Abstract
In recent years, many practical algorithms have been put forward for images and videos encryption. Security analysis on these encryption algorithms focuses research on cryptographic security, and few work relate to visual security. Visual security means that the encrypted video content is unintelligible to human vision. The higher visual security the encryption algorithm can provide, the less information an attacker from the cipher-images to obtain, the greater the difficulty of attack is. Therefore, visual security assessment for cipher-images is a very important indicator in security evaluation of visual media. So far, systematic research on visual security assessment for cipher-images is far from enough. Moreover, there are no practical objective indicators or evaluation methods on visual security have been proposed at present. According to the changes on image information entropy between cipher-images and original images, we present a visual security assessment algorithm based on local entropy. The experiments result shows that the scheme can provide an efficient objective assessment which is match up to subjective assessment, and is also suitable for security assessment of other selective encryption algorithms.
Similar content being viewed by others
References
Ahn J, Shim H, Jeon B, Choi I (2004) Digital video scrambling method using intra prediction mode. PCM 2004, Springer, LNCS 3333:386–393
Bhargava B, Shi C, Wang S (2004) MPEG video encryption algorithms. Multimed Tools Appl 24(1):57–79
Kwon S, Choi W, Jeon B (2005) Digital video scrambling using motion vector and slice relocation. ICIAR 2005, LNCS 3656:207–214
Li S, Li C, Chen G, Bourbakis N, Lo K (2008) A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Process-Image 23(3):212–223
Li S, Li C, Lo K, Chen G (2008) Cryptanalysis of an image-scrambling scheme without bandwidth expansion. IEEE Trans Circ Syst Vid 18(3):338–349
Lian S (2008) Multimedia content encryption: techniques and applications. CRC, Florida
Lian S, Liu Z, Ren Z, Wang Z (2005) Selective video encryption based on advanced video coding. PCM 2005, Springer, LNCS 3768:281–290
Lian S, Sun J, Liu G, Wang Z (2008) Efficient video encryption scheme based on advanced video coding. Multimed Tools Appl 38:75–89
Mollin R (2006) An introduction to cryptography. CRC, Florida
Nikhil R, Sankar K (1991) Entropy: a new definition and its applications. IEEE T Syst Man Cy 21(5):1260–1270
Pun T (1980) A new method for gray-level picture thresholding using the entropy of the histogram. Signal Process 2:223–237
Shannon CE (1948) A mathematical theory of communication. Bell Syst Tech J 27:379–423
Stütz T, Uhl A (2007) On efficient transparent JPEG2000 encryption. Proceedings of the 9th workshop on Multimedia & security pp 97–108
Wang Z, Lu L, Bovik A (2004) Video quality assessment based on structural distortion measurement. Signal Process-Image 19:121–132
Wang Z, Sheikh H, Bovik A (2003) Objective video quality assessment. In: Furht B, Marqure O (ed) The Handbook of Video Databases: Design and Applications. CRC Press, ch.41, pp 1041–1078
Yao Y, Xu Z, Sun J (2009) Visual security assessment for cipher-images based on neighborhood similarity. Informatica 33(4):69–76
Zhou J, Liang Z, Chen Y, Au O (2007) Security analysis of multimedia encryption schemes based on multiple Huffman table. IEEE Signal Process Lett 14(3):201–204
Zou Y, Huang T, Gao W, Huo L (2006) H.264 video encryption scheme adaptive to DRM. IEEE Trans Consum Electron 52(4):1289–1297
Acknowledgement
The work was supported by the National Basic Research Program of China (Grant No. 2006CB303104) and the National Natural Science Foundation of China (Grant No. 40871200).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Sun, J., Xu, Z., Liu, J. et al. An objective visual security assessment for cipher-images based on local entropy. Multimed Tools Appl 53, 75–95 (2011). https://doi.org/10.1007/s11042-010-0491-5
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-010-0491-5