E ff ect of random byte errors on Lena image. 

E ff ect of random byte errors on Lena image. 

Source publication
Article
Full-text available
This paper analyzes the robustness properties of 2D chaotic map image encryption schemes. We investigate the behavior of such block ciphers under different channel error types and find the transmission error robustness to be highly dependent on on the type of error occurring and to be very different as compared to the effects when using traditional...

Similar publications

Conference Paper
Full-text available
Since Rijndael was chosen as the Advanced Encryption Standard (AES), improving upon 7-round attacks on the 128-bit key variant (out of 10 rounds) or upon 8-round attacks on the 192/256-bit key variants (out of 12/14 rounds) has been one of the most difficult challenges in the cryptanalysis of block ciphers for more than a decade. In this paper, we...
Article
Full-text available
A novel visually meaningful image encryption algorithm is proposed based on adaptive 2D compressive sensing and chaotic system. The plain image is first compressed and encrypted simultaneously by adaptive 2D compressive sensing to obtain the pre-encrypted compressed image. In this process, 3D cat map is used to generate the measurement matrix and t...
Article
Full-text available
Security is a most important issue for communication and storing images during image transformation. Protection of image becoming very important. The protection of image done with encryption and decryption. There are various techniques has been proposed to protect the confidential image from unauthorized access. Image compression technique is used...
Article
Full-text available
With the increase of commercial multimedia applications using digital video, the security of video data becomes more and more important. Although several techniques have been proposed in order to protect these video data, they provide limited security or introduce significant overhead. This paper proposes a video security scheme for MPEG video comp...
Article
Full-text available
In order to overcome the shortcomings of the standard compressive sensing (CS) encryption framework, a novel fusion application scheme of CS and optical transformation technology is proposed. The proposed scheme, making full use of the feature of CS to achieve compression and encryption simultaneously, compresses and encrypts two images into one im...

Citations

... While the conventional encryption approach (which is the encryption of the entire JPEG XR data with a cryptographically strong cipher in our context) of course does not offer such robustness properties due to the intrinsic properties of the employed ciphers, certain multimedia encryption techniques have been proven to provide this property to some extent. For example, we were able to demonstrate transmission error robustness and compression robustness for a class of chaos-based encryption techniques when applied to image data [15]. Contrasting to this prior work, we do not consider the encryption of plain image data here but we deal with format-compliant encryption schemes for a particular compression format, i.e. ...
Article
Full-text available
JPEG XR is the most recent still image coding standard, and custom security features for this format are required for fast adoption of the standard. Format-compliant encryption schemes are important for many application scenarios but need to be highly customised to a specific recent format like JPEG XR. This paper proposes, discusses, and evaluates a set of format-compliant encryption methods for the JPEG XR standard: coefficient scan order permutation, sign bit encryption, transform-based encryption, random level shift encryption, index-based VLC encryption, and encrypting entire frequency bands are considered. All algorithms are thoroughly evaluated by discussing possible compression impact, by assessing visual security and cryptographic security, and by discussing applicability in real-world scenarios. Most techniques are found to be insecure and, in a cryptographic sense, have a limited range of applicability and cannot be applied to JPEG XR bitstreams in an efficient manner. Encrypting entire frequency bands is identified to be a good solution in case a weaker form of format compliance can be accepted.
... (6) Transmission error tolerance: since the real-time transport of multimedia data often occurs in noisy environments, which is especially true in the case of wireless channels (Gschwandtner et al., 2007; Lin, Chung & Chen, 2008), the delivered multimedia data is prone to bit errors. So, a perfect encryption algorithm should be insensitive and robust to transmission errors. ...
... Chaosbased cryptography is relied on the complex dynamics of nonlinear systems or maps which are deterministic but simple. Therefore, it can provide a fast and secure methods for data protection, which is crucial for multimedia data transmission over fast communication channels, such as the broadband internet communication56789. The chaos-based cryptographic algorithms have suggested some new ways to develop efficient image-encryption schemes1011121314. ...
Article
Full-text available
Recently, an enhanced spatiotemporal chaotic image/video cryptosystem was proposed by Rhouma and Belghith. This paper demonstrates that the enhanced cryptosystem is not secure against the following three different classical types of attacks: chosen plaintext, chosen ciphertext, and known plaintext. In the three attacks, only a pair of (plaintext/ciphertext) was needed to totally break the cryptosystem.
... The underlying problem is that VQIs overall performance does not correlate to performance for low quality scenarios or even, though less frequently, for high quality scenarios. Typical low quality scenarios are low bitrate videos [3,4], video streaming [5,6], assessment of transmission errors [7] or quality control for transparent encryption [8]. ...
Conference Paper
Full-text available
Visual quality indices are frequently used instead of human evaluation for the quality assessment of impaired images (or video material). These visual quality indices are in turn evaluated on databases containing impaired images in conjunction with a score given by evaluation with human observers. The fitness of these indices are judged on the entire quality scale of the respective database. However, this leads to the incorrect assumption that these quality indices perform well over the whole range possible qualities. This is unfortunately not true, especially towards the low quality range of images these quality indices often show little actual correlation to human judgement. In this paper a number of visual quality indices will be evaluated with regard to the lower quality spectrum of impairments and it will be shown that the overall fitness of a quality index is not generally related to its performance regarding high impairment.
... The underlying problem is that VQIs overall performance does not correlate to performance for low quality scenarios or even, though less frequently, for high quality scenarios. Typical low quality scenarios are low bitrate videos [3,4], video streaming [5,6], assessment of transmission errors [7] or quality control for transparent encryption [8]. ...
Chapter
A method of scrambling for a service components system in crypto-compression codograms formed under the condition of discarding the pixel brightness values in RGB space least significant been developed. The difference between this method and the known ones is that, what before performing scrambling transformations, the service data merging presented in a reduced dynamic range into 8-bit combined elements is organized. At the permutation stage of the combined 8-bit data, not only the original 7-bit elements of the service components` values location changing organized, but also their values change too. This allows to increase known permutation transformations cryptographic characteristics. The developed method provides: availability of video data increasing by further reducing the image crypto-compression representation; cryptographic stability increasing by the elements of service data system values changing, breaking the correlation between the elements and changing the frequency of pixels. Scrambling transformations based on permutation tables applied to the service components in cryptocompression codograms system, ensure the stability of the image visual information to errors in codograms that occur in the communication channel. This is despite the fact that cryptocompression codograms are original images concise representation.KeywordsCryptocompression encryptionInformation protectionScramblingEncryptionPermutationCompressionPrivacyImage
Article
This research analyzes the susceptibility to errors in the communication channel of the two standards in image compression - JPEG and JPEG 2000. Errors are introduced to the bit stream via channel noise, i.e. Gauss, Poisson, uniform noise and their influence to image quality is measured by objective and subjective image quality assessment methods. A novel compression method based on partial differential equations is introduced as a direct contender to two before mentioned standards.
Article
We present two approaches to robust image obfuscation based on permutation of image regions and channel intensity modulation. The proposed concept of robust image obfuscation is a step towards end-to-end security in Web 2.0 applications. It helps to protect the privacy of the users against threats caused by internet bots and web applications that extract biometric and other features from images for data-linkage purposes. The approaches described in this paper consider that images uploaded to Web 2.0 applications pass several transformations, such as scaling and JPEG compression, until the receiver downloads them. In contrast to existing approaches, our focus is on usability, therefore the primary goal is not a maximum of security but an acceptable trade-off between security and resulting image quality.
Chapter
The augmentation in the field of communication technology has lead to an extensive use of multimedia applications. Multimedia applications, especially, over wireless networks, can easily be intercepted, thus, making its security an essential and challenging issue. Multimedia encryption is the core enabling technology that provides confidentiality and prevents unauthorized access of the content. Real time constraints, large amount, and unique characteristics of multimedia data inhibits the use of traditional cryptographic algorithms over multimedia data. Recent years have witnessed an astounding development in the direction of format compliant, perceptual, and scalable encryption techniques that support advanced functionalities. This chapter gives a snapshot of the conventional encryption, and an up-to-date treatise of the principles, techniques, attacks, and advancements of multimedia encryption techniques developed to meet desired goals in specific applications.