Next Article in Journal
Texture Based Quality Analysis of Simulated Synthetic Ultrasound Images Using Local Binary Patterns
Previous Article in Journal
Characterization of Crystallographic Structures Using Bragg-Edge Neutron Imaging at the Spallation Neutron Source
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Integrated Model of Image Protection Techniques

1
Graduate School of Advanced Integration Science, Chiba University, Chiba 263-8522, Japan
2
Graduate School of Engineering, Chiba University, Chiba 263-8522, Japan
3
Faculty of System Design, Tokyo Metropolitan University, Tokyo 192-0364, Japan
*
Author to whom correspondence should be addressed.
J. Imaging 2018, 4(1), 1; https://doi.org/10.3390/jimaging4010001
Submission received: 6 September 2017 / Revised: 13 December 2017 / Accepted: 18 December 2017 / Published: 21 December 2017

Abstract

:
We propose an integrated model of Block-Permutation-Based Encryption (BPBE) and Reversible Data Hiding (RDH). The BPBE scheme involves four processes for encryption, namely block scrambling, block-rotation/inversion, negative-positive transformation and the color component shuffling. A Histogram Shifting (HS) method is adopted for RDH in our model. The proposed scheme can be well suitable for the hierarchical access control system, where the data can be accessed with the different access rights. This scheme encrypts R, G and B components independently. Therefore, we can generate similar output images from different input images. Additionally, the key derivation scheme also provides the security according to the different access rights. Our scheme is also resilient against brute-force attacks and Jigsaw Puzzle Solvers (JPSs). Furthermore, the compression performance is also not severely degraded using a standard lossless compression method.

1. Introduction

Due to the development of digital communication technologies, there are more services such as E-learning, digital diagnosis and web conferences. Therefore, digital content needs to be secured properly, as it can be easily manipulated and have problems with copyright, data security, authentication, etc.
Generally, data hiding can be classified into two categories, namely Irreversible Data Hiding (IDH) [1,2,3] and Reversible Data Hiding (RDH) [4,5,6,7,8,9]. In IDH, the host signal cannot be completely recovered. On the other hand, RDH is also referred to as invertible or lossless data hiding, which has been extensively studied to embed secret message bits into a cover object such as an image/video or audio to generate the marked one. In RDH, not only the embedded message needs to be restored precisely, but also the cover image should be losslessly recovered. Therefore, RDH techniques are desirable in some special scenarios such as remote sensing, medical imagery, military communications and law forensics where no permanent change is permitted. Most of the RDH methods aim to provide a good performance on the data hiding rate, the quality of the marked image, the level of security and the computational complexity.
One of the popular methods for RDH is the Histogram Shifting (HS) method. The algorithm proposed by Ni et al. [9] is based on an HS method, in which the data are embedded to the peak of the histogram of an image.
Block-Permutation-Based Encryption (BPBE) schemes [10,11,12,13] comprise one of the perceptual encryption techniques. In BPBE schemes, first, an original image is divided into definite block size, and the four processes of encryption, namely block scrambling, block rotation/inversion, negative-positive transformation and color component shuffling, are processed. The main feature of BPBE schemes is that the compression efficiency of the encrypted images is compatible with JPEG compression [11]. Similarly, the BPBE schemes have been proposed for encryption-then-compression (ETC) technique [14,15,16,17,18,19,20], in which a user securely transmits images via a Social Network Service (SNS) provider.
Recently, the encryption-based RDH method using adaptive code embedding has been proposed [19]. It is a pixel-based scrambling method. This method has the advantage of a maximum embedding rate of 1.72 bpp and allows the severe distortion of the final encrypted image by embedding more data. However, the disadvantage of this method is that the decryption process is not possible without the extraction of embedded data. Similarly, the access rights cannot be controlled according to various permission levels. In addition, there is no consideration for the compatibility on compression efficiency using international standards. Therefore, we propose an integrated model of BPBE and RDH in this paper. The proposed scheme has the advantage of decryption of the image without extraction of data. Our scheme can also control the quality of the embedded image. Similarly, the access rights can be controlled according to various permission levels. This scheme also considers standard lossless compression methods such as JPEG-LS [21]. The proposed scheme can be attractive in scenarios such as the doctor-nurse relation in a hospital, large organizations and hierarchical file systems, where there is a hierarchical access control according to the various access rights. In some organizations, there is a complex hierarchy between the CEO and front line employees. Different employees have to access different types of information as per their requirements. For example, the CEO is the only user with full permission. A manager may have partial permission to know the salary of the employees, but not personal information such as telephone numbers. Furthermore, we also propose an efficient key derivation scheme to manage the multiple keys, which has been utilized in BPBE and RDH. The experimental results and analysis demonstrate the effectiveness of the proposed scheme.

2. Preliminaries

2.1. BPBE Scheme

In the BPBE scheme [13], an original image with M × N pixels is divided into different non-overlapping blocks of B x × B y pixels. As illustrated in Figure 1, this scheme has four processes, i.e., block scrambling, block rotation/inversion, negative-positive transformation and color component shuffling, respectively. The procedures for the above-mentioned four processes are elaborated as follows.
Step 1
Divide each color component of a color image I = { I R , I G , I B } into multiple blocks with B x × B y size.
Step 2
Permute the positions of the divided blocks randomly using a key K 1 .
Step 3
Rotate and invert each of the divided blocks using keys K 2 and K 3 .
Step 4
Apply a negative-positive transformation to the blocks using a key K 4 .
Step 5
Shuffle each color components in each block using a key K 5 .
In this scheme, the keys K 1 , K 2 , K 3 and K 4 are commonly used for the Red (R), Green (G) and Blue (B) color components.

2.2. RDH

For RDH, we have applied the conventional RDH algorithm, which is employed in the spatial domain and is based on HS [9], to our work as one of the examples. This algorithm is chosen to maintain the quality of an image. However, the other RDH algorithms can also be employed in our scheme.

3. Proposed Scheme

We propose an integrated model of BPBE and RDH that can be well applied to the hierarchical access control system. The major purposes of using a hierarchical system are that the embedded data can be extracted and also the encrypted image can be decrypted according to the various permission levels. Similarly, the level of security can be controlled by embedding more confidential data at a higher level and less confidential data at a lower level in the hierarchical system. Therefore, the users with a higher permission level are allowed to extract more confidential data than the users with a low permission level. On the other hand, for decryption-only permission, the users are able to decrypt the image, but are not allowed to extract the embedded data. In this manner, the access control can be made flexible for the various users who are accessing the confidential data from different levels in the hierarchy.
Here, we use three independent keys for the R, G and B components [10] for the encryption and embedding process. In the case that we use JPEG-LS [21], which processes the images in the RGB color space without conversion to any other color spaces for the final encrypted images, we can maintain the compression efficiency.

3.1. Encryption and Embedding Process

In this section, we elaborate the encryption and embedding process as shown in Figure 2. For the simulation, we have employed a hundred different test images with 768 × 512 (70) and 512 × 768 pixels (30) from the image database “Content-based image retrieval database” [22]. The divided block size is selected as 16 × 16 pixels for encryption to maintain JPEG compression efficiency [11].
Step 1
Apply RDH to an original image I = { I R , I G , I B } of M × N pixels using keys K 1 R , K 1 G and K 1 B .
Step 2
Divide each color component of an original image into multiple blocks with B x × B y pixels.
Step 3
Permute the positions of the divided blocks randomly using keys K 2 R , K 2 G and K 2 B .
Step 4
Apply RDH using keys K 3 R , K 3 G and K 3 B .
Step 5
Rotate and invert each block randomly using keys K 4 R , K 4 G , K 4 B , K 5 R , K 5 G and K 5 B .
Step 6
Apply RDH using keys K 6 R , K 6 G and K 6 B .
Step 7
Apply the negative-positive transformation for each block using keys K 7 R , K 7 G and K 7 B .
Step 8
Apply RDH using keys K 8 R , K 8 G and K 8 B .
Step 9
Shuffle the three color components, i.e., R, G, and B in each block by using a key K 9 .
Step 10
Apply RDH using keys K 10 R , K 10 G and K 10 B .
Step 11
Generate the encrypted image I E = { I E R , I E G , I E B } by integrating all the transformed blocks.

3.2. Key Derivation

A large amount of keys would be generated in the proposed scheme due to the use of independent keys K 1 i , K 2 i , …, K 8 i , K 10 i ( i = R , G , B ) for three components. Therefore, the management of those multiple keys is an important issue. Hence, we also consider deriving an efficient key management scheme with the use of hash chains [23] and decrease the number of managed keys. With the use of hash chains, we assign the derived keys to each step of encryption and embedding. The number of managed keys is diminished to one, that is key K M . Keys K x can be given by:
K x = H x ( K M ) ,
where x = 1 , 2 , , 10 and H ( · ) is a one-way hash function.
An efficient key derivation scheme is as shown in Figure 3. The keys K e ( u ) i are the representation for the embedding process, whereas the keys K c ( u ) i are the representation for the encryption process. Here, u ( u = 1 , 2 , , 5 ) indicates the number of the encryption or the embedding process. In the embedding process, a key K e ( 1 ) R can be derived by performing a one-way hash chain to the result obtained by XOR (exclusive or) operation between key K M and its associated random numbers a e R . Similarly, K e ( 1 ) G can be achieved by a one-way hash function to the result of XOR operation between K e ( 1 ) R and a e G . A key K e ( 1 ) B can be derived by performing a one-way hash function to the result obtained by XOR operation between K e ( 1 ) G and a e B . The key derivation can be given as follows.
K e ( 1 ) R = H ( K M a e R ) ,
K e ( 1 ) G = H ( K e ( 1 ) R a e G ) ,
K e ( 1 ) B = H ( K e ( 1 ) G a e B ) ,
where ⊕ represents a bitwise XOR operation.
In addition, by using hash chains, all other keys K e ( 1 ) i , K e ( 2 ) i , …, K e ( 5 ) i , ( i = R , G , B ) can be obtained as follows.
K e ( u ) R = H u 1 ( K e ( 1 ) R ) ,
K e ( u ) G = H u 1 ( K e ( 1 ) G ) ,
K e ( u ) B = H u 1 ( K e ( 1 ) B ) ,
where u = 2 , 3 , 4 , 5 .
In encryption process, K c ( 1 ) R can be obtained by the result of the XOR operation between K e ( 1 ) R and a c R . The key derivation process is described as follows.
K c ( 1 ) R = H ( K e ( 1 ) R a c R ) ,
K c ( 1 ) G = H ( K c ( 1 ) R a c G ) ,
K c ( 1 ) B = H ( K c ( 1 ) G a c B ) ,
Similarly,
K c ( u ) R = H u 1 ( K c ( 1 ) R ) ,
K c ( u ) G = H u 1 ( K c ( 1 ) G ) ,
K c ( u ) B = H u 1 ( K c ( 1 ) B ) ,
where u = 2 , 3 , 4 . Regarding the key for the color component shuffling, it is single for each image. Therefore, it is derived by:
K c ( 5 ) B = H ( K c ( 4 ) B ) .

3.3. Decryption and Extraction Process

As shown in Figure 3, there are different hierarchical levels. Therefore, the access rights for each hierarchical level can be easily controlled for the decryption and extraction. The user with high permission is able to extract and decrypt more confidential data and images, respectively, than the user with low permission.
Table 1 shows the total embedding capacity of Japan Image32 at each level for single embedding (one time) and double embedding (two times). Table 2 and Table 3 illustrate the total embedding capacity and the Peak Signal-to-Noise Ratio (PSNR) values of test images for single embedding and double embedding, respectively. Figure 4 and Figure 5 show the simulation results of Japan Image32 and Japan Image22 obtained by different permissions in the case of single embedding. The following sections describe the decryption and extraction process for different permissions.

3.3.1. Full Permission

Let us consider that a user has the full access right to extract all the embedded data and to entirely decrypt the images. Therefore, the user has the full permission to get a managed key K M as given in Figure 3a. If a user were to obtain a key K M , the user would be able to derive all twenty eight keys, retrieve the original image from the final encrypted image as shown in Figure 4b and Figure 5b and also extract all the embedded data, as shown in Table 1.

3.3.2. Partial Permission

In this case, let us assume that another user is only permitted to extract Data 3, 4 and 5, as shown in Figure 3b. The user would obtain six keys, i.e., K e ( 3 ) R , K e ( 3 ) G , K e ( 3 ) B , K c ( 4 ) R , K c ( 4 ) G and K c ( 4 ) B . Hence, the user is able to derive the seven keys, i.e., K e ( 4 ) R , K e ( 5 ) R , K e ( 4 ) G , K e ( 5 ) G , K e ( 4 ) B , K e ( 5 ) B , K c ( 5 ) B , extract Data 3, 4, and 5 and obtain the half encrypted image as given in Figure 4c and Figure 5c.

3.3.3. Decryption-Only Permission

Let us assume that a user is only allowed to decrypt the image, but is restricted in extracting the embedded data. If a user were to obtain a key, i.e., K c ( 1 ) R , then he/she would be able to derive the twelve keys, i.e., K c ( 1 ) G , K c ( 1 ) B , K c ( 2 ) R , K c ( 2 ) G , K c ( 2 ) B , K c ( 3 ) R , K c ( 3 ) G , K c ( 3 ) B , K c ( 4 ) R , K c ( 4 ) G , K c ( 4 ) B and K c ( 5 ) B . Figure 4d and Figure 5d show the simulation results for decryption-only permission. From the experimental results of 100 images, the maximum and minimum values of PSNR are 43.93 (Japan Image27) and 37.42 (Indonesia Image35), respectively, as shown in Table 2. Hence, there is approximately only 6.51 dB of variation in PSNR values. The maximum embedding capacity for ‘Iran Image13’ is 525,427 bits with its corresponding PSNR value as 38.29 dB. Similarly, the minimum embedding capacity for ‘Japan Image26’ is 38,418 bits with its corresponding PSNR value as 38.81 dB. In this case, our scheme is effective for ‘Iran Image13’, as it has comparatively higher embedding capacity than ‘Japan Image26’.

4. Experimental Results and Analysis

4.1. Key Space

Generally, there are various types of attacks on encryption such as differential attacks, brute-force attacks, statistical attacks, and so on. A brute-force attack is a kind of a trial-and-error method that is used to obtain the possible combination. Here, we evaluate the size of key space assuming the brute-force attacks. The conventional BPBE scheme [13] has four encryption processes, namely block scrambling, block rotation/inversion, negative-positive transformation and color component shuffling, respectively. It performs the encryption with the identical keys for all color components. The key space can be determined by the number of the divided blocks n. The four encryption processes are independent of each other. Therefore, the total key space is calculated by multiplying the key spaces of each encryption process as described below.
If an original image with M × N pixels is divided into n blocks with B x × B y pixels, n is calculated by:
n = M × N B x × B y .
In block scrambling, the key space N B is the number of permutations of n blocks, which is given by:
N B = n ! .
Similarly, while combining each of the four processes of rotation and inversion, there are some similar patterns generated. Therefore, the maximum possible patterns generated due to the rotation and the inversions are eight, respectively. The key space of the block rotation and inversion N R is given as:
N R = 8 n .
The number of patterns for the negative-positive transformation N N and color component shuffling N C is two and six, respectively. Hence, the total key spaces can be calculated by:
N N = 2 n ,
N C = 6 n .
The total key space of the encrypted images N A can be calculated by:
N A = N B × N R × N N × N C = n ! × 8 n × 2 n × 6 n = n ! × 2 5 n × 3 n .
On the other hand, the proposed scheme performs the encryption with the independent keys for all color components. Hence, the key spaces N B , N R and N N are given by:
N B = ( n ) ! 3 .
N R = ( 8 n ) 3 .
N N = ( 2 n ) 3 ,
Therefore, the total key space of the encrypted image N A can be calculated by:
N A = N B × N R × N N × N C = ( n ) ! 3 × ( 8 n ) 3 × ( 2 n ) 3 × 6 n = ( n ) ! 3 × 2 13 n × 3 n .
From the above-mentioned analysis, the proposed scheme has a larger key space than the conventional scheme [13] due to the use of independent keys for R, G and B components in the encryption. Although the conventional scheme [10] utilizes the independent keys for encryption, the key space of the proposed scheme is more complex because of the embedding process. Therefore, the proposed scheme is more secured by confirming its large key space. Hence, the resilience against brute-force attacks can be improved.

4.2. Resilience Against Jigsaw Puzzle Solvers

JPS is a kind of attack that uses the correlation between the large numbers of pieces to obtain an original image. In an encrypted image, each block has a strong correlation to that of an original image. Hence, it is required to analyze the security of the proposed scheme with JPSs. According to [24,25], direct comparison D c is the ratio of number of the pieces that are in correct position. Neighbor comparison N c represents the ratio of the number of correctly joined blocks. Similarly, the largest component that is denoted as L c is the ratio of the number of largest joined blocks that have correct adjacencies. As shown in Table 4, we have calculated the average scores of D c , N c and L c of seven different standard images, i.e., Lena, Mandrill, Milkdrop, Pepper, Girl, Lake and Airplane of 512 × 512 pixels from the Signal and Image Processing Institute (SIPI) database [26]. The original images of 512 × 512 pixels are trimmed to 512 × 480 pixels to make a rectangular shape in the JPSs analysis. It is noted that a block size of 32 × 32 is chosen for the encryption. The scores of D c , N c and L c are 1 s if the image is completely assembled by JPSs, whereas these scores are 0 s when the puzzles are not assembled at all. Hence, it is confirmed that the use of independent keys for encryption makes puzzle solvers almost impossible even when the number of blocks is 240.

4.3. Compression Efficiency

The compression efficiency is evaluated by calculating the bitrates, which is given by:
B i t r a t e ( b p p ) = S i z e o f i m a g e f i l e N o . o f p i x e l s i n o r i g i n a l i m a g e .
JPEG is a lossy compression algorithm. Therefore, if we use lossy compression in our scheme, the embedded data will be broken, and we cannot extract the embedded data. However, the lossless compression methods such as JPEG-LS can be applied for our scheme. As shown in Table 5, the compression performance of the proposed scheme is not severely degraded as compared to the original image. Hence, our scheme is somehow compatible with the JPEG-LS compression method.

5. Conclusions

In this paper, we proposed an integrated model of image protection techniques. The proposed scheme allows the hierarchical process for the encryption and the data embedding. Therefore, our scheme is suitable for the hierarchical access control system, where the permission is granted according to the various access rights. The compression performance is also not severely degraded as compared to the original image. In addition, we also posit an efficient key derivation scheme for managing the large amount of keys generated in the encryption and data embedding process. The size of the key space in the proposed scheme is larger than the conventional schemes due to the use of independent keys and the embedding process. Hence, our scheme is resilient against brute-force attacks. Similarly, we also assure that the proposed scheme is almost impossible for JPSs attacks. Our future work involves embedding the data that are related to the original image. For example, it may be possible to control the visibility of Regions of Interest (ROIs) via embedded data in a hierarchical manner.

Acknowledgments

This work was partially supported by Grant-in-Aid for Scientific Research(B), No.17H03267, from the Japan Society for the Promotion Science.

Author Contributions

Shoko Imaizumi and Takahiko Horiuchi designed the experiments; Anu Aryal performed the experiments and analyzed the results with Shoko Imaizumi; Hitoshi Kiya contributed the theoretical concept; Anu Aryal, Shoko Imaizumi, and Takahiko Horiuchi wrote the paper.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Cox, I.J.; Kilian, J.; Leighton, F.T.; Shamoon, T. Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process. 1997, 6, 1673–1687. [Google Scholar] [CrossRef] [PubMed]
  2. Tirkel, A.Z.; Osborne, C.F.; Schyndel, R.G. Image watermarking-a spread spectrum application. In Proceedings of the IEEE 4th International Symposium on Spread Spectrum Techniques and Applications, Mainz, Germany, 25 September 1996; Volume 2, pp. 785–789. [Google Scholar]
  3. Yeung, M.M.; Mintzer, F.C. Invisible watermarking for image verification. Electron. Imaging 1998, 7, 578–591. [Google Scholar] [CrossRef]
  4. Golijan, M.; Fridrich, J.J.; Du, R. Distortion-free data embedding. In Proceedings of the International Workshop on Information Hiding, Pittsburgh, PA, USA, 25–27 April 2001; pp. 27–41. [Google Scholar]
  5. Xuan, G.; Zhu, J.; Chen, J.; Shi, Y.Q.; Ni, Z.; Su, W. Distortionless data hiding based on integer wavelet transform. IEEE Electron. Lett. 2002, 38, 1646–1684. [Google Scholar] [CrossRef]
  6. Tian, J. Reversible data embedding using a difference expansion. IEEE Trans. Circuits Syst. Video Technol. 2003, 13, 890–896. [Google Scholar] [CrossRef]
  7. Thodi, D.M.; Rodriguez, J.J. Expansion embedding techniques for reversible watermarking. IEEE Trans. Image Process. 2007, 16, 721–730. [Google Scholar] [CrossRef] [PubMed]
  8. Wu, H.T.; Dugelay, J.L.; Shi, Y.Q. Reversible image data hiding with contrast enhancement. IEEE Signal Process. Lett. 2015, 22, 81–85. [Google Scholar] [CrossRef]
  9. Ni, Z.; Shi, Y.Q.; Ansari, N.; Su, W. Reversible data hiding. IEEE Trans. Circuits Syst. Video Technol. 2006, 16, 354–362. [Google Scholar]
  10. Imaizumi, S.; Ogasawara, T.; Kiya, H. Block-Permutation-Based-Encryption Scheme with Enhanced Color Scrambling. In Proceedings of the 20th Scandinavian Conference on Image Analysis, Tromsø, Norway, 12–14 June 2017; Volume 10269, pp. 562–573. [Google Scholar]
  11. Kurihara, K.; Imaizumi, S.; Shiota, S.; Kiya, H. An Encryption-then-Compression System for Lossless Image Compression Standards. IEICE Trans. Inf. Syst. 2017, E100-D, 52–56. [Google Scholar] [CrossRef]
  12. Watanabe, O.; Uchida, A.; Fukuhara, T.; Kiya, H. An Encryption-then-Compression System for JPEG 2000 Standard. In Proceedings of the 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Brisbane, Australia, 19–24 April 2015. [Google Scholar]
  13. Kurihara, K.; Kikuchi, M.; Imaizumi, S.; Shiota, S.; Kiya, H. An Encryption-then-Compression System for JPEG/Motion JPEG Standard. IEICE Trans. Fundam. 2015, E98-A, 2238–2245. [Google Scholar] [CrossRef]
  14. Zhou, J.; Liu, X.; Au, O.C.; Tang, Y.Y. Designing an efficient image encryption-then-compression system via prediction error clustering and random permutation. IEEE Trans. Inf. Forensics Secur. 2014, 9, 39–50. [Google Scholar] [CrossRef]
  15. Erkin, Z.; Piva, A.; Katzenbeisser, S.; Lagendijk, R.L.; Shokrollahi, J.; Neven, G.; Barni, M. Protection and retrieval of encrypted multimedia content: When cryptography meets signal processing. EURASIP J. Inf. Secur. 2007, 2007. [Google Scholar] [CrossRef]
  16. Liu, W.; Zeng, W.; Dong, L.; Yao, Q. Efficient compression of encrypted grayscale images. IEEE Trans. Image Process. 2010, 19, 1097–1102. [Google Scholar] [CrossRef] [PubMed]
  17. Johnson, M.; Ishwar, P.; Prabhakaran, V.; Schnoberg, D.; Ramchandran, K. On compressing encrypted data. IEEE Trans. Signal Process. 2004, 52, 2992–3006. [Google Scholar] [CrossRef]
  18. Hu, R.; Li, X.; Yang, B. A new lossy compression scheme for encrypted gray-scale images. In Proceedings of the 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Florence, Italy, 4–9 May 2014; pp. 7387–7390. [Google Scholar]
  19. Yi, S.; Zhou, Y. Adaptive code embedding for reversible data hiding in encrypted images. In Proceedings of the 2017 IEEE International Conference on Image Processing (ICIP), Beijing, China, 17–20 September 2017; pp. 4322–4326. [Google Scholar]
  20. Chuman, T.; Kurihara, K.; Kiya, H. Security evaluation for block scrambling-based ETC systems against extended jigsaw puzzle solver attacks. In Proceedings of the 2017 IEEE International Conference on Multimedia and Expo (ICME), Hong Kong, China, 10–14 July 2017. [Google Scholar]
  21. International Organization for Standardization. ISO/ICE 14495-1:1999 Information Technology—Lossless and Nearlossless Compression of Continuous-Tone Still Images Baseline; International Organization for Standardization: Geneva, Switzerland, 1999. [Google Scholar]
  22. Content-Based Image Retrieval Database. Available online: http://imagedatabase.cs.washington.edu/groundtruth (accessed on 6 September 2017).
  23. Imaizumi, S.; Fujiyoshi, M.; Kiya, H. An efficient access control method for composite multimedia content. IEICE Electron. Express 2010, 7, 1534–1538. [Google Scholar] [CrossRef]
  24. Gallagher, A. Jigsaw puzzles with pieces of unknown orientation. In Proceedings of the 2012 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Providence, RI, USA, 16–21 June 2012; pp. 382–389. [Google Scholar]
  25. Cho, T.; Avidan, S.; Freeman, W. A probabilistic image jigsaw puzzle solvers. In Proceedings of the 2010 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), San Francisco, CA, USA, 13–18 June 2010; pp. 183–190. [Google Scholar]
  26. SIPI Database. Available online: http://sipi.usc.edu/database (accessed on 6 September 2017).
Figure 1. Block-Permutation-Based Encryption (BPBE) scheme.
Figure 1. Block-Permutation-Based Encryption (BPBE) scheme.
Jimaging 04 00001 g001
Figure 2. Encryption and embedding process. RDH, Reversible Data Hiding.
Figure 2. Encryption and embedding process. RDH, Reversible Data Hiding.
Jimaging 04 00001 g002
Figure 3. Key derivation. (a) Key derivation scheme; (b) decryption extraction process.
Figure 3. Key derivation. (a) Key derivation scheme; (b) decryption extraction process.
Jimaging 04 00001 g003
Figure 4. Simulation results of Japan Image32 obtained by different permissions (single embedding). (a) Original image (Japan Image32); (b) final encrypted image; (c) half encrypted image (decryption: negative-positive transformation and color component shuffling; extraction: Data 3, 4, and 5); (d) decryption-only image.
Figure 4. Simulation results of Japan Image32 obtained by different permissions (single embedding). (a) Original image (Japan Image32); (b) final encrypted image; (c) half encrypted image (decryption: negative-positive transformation and color component shuffling; extraction: Data 3, 4, and 5); (d) decryption-only image.
Jimaging 04 00001 g004
Figure 5. Simulation results of Japan Image22 obtained by different permissions (single embedding). (a) Original image (Japan Image22); (b) final encrypted image; (c) half encrypted image (decryption: negative-positive transformation and color component shuffling; extraction: Data 3, 4, and 5); (d) decryption-only image.
Figure 5. Simulation results of Japan Image22 obtained by different permissions (single embedding). (a) Original image (Japan Image22); (b) final encrypted image; (c) half encrypted image (decryption: negative-positive transformation and color component shuffling; extraction: Data 3, 4, and 5); (d) decryption-only image.
Jimaging 04 00001 g005
Table 1. Embedding capacity at each level of Japan Image32.
Table 1. Embedding capacity at each level of Japan Image32.
LevelEmbedding Capacity (bits)
Single EmbeddingDouble Embedding
Data 118,70937,233
Data 218,52436,866
Data 318,47636,090
Data 416,82731,934
Data 515,29727,396
Total87,833169,519
Table 2. Total embedding capacity (bits) and Peak Signal-to-Noise Ratio (PSNR) values for single embedding.
Table 2. Total embedding capacity (bits) and Peak Signal-to-Noise Ratio (PSNR) values for single embedding.
ImageSingle Embedding
(768 × 512 pixels)Total Embedding Capacity (bits)PSNR
Japan Image2241,57638.34
Japan Image2778,68243.93 (max)
Japan Image3287,83340.41
Australia Image0175,36043.80
Australia Image0386,72041.69
Australia Image0541,96538.75
Indonesia Image01285,82137.91
Indonesia Image35240,07137.42 (min)
Iran Image13525,427 (max)38.29
Iran Image49132,79238.41
(512 × 768 pixels)Total Embedding Capacity (bits)PSNR
Japan Image2638,418 (min)38.81
Japan Image3155,59439.61
Australia Image0241,21242.77
Australia Image0665,85940.55
Indonesia Image2089,42440.98
Indonesia Image26112,83139.69
Iran Image10218,53242.29
Iran Image1562,67041.94
Table 3. Total embedding capacity (bits) and PSNR values for double embedding (Japan).
Table 3. Total embedding capacity (bits) and PSNR values for double embedding (Japan).
Image (768 × 512 pixels)Double Embedding
Total Embedding Capacity (bits)PSNR
Japan Image01131,52937.44
Japan Image1385,15634.64
Japan Image32169,51934.65
Japan Image17165,83235.55
Japan Image1588,18032.93
Japan Image2279,47732.43
Japan Image27142,13639.68
Japan Image0890,01634.53
Japan Image20101,27535.66
Japan Image02111,14437.65
Table 4. Evaluation of Jigsaw Puzzle Solvers (JPSs) using standard images of 512 × 512 pixels.
Table 4. Evaluation of Jigsaw Puzzle Solvers (JPSs) using standard images of 512 × 512 pixels.
ComponentBPBE Scheme ( 32 × 32 )
IdenticalIndependent
D c (Avg)0.1020.002
N c (Avg)0.1520.006
L c (Avg)0.1970.008
Table 5. Calculation of bitrate after JPEG-LS compression (Iran Image13).
Table 5. Calculation of bitrate after JPEG-LS compression (Iran Image13).
ImageBitrate (bpp)
Original13.10
Proposed scheme (independent)13.73
Proposed scheme (identical)13.70

Share and Cite

MDPI and ACS Style

Aryal, A.; Imaizumi, S.; Horiuchi, T.; Kiya, H. Integrated Model of Image Protection Techniques. J. Imaging 2018, 4, 1. https://doi.org/10.3390/jimaging4010001

AMA Style

Aryal A, Imaizumi S, Horiuchi T, Kiya H. Integrated Model of Image Protection Techniques. Journal of Imaging. 2018; 4(1):1. https://doi.org/10.3390/jimaging4010001

Chicago/Turabian Style

Aryal, Anu, Shoko Imaizumi, Takahiko Horiuchi, and Hitoshi Kiya. 2018. "Integrated Model of Image Protection Techniques" Journal of Imaging 4, no. 1: 1. https://doi.org/10.3390/jimaging4010001

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop