Cargando…

Comprehensive Analysis of Compressible Perceptual Encryption Methods—Compression and Encryption Perspectives

Perceptual encryption (PE) hides the identifiable information of an image in such a way that its intrinsic characteristics remain intact. This recognizable perceptual quality can be used to enable computation in the encryption domain. A class of PE algorithms based on block-level processing has rece...

Descripción completa

Detalles Bibliográficos
Autores principales: Ahmad, Ijaz, Choi, Wooyeol, Shin, Seokjoo
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10145250/
https://www.ncbi.nlm.nih.gov/pubmed/37112398
http://dx.doi.org/10.3390/s23084057
_version_ 1785034288171843584
author Ahmad, Ijaz
Choi, Wooyeol
Shin, Seokjoo
author_facet Ahmad, Ijaz
Choi, Wooyeol
Shin, Seokjoo
author_sort Ahmad, Ijaz
collection PubMed
description Perceptual encryption (PE) hides the identifiable information of an image in such a way that its intrinsic characteristics remain intact. This recognizable perceptual quality can be used to enable computation in the encryption domain. A class of PE algorithms based on block-level processing has recently gained popularity for their ability to generate JPEG-compressible cipher images. A tradeoff in these methods, however, is between the security efficiency and compression savings due to the chosen block size. Several methods (such as the processing of each color component independently, image representation, and sub-block-level processing) have been proposed to effectively manage this tradeoff. The current study adapts these assorted practices into a uniform framework to provide a fair comparison of their results. Specifically, their compression quality is investigated under various design parameters, such as the choice of colorspace, image representation, chroma subsampling, quantization tables, and block size. Our analyses have shown that at best the PE methods introduce a decrease of 6% and 3% in the JPEG compression performance with and without chroma subsampling, respectively. Additionally, their encryption quality is quantified in terms of several statistical analyses. The simulation results show that block-based PE methods exhibit several favorable properties for the encryption-then-compression schemes. Nonetheless, to avoid any pitfalls, their principal design should be carefully considered in the context of the applications for which we outlined possible future research directions.
format Online
Article
Text
id pubmed-10145250
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-101452502023-04-29 Comprehensive Analysis of Compressible Perceptual Encryption Methods—Compression and Encryption Perspectives Ahmad, Ijaz Choi, Wooyeol Shin, Seokjoo Sensors (Basel) Review Perceptual encryption (PE) hides the identifiable information of an image in such a way that its intrinsic characteristics remain intact. This recognizable perceptual quality can be used to enable computation in the encryption domain. A class of PE algorithms based on block-level processing has recently gained popularity for their ability to generate JPEG-compressible cipher images. A tradeoff in these methods, however, is between the security efficiency and compression savings due to the chosen block size. Several methods (such as the processing of each color component independently, image representation, and sub-block-level processing) have been proposed to effectively manage this tradeoff. The current study adapts these assorted practices into a uniform framework to provide a fair comparison of their results. Specifically, their compression quality is investigated under various design parameters, such as the choice of colorspace, image representation, chroma subsampling, quantization tables, and block size. Our analyses have shown that at best the PE methods introduce a decrease of 6% and 3% in the JPEG compression performance with and without chroma subsampling, respectively. Additionally, their encryption quality is quantified in terms of several statistical analyses. The simulation results show that block-based PE methods exhibit several favorable properties for the encryption-then-compression schemes. Nonetheless, to avoid any pitfalls, their principal design should be carefully considered in the context of the applications for which we outlined possible future research directions. MDPI 2023-04-17 /pmc/articles/PMC10145250/ /pubmed/37112398 http://dx.doi.org/10.3390/s23084057 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Review
Ahmad, Ijaz
Choi, Wooyeol
Shin, Seokjoo
Comprehensive Analysis of Compressible Perceptual Encryption Methods—Compression and Encryption Perspectives
title Comprehensive Analysis of Compressible Perceptual Encryption Methods—Compression and Encryption Perspectives
title_full Comprehensive Analysis of Compressible Perceptual Encryption Methods—Compression and Encryption Perspectives
title_fullStr Comprehensive Analysis of Compressible Perceptual Encryption Methods—Compression and Encryption Perspectives
title_full_unstemmed Comprehensive Analysis of Compressible Perceptual Encryption Methods—Compression and Encryption Perspectives
title_short Comprehensive Analysis of Compressible Perceptual Encryption Methods—Compression and Encryption Perspectives
title_sort comprehensive analysis of compressible perceptual encryption methods—compression and encryption perspectives
topic Review
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10145250/
https://www.ncbi.nlm.nih.gov/pubmed/37112398
http://dx.doi.org/10.3390/s23084057
work_keys_str_mv AT ahmadijaz comprehensiveanalysisofcompressibleperceptualencryptionmethodscompressionandencryptionperspectives
AT choiwooyeol comprehensiveanalysisofcompressibleperceptualencryptionmethodscompressionandencryptionperspectives
AT shinseokjoo comprehensiveanalysisofcompressibleperceptualencryptionmethodscompressionandencryptionperspectives