Skip to main content

Secure Representation of Images Using Multi-layer Compression

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 9119))

Abstract

We analyze the privacy preservation capabilities of a previously introduced multi-stage image representation framework where blocks of images with similar statistics are decomposed into different codebooks (dictionaries). There it was shown that at very low rate regimes, the method is capable of compressing images that come from the same family with results superior to those of the JPEG2000 codec. We consider two different elements to be added to the discussed approach to achieve a joint compression-encryption framework. The first visual scrambling is the random projections were the random matrix is kept secret between the encryption and decryption sides. We show that for the second approach, scrambling in the DCT domain, we can even slightly increase the compression performance of the multi-layer approach while making it safe against de-scrambling attacks. The experiments were carried out on the ExtendedYaleB database of facial images.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ferdowsi, S., Voloshynovskiy, S., Kostadinov, D.: Sparse Multi-Layer image approximation: Image compression. In: European Signal Processing Conference 2015 (EUSIPCO 2015) (submitted to), Nice, France (August 2015)

    Google Scholar 

  2. Johnson, W.B., Lindenstrauss, J.: Extensions of lipschitz mappings into a hilbert space. In: Conference in Modern Analysis and Probability (New Haven, Conn., 1982). Contemp. Math., vol. 26, pp. 189–206 (1984)

    Google Scholar 

  3. Farhadzadeh, F., Voloshynovskiy, S., Koval, O.J.: Performance analysis of content-based identification using constrained list-based decoding. IEEE Transactions on Information Forensics and Security 7(5), 1652–1667 (2012)

    Article  Google Scholar 

  4. Diephuis, M., Voloshynovskiy, S., Koval, O., Beekhof, F.: Robust message-privacy preserving image copy detection for cloud-based systems. In: 10th Workshop on Content-Based Multimedia Indexing, CBMI 2012 (2012)

    Google Scholar 

  5. Grytskiv, Z., Voloshynovskiy, S., Rytsar, Y.: Cryptography and steganography of video information in modern communications. Facta Universitatis 11(1), 115–125 (1998)

    Google Scholar 

  6. Lee, K., Ho, J., Kriegman, D.: Acquiring linear subspaces for face recognition under variable lighting. IEEE Trans. Pattern Anal. Mach. Intelligence 27(5), 684–698 (2005)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Ferdowsi, S., Voloshynovskiy, S., Kostadinov, D., Korytkowski, M., Scherer, R. (2015). Secure Representation of Images Using Multi-layer Compression. In: Rutkowski, L., Korytkowski, M., Scherer, R., Tadeusiewicz, R., Zadeh, L., Zurada, J. (eds) Artificial Intelligence and Soft Computing. ICAISC 2015. Lecture Notes in Computer Science(), vol 9119. Springer, Cham. https://doi.org/10.1007/978-3-319-19324-3_62

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-19324-3_62

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-19323-6

  • Online ISBN: 978-3-319-19324-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics