Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1854229.1854272acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
research-article

Subjective and objective quality assessment of transparently encrypted JPEG2000 images

Published: 09 September 2010 Publication History

Abstract

Transparent encryption has two main requirements, i.e. security and perceived quality. The perceptual quality aspect has never been thoroughly investigated. In this work, three variants to transparently encrypt JPEG2000 images are compared from a perceptual quality viewpoint. The assessment is based on subjective and objective quality assessment of the transparently encrypted images and if the requirements with respect to desired functionalities can be met by the respective techniques. In particular, we focus on the question if it is possible to predict the subjective quality of the encrypted (and attacked) images as given by the Mean Opinion Score (MOS) with state-of-the-art objective quality metrics. Additionally, we answer the question which objective quality measure is suited best to determine an image quality for which a certain subjective quality is required.

References

[1]
A. Uhl and A. Pommer. Image and Video Encryption. From Digital Rights Management to Secured Personal Communication, volume 15 of Advances in Information Security. Springer-Verlag, 2005.
[2]
B. M. Macq and J-J. Quisquater. Cryptology for digital TV broadcasting. Proceedings of the IEEE, 83(6):944--957, June 1995.
[3]
ITU-R-BT.500-11. Methodology for the subjective assessment of the quality of television pictures question itu-r211/11, g. Technical report, Intl Telecom. Union, 2004.
[4]
ISO/IEC15444-8. Information technology -- JPEG2000 image coding system, Part8: Secure JPEG2000, April 2007.
[5]
T. Stütz and A. Uhl. On efficient transparent JPEG2000 encryption. In Proc. of ACM Multimedia and Security Workshop, MM-SEC'07, pages: 97--108, New York, NY, USA, September 2007. ACM Press.
[6]
A. Pommer and A. Uhl. Selective encryption of wavelet-packet encoded image data-efficiency and security. ACM Multimedia Systems (Special issue on Multimedia Security), 9(3):279--287, 2003.
[7]
D. Engel and A. Uhl. Secret wavelet packet decompositions for JPEG2000 lightweight encryption. In Intl. Conf. on Acoustics, Speech, and Signal Processing, ICASSP, volume V, pages 465--468, 2006.
[8]
VQEG MM. Final report from the video quality experts group on the validation of objective models of multimedia quality assessment, 2008.
[9]
H. Wu and D. Ma. Efficient and secure encryption schemes for JPEG2000. In Proc. of the 2004 Intl. Conf. on Acoustics, Speech and Signal Processing (ICASSP2004), pages 869--872, May2004.
[10]
Y. Mao and M. Wu. A joint signal processing and cryptographic approach to multimedia encryption. IEEE Transactions on Image Processing, 15(7) pages:2061--2075, July 2006.
[11]
M. Carosi, V. Pankajakshan, and F. Autrusseau. Toward a simplified perceptual quality metric for watermarking applications. In Proc. of the SPIE conf. on Electronic Imaging, volume 7542, San Jose, CA, USA, January 2010. SPIE.

Cited By

View all
  • (2022)Low Quality and Recognition of Image ContentIEEE Transactions on Multimedia10.1109/TMM.2021.310339424(3595-3610)Online publication date: 2022
  • (2021)Visual Quality and Security Assessment of Perceptually Encrypted Images Based on Multi-Output Deep Neural Network2021 9th European Workshop on Visual Information Processing (EUVIP)10.1109/EUVIP50544.2021.9483966(1-6)Online publication date: 23-Jun-2021
  • (2021)To recognize or not to recognize – A database of encrypted images with subjective recognition ground truthInformation Sciences10.1016/j.ins.2020.11.047551(128-145)Online publication date: Apr-2021
  • Show More Cited By

Index Terms

  1. Subjective and objective quality assessment of transparently encrypted JPEG2000 images

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    MM&Sec '10: Proceedings of the 12th ACM workshop on Multimedia and security
    September 2010
    264 pages
    ISBN:9781450302869
    DOI:10.1145/1854229
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 09 September 2010

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. JPEG2000
    2. image encryption
    3. image quality
    4. subjective quality assessment
    5. transparent encryption

    Qualifiers

    • Research-article

    Conference

    MM&Sec '10
    Sponsor:
    MM&Sec '10: Multimedia and Security Workshop
    September 9 - 10, 2010
    Roma, Italy

    Acceptance Rates

    Overall Acceptance Rate 128 of 318 submissions, 40%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)2
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 22 Sep 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2022)Low Quality and Recognition of Image ContentIEEE Transactions on Multimedia10.1109/TMM.2021.310339424(3595-3610)Online publication date: 2022
    • (2021)Visual Quality and Security Assessment of Perceptually Encrypted Images Based on Multi-Output Deep Neural Network2021 9th European Workshop on Visual Information Processing (EUVIP)10.1109/EUVIP50544.2021.9483966(1-6)Online publication date: 23-Jun-2021
    • (2021)To recognize or not to recognize – A database of encrypted images with subjective recognition ground truthInformation Sciences10.1016/j.ins.2020.11.047551(128-145)Online publication date: Apr-2021
    • (2020)Viewport-based CNN: A Multi-task Approach for Assessing 360° Video QualityIEEE Transactions on Pattern Analysis and Machine Intelligence10.1109/TPAMI.2020.3028509(1-1)Online publication date: 2020
    • (2020)PEID: A Perceptually Encrypted Image Database for Visual Security EvaluationIEEE Transactions on Information Forensics and Security10.1109/TIFS.2019.293541515(1151-1163)Online publication date: 2020
    • (2020)Security Assessment of Partially Encrypted Visual Data: Using Iris Recognition as Generic Measure2020 8th International Workshop on Biometrics and Forensics (IWBF)10.1109/IWBF49977.2020.9107967(1-6)Online publication date: Apr-2020
    • (2018)Bridge the Gap Between VQA and Human Behavior on Omnidirectional VideoProceedings of the 26th ACM international conference on Multimedia10.1145/3240508.3240581(932-940)Online publication date: 15-Oct-2018
    • (2018)Applicability of No-Reference Visual Quality Indices for Visual Security AssessmentProceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security10.1145/3206004.3206007(139-144)Online publication date: 14-Jun-2018
    • (2016)Identifying deficits of visual security metrics for imagesImage Communication10.1016/j.image.2016.05.00146:C(60-75)Online publication date: 1-Aug-2016
    • (2012)Assessing JPEG2000 encryption with key-dependent wavelet packetsEURASIP Journal on Information Security10.1186/1687-417X-2012-22012:1Online publication date: 13-Apr-2012

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media