Index


Figures


Tables

Ahmad and Shin: Sub-Block-Based Compressible Perceptual Encryption Algorithm with Chroma Subsampling

Ijaz Ahmad♦ and Seokjoo Shin°

Sub-Block-Based Compressible Perceptual Encryption Algorithm with Chroma Subsampling

Abstract: Perceptual Encryption (PE) provides an efficient solution to the requirement of cipher images format-compatibility of photo-storage and photo-sharing applications. They deliver a desired level of security while preserving image intrinsic properties necessary to enable image processing such as image compression, in the encrypted domain. PE methods implement blockwise geometric and color transformation functions wherein the choice of block size results in a tradeoff relationship between encryption efficiency and compression savings. Nonetheless PE methods that incorporate sub-block level processing alongside block level processing can better manage this tradeoff. However, such methods have a compatibility issue with the JPEG lossy standard as the recovered images have subsampling distortions. Specifically, it cannot avoid the blur distortion resulted from the subsampling of the luminance component that is shuffled with the chroma component of the image during encryption. To address this limitation, we propose a color transformation function for the sub-block-based PE algorithms that integrates the image component shuffling step of encryption with the chroma subsampling function of compression. The simulation analyses show that the images are decoded without any visible artifacts and distortions. In addition, the proposed function reduces the datarate difference by 87% at maximum and 18% at minimum for different sub-block sizes.

Keywords: perceptual encryption , JPEG , image compression , image encryption , chroma subsampling

Ⅰ. Introduction

Compression and encryption are the two requirements for efficient and secure image data transmission and/or storage. Both of these processes aim to reduce the redundancy present in the image data[1]. The compression eliminates this undesirable redundancy to give a compact representation to the data thus efficiently utilizes the available limited bandwidth and storage capacities. The encryption removes this redundancy to make the data random and unintelligible thereby protects it from unauthorized access. Compression can be carried out either in lossless mode where higher image quality is preserved, or in lossy mode where image quality is traded for better compression savings. Encryption algorithms can be classified as symmetric-key algorithm which uses the same key for encryption and decryption, or asymmetric-key algorithm which uses two different keys during encryption and decryption. Regardless of their mode of operation, compression and encryption have competing requirements and the order in which they are coupled together affects the overall performance of the target application system[2]. In general, compression is completed prior to encryption or else there is less or no redundancy left in the cipher images to be exploited by the compression process[2]. However, applications such as photo-storage or photo-sharing services, where format-compatibility is a requirement then it is necessary to reverse this order. Though the traditional number theory and chaos theory -based image encryption algorithms are the most secure options, they do not cater to this requirement. Towards this perceptual encryption (PE) algorithms have been proposed that adds randomness to the image data in such a way that its redundancy remains intact, which makes their cipher images compressible[3]. The output of a PE algorithm is an image which can be encoded with image compression standards such as the JPEG algorithm[4]. In addition, PE has an advantage of low computational cost which makes them suitable for data protection in resource-constrained devices[5] and for real-time multimedia applications[6].

In general, a PE algorithm performs geometric and color transformations on a block level in such a way that the human perceivable information in the image is protected while its intrinsic characteristics are preserved. In PE methods, the choice of block size results in a tradeoff relationship between security efficiency and compression savings. Usually, a larger number of blocks is required for better security, which can be achieved by choosing smaller block size. However, to avoid any adverse impact of compression, an encryption algorithm should adhere to the JPEG standard recommendations for this choice of block size. Therefore, for the color and grayscale image encryption block sizes 16 × 16 and 8 × 8 should be used, respectively. Nonetheless, as opposed to reducing the block size during encryption, several other practices have been proposed that efficiently manage this tradeoff. For example, a larger number of blocks can be achieved by processing each color component independently[7] or by representing an input true color image as a pseudo grayscale image to exploit the 8 × 8 block size for color image encryption [8]. Alternatively, sub-block-level processing can enable the use of smaller block size than the JPEG specifications in selected encryption steps [5], [9]. For a detail description, we recommend the comprehensive analysis and review presented in [6], [10], [11], [12], [13]. For example, [10] implements these best practices of the PE algorithms and provides a perspective on their compression and encryption efficiencies. In addition, [6] provides an overview of PE methods, [13] analyzes their encryption efficiency while [12] analyzes their robustness against various communication impairments, and [11] summarizes their privacy-preserving applications.

Despite the aforementioned improvements in PE methods, there is a prerequisite of an input color image for security efficiency in [7] and [8], and there is a compatibility issue with the JPEG lossy standard in [9]. In the latter case, performing compression with the chroma subsampling results in block artifacts and blur distortion. Towards this we propose a subsampling function that can be integrated with the PE methods based on sub-block processing. Specifically, this function is implemented in the component shuffling step of the PE algorithm. The current work is an extension of [14] and its main contributions are summarized as following: (1) The encryption efficiency is improved with a new set of rules for the image components shuffling step. (2) The compression performance is analyzed for a wide range of the JPEG quality factors implemented with both luminance and chrominance quantization tables. (3) The encryption and compression efficiencies are analyzed for three different sub-block sizes. (4) The compression savings and image quality are measuredusing Bjøntega rd delta (BD) metrics[15].

Ⅱ. Proposed Method

2.1 Motivation

Block artifacts and blur distortion can appear in the recovered images when the JPEG chroma subsampling and quantization steps are mishandled. The JPEG chroma subsampling is a block-based operation that down samples a 16 × 16 chroma block to an 8 × 8 block size. To recover the original image resolution, the JPEG decoder performs interpolation in the down sampled blocks. The implementation of permutation and negative-positive transformation steps of PE algorithm on a block size less than 16 × 16 results in pixels having low correlation; therefore, the JPEG decoder recovers images with block artifacts. On the other hand, the color channel shuffling step of PE algorithm invalidates the JPEG colorspace conversion and quantization functions. This conversion is necessary to separate luminance and chrominance components of the image for the JPEG sub-sampling step. A simple solution to this is to perform the colorspace conversion prior to encryption. However, when the luminance component is mixed up with either of the chrominance components in the shuffling step of PE algorithm, then it is subjected to sub-sampling during compression, which later results in the blur distortion. The methods that incorporate sub-block processing to exploit smaller block size only for inside-out transformation can avoid the block artifacts; however, they cannot completely eliminate the blur distortion. To address this issue, we present our proposed method in the following subsections.

Fig. 1.

An illustration of our proposed PE method. [TeX:] $$I_P$$ is the permutation, [TeX:] $$I_{R I}$$ is the rotation-inversion, [TeX:] $$I_{N P}$$ is the negative-positive transformation, and [TeX:] $$I_C$$ is the color channels shuffling steps performed on the image [TeX:] $$I$$.
1.png
2.2 Proposed Perceptual Encryption

For an image [TeX:] $$I^{H \times W \times C}$$, whose dimensions are specified as [TeX:] $$H$$ rows, [TeX:] $$W$$ columns, and [TeX:] $$C$$ color channels, our proposed PE algorithm is illustrated in Fig.1. and consists of the following steps: Step 1) Separate the luminance component ([TeX:] $$Y$$) from the chrominance components ([TeX:] $$Cb$$ and [TeX:] $$Cr$$) of the image by performing colorspace conversion as

(1)
[TeX:] $$\begin{gathered} \boldsymbol{Y}=(0.3 \times \boldsymbol{R})+(0.59 \times \boldsymbol{G})+(0.11 \times \boldsymbol{B}) \\ \boldsymbol{C b}=128-(0.17 \times \boldsymbol{R})+(0.33 \times \boldsymbol{G})+(0.5 \times \boldsymbol{B}) \\ \boldsymbol{C r}=128+(0.5 \times \boldsymbol{R})+(0.42 \times \boldsymbol{G})+(0.08 \times \boldsymbol{B}) . \end{gathered}$$

Step 2) Divide [TeX:] $$I^{H \times W \times C}$$ into [TeX:] $$L \times M$$ nonoverlapping blocks where [TeX:] $$L=H|B$$ and [TeX:] $$M=W|B$$. Each block has [TeX:] $$B^2$$ pixels and [TeX:] $$C$$ channels. Step 3) Scramble the block positions in the image using a randomly generated key [TeX:] $$K_1$$. Step 4) Apply the inside-out transformation proposed in [9] by using key [TeX:] $$K_2$$ to change each block orientation in the shuffled image. Each entry of this key represents an axis of rotation and inversion. Step 5) Apply the negative–positive transformation proposed in [3] to randomly chosen blocks by using key [TeX:] $$K_3$$. The modified value of a pixel [TeX:] $$p_{x,y}$$ positioned at [TeX:] $$x, y$$ in a block is obtained as:

(2)
[TeX:] $$\dot{p}_{x, y}=\left\{\begin{array}{cc} p_{x, y} & \boldsymbol{K}_3(i)=0 \\ 255-p_{x, y} & \boldsymbol{K}_3(i)=1, \end{array}\right.$$

where i = 0, 1, 2, …, [TeX:] $$L \times M$$ is the [TeX:] $$1^{th}$$ key element. Step 6) Shuffle the luminance and chrominance components in each block using a random key [TeX:] $$K_4$$. The key [TeX:] $$K_4$$ elements and their associated shuffle actions are described in Table 1. An additional key [TeX:] $$K_5$$ is used to randomly choose sub-blocks from the [TeX:] $$Y$$ component. This color transformation function is further explained in the subsection 2.3.

In its basic form, PE methods process each color component with the same key. However, for a larger key space these methods can be extended: to process each color component independently [7], to introduce sub-block-level processing [9], and to represent an input as a pseudo grayscale image [8]. To preserve the spatial information of an image, which is necessary for privacy-preserving computation applications, we considered sub-block-level processing in Step 4 and adopted inside-out transformation function as proposed in [9]. Though this sub-block processing avoids block artifacts by preserving the correlation among the neighboring pixels within a block, it cannot avoid the blur distortion resulted from the subsampling of the luminance component that is shuffled with the chroma component of the image during encryption. To mitigate the subsampling distortions, we proposed the following color transformation function.

Table 1.

Key rules for proposed color transformation function.
[TeX:] $$K_4$$ [TeX:] $$Y$$ [TeX:] $$Cb$$ [TeX:] $$Cr$$
0 [TeX:] $$\boldsymbol{Y}_{\mathcal{A}}$$ [TeX:] $$Cr$$ [TeX:] $$Cb$$
1 [TeX:] $$Y_{\mathcal{A}} \dot{C b}$$ [TeX:] $$\ddot{\boldsymbol{Y}_{\mathcal{B}}}$$ [TeX:] $$Cr$$
2 [TeX:] $$Y_{\mathcal{A}} \dot{C b}$$ [TeX:] $$Cr$$ [TeX:] $$\ddot{Y_{\mathcal{C}}}$$
3 [TeX:] $$Y_{\mathcal{A}} \dot{C r}$$ [TeX:] $$\ddot{\boldsymbol{Y}_{\mathcal{B}}}$$ [TeX:] $$Cb$$
4 [TeX:] $$Y_{\mathcal{A}} \dot{C r}$$ [TeX:] $$Cb$$ [TeX:] $$\ddot{Y_{\mathcal{C}}}$$
5 [TeX:] $$Y_{\mathcal{A}} \dot{C b} \dot{C} \boldsymbol{r}$$ [TeX:] $$\ddot{\boldsymbol{Y}_{\mathcal{B}}}$$ [TeX:] $$\ddot{Y_{\mathcal{C}}}$$
2.3 Proposed Color Transformation Function

Firstly, proposed method represents an input image in YCbCr colorspace prior to encryption; thus, avoids invalid calculation of luma and chroma components during compression. Secondly, chroma subsampling is integrated into the color channel shuffling step as shown in Fig. 2. For a randomly chosen block, the proposed method modifies Step 6 according to the luma and chroma components as:

1. To shuffle the luma component with either of the chrominance components, luminance sub-blocks are randomly chosen (two sub-blocks can be shuffled at maximum), and up-sampled to 16 × 16 block size.

2. Conversely, to shuffle either of the chrominance components of a block with the luminance component, the chroma block is down-sampled to 8 × 8 block size.

The block sizes 16 × 16 and 8 × 8, and the chroma sub- and up-sampling functions are chosen according to the JPEG standard requirements.

Fig. 2.

An illustration of our proposed color transformation function that combines image-component shuffling step of encryption with the chroma subsampling function of compression. The sub-blocks labeled as ‘b’ and ‘c’ in [TeX:] $$Y$$ are up-sampled before shuffling them with the ‘ [TeX:] $$Cb$$’ and ‘ [TeX:] $$Cr$$’ components, respectively. Here, [TeX:] $$K_$=5$$.
2.png

Ⅲ. Results

In the simulations, we have used Tecnick sampling dataset [16] that consists of 120 true color images of size 1200 × 1200. The JPEG quality factor [TeX:] $$Q_f \in \{71, 72, 73 , \cdots, 99, 100\}$$, the chroma sub-sampling ratio {4:2:0} and the standard luminance and chrominance quantization tables were used. The block size was set to be 16×16 with sub-block sizes {8 × 8, 4 × 4, 2 × 2} for the inside-out transformation and 8 × 8 for the channel shuffling step. The image quality was measured using the log transformed value of Multiscale Structural Similarity Index Measure (MS–SSIM)[17].

3.1 Visual Analysis

For visual quality analysis of the recovered images, an example image is shown in Fig. 3. The image was compressed with the JPEG standard implemented with the chroma subsampling of ratio 4:2:0 and standard quantization tables. For better inspection, a boxed region in each image is zoomed in and shown on the right of its corresponding image. It can be observed that the block artifact is avoided in Color-CPE method proposed in [3] for block size 16 × 16 and in IIB-CPEmethod proposed in [9] for all sub-block sizes as the correlation among the neighboring pixels within a block has been preserved. However, due to the erroneous calculation of the colorspace conversion function in both methods, regardless of the block size, the blur distortion appears in regions where there is an abrupt change in the intensity values. This blur distortion is reduced when the JPEG quality factor is set to a higher value, as shown in Fig. 3. (B). In addition, images recovered from Color-CPE cipher images where block sizes smaller than 16 × 16 were used have both block artifacts and blur distortions. On the other hand, no block artifacts and blur distortions are visible in the images recovered from our proposed method. The block artifacts were avoided by incorporating sub-block processing to preserve the pixel correlation, while the blur distortions were avoided by performing colorspace conversion and the chroma subsampling prior to the image component shuffling step. Since, proposed method used a single quantization table; therefore, for chrominance table, the edges in the recovered images are smudged for smaller block sizes. For a quantitative analysis and better understanding, the following subsection presents image quality and data rate differences using BD-measures.

Fig. 3.

Visual quality analysis of images recovered from PE methods. (a) The original image. (b) Image recovered from the plain image. (c-f) Images recovered from the Color-CPE method with block sizes (16 × 16, 8 × 8, 4 × 4, and 2 × 2), respectively. (g-i) Images recovered from IIB-CPE method. (j-l) and (m-o) are images recovered from proposed method implemented with luminance and chrominance tables, respectively. The sub-block sizes (8 × 8, 4 × 4, and 2 × 2) were used in (g, j, m), (h, k, n) and (i, l, o), respectively. The boxed region in each image is zoomed in and shown on its right side. The JPEG quality factor is 70 in (A) and 100 in (B).
3.png
3.2 Compression Analysis

For compression performance analysis of our proposed method, Fig. 4. plots the rate distortion (RD) curves for compression savings calculated as bitrate and the MS-SSIM quality of the recovered images. The RD curves were computed for the JPEG quality factor in the range of [70, 100] and standard quantization tables were used. The chroma subsampling ratio was set to 4:2:0. The ‘JPEG-Only’ curve is the JPEG compression of plain images, ‘IIB-CPE’ implements the baseline PE method proposed in [9] that incorporates sub-block processing, and ‘Proposed_Lum’ and ‘Proposed_Chr’ implement our proposed method with luminance and chrominance quantization tables, respectively. During encryption, the block size used was (16 × 16) and sub-block sizes used were (8 × 8), (4 × 4) and (2 × 2) for the IIB-CPE and proposed methods.

Fig. 4.

Rate distortion curves for the compression performance analysis. Each method is ranked based on BD-measures presented in Fig. 5. The rank is given in the legend as a number enclosed in brackets
4.png

Fig. 5. quantitatively compares the RD curves by using the BD difference metrics that is, rate and quality differences. The BD rate measures a percentage difference between two bitrates for an equivalent image quality, while the BD quality measures an average quality difference (dB) between two RD curves for the equivalent bandwidth. The MS-SSIM values for nearly identical quality images lie closer on the curve; therefore, the MS-SSIM ([TeX:] $$M$$) score is [TeX:] $$-10 \log _{10}(1-M)$$, as suggested in [9]. Compared to IIB-CPE method, the proposed method reduced the datarate difference by 87% at maximum (Proposed_Lum 8 × 8) and 18% at minimum (Proposed_Chr 2 × 2). In addition, the choice of quantization table has a negligible effect on the compression savings of proposed method implemented with larger sub-block sizes; however, for smaller sub-block size (2 × 2) compression with the luminance quantization table offered 8% better data rate than the chrominance quantization table.

Fig. 5.

Performance of the JPEG compression standard on PE methods implemented with different block sizes in terms of BD measures. The rate differences are for the equivalent quality relative to the JPEG under MS-SSIM for RD curves plotted in Fig. 4.
5.png

Besides comparison with IIB-CPE technique in Fig. 5., we compared our proposed scheme with the PE techniques proposed in [3] and [8] in-terms of BD rate differences. Though these schemes preserve the JPEG compression savings for larger block sizes (such as 16 × 16 in [3] and 8 × 8 in [8]), their performances drastically degrade on smaller block sizes. For smaller block sizes, the PE scheme proposed in [3] cannot satisfy the bitrate requirements to deliver the same quality image as that of the plain image while [8]'s scheme requires 352% and 549% more bitrate than the compression of plain images for block sizes 4 × 4 and 2 × 2, respectively.

3.3 Encryption Analysis

PE belongs to a class of symmetric key algorithm and consists of four secret keys as: permutation key [TeX:] $$K_1$$, rotation-inversion transformation key [TeX:] $$K_2$$, negative–positive transformation key [TeX:] $$K_3$$, and color-component shuffling key [TeX:] $$K_4$$. For a PE algorithm, the keyspace [TeX:] $$\mathcal{K}=\left\{\boldsymbol{K}_1, \boldsymbol{K}_2, \boldsymbol{K}_3, \boldsymbol{K}_4\right\}$$ is the set of all aforementioned keys whose size depends on the chosen block size. The number of blocks [TeX:] $$N$$ in a color image [TeX:] $$I^{H \times W \times C}$$, where [TeX:] $$H \times W$$ pixels in [TeX:] $$C$$ color channels is the image size, is given by

(3)
[TeX:] $$N=\frac{W}{B} \times \frac{H}{B},$$

where [TeX:] $$B$$ is the chosen block size. For the sub-block processing, the number of sub-blocks n in a block [TeX:] $$B^{B \times B \times C}$$ of size B[TeX:] $$B^2 \timesda$$ pixels are given by

(4)
[TeX:] $$n=\frac{B}{b} \times \frac{B}{b}$$

where [TeX:] $$b$$ is the chosen sub-block size. The missing term [TeX:] $$C$$ in (3) and (4) shows that a common key is used to process the color components in blocks and sub-blocks, respectively. The keyspace [TeX:] $$\mathcal{K}_{[3]}$$ of Color-CPE scheme is given as

(5)
[TeX:] $$\begin{gathered} \mathcal{K}_{[3]}=\left\{\boldsymbol{K}_{1,[3]}, \boldsymbol{K}_{2,[3]}, \boldsymbol{K}_{3,[3]}, \boldsymbol{K}_{4,[3]}\right\}, \\ \left|\mathcal{K}_{[3]}\right|=N!\cdot 8^N \cdot 2^N \cdot 6^N . \end{gathered}$$

The keyspace [TeX:] $$\mathcal{K}_{[9]}$$ of IIB-CPE scheme is given as

(6)
[TeX:] $$\begin{gathered} \mathcal{K}_{[9]}=\left\{\boldsymbol{K}_{1,[9]}, \boldsymbol{K}_{2,[9]}, \boldsymbol{K}_{3,[9]}, \boldsymbol{K}_{4,[9]}\right\}, \\ \left|\mathcal{K}_{[9]}\right|=N!\cdot\left(8^N \cdot 8^n\right) \cdot 2^N \cdot 6^N . \end{gathered}$$

The keyspace [TeX:] $$\mathcal{K}_{\text {pro }}$$ proposed method can bederived as

(7)
[TeX:] $$\begin{aligned} \mathcal{K}_{\text {pro }} & =\left\{\boldsymbol{K}_{1, \text { pro }}, \boldsymbol{K}_{2, \text { pro }}, \boldsymbol{K}_{3, \text { pro }}, \mathcal{K}_{4, \text { proo }}\right\}, \\ \left|\mathcal{K}_{\text {proo }}\right| & =N!\cdot\left(8^N \cdot 8^n\right) \cdot 2^N \cdot\left(6^N \cdot 4^N\right) \end{aligned}$$

When the sub-block processing is incorporated as in (6) and (7) then the key size is increased by a factor of [TeX:] $$8^f$$ compared to [TeX:] $$\mathcal{K}_{[3],}$$, which processes an entire block during encryption. This increment depends on the chosen sub-block size as [TeX:] $$n \in\left\{8^2, 4^2, 2^2\right\}$$ the factor becomes [TeX:] $$8^f \in\left\{8^{4 n}, 8^{16 n}, 8^{64 n}\right\}$$, respectively. In addition, [TeX:] $$K_4$$ in (7) is the set of two keys: color shuffling key and the luminance component sub-block selection key. Therefore, the key size of proposed method is increased by a factor of [TeX:] $$4^N$$ compared to [9].

Table 2.

Analysis of PE techniques robustness against the jigsaw puzzle solver attack.
PE Methods [TeX:] $$D_c$$ [TeX:] $$N_c$$ [TeX:] $$L_c$$
[3] (16 × 16) 0.01 0.11 0.12
[8] (8 × 8) 0.001 0.002 0.002
[9] (8 × 8) 0.01 0.08 0.02
[9] (4 × 4) 0.01 0.05 0.02
[9] (2 × 2) 0.01 0.06 0.02
Proposed (8 × 8) 0.01 0.08 0.02
Proposed (4 × 4) 0.01 0.05 0.02
Proposed (2 × 2) 0.01 0.06 0.02

[TeX:] $$D_c$$: direct comparison, [TeX:] $$N_c$$: neighbor comparison, and [TeX:] $$L_c$$: largest component comparison.

Block-based PE methods are vulnerable against a ciphertext-only attack known as jigsaw puzzle solver (JPS) attack, which treats each block of the cipher image as a jigsaw puzzle piece and tries to reconstruct the original image as a whole or partially. The robustness of a PE method against JPS attack can be quantified in-terms of three measures [9]: direct comparison([TeX:] $$D_c$$) measure that gives the ratio of blocks in the correct position, neighbor comparison ([TeX:] $$N_c$$) measure that gives the ratio of correctly joined pairwise blocks and largest component comparison ([TeX:] $$L_c$$) measure that gives the ratio of the largest joined blocks that have correct neighbors in a component. A smaller value of each metric indicates better robustness of a PE scheme against the JPS attack. Table 2. summarizes robustness analysis of our proposed scheme against JPS attack in comparison with the conventional PE techniques. It can be seen that techniques that use smaller block size have better resistance against the JPS attack because they reduce the efficiency of the JPS compatibility function.

3.4 Discussion

The proposed method mitigated the compatibility issue with the JPEG lossy standard of the conventional sub-block-based PE method [9]. However, the main limitation of our proposed method is the associated computational cost with performing chroma up- and sub-sampling twice. For example, in our proposed color transformation function, a luminance component that is shuffled with either of the chrominance components is up-sampled which undergoes sub-sampling during compression as explained in subsection 2.3. Therefore, this incurred an additional cost of performing color sampling twice.

Ⅳ. Conclusions and Future Work

In this paper, we proposed a color transformation function for PE methods that jointly performed image component shuffling and chroma subsampling functions. The proposed method adopts sub-block level processing to change the orientation of a block for better security and to preserve the correlation among adjacent pixels. The main advantage of our scheme is a better tradeoff between compression savings and encryption efficiency for photo-storage and photo-sharing applications.

The notable application of the conventional PE methods is privacy-preserving deep learning. Therefore, implementing our proposed method for such an application could be an interesting research direction.

Biography

Ijaz Ahmad

Aug. 2018: M.S. degree, Cho- sun University

Aug. 2023: Ph.D. degree, Cho- sun University

Jan. 2024~Current: Postdoc- toral Researcher, Korea University

[Research Interests] Image encryption and compression, Privacy-preserving deep learning

[ORCID:0000-0002-6022-7413]

Biography

Seokjoo Shin

1999: M.S. degree, Gwangju Institute of Science and Technology

2002: Ph.D. degree, Gwangju Institute of Science and Technology

2003~Current: Professor, Chosun University

[Research Interests] Wireless communication systems, AI for communication, privacy- preserving machine learning, and network security and privacy

[ORCID:0000-0003-2092-1336]

References

  • 1 I. Ahmad and S. Shin, "A novel hybrid image encryption-compression scheme by combining chaos theory and number theory," Signal Process. Image Commun., vol. 98, p. 116418, Oct. 2021. (http://dx.doi.org/10.1016/j.image.2021.116418)doi:[[[10.1016/j.image.2021.116418]]]
  • 2 B. Carpentieri, "Efficient compression and encryption for digital data transmission," Secur. Commun. Netw., vol. 2018, pp. 1-9, 2018. (http://dx.doi.org/10.1155/2018/9591768)doi:[[[10.1155/2018/9591768]]]
  • 3 K. Kurihara, S. Shiota, and H. Kiya, "An encryption-then-compression system for JPEG standard," in 2015 IEEE Picture Coding Symp. (PCS), pp. 119-123, Cairns, Australia, May 2015. (http://dx.doi.org/10.1109/PCS.2015.7170059)doi:[[[10.1109/PCS.2015.7170059]]]
  • 4 G. K. Wallace, "The JPEG still picture compression standard," IEEE Trans. Consum. Electron., vol. 38, no. 1, pp. xviii-xxxiv, Feb. 1992. (http://dx.doi.org/10.1109/30.125072)doi:[[[10.1109/30.125072]]]
  • 5 I. Ahmad and S. Shin, "Perceptual encryptionbased privacy-preserving deep learning in internet of things applications," in 2022 IEEE 13th Int. Conf. ICTC, pp. 1817-1822, Jeju Island, Korea, Oct. 2022. (http://dx.doi.org/10.1109/ICTC55196.2022.995 2589)doi:[[[10.1109/ICTC55196.2022.9952589]]]
  • 6 H. Kiya, A. P. M. Maung, Y. Kinoshita, S. Imaizumi, and S. Shiota, "An overview of compressible and learnable image transformation with secret key and its applications," APSIPA Trans. Signal Inf. Process., vol. 11, no. 1, 2022. (http://dx.doi.org/10.1561/116.00000048)doi:[[[10.1561/116.00000048]]]
  • 7 S. Imaizumi and H. Kiya, "A blockpermutation-based encryption scheme with independent processing of RGB components," IEICE Trans. Inf. Syst., vol. E101.D, no. 12, pp. 3150-3157, Dec. 2018. (http://dx.doi.org/10.1587/transinf.2018EDT0002)doi:[[[10.1587/transinf.2018EDT0002]]]
  • 8 W. Sirichotedumrong and H. Kiya, "Grayscale-based block scrambling image encryption using YCbCr color space for encryption-then-compression systems," APSIPA Trans. Signal Inf. Process., vol. 8, no. 1, 2019. (http://dx.doi.org/10.1017/ATSIP.2018.33)doi:[[[10.1017/ATSIP.2018.33]]]
  • 9 I. Ahmad and S. Shin, "IIB-CPE: Inter and intra block processing-based compressible perceptual encryption method for privacypreserving deep learning," Sensors, vol. 22, no. 20, p. 8074, Oct. 2022. (http://dx.doi.org/10.3390/s22208074)doi:[[[10.3390/s22208074]]]
  • 10 I. Ahmad, W. Choi, and S. Shin, "Comprehensive analysis of compressible perceptual encryption methods-compression and encryption perspectives," Sensors, vol. 23, no. 8, p. 4057, Apr. 2023. (http://dx.doi.org/10.3390/s23084057)doi:[[[10.3390/s23084057]]]
  • 11 R. El Saj, E. Sedgh Gooya, A. Alfalou, and M. Khalil, "Privacy-preserving deep neural network methods: Computational and perceptual methods-An overview," Electr., vol. 10, no. 11, p. 1367, Jun. 2021. 1140 (http://dx.doi.org/10.3390/electronics10111367)doi:[[[10.3390/electronics10111367]]]
  • 12 I. Ahmad and S. Shin, "Perceptual image encryption: A communication perspective," in 2024 IEEE ICOIN, pp. 660-663, Ho Chi Minh, Vietnam, Jan. 2024.custom:[[[-]]]
  • 13 P. Li and K. Lo, "Survey on JPEG compatible joint image compression and encryption algorithms," IET Signal Process., vol. 14, no. 8, pp. 475-488, Oct. 2020. (http://dx.doi.org/10.1049/iet-spr.2019.0276)doi:[[[10.1049/iet-spr.2019.0276]]]
  • 14 I. Ahmad and S. Shin, "Chroma subsampling for sub-block-based perceptual encryption algorithms," in Proc. Symp. KICS, pp. 852853, 2023. (Online) Available: http:///jou rnal/articleDetail?nodeId=NODE11667552custom:[[[http:///journal/articleDetail?nodeId=NODE11667552]]]
  • 15 G. Bjøntegaard, "Calculation of average PSNR differences between RD-curves," Comput. Sci., Eng., 2001.custom:[[[-]]]
  • 16 N. Asuni and A. Giachetti, "TESTIMAGES: A large-scale archive for testing visual devices and basic image processing algorithms," Smart Tools Apps Graph.-Eurographics Ital. Chapter Conf., p. 8, 2014. (http://dx.doi.org/10.2312/STAG.20141242)doi:[[[10.2312/STAG.20141242]]]
  • 17 Z. Wang, E. P. Simoncelli, and A. C. Bovik, "Multiscale structural similarity for image quality assessment," in IEEE The ThritySeventh Asilomar Conf. Signals, Syst. Comput., 2003, pp. 1398-1402, Pacific Grove, CA, USA, 2003. (http://dx.doi.org/10.1109/ACSSC.2003.129221 6)doi:[[[10.1109/ACSSC.2003.1292216]]]

Statistics


Related Articles

NBCA에 기초한 여원 MLCA와 2D CAT를 이용한 새로운 영상 암호화
H. Kim, T. Nam, S. Cho, S. Kim
JPEG-2000 부분 엔트로피 복호화에 의한 질감 영상 데이터베이스 검색
H. Park and H. Jung
웨이브렛 계수의 비트율-왜곡 최적화 기반 블록 부호화를 이용하는 임베디드 영상 압축 방법
C. M. Yang and K. Chung
비선형 FSR 과 2D CAT을 이용한 영상 암호화
T. Nam, S. Cho, S. Kim
JPEG2000에서 시각적 무손실 임계값을 이용한 진단의료영상 압축기법
J. Bong, G. Yang, J. Jeon
가역적 데이터 은닉 시스템에서 RS 부호를 사용한 이미지 공간상관 관계 향상을 위한 전송 기법
T. Kim, M. Jang, S. Kim
고해상도 이미지 처리를 위한 PIM 기반 JPEG 디코더 병렬화 기법 구현
J. Kim and D. Nam
영상압축에 강인한 변질검증 워터마킹에 관한 연구
S. Ahn, K. Lee, H. Park, H. Ko
디지털 영상 감시 시스템의 영상 데이터 암호화
H. Lee and H. Lee
집적영상 및 랜덤 픽셀-스크램블링 기법을 이용한 새로운 광 영상 암호화
Y. Piao, S. Kim, E. Kim

Cite this article

IEEE Style
I. Ahmad and S. Shin, "Sub-Block-Based Compressible Perceptual Encryption Algorithm with Chroma Subsampling," The Journal of Korean Institute of Communications and Information Sciences, vol. 49, no. 8, pp. 1132-1140, 2024. DOI: 10.7840/kics.2024.49.8.1132.


ACM Style
Ijaz Ahmad and Seokjoo Shin. 2024. Sub-Block-Based Compressible Perceptual Encryption Algorithm with Chroma Subsampling. The Journal of Korean Institute of Communications and Information Sciences, 49, 8, (2024), 1132-1140. DOI: 10.7840/kics.2024.49.8.1132.


KICS Style
Ijaz Ahmad and Seokjoo Shin, "Sub-Block-Based Compressible Perceptual Encryption Algorithm with Chroma Subsampling," The Journal of Korean Institute of Communications and Information Sciences, vol. 49, no. 8, pp. 1132-1140, 8. 2024. (https://doi.org/10.7840/kics.2024.49.8.1132)