Skip to main content
Log in

Development of scalable coding on encrypted images using BTC for different non-overlapping block size

  • Original Paper
  • Published:
Signal, Image and Video Processing Aims and scope Submit manuscript

Abstract

In this paper, the novelty of scalable coding of encrypted images (S.C.E.I) using Block Truncation Code (BTC) for different non-overlapping block sizes is investigated. Initially, the original content of the image of size 512 × 512 is split into different non-overlapping block (N.O.B.) sizes of 2 × 2, 4 × 4, 8 × 8 and 16 × 16. Then each N.O.B. size will undergo image compression using a BTC followed by encryption using pseudo-random number (PN) at the transmitter side. The original content is reconstructed at the receiver by the following stages: the transmitted content is decrypted by PN, which is shared by the transmitter, then the BTC technique for image reconstruction is applied, further there is the application of scaling and the bilinear interpolation techniques. While making an analogy, it is observed that the non-overlapping block of size 4 × 4 is best suitable for image encryption procedures/applications than the 2 × 2 size in terms of lesser memory size and storage space requirements; even though better MSE, wMSE, PSNR, wPSNR, compression ratio and bit rates are delivered by the non-overlapping block of 2 × 2 size.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Ma, W., Zhou, T., Qin, J., Xiang, X., Tan, Y., Cai, Z.: A privacy-preserving content-based image retrieval method based on deep learning in cloud computing. Expert Syst. Appl. 203, 117508 (2022)

    Article  Google Scholar 

  2. Markovskyi, O., Nikos, D., Mirataei, A., Nikos, B.: Method of protecting data processed by the discrete Fourier transform in remote computer systems. In: 12th International Conference on Dependable Systems, Services and Technologies (DESSERT), Athens, Greece, (2022)

  3. Sun, Y., Xiao, H., Ding, D., Liu, S.: Secure filtering under adaptive event-triggering protocols with memory mechanisms. ISA Trans. 127, 13–21 (2022)

    Article  Google Scholar 

  4. Bianchi, T., Piva, A., Barni, M.: Composite signal representation for fast and storage-efficient processing of encrypted signals. IEEE Transform. Inf. Forensics Secur. 5(1), 180–187 (2010)

    Article  Google Scholar 

  5. Kumar, A.: A cloud-based buyer-seller watermarking protocol (CB-BSWP) using semi-trusted third party for copy deterrence and privacy preserving. Multimedia Tools Appl. 81, 21417–21448 (2022)

    Article  Google Scholar 

  6. Heino, J., Gupta, A., Hakkala, A., Virtanen, S.: On usability of hash fingerprinting for endpoint application identification. In: IEEE International Conference on Cyber Security and Resilience (CSR), Rhodes, Greece, (2022)

  7. Johnson, M., Ishwar, P., Prabhakaran, V.M., Schonberg, D., Ramchandran, K.: On compressing encrypted data. IEEE Trans. Signal Process. 52(10), 2992–3006 (2004)

    Article  MathSciNet  MATH  Google Scholar 

  8. Schonberg, D., Draper, S. C., Ramchandran, K.: On blind compression of encrypted correlated data approaching the source entropy rate. In: 43rd Annual Allerton Conference, Allerton, IL, USA (2005)

  9. Lazzeretti, R., Barni, M.: Lossless compression of encrypted grey level and color images. In: 16th European Signal Processing Conference, Lausanne, Switzerland, pp. 1–5 (2008)

  10. Xilin, L., Andrew, G., Richardson, J., Vander, S.: An energy-efficient compressed sensing-based encryption scheme for wireless neural recording. IEEE J. Emerg. Sel. Top. Circuits Syst. 11(2), 405–414 (2021)

    Article  Google Scholar 

  11. Zhang, X.: Lossy compression and iterative reconstruction for encrypted image. IEEE Transform. Inf. Forensics Secur. 6(1), 53–58 (2011)

    Article  Google Scholar 

  12. Bilgin, A., Sementilli, P.J., Sheng, F., Marcellin, M.W.: Scalable image coding using reversible integer wavelet transforms. IEEE Trans. Image Process. 9(11), 1972–1977 (2000)

    Article  MathSciNet  MATH  Google Scholar 

  13. Taubman, D.: High performance scalable image compression with EBCOT. IEEE Trans. Image Process. 9(7), 1158–1170 (2000)

    Article  MathSciNet  Google Scholar 

  14. Zhang, X., Feng, G., Ren, Y., Qian, Z.: Scalable coding of encrypted images. IEEE Trans. Image Process. 21(6), 3108–3114 (2012)

    Article  MathSciNet  MATH  Google Scholar 

  15. Edward, J.D., Robert Mitchell, O.: Image coding using block truncation coding. IEEE Trans. Commun. 27(9), 1335–1342 (1979)

    Article  Google Scholar 

  16. Jeya Bright, P., Vishnuvarthanan, G.: Development of a scalable coding for the encryption of images using block truncation code. In: 3rd International Conference on Trends in Electronics and Informatics (ICOEI 2019), Tirunelveli, India, pp. 934–938 (2019)

  17. Pankiraj, J.B., Govindaraj, V., Yudong, Z., Murugan, P.R., Milton, A.: Development of a scalable coding of encrypted images using Enhanced block truncation code. Webology 19(1), 1620–1639 (2022)

    Article  Google Scholar 

  18. Welstead, S.T.: Fractal and wavelet image compression techniques. SPIE Publication, TT40, pp. 155–156 (1999)

  19. Raouf, H., Dietmar, S.: Fractal image compression-document and image compression, pp. 168–169. CRC Press (2006)

    Google Scholar 

  20. Saravanan, A., Kartheeban, K., Vishnuvarthanan, G.: Multi-channeled MR brain image segmentation: a new automated approach combining BAT and clustering technique for better identification of heterogeneous tumors. J. Biocybern. Biomed. Eng. 39(4), 1005–1035 (2019)

    Article  Google Scholar 

  21. Ching-Nung, Y., Xiaotian, W., Yung-Chien, C., Zhangjie, F.: Constructions of general (k, n) reversible AMBTC based visual cryptography with two decryption options. J. Vis. Commun. Image Represent. 48, 182–194 (2017)

    Article  Google Scholar 

  22. Zhan, Y., Chia-Chen, L., Chin-Chen, C., Guo-Dong, S.: BF-DH: an enhanced payload hybrid data hiding method based on a hybrid strategy and block features. IEEE Access 7, 148439–148452 (2019)

    Article  Google Scholar 

  23. Chuang, J.C., Chang, C.C.: Using a simple and fast image compression algorithm to hide secret information. Int. J. Comput. Appl. 28(4), 329–333 (2006)

    Google Scholar 

  24. Ou, D., Sun, W.: High payload image steganography with minimum distortion based on absolute moment block truncation coding. Multimedia Tools Appl. 74(21), 9117–9139 (2014)

    Article  Google Scholar 

  25. Malik, A., Sikka, G., Verma, H.K.: A high payload data hiding scheme based on modified AMBTC technique. Multimedia Tools Appl. 76, 14151–14167 (2017)

    Article  Google Scholar 

  26. Zhou, J., Au, O.C., Zhai, G., Tang, Y.Y.: Scalable compression of stream cipher encrypted images through context-adaptive sampling. IEEE Trans. Inf. Forensics Secur. 9(11), 1857–1868 (2014)

    Article  Google Scholar 

  27. Lin, C.-C., Liu, X.-L., Tai, W.-L., Yuan, S.-M.: A novel reversible data hiding scheme based on AMBTC compression technique. Multimedia Tools Appl. 74(11), 3823–3842 (2013)

    Article  Google Scholar 

  28. Lin, C.-C., Lin, J., Chang, C.-C.: Reversible data hiding for AMBTC compressed images based on matrix and Hamming coding. MDPI-Electron. 10(3), 1–20 (2021)

    Google Scholar 

Download references

Funding

This work was supported by the British Heart Foundation Accelerator Award, UK (AA/18/3/34220); Royal Society International Exchanges Cost Share Award, UK (RP202G0230); Hope Foundation for Cancer Research, UK (RM60G0680); Medical Research Council Confidence in Concept Award, UK (MC_PC_17171); Sino-UK Industrial Fund, UK (RP202G0289); Global Challenges Research Fund (GCRF), UK (P202PF11); LIAS Pioneering Partnerships award, UK (P202ED10); Data Science Enhancement Fund, UK (P202RE237); Fight for Sight, UK (24NN201); Sino-UK Education Fund, UK (OP202006).

Author information

Authors and Affiliations

Authors

Contributions

JBP—paper writing and methodology, VG, YZ—methodology, PRM, RK—paper writing.

Corresponding authors

Correspondence to Vishnuvarthanan Govindaraj or Yudong Zhang.

Ethics declarations

Conflict of interest

There are no competing interests regarding the subject matter/core part of the research being proposed through this paper, and there are no direct/indirect financial involvements or competing interests in relevance throughout the articulation/preparation of this research paper.

Ethical approval

This research article does not require any ethical clearance or approval at any means, and the article is no way connected or not requires any of the testing/trials to be done on human or animal subjects, and it is mere technological oriented study that intends to improve the quality of the image compression through encoding and decoding techniques to augment secure data transmission over the internet facility or via any other public domains.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Pankiraj, J.B., Govindaraj, V., Zhang, Y. et al. Development of scalable coding on encrypted images using BTC for different non-overlapping block size. SIViP 17, 3821–3828 (2023). https://doi.org/10.1007/s11760-023-02610-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11760-023-02610-2

Keywords

Navigation