Skip to main content

Advertisement

Log in

An objective visual security assessment for cipher-images based on local entropy

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In recent years, many practical algorithms have been put forward for images and videos encryption. Security analysis on these encryption algorithms focuses research on cryptographic security, and few work relate to visual security. Visual security means that the encrypted video content is unintelligible to human vision. The higher visual security the encryption algorithm can provide, the less information an attacker from the cipher-images to obtain, the greater the difficulty of attack is. Therefore, visual security assessment for cipher-images is a very important indicator in security evaluation of visual media. So far, systematic research on visual security assessment for cipher-images is far from enough. Moreover, there are no practical objective indicators or evaluation methods on visual security have been proposed at present. According to the changes on image information entropy between cipher-images and original images, we present a visual security assessment algorithm based on local entropy. The experiments result shows that the scheme can provide an efficient objective assessment which is match up to subjective assessment, and is also suitable for security assessment of other selective encryption algorithms.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Ahn J, Shim H, Jeon B, Choi I (2004) Digital video scrambling method using intra prediction mode. PCM 2004, Springer, LNCS 3333:386–393

    Google Scholar 

  2. Bhargava B, Shi C, Wang S (2004) MPEG video encryption algorithms. Multimed Tools Appl 24(1):57–79

    Article  Google Scholar 

  3. Kwon S, Choi W, Jeon B (2005) Digital video scrambling using motion vector and slice relocation. ICIAR 2005, LNCS 3656:207–214

    Google Scholar 

  4. Li S, Li C, Chen G, Bourbakis N, Lo K (2008) A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Process-Image 23(3):212–223

    Article  Google Scholar 

  5. Li S, Li C, Lo K, Chen G (2008) Cryptanalysis of an image-scrambling scheme without bandwidth expansion. IEEE Trans Circ Syst Vid 18(3):338–349

    Article  Google Scholar 

  6. Lian S (2008) Multimedia content encryption: techniques and applications. CRC, Florida

    MATH  Google Scholar 

  7. Lian S, Liu Z, Ren Z, Wang Z (2005) Selective video encryption based on advanced video coding. PCM 2005, Springer, LNCS 3768:281–290

    Google Scholar 

  8. Lian S, Sun J, Liu G, Wang Z (2008) Efficient video encryption scheme based on advanced video coding. Multimed Tools Appl 38:75–89

    Article  Google Scholar 

  9. Mollin R (2006) An introduction to cryptography. CRC, Florida

    Book  Google Scholar 

  10. Nikhil R, Sankar K (1991) Entropy: a new definition and its applications. IEEE T Syst Man Cy 21(5):1260–1270

    Article  Google Scholar 

  11. Pun T (1980) A new method for gray-level picture thresholding using the entropy of the histogram. Signal Process 2:223–237

    Article  Google Scholar 

  12. Shannon CE (1948) A mathematical theory of communication. Bell Syst Tech J 27:379–423

    MATH  MathSciNet  Google Scholar 

  13. Stütz T, Uhl A (2007) On efficient transparent JPEG2000 encryption. Proceedings of the 9th workshop on Multimedia & security pp 97–108

  14. Wang Z, Lu L, Bovik A (2004) Video quality assessment based on structural distortion measurement. Signal Process-Image 19:121–132

    Article  Google Scholar 

  15. Wang Z, Sheikh H, Bovik A (2003) Objective video quality assessment. In: Furht B, Marqure O (ed) The Handbook of Video Databases: Design and Applications. CRC Press, ch.41, pp 1041–1078

  16. Yao Y, Xu Z, Sun J (2009) Visual security assessment for cipher-images based on neighborhood similarity. Informatica 33(4):69–76

    MATH  Google Scholar 

  17. Zhou J, Liang Z, Chen Y, Au O (2007) Security analysis of multimedia encryption schemes based on multiple Huffman table. IEEE Signal Process Lett 14(3):201–204

    Article  Google Scholar 

  18. Zou Y, Huang T, Gao W, Huo L (2006) H.264 video encryption scheme adaptive to DRM. IEEE Trans Consum Electron 52(4):1289–1297

    Article  Google Scholar 

Download references

Acknowledgement

The work was supported by the National Basic Research Program of China (Grant No. 2006CB303104) and the National Natural Science Foundation of China (Grant No. 40871200).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhengquan Xu.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Sun, J., Xu, Z., Liu, J. et al. An objective visual security assessment for cipher-images based on local entropy. Multimed Tools Appl 53, 75–95 (2011). https://doi.org/10.1007/s11042-010-0491-5

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-010-0491-5

Keywords

Navigation