Selective Encryption Techniques of JPEG2000 Codestream for Medical Images Transmission (original) (raw)
Related papers
A new selective encryption technique of JPEG2000 codestream for medical images transmission
2008 5th International Multi-Conference on Systems, Signals and Devices, 2008
In this paper, a novel selective encryption image scheme based on JPEG2000 is proposed, which encrypts only the code-blocks corresponding to some sensitive precincts. In order to improve the security level we introduce the permutation of codeblocks contributing in the selected precincts. Symmetric encryption AES with CFB mode is used to encrypt swapped codeblocks. The idea of combining permutation and selective encryption is used in order to minimize the amount of processed data encryption while ensuring the best possible degradation through the permutation. The proposed process encryption doesn't introduce superfluous JPEG2000 markers in the protected codestream, i.e, the protected codestream format is compliant to JPEG2000 codestream one. It keeps file format and compression ratio unchanged and doesn't degrade the original error robustness. The proposed scheme works with any standard ciphers and introduces negligible computational cost.
In this paper, a novel selective encryption scheme for JPEG2000 codestream is proposed. Many of proposals format compliant encryption schemes for JPEG2000 that have been made encrypt packet body data, but leave header packet in plaintext. Our proposed scheme encrypts code-blocks data corresponding to some sensitive precincts. This encryption is combined to a cyclic permutation of all packets headers in the bitstream. Actually, in the JPEG2000 codestream, packet header information is specific to the visual content, and it is can be used as a fingerprint of the codestream. The proposed process doesn't introduce superfluous JPEG2000 markers in the protected codestream, i.e, the protected codestream format is compliant to JPEG2000 codestream one. It keeps file format and compression ratio unchanged and doesn't degrade the original error robustness. The proposed scheme works with any standard ciphers and introduces negligible computational cost.
A new selective encryption of JPEG2000 codestream for confidential images transmission
In this paper, a novel image encryption scheme based on JPEG2000 is proposed, which encrypts only the code-blocks corresponding to some sensitive precincts. The proposed process encryption doesn't introduce superfluous JPEG2000 markers in the protected codestream, i.e, the protected codestream format is compliant to JPEG2000 codestream one. It keeps file format and compression ratio unchanged and doesn't degrade the original error robustness. The proposed scheme works with any standard ciphers and introduces negligible computational cost.
Selective Encryption of Medical Images
Proceedings of the 10th International Conference on Computer Vision Theory and Applications, 2015
The transfer of image in the digital world plays a very important role, their security is an important issue, and encryption is one of the ways to ensure security. Few applications like medical image security needs to secure only selected region of the image. This work proposes a selective encryption approach for medical images. The approach based on Grain-128 which provides the facilities of implementation of selective image encryption and decryption. Several tests are done in order to prove the approach performance including visual tests, key sensitivity, entropy analysis and correlation coefficient analysis.
Selective image encryption for Medical and Satellite Images
Information security plays a very important role in fast growing information and communication technology. Few applications like medical image security and satellite image security needs to secure only selected portion of the image. This paper describes a concept of selective image encryption in two ways. First method divides the image in to sub blocks, then selected blocks are applied to encryption process. Second method automatically detects the positions of objects, and then selected objects are applied to encryption process. Morphological techniques are used to detect the positions of the objects in given images. These two approaches are specifically developed to encrypt the portion of an image in medical images and satellite image. Keyword-Region of Interest, partial image encryption, visible encryption Panduranga H T et al. / International Journal of Engineering and Technology (IJET)
Secure and Low Cost Selective Encryption for JPEG2000
2008 Tenth IEEE International Symposium on Multimedia, 2008
Selective encryption is a new trend in content protection. It aims at reducing the amount of data to encrypt while achieving a sufficient and inexpensive security. This approach is particularly desirable in constrained communication (real time networking with delay constraints, mobile communication with limited computational power...). In this paper we introduce selective encryption from information theory point of view. We define a set of evaluation criteria for selective encryption algorithms and propose a novel selective encryption algorithm for JPEG2000 compressed images satisfying all these criteria. The main contribution of this proposal consists of reaching the minimum amount of data to encrypt regarding a given level of security and target application requirements. For this purpose, we exploit the R-D optimization performed by JPEG2000 EBCOT algorithm.
An Efficient Method for Secured Transfer of Medical Images
Transmission of multimedia data is in a secured manner in different channels is found to be one of the complex tasks. Due to heavy traffic in the network, chances of data drop are also very high. In such cases, intruder or any third party can tap the information where the security is compromised. Hence to reduce the transmission time, a novel method is introduced here that provides security of the data as well as compression for faster transmission of data. We have seen substitution cipher scheme has gained prominence in the cryptographic system. The proposed technique considers two arrays namely row array and column array where encrypted data is stored. Encryption is based on the key of random array. All color components of the pixels of the image are encrypted individually. Addition modulo 256 is applied one pixel values using a random number. Individually encrypted colors are combined together to form an encrypted image. This encrypted image is compressed using Deflate compression technique. Performance of the proposed method is evaluated on many images and comparative study with the existing system revealed that the proposed system possess better performance.
Techniques of medical image encryption taxonomy
Bulletin of Electrical Engineering and Informatics, 2022
Medical images are one of the most significant and sensitive data types in computer systems. Sending medical images over the internet necessitates using a robust encryption scheme that is resistant to cryptographic attacks. Confidentiality is the most critical part of the three security objectives for information systems security, namely confidentiality, integrity, and availability. Confidentiality is the most critical aspect for the secure storage and transfer of medical images. In this study, we attempt to classify various encryption methods in order to assist researchers in selecting the optimal strategy for protecting sensitive patient information while transferring medical images without alteration and outline the measures that should be adopted to address challenges and concerns relevant to techniques of medical image encryption.
Efficient and secure encryption schemes for JPEG2000
2004 IEEE International Conference on Acoustics, Speech, and Signal Processing
The JPEG2000 syntax requires that any two consecutive bytes in the encrypted packet body should not be larger than 0xFF8F. This stringent requirement has plagued researchers for a few years and no satisfactory solution has been proposed. In this paper, we successfully developed efficient, secure and format-compliant encryption schemes for JPEG 2000. Any secure encryption algorithm (stream cipher or block cipher) can be used in our schemes. The new schemes are remarkably efficient and introduce only extremely small amount of extra computation. The new schemes are highly secure and it is proved that they perfectly protect 99.15% of the information of an image. The encryption tools described in this paper have been proposed to the JPSEC (JPEG 2000 Security) standardization group.