Cargando…
Comprehensive Analysis of Compressible Perceptual Encryption Methods—Compression and Encryption Perspectives
Perceptual encryption (PE) hides the identifiable information of an image in such a way that its intrinsic characteristics remain intact. This recognizable perceptual quality can be used to enable computation in the encryption domain. A class of PE algorithms based on block-level processing has rece...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10145250/ https://www.ncbi.nlm.nih.gov/pubmed/37112398 http://dx.doi.org/10.3390/s23084057 |
_version_ | 1785034288171843584 |
---|---|
author | Ahmad, Ijaz Choi, Wooyeol Shin, Seokjoo |
author_facet | Ahmad, Ijaz Choi, Wooyeol Shin, Seokjoo |
author_sort | Ahmad, Ijaz |
collection | PubMed |
description | Perceptual encryption (PE) hides the identifiable information of an image in such a way that its intrinsic characteristics remain intact. This recognizable perceptual quality can be used to enable computation in the encryption domain. A class of PE algorithms based on block-level processing has recently gained popularity for their ability to generate JPEG-compressible cipher images. A tradeoff in these methods, however, is between the security efficiency and compression savings due to the chosen block size. Several methods (such as the processing of each color component independently, image representation, and sub-block-level processing) have been proposed to effectively manage this tradeoff. The current study adapts these assorted practices into a uniform framework to provide a fair comparison of their results. Specifically, their compression quality is investigated under various design parameters, such as the choice of colorspace, image representation, chroma subsampling, quantization tables, and block size. Our analyses have shown that at best the PE methods introduce a decrease of 6% and 3% in the JPEG compression performance with and without chroma subsampling, respectively. Additionally, their encryption quality is quantified in terms of several statistical analyses. The simulation results show that block-based PE methods exhibit several favorable properties for the encryption-then-compression schemes. Nonetheless, to avoid any pitfalls, their principal design should be carefully considered in the context of the applications for which we outlined possible future research directions. |
format | Online Article Text |
id | pubmed-10145250 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2023 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-101452502023-04-29 Comprehensive Analysis of Compressible Perceptual Encryption Methods—Compression and Encryption Perspectives Ahmad, Ijaz Choi, Wooyeol Shin, Seokjoo Sensors (Basel) Review Perceptual encryption (PE) hides the identifiable information of an image in such a way that its intrinsic characteristics remain intact. This recognizable perceptual quality can be used to enable computation in the encryption domain. A class of PE algorithms based on block-level processing has recently gained popularity for their ability to generate JPEG-compressible cipher images. A tradeoff in these methods, however, is between the security efficiency and compression savings due to the chosen block size. Several methods (such as the processing of each color component independently, image representation, and sub-block-level processing) have been proposed to effectively manage this tradeoff. The current study adapts these assorted practices into a uniform framework to provide a fair comparison of their results. Specifically, their compression quality is investigated under various design parameters, such as the choice of colorspace, image representation, chroma subsampling, quantization tables, and block size. Our analyses have shown that at best the PE methods introduce a decrease of 6% and 3% in the JPEG compression performance with and without chroma subsampling, respectively. Additionally, their encryption quality is quantified in terms of several statistical analyses. The simulation results show that block-based PE methods exhibit several favorable properties for the encryption-then-compression schemes. Nonetheless, to avoid any pitfalls, their principal design should be carefully considered in the context of the applications for which we outlined possible future research directions. MDPI 2023-04-17 /pmc/articles/PMC10145250/ /pubmed/37112398 http://dx.doi.org/10.3390/s23084057 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Review Ahmad, Ijaz Choi, Wooyeol Shin, Seokjoo Comprehensive Analysis of Compressible Perceptual Encryption Methods—Compression and Encryption Perspectives |
title | Comprehensive Analysis of Compressible Perceptual Encryption Methods—Compression and Encryption Perspectives |
title_full | Comprehensive Analysis of Compressible Perceptual Encryption Methods—Compression and Encryption Perspectives |
title_fullStr | Comprehensive Analysis of Compressible Perceptual Encryption Methods—Compression and Encryption Perspectives |
title_full_unstemmed | Comprehensive Analysis of Compressible Perceptual Encryption Methods—Compression and Encryption Perspectives |
title_short | Comprehensive Analysis of Compressible Perceptual Encryption Methods—Compression and Encryption Perspectives |
title_sort | comprehensive analysis of compressible perceptual encryption methods—compression and encryption perspectives |
topic | Review |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10145250/ https://www.ncbi.nlm.nih.gov/pubmed/37112398 http://dx.doi.org/10.3390/s23084057 |
work_keys_str_mv | AT ahmadijaz comprehensiveanalysisofcompressibleperceptualencryptionmethodscompressionandencryptionperspectives AT choiwooyeol comprehensiveanalysisofcompressibleperceptualencryptionmethodscompressionandencryptionperspectives AT shinseokjoo comprehensiveanalysisofcompressibleperceptualencryptionmethodscompressionandencryptionperspectives |