Scalable Coding of PRNG Encrypted Images

Y. Sridhar, Bighneswar Panda


This paper proposes a unique scheme of scalable coding for PRNG encrypted images. In the encryption stage, the original pixel values are masked by a modulo-256 addition with pseudorandom numbers that are resulting from a secret key. After decomposing the encrypted data into a down sampled sub image and some data sets with a multiple-resolution construction, an encoder quantizes the sub image and the Hadamard coefficients of each data set to condense the data quantity. Then, the data of quantized sub image and coefficients are observed as a set of bit streams. At the receiver side, while a sub image is decrypted to provide the uneven information of the original content, the quantized coefficients can be used to reconstruct the detailed content with an iteratively updating procedure. Because of the hierarchical coding mechanism, the principal original content with advanced resolution can be reconstructed when more bit streams are received.


Z. Erkin, A. Piva, S. Katzenbeisser, R. L. Lagendijk, J. Shokrollahi, G. Neven, and M. Barni, “Protection and retrieval of encrypted multimedia content: When cryptography meets signal processing,” EURASIP J. Inf. Security, vol. 2007, pp. 1–20, Jan. 2007.

T. Bianchi, A. Piva, and M. Barni, “On the implementation of the discrete Fourier transform in the encrypted domain,” IEEE Trans. Inf. Forensics Security, vol. 4, no. 1, pp. 86–97, Mar. 2009.

J. R. Troncoso-Pastoriza and F. Pérez-González, “Secure adaptive filtering,” IEEE Trans. Inf. Forensics Security, vol. 6, no. 2, pp. 469–485, Jun. 2011.

T. Bianchi, A. Piva, and M. Barni, “Composite signal representation for fast and storage-efficient processing of encrypted signals,” IEEE Trans. Inf. Forensics Security, vol. 5, no. 1, pp. 180–187, Mar. 2010.

S. Lian, Z. Liu, Z. Ren, and H. Wang, “Commutative encryption and watermarking in video compression,” IEEE Trans. Circuits Syst. Video Technol., vol. 17, no. 6, pp. 774–778, Jun. 2007.

M. Cancellaro, F. Battisti, M. Carli, G. Boato, F. G. B. Natale, and A. Neri, “A commutative digital image watermarking and encryption method in the tree structured Haar transform domain,” Signal Process.Image Commun., vol. 26, no. 1, pp. 1–12, Jan. 2011.

N. Memon and P. W. Wong, “A buyer-seller watermarking protocol,”IEEE Trans. Image Process., vol. 10, no. 4, pp. 643–649, Apr. 2001.

M. Kuribayashi and H. Tanaka, “Fingerprinting protocol for images based on additive homomorphic property,” IEEE Trans. Image Process., vol. 14, no. 12, pp. 2129–2139, Dec. 2005.

M. Johnson, P. Ishwar, V. M. Prabhakaran, D. Schonberg, and K. Ramchandran, “On compressing encrypted data,” IEEE Trans. Signal Process., vol. 52, no. 10, pp. 2992–3006, Oct. 2004.

D. Schonberg, S. C. Draper, and K. Ramchandran, “On blind compression of encrypted correlated data approaching the source entropy rate,” in Proc. 43rd Annu. Allerton Conf., Allerton, IL, 2005.

R. Lazzeretti and M. Barni, “Lossless compression of encrypted greylevel and color images,” in Proc. 16th EUSIPCO, Lausanne, Switzerland, Aug. 2008 .

W. Liu, W. Zeng, L. Dong, and Q. Yao, “Efficient compression of encrypted grayscale images,” IEEE Trans. Signal Process., vol. 19, no. 4,pp. 1097–1102, Apr. 2010.

D. Schonberg, S. C. Draper, C. Yeo, and K. Ramchandran, “Toward compression of encrypted images and video sequences,” IEEE Trans. Inf. Forensics Security, vol. 3, no. 4, pp. 749–762, Dec. 2008.

A. Kumar and A. Makur, “Lossy compression of encrypted image by compressing sensing technique,” in Proc. IEEE TENCON, 2009, pp. 1–6


X. Zhang, “Lossy compression and iterative reconstruction for encrypted image,” IEEE Trans. Inf. Forensics Security, vol. 6, no. 1, pp. 53–58, Mar. 2011.

A. Bilgin, P. J. Sementilli, F. Sheng, and M. W. Marcellin, “Scalable image coding using reversible integerwavelet transforms,” IEEE Trans.Image Process., vol. 9, no. 11, pp. 1972–1977, Nov. 2000.

D. Taubman, “High performance scalable image compression with EBCOT,” IEEE Trans. Image Process., vol. 9, no. 7, pp. 1158–1170, Jul. 2000.

Full Text: PDF [FULL TEXT]


  • There are currently no refbacks.

Copyright © 2013, All rights reserved.|

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at