S., Zhong, Y.: Efficient and fully scalable encryption for MPEG-4 FGS. In: IEEE International Symposium on Circuits and Systems (ISCAS 2003), Bangkok, Thailand (May 2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 IFIP International Federation for Information Processing
About this paper
Cite this paper
Pfarrhofer, R., Uhl, A. (2005). Selective Image Encryption Using JBIG. In: Dittmann, J., Katzenbeisser, S., Uhl, A. (eds) Communications and Multimedia Security. CMS 2005. Lecture Notes in Computer Science, vol 3677. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11552055_10
Download citation
DOI: https://doi.org/10.1007/11552055_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28791-9
Online ISBN: 978-3-540-31978-8
eBook Packages: Computer ScienceComputer Science (R0)