Abstract
A selective encryption algorithm joint with compression coding is proposed to protect JPEG 2000 images in wireless multimedia sensor networks (WMSN). The algorithm selectively encrypts the lookup table of probability model in MQ coding. As the size of lookup table is fixed and only such one table is used for an image, the proposed algorithm is fairly efficient and thus can perform fast encryption on large volume of JPEG 2000 images in WMSN. Experimental results and their analysis show that the algorithm is secure and energy saving, meanwhile, it does not impair the compression performance of JPEG 2000 coding obviously.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Akyildiz, I., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Computer Networks 38(4), 393–422 (2002)
Akyildiz, I., Melodia, T., Chowdhury, K.R.: A survey on wireless multimedia sensor networks. Computer Networks 51(4), 921–960 (2007)
Cheng, H., Li, X.: Partial encryption of compressed images and videos. IEEE Transactions on Signal Processing 48(8), 2439–2451 (2000)
Podesser, M., Schmidt, H.P., Uhl, A.: Selective bitplane encryption for secure transmission of image data in mobile environments. In: IEEE Nordic Signal Processing Symposium (NORSIG 2002), Tromso-Trondheim, Norway (2002)
Sadourny, Y., Conan, V.: A proposal for supporting selective encryption in JPSEC. IEEE Transactions on Consumer Electronics 49(4), 846–849 (2003)
Pfarrhofer, R., Uhl, A.: Selective image encryption using JBIG. In: Dittmann, J., Katzenbeisser, S., Uhl, A. (eds.) CMS 2005. LNCS, vol. 3677, pp. 98–107. Springer, Heidelberg (2005)
Grangetto, M., Magli, E., Olmo, G.: Multimedia selective encryption by means of randomized arithmetic coding. IEEE Transactions on Multimedia 8(5), 905–917 (2006)
Liu, J.L.: Efficient selective encryption for JPEG 2000 images using private initial table. Pattern Recognition 39(8), 1509–1517 (2006)
Christopoulos, C., Skodras, A., Ebrahimi, T.: The JPEG2000 still image coding system: an overview. IEEE Transactions on Consumer Electronics 46(4), 1103–1127 (2000)
Chang, H.K.C., Liu, J.L.: A linear quadtree compression scheme for image encryption. Signal Processing: Image Communication 10(4), 279–290 (1997)
Lian, S., Sun, J., Wang, Z.: Perceptual cryptography on SPIHT compressed images or videos. In: IEEE International Conference on Multimedia and Expo (ICME 2004), Taipei, Taiwan, pp. 2195–2198 (2004)
Lian, S., Sun, J., Wang, Z.: A secure 3D-SPIHT codec. In: European Signal Processing Conference (EUSIPCO 2004), Vienna, Austria, pp. 813–816 (2004)
Wu, C.P., Kuo, C.C.J.: Design of integrated multimedia compression and encryption systems. IEEE Transactions on Multimedia 7(5), 828–839 (2005)
Martin, K., Lukac, R., Plataniotis, K.N.: Efficient encryption of wavelet-based coded color images. Pattern Recognition 38(7), 1111–1115 (2005)
Wen, J., Kim, H., Villasenor, J.D.: Binary arithmetic coding with key-based interval splitting. IEEE Signal Processing Letters 13(2), 69–72 (2006)
Kim, H., Wen, J., Villasenor, J.D.: Secure arithmetic coding. IEEE Transactions on Signal Processing 55(5), 2263–2272 (2007)
Martin, K., Member, S., Plataniotis, K.N.: Privacy protected surveillance using secure visual object coding. IEEE Transactions on Circuits and Systems for Video Technology 18(8), 1152–1162 (2008)
Li, H., Zhang, J.: A secure and efficient entropy coding based on arithmetic coding. Communications in Nonlinear Science and Numerical Simulation 14(12), 4304–4318 (2009)
Taneja, N., Raman, B., Gupta, I.: Partial encryption on SPIHT compressed images. In: Chaudhury, S., Mitra, S., Murthy, C.A., Sastry, P.S., Pal, S.K. (eds.) PReMI 2009. LNCS, vol. 5909, pp. 426–431. Springer, Heidelberg (2009)
Hermassi, H., Rhouma, R., Belghith, S.: Joint compression and encryption using chaotically mutated Huffman trees. Communications in Nonlinear Science and Numerical Simulation 15(10), 2987–2999 (2010)
Wong, K.W., Lin, Q., Chen, J.: Simultaneous arithmetic coding and encryption using chaotic maps. IEEE Transactions on Circuits and Systems Part II: Express Briefs 57(2), 146–150 (2010)
Wang, W., Peng, D., Wang, H., Sharif, H.: A cross layer resource allocation scheme for secure image delivery in wireless sensor networks. In: 2007 International Conference on Wireless Communications and Mobile Computing (IWCMC 2007), Hawaii, USA, pp. 152–157 (2007)
Wang, W., Peng, D., Wang, H., Sharif, H., Chen, H.H.: Energy-constrained quality optimization for secure image transmission in wireless sensor networks. Advances in Multimedia 1, 1–9 (2007)
Wang, W., Peng, D., Wang, H., Sharif, H.: An adaptive approach for image encryption and secure transmission over multirate wireless sensor networks. Wireless Communications and Mobile Computing 9, 383–393 (2009)
Wang, H., Hempel, M., Peng, D., Wang, W., Sharif, H., Chen, H.H.: Index-based selective audio encryption for wireless multimedia sensor networks. IEEE Transactions on Multimedia 12(3), 215–223 (2010)
Wang, H., Hempel, M., Peng, D., Wang, W., Sharif, H., Chen, H.H.: On energy efficient encryption for video streaming in wireless sensor networks. IEEE Transactions on Multimedia 12(5), 417–426 (2010)
Taubman, D.S., Marcellin, M.W.: JPEG2000: Compression Fundamentals, Standards and Practice. Kluwer Academic Publishers (2002)
OMNeT++, http://www.omnetpp.org/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Xiang, T., Yu, C., Chen, F. (2013). Fast Encryption of JPEG 2000 Images in Wireless Multimedia Sensor Networks. In: Ren, K., Liu, X., Liang, W., Xu, M., Jia, X., Xing, K. (eds) Wireless Algorithms, Systems, and Applications. WASA 2013. Lecture Notes in Computer Science, vol 7992. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-39701-1_17
Download citation
DOI: https://doi.org/10.1007/978-3-642-39701-1_17
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-39700-4
Online ISBN: 978-3-642-39701-1
eBook Packages: Computer ScienceComputer Science (R0)