Comprehensive Analysis of Compressible Perceptual Encryption Methods-Compression and Encryption Perspectives.

Sensors (Basel)

Department of Computer Engineering, Chosun University, Gwangju 61452, Republic of Korea.

Published: April 2023

Perceptual encryption (PE) hides the identifiable information of an image in such a way that its intrinsic characteristics remain intact. This recognizable perceptual quality can be used to enable computation in the encryption domain. A class of PE algorithms based on block-level processing has recently gained popularity for their ability to generate JPEG-compressible cipher images. A tradeoff in these methods, however, is between the security efficiency and compression savings due to the chosen block size. Several methods (such as the processing of each color component independently, image representation, and sub-block-level processing) have been proposed to effectively manage this tradeoff. The current study adapts these assorted practices into a uniform framework to provide a fair comparison of their results. Specifically, their compression quality is investigated under various design parameters, such as the choice of colorspace, image representation, chroma subsampling, quantization tables, and block size. Our analyses have shown that at best the PE methods introduce a decrease of 6% and 3% in the JPEG compression performance with and without chroma subsampling, respectively. Additionally, their encryption quality is quantified in terms of several statistical analyses. The simulation results show that block-based PE methods exhibit several favorable properties for the encryption-then-compression schemes. Nonetheless, to avoid any pitfalls, their principal design should be carefully considered in the context of the applications for which we outlined possible future research directions.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC10145250PMC
http://dx.doi.org/10.3390/s23084057DOI Listing

Publication Analysis

Top Keywords

perceptual encryption
8
block size
8
image representation
8
chroma subsampling
8
encryption
5
comprehensive analysis
4
analysis compressible
4
compressible perceptual
4
encryption methods-compression
4
methods-compression encryption
4

Similar Publications

The development of innovative methods for concealing critical data in multimedia files has exploded in information security in recent years. Cryptography and steganography cannot be used alone to protect data; rather, they can be combined and used in a single system. Audio steganography is among the most important information security techniques.

View Article and Find Full Text PDF

Perceptual encryption (PE) hides the identifiable information of an image in such a way that its intrinsic characteristics remain intact. This recognizable perceptual quality can be used to enable computation in the encryption domain. A class of PE algorithms based on block-level processing has recently gained popularity for their ability to generate JPEG-compressible cipher images.

View Article and Find Full Text PDF

A major challenge in nanotechnology is the fabrication of complex three-dimensional (3D) structures with desired materials. We present a strategy for fabricating arbitrary 3D nanostructures with a library of materials including metals, metal alloys, 2D materials, oxides, diamond, upconversion materials, semiconductors, polymers, biomaterials, molecular crystals, and inks. Specifically, hydrogels patterned by femtosecond light sheets are used as templates that allow for direct assembly of materials to form designed nanostructures.

View Article and Find Full Text PDF

Perceptual encryption (PE) of images protects visual information while retaining the intrinsic properties necessary to enable computation in the encryption domain. Block-based PE produces JPEG-compliant images with almost the same compression savings as that of the plain images. The methods represent an input color image as a pseudo grayscale image to benefit from a smaller block size.

View Article and Find Full Text PDF

The Internet of Things (IoT) is legitimately growing quicker. The operators have already started setting up a diligent infrastructure for these gadgets. Various technologies need to be developed for this type of sensor, including enterprise safety initiatives.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!