Skip to main content

Advertisement

Log in

Visual security index combining superpixel segmentation and block variance calculation for selective encrypted images

  • Original Paper
  • Published:
Signal, Image and Video Processing Aims and scope Submit manuscript

Abstract

Selective encryption algorithms have currently become an important method for protecting image privacy. Visual security evaluation of selective encrypted images plays an important role in measuring the effectiveness of these algorithms, yet such studies are scarce. In this paper, we propose a visual security index combining superpixel segmentation and block variance calculation for selective encrypted images (SBVSI). Specifically, we propose a method based on superpixel segmentation and block variance calculation to find blocks of pixels that include valid information. These blocks can better represent the image regions of interest to the human visual system, thereby improving the evaluation accuracy. Next, to obtain features with stability, global features and local features of the image are extracted to represent the overall changes in the encrypted image. After that, the global similarity index and local similarity index are constructed using the above two features. Finally, the support vector regression model is used to integrate the similarity indices of global and local features, which effectively combines the information of different features and improves the accuracy and robustness of the visual security assessment. Experimental results on two public selective encrypted databases demonstrate that compared with existing state-of-the-art work, the proposed SBVSI exhibits better performance, especially in handling middle and high quality images.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

Data Availability

Data is to be provided upon requests. Code and model are publicly at https://github.com/Wsh6/SBVSI.

References

  1. Chai, X., et al.: Exploiting semi-tensor product compressed sensing and hybrid cloud for secure medical image transmission. IEEE Internet Things J. 10(8), 7380–7392 (2023). https://doi.org/10.1109/JIOT.2022.3228781

    Article  MATH  Google Scholar 

  2. Chai, X., et al.: TPE-GAN: thumbnail preserving encryption based on GAN with key. IEEE Signal Process. Lett. 29, 972-a976 (2022). https://doi.org/10.1109/LSP.2022.3163685

    Article  MATH  Google Scholar 

  3. Cao, Y., et al.: Multiplexing optical images for steganography by single metasurfaces. Small 19(19), 2206319 (2023)

    Article  Google Scholar 

  4. Go, K., et al.: Secure video transmission framework for battery-powered video devices. (2020). https://doi.org/10.1109/TDSC.2020.2980256

  5. Mohan, A., et al.: Selective encryption and optimization based watermarking for robust transmission of landslide images. Comput. Electr. Eng. 95, 107385 (2021) https://doi.org/10.1016/J.COMPELECENG.2021.107385

  6. Shen, Y., et al.: Optical selective encryption based on the FRFCM algorithm and face biometric for the medical image. Opt. Laser Technol. 138, 106911 (2021)

    Article  MATH  Google Scholar 

  7. Kiran, P., Divakarachari, P.B.: Resource optimized selective image encryption of medical images using multiple chaotic systems. Microprocess. Microsyst. 91, 104546 (2022) https://doi.org/10.1016/J.MICPRO.2022.104546

  8. Gan, Z., et al.: Exploiting compressed sensing and polynomial-based progressive secret image sharing for visually secure image selection encryption with authentication. J. King Saud Univ. Comput. Inf. Sci. 34(10), 9252–9272 (2022) https://doi.org/10.1016/J.JKSUCI.2022.09.006

  9. Varga, D.: Full-reference image quality assessment based on Grunwald-Letnikov derivative, image gradients, and visual saliency. Electronics 11(4), 559 (2022)

    Article  MATH  Google Scholar 

  10. Wang, Z., et al.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600–612 (2004). https://doi.org/10.1109/TIP.2003.819861

    Article  MATH  Google Scholar 

  11. Sheikh, H.R., Bovik, A.C.: Image information and visual quality. IEEE Trans. Image Process. 15(2), 430–444 (2006). https://doi.org/10.1109/TIP.2005.859378

    Article  MATH  Google Scholar 

  12. Mao, Y., Wu, M.: Security evaluation for communication-friendly encryption of multimedia. In: 2004 International Conference on Image Processing, pp. 569–572 (2004). https://doi.org/10.1109/ICIP.2004.1418818

  13. Yao, Y., Xu, Z., Sun, J.: Visual security assessment for cipher-images based on neighborhood similarity. Informatica 33(1), 69–76 (2009)

    MATH  Google Scholar 

  14. Tong, L., et al.: Visual security evaluation for video encryption. In: Proceedings of the 18th ACM international conference on Multimedia, pp. 835–838 (2010). https://doi.org/10.1145/1873951.1874091

  15. Sun, W., et al.: SPSIM: A superpixel-based similarity index for full-reference image quality assessment. IEEE Trans. Image Process. 27(9), 4232–4244 (2018). https://doi.org/10.1109/TIP.2018.2837341

    Article  MathSciNet  MATH  Google Scholar 

  16. Wang, Y., et al.: Blind quality evaluator for enhanced colonoscopy images by integrating local and global statistical features. IEEE Trans. Instrum. Meas., 1–1 (2024) https://doi.org/10.1109/TIM.2024.3481532

  17. Xiang, T., Guo, S., Li, X.: Perceptual visual security index based on edge and texture similarities. IEEE Trans. Inf. Forensics Secur. 11(5), 951–963 (2016). https://doi.org/10.1109/TIFS.2016.2515503

    Article  MATH  Google Scholar 

  18. Cui, Y., et al.: Stitched wide field of view light field image quality assessment: Benchmark database and objective metric. IEEE Trans. Multi. 26, 5092–5107 (2024) https://doi.org/10.1109/TMM.2023.3330096

  19. Gan, Z., et al.: Visual security index of selective encrypted images based on multi-directional structure and content-aware features. J. Electron. Imag. 32(4), 043018–043018 (2023). https://doi.org/10.1117/1.JEI.32.4.043018

    Article  MATH  Google Scholar 

  20. Po, L., et al.: A novel patch variance biased convolutional neural network for no-reference image quality assessment. IEEE Trans. Circuits Syst. Video Technol. 29(4), 1223–1229 (2019). https://doi.org/10.1109/TCSVT.2019.2891159

    Article  MATH  Google Scholar 

  21. Shi, C., Lin, Y.: Full reference image quality assessment based on visual salience with color appearance and gradient similarity. IEEE Access 8, 97310–97320 (2020) https://doi.org/10.1109/ACCESS.2020.2995420

  22. Guo, S., et al.: PEID: A perceptually encrypted image database for visual security evaluation. IEEE Trans. Inf. Forensics Secur. 15, 1151–1163 (2020) https://doi.org/10.1109/TIFS.2019.2935415

  23. Achanta, R., et al.: SLIC superpixels compared to state-of-the-art superpixel methods. IEEE Trans. Pattern Anal. Mach. Intell. 34(11), 2274–2282 (2012). https://doi.org/10.1109/TPAMI.2012.120

  24. Ding, K., et al.: Image quality assessment: unifying structure and texture similarity. IEEE Trans. Pattern Anal. Mach. Intell. 44(5), 2567–2581 (2022). https://doi.org/10.1109/TPAMI.2020.3045810

  25. Meng, C., et al.: Objective quality assessment of lenslet light field image based on focus stack. IEEE Trans. Multim. 24, 3193–3207 (2022). https://doi.org/10.1109/TMM.2021.3096071

  26. Liu, Y., et al.: Blind omnidirectional image quality assessment based on structure and natural features. IEEE Trans. Instrum. Meas. 70, 1–11 (2021). https://doi.org/10.1109/TIM.2021.3102691

  27. Scott, K.: Computer vision metrics survey, taxonomy, and analysis. Apress (2014). https://doi.org/10.1007/978-1-4302-5930-5

    Article  MATH  Google Scholar 

  28. Dalal, N., Triggs, B.: Histograms of oriented gradients for human detection. Comput. Vis. Pattern Recognit. 886–893 (2005). https://doi.org/10.1109/CVPR.2005.177

  29. Yue, G., et al.: No-reference quality evaluator of transparently encrypted images. IEEE Trans. Multi. 21(9), 2184–2194 (2019). https://doi.org/10.1109/TMM.2019.2913315

    Article  MATH  Google Scholar 

  30. Liu, Y., et al.: Hvs-based perception-driven no-reference omnidirectional image quality assessment. IEEE Trans. Instrum. Meas. 72, 1–11 (2023). https://doi.org/10.1109/TIM.2022.3232792

  31. Florent, A., Thomas, S., Vinod, P.: Subjective quality assessment of selective encryption techniques. (2010)

  32. Liu, A., Lin, W., Narwaria, M.: Image quality assessment based on gradient similarity. IEEE Trans. Image Process. 21(4), 1500–1512 (2012). https://doi.org/10.1109/TIP.2011.2175935

    Article  MathSciNet  MATH  Google Scholar 

  33. Zhang, L., et al.: FSIM: a feature similarity index for image quality assessment. IEEE Trans. Image Process. 20(8), 2378–2386 (2011). https://doi.org/10.1109/TIP.2011.2109730

Download references

Funding

This work is supported by the Science and Technology Project of Henan Province (Grant Nos. 232102210109, 232102210096), Key Scientific Research Project of Colleges and Universities of Henan Province (Grant No. 24A520003), Natural Science Foundation Project of Henan Province (Grant No. 242300421404).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Zilong Pang or Xiuli Chai.

Ethics declarations

Competing interests

The authors declare no competing interests.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Gan, Z., Wu, S., Pang, Z. et al. Visual security index combining superpixel segmentation and block variance calculation for selective encrypted images. SIViP 19, 179 (2025). https://doi.org/10.1007/s11760-024-03583-6

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11760-024-03583-6

Keywords

Navigation