Abstract
Chaotic mixing based encryption schemes for visual data are shown to be robust to lossy compression as long as the security requirements are not too high. This property facilitates the application of these ciphers in scenarios where lossy compression is applied to encrypted material – which is impossible in case traditional ciphers should be employed. If high security is required chaotic mixing loses its robustness to compression, still the lower computational demand may be an argument in favor of chaotic mixing as compared to traditional ciphers when visual data is to be encrypted.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Avcibas, I., Sankur, B., Sayood, K.: Statistical evaluation of image quality measures. Journal of Electronic Imaging 11(2), 206–223 (2002)
Chen, G., Mao, Y., Chui, C.K.: A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons and Fractals 21, 749–761 (2004)
Daemen, J., Rijmen, V.: The Design of Rijndael: AES — The Advanced Encryption Standard. Springer, Heidelberg (2002)
Eskicioglu, A.: Quality measurement for monochrome compressed images in the past 25 years. In: Proceedings of the International Conference on Acoustics, Speech and Signal Processing, pp. 1907–1910 (2000)
Fridrich, J.: Symmetric ciphers based on two-dimensional chaotic maps. Int. J. of Bifurcation and Chaos 8(6), 1259–1284 (1998)
Furht, B., Kirovski, D. (eds.): Multimedia Security Handbook. CRC Press, Boca Raton, Florida (2005)
Norcen, R., Uhl, A.: Encryption of wavelet-coded imagery using random permutations. In: Proceedings of the IEEE International Conference on Image Processing (ICIP 2004), Singapore, IEEE Signal Processing Society (October 2004)
Scharinger, J.: Fast encryption of image data using chaotic Kolmogorov flows. Journal of Electorinic Imaging 7(2), 318–325 (1998)
Tosun, A.S., Feng, W.C.: On error preserving encryption algorithms for wireless video transmission. In: Proceedings of the ninth ACM Multimedia Conference 2001, pp. 302–307, Ottawa, Canada (October 2001)
Uhl, A., Pommer, A.: Image and Video Encryption. From Digital Rights Management to Secured Personal Communication. In: Advances in Information Security, vol. 15, Springer, Heidelberg (2005)
Wen, J., Severa, M., Zeng, W., Luttrell, M., Jin, W.: A format-compliant configurable encryption framework for access control of video. IEEE Transactions on Circuits and Systems for Video Technology 12(6), 545–557 (2002)
Zeng, W., Wen, J., Severa, M.: Fast self-synchronous content scrambling by spatially shuffling codewords of compressed bitstreams. In: Proceedings of the IEEE International Conference on Image Processing (ICIP 2002) (September 2002)
Zeng, W., Lei, S.: Efficient frequency domain selective scrambling of digital video. IEEE Transactions on Multimedia 5(1), 118–129 (2003)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2006 IFIP International Federation for Information Processing
About this paper
Cite this paper
Gschwandtner, M., Uhl, A., Wild, P. (2006). Compression of Encrypted Visual Data. In: Leitold, H., Markatos, E.P. (eds) Communications and Multimedia Security. CMS 2006. Lecture Notes in Computer Science, vol 4237. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11909033_13
Download citation
DOI: https://doi.org/10.1007/11909033_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-47820-1
Online ISBN: 978-3-540-47823-2
eBook Packages: Computer ScienceComputer Science (R0)