{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,21]],"date-time":"2024-07-21T11:50:45Z","timestamp":1721562645432},"reference-count":36,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2021,3,31]],"date-time":"2021-03-31T00:00:00Z","timestamp":1617148800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Entropy"],"abstract":"In this paper, the authors analyze in more details an image encryption scheme, proposed by the authors in their earlier work, which preserves input image statistics and can be used in connection with the JPEG compression standard. The image encryption process takes advantage of fast linear transforms parametrized with private keys and is carried out prior to the compression stage in a way that does not alter those statistical characteristics of the input image that are crucial from the point of view of the subsequent compression. This feature makes the encryption process transparent to the compression stage and enables the JPEG algorithm to maintain its full compression capabilities even though it operates on the encrypted image data. The main advantage of the considered approach is the fact that the JPEG algorithm can be used without any modifications as a part of the encrypt-then-compress image processing framework. The paper includes a detailed mathematical model of the examined scheme allowing for theoretical analysis of the impact of the image encryption step on the effectiveness of the compression process. The combinatorial and statistical analysis of the encryption process is also included and it allows to evaluate its cryptographic strength. In addition, the paper considers several practical use-case scenarios with different characteristics of the compression and encryption stages. The final part of the paper contains the additional results of the experimental studies regarding general effectiveness of the presented scheme. The results show that for a wide range of compression ratios the considered scheme performs comparably to the JPEG algorithm alone, that is, without the encryption stage, in terms of the quality measures of reconstructed images. Moreover, the results of statistical analysis as well as those obtained with generally approved quality measures of image cryptographic systems, prove high strength and efficiency of the scheme\u2019s encryption stage.<\/jats:p>","DOI":"10.3390\/e23040421","type":"journal-article","created":{"date-parts":[[2021,4,1]],"date-time":"2021-04-01T01:37:03Z","timestamp":1617241023000},"page":"421","source":"Crossref","is-referenced-by-count":4,"title":["Image Statistics Preserving Encrypt-then-Compress Scheme Dedicated for JPEG Compression Standard"],"prefix":"10.3390","volume":"23","author":[{"ORCID":"http:\/\/orcid.org\/0000-0001-9070-8042","authenticated-orcid":false,"given":"Dariusz","family":"Puchala","sequence":"first","affiliation":[{"name":"Institute of Information Technology, Lodz University of Technology, 90-924 Lodz, Poland"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-2707-7353","authenticated-orcid":false,"given":"Kamil","family":"Stokfiszewski","sequence":"additional","affiliation":[{"name":"Institute of Information Technology, Lodz University of Technology, 90-924 Lodz, Poland"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-3368-5531","authenticated-orcid":false,"given":"Mykhaylo","family":"Yatsymirskyy","sequence":"additional","affiliation":[{"name":"Institute of Information Technology, Lodz University of Technology, 90-924 Lodz, Poland"}]}],"member":"1968","published-online":{"date-parts":[[2021,3,31]]},"reference":[{"key":"ref_1","unstructured":"Data Encryption Standard (DES) (1999). Federal Information Processing Standards Publication, FIPS PUB 46-3."},{"key":"ref_2","unstructured":"Massey, J.L., and Lai, X. (1993). Device for the Conversion of a Digital Block and Use of Same. (5214703), U.S. Patent."},{"key":"ref_3","unstructured":"Advanced Encryption Standard (AES) (2001). Federal Processing Standards Application, FIPS 197."},{"key":"ref_4","unstructured":"Furht, B., Muharemagic, E., and Socek, D. (2005). Multimedia Encryption And Watermarking. Mult. Syst. Appl. Ser., 28."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"2992","DOI":"10.1109\/TSP.2004.833860","article-title":"On Compressing Encrypted Data","volume":"52","author":"Johnson","year":"2004","journal-title":"IEEE Trans. Signal Process."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Schonberg, D., Draper, S., and Ramchandran, K. (2006, January 8\u201311). On Compression of Encrypted Images. Proceedings of the 2006 International Conference on Image Processing, Atlanta, GA, USA.","DOI":"10.1109\/ICIP.2006.313177"},{"key":"ref_7","unstructured":"Kumar, A.A., and Makur, A. (2008, January 8\u201310). Distributed Source Coding Based Encryption And Lossless Compression of Gray Scale and Color Images. Proceedings of the 2008 IEEE 10th Workshop on Multimedia Signal Processing, Cairns, Australia."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1109\/TIFS.2010.2099114","article-title":"Lossy Compression and Iterative Reconstruction for Encrypted Image","volume":"6","author":"Zhang","year":"2011","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1016\/j.image.2015.09.009","article-title":"A new encryption-then-compression algorithm using rate-distortion optimization","volume":"39","author":"Wang","year":"2015","journal-title":"Elsevier Signal Process. Image Commun."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Kumar, A.A., and Makur, A. (2009, January 23\u201326). Lossy Compression of Encrypted Image by Compressive Sensing Technique. Proceedings of the TENCON 2009\u20142009 IEEE Region 10 Conference, Singapore.","DOI":"10.1109\/TENCON.2009.5395999"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"3353","DOI":"10.1007\/s11227-015-1413-0","article-title":"A game theory-based block image compression method in encryption domain","volume":"71","author":"Liu","year":"2015","journal-title":"J. Supercomput."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Puchala, D., Stokfiszewski, K., and Yatsymirskyy, M. (2020, January 24\u201327). Encryption Before Compression Coding Scheme for JPEG Image Compression Standard. Proceedings of the Data Compression Conference (DCC), Snowbird, UT, USA.","DOI":"10.1109\/DCC47342.2020.00039"},{"key":"ref_13","first-page":"373","article-title":"Joint Compression and Encryption of Visual Data Using Orthogonal Parametric Transforms","volume":"64","author":"Puchala","year":"2016","journal-title":"Bull. Pol. Acad. Sci."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"772","DOI":"10.1109\/TCS.1978.1084534","article-title":"Kronecker Products and Matrix Calculus in System Theory","volume":"CAS-25","author":"Brewer","year":"1978","journal-title":"IEEE Trans. Circuits Syst."},{"key":"ref_15","unstructured":"(2018). Microsoft Corporation, Windows Metafile Format. Protoc. Revis., 15, 84\u201392."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"1508","DOI":"10.1109\/83.799879","article-title":"Optimal Transform Coding in the Presence of Quantization Noise","volume":"8","author":"Diamantaras","year":"1999","journal-title":"IEEE Trans. Image Process."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"1186","DOI":"10.1109\/72.788657","article-title":"Optimal Linear Compression Under Unreliable Representation and Robust PCA Neural Models","volume":"10","author":"Diamantaras","year":"1999","journal-title":"IEEE Trans. Neural Netw."},{"key":"ref_18","unstructured":"Pennebaker, W.B., and Mitchell, J.L. (1993). JPEG: Still Image Data Compression Standard, Springer Science & Business Media."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","article-title":"A Mathematical Theory of Communication","volume":"27","author":"Shannon","year":"1948","journal-title":"Bell Syst. Tech. J."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/18.720541","article-title":"Quantization","volume":"44","author":"Gray","year":"1998","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"427","DOI":"10.1109\/TCS.1978.1084497","article-title":"Principles of Quantization","volume":"CAS-25","author":"Gersho","year":"1978","journal-title":"IEEE Trans. Circuits Syst."},{"key":"ref_22","unstructured":"Cover, T.M., and Thomas, J.A. (1991). Elements of Information Theory, John Wiley & Sons."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"1623","DOI":"10.1109\/18.850706","article-title":"Transform Coding with Backward Adaptive Updates","volume":"46","author":"Goyal","year":"2000","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1145\/356859.356861","article-title":"Image Models","volume":"13","author":"Ahuja","year":"1981","journal-title":"Comput. Surv."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"1485","DOI":"10.1109\/5.40665","article-title":"Discrete-Index Markov-Type Random Processes","volume":"77","author":"Derin","year":"1989","journal-title":"Proc. IEEE"},{"key":"ref_26","first-page":"93","article-title":"Parametrized Orthogonal Transforms for Data Encryption","volume":"3","author":"Puchala","year":"2013","journal-title":"Comput. Probl. Electr. Eng. J."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Rao, K.R., and Yip, P. (1990). Discrete Cosine Transform: Algorithms, Advantages, Applications, Academic Press Professional.","DOI":"10.1016\/B978-0-08-092534-9.50007-2"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1016\/j.diin.2008.05.004","article-title":"Using JPEG quantization tables to identify imagery processed by software","volume":"5","author":"Kornblum","year":"2008","journal-title":"Digit. Investig."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1109\/LSP.2013.2237764","article-title":"Approximating the KLT by Maximizing the Sum of Fourth-Order Moments","volume":"20","author":"Puchala","year":"2013","journal-title":"IEEE Signal Process. Lett."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Bouguezel, S., Ahmad, O., and Swamy, M.N.S. (2013, January 19\u201323). A New Involutory Parametric Transform and Its Application to Image Encryption. In Proceeding of the 2013 IEEE International Symposium on Circuits and Systems (ISCAS), Beijing, China.","DOI":"10.1109\/ISCAS.2013.6572412"},{"key":"ref_31","unstructured":"Shakhovska, N., and Stepashko, V. (2018). Involutory Parametric Orthogonal Transforms of Cosine-Walsh Type with Application to Data Encryption. Advances in Intelligent Systems and Computing II. CSIT 2017, Springer."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"1481","DOI":"10.1002\/j.1538-7305.1962.tb03990.x","article-title":"On rearrangeable three-stage connecting networks","volume":"41","author":"Benes","year":"1962","journal-title":"Bell Syst. Tech. J."},{"key":"ref_33","first-page":"241","article-title":"Quality of Encryption Measurement of Bitmap Images with RC6, MRC6, and Rijndael Block Cipher Algorithms","volume":"5","year":"2007","journal-title":"Inter. J. Netw. Secur."},{"key":"ref_34","first-page":"134","article-title":"A Survey on Key(s) and Keyless Image Encryption Techniques","volume":"17","author":"Kumar","year":"2017","journal-title":"Cybern. Inf. Technol."},{"key":"ref_35","unstructured":"Stallings, W. (2020). Cryptography and Network Security: Principles and Practice, Pearson. [8th ed.]."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Nguyen, H.C., and Katzenbeisser, S. (2013). Detecting Resized Double JPEG Compressed Images\u2014Using Support Vector Machine. Proc. Commun. Multimed. Secur., 113\u2013122.","DOI":"10.1007\/978-3-642-40779-6_9"}],"container-title":["Entropy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1099-4300\/23\/4\/421\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T12:03:53Z","timestamp":1720613033000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1099-4300\/23\/4\/421"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,31]]},"references-count":36,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2021,4]]}},"alternative-id":["e23040421"],"URL":"https:\/\/doi.org\/10.3390\/e23040421","relation":{},"ISSN":["1099-4300"],"issn-type":[{"value":"1099-4300","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,3,31]]}}}