Metrics for Assessing Visual Security of Image and Video Encryption Schemes
Metrics for Assessing Visual Security of Image and Video Encryption Schemes
Disciplines
Computer Sciences (100%)
Keywords
-
Image encryption,
Video Encryption,
Security Assessment,
Quality Assessment,
Visual Quality Metrics
Image and video encryption schemes (IVES) have been intensively researched in the last ten years, however, a commonly agreed methodology how to assess such techniques has not yet been established. Application scenarios for IVES and corresponding security requirements range from highest level security (information leakage has to be prevented) to transparent encryption, where a low quality public version of the content (image / video) is required to be decodable from the ciphertext even with standard decoders. Given a certain IVES, it needs to be determined for which application scenario this specific approach might be suited and for which it is not. To automatically assess the amount of information present in ciphertext or the visual quality of image or video ciphertext (after eventual attacks have been mounted), (image / video) metrics are required. These metrics play an important role in the definition of security of IVES: The security of IVES relies on the inability of an attacker to reconstruct an approximation of the original content with higher quality than targeted by the scheme. Compared to conventional visual quality metrics (PSNR / SSIM / VIF) these security metrics have to assess visual similarity for extremely low quality content, for which the conventional metrics are no longer applicable. Besides the development of such metrics (which is one of the main goals of this project), different subjective test methodologies will have to be considered, developed and implemented, which are applied to IVES-specific subjective databases. These databases will serve as objective basis of evaluation for the suitability of a metric. A second way to objectively evaluate the constructed metrics is to consider application contexts in which the extent of security can be quantified. We consider biometric recognition, medical image retrieval, and privacy protected video surveillance as corresponding application fields where we can measure the impact of using encrypted visual data in a pattern recognition context. Correlation with objective metrics values and subjective assessment will shed light on the impact of using IVES in such contexts. A special interest will be taken in IVES that preserve functionality, especially interesting is transcoding / adaptation of encrypted content and privacy-preserving (ROI) encryption. If such IVES are found to be sufficiently secure, their application could completely change current multimedia distribution and give technological solutions to many of the currently unsolved problems, such as piracy and privacy issues. Overall, the project targets to develop solid foundations for a methodology to enable a transparent assessment of the security of IVES and to study corresponding implications on security architecture design. Furthermore, IVES will be developed for recent image and video formats (i.e. JPEG XR and HEVC) based on the principles garnered from the study of security architecture design. These new IVES can then be employed to compare traditional security evaluation and the security evaluation developed during this project and provide interpretations with respect to the difference among the approaches.
FWF project P27776 is a project on developing metrics to automatically assess the amount of information present in image or video ciphertext (after eventual attacks have been mounted). Such metrics play an important role in the definition of security of image and video encryption schemes (IVES): The security of IVES relies on the inability of an attacker to reconstruct an approximation of the original content with higher quality than targeted by the scheme. Compared to conventional visual quality metrics (PSNR / SSIM / VIF) these security metrics have to assess visual similarity for extremely low quality content, for which the conventional metrics are no longer applicable. Besides the development of such metrics (which is one of the main goals of this project), different subjective test methodologies have been considered, developed and implemented, which have been applied to IVES-specific subjective databases. These databases, also established in the framework of the project, serve as objective basis of evaluation for the suitability of a metric.
- Universität Salzburg - 100%
- Florent Autrusseau, Polytech Nantes - France
Research Output
- 478 Citations
- 29 Publications
-
2021
Title Highly Efficient Protection of Biometric Face Samples with Selective JPEG2000 Encryption DOI 10.1109/icassp39728.2021.9413941 Type Conference Proceeding Abstract Author Hofbauer H Pages 2580-2584 -
2021
Title To recognize or not to recognize – A database of encrypted images with subjective recognition ground truth DOI 10.1016/j.ins.2020.11.047 Type Journal Article Author Hofbauer H Journal Information Sciences Pages 128-145 Link Publication -
2021
Title Low Quality and Recognition of Image Content DOI 10.1109/tmm.2021.3103394 Type Journal Article Author Hofbauer H Journal IEEE Transactions on Multimedia Pages 3595-3610 Link Publication -
2022
Title Experimental analysis regarding the influence of iris segmentation on the recognition rate DOI 10.48550/arxiv.2211.05507 Type Preprint Author Hofbauer H -
2022
Title Utilizing CNNs for Cryptanalysis of Selective Biometric Face Sample Encryption DOI 10.1109/icpr56361.2022.9956664 Type Conference Proceeding Abstract Author Hofbauer H Pages 892-899 -
2019
Title Selective Jpeg2000 Encryption of Iris Data: Protecting Sample Data vs. Normalised Texture DOI 10.1109/icassp.2019.8683196 Type Conference Proceeding Abstract Author Rieger M Pages 2602-2606 -
2018
Title To See or Not To See: Determining the Recognition Threshold of Encrypted Images DOI 10.1109/euvip.2018.8611779 Type Conference Proceeding Abstract Author Hofbauer H Pages 1-6 Link Publication -
2018
Title Depreciating Motivation and Empirical Security Analysis of Chaos-Based Image and Video Encryption DOI 10.1109/tifs.2018.2812080 Type Journal Article Author Preishuber M Journal IEEE Transactions on Information Forensics and Security Pages 2137-2150 -
2018
Title Non-reference image quality assessment and natural scene statistics to counter biometric sensor spoofing DOI 10.1049/iet-bmt.2017.0146 Type Journal Article Author Söllinger D Journal IET Biometrics Pages 314-324 Link Publication -
2018
Title Applicability of No-Reference Visual Quality Indices for Visual Security Assessment DOI 10.1145/3206004.3206007 Type Conference Proceeding Abstract Author Hofbauer H Pages 139-144 Link Publication -
2018
Title Efficient Iris Sample Data Protection Using Selective JPEG2000 Encryption of Normalised Texture DOI 10.1109/iwbf.2018.8401552 Type Conference Proceeding Abstract Author Riegen M Pages 1-7 -
2016
Title Identifying deficits of visual security metrics for images DOI 10.1016/j.image.2016.05.001 Type Journal Article Author Hofbauer H Journal Signal Processing: Image Communication Pages 60-75 Link Publication -
2016
Title Assessment of Efficient Fingerprint Image Protection Principles Using Different Types of AFIS DOI 10.1007/978-3-319-50011-9_19 Type Book Chapter Author Draschl M Publisher Springer Nature Pages 241-253 -
2016
Title Weaknesses in Security Considerations Related to Chaos-Based Image Encryption DOI 10.1007/978-3-319-50011-9_22 Type Book Chapter Author Hütter T Publisher Springer Nature Pages 278-291 -
2016
Title Calculating a Boundary for the Significance from the Equal-Error Rate DOI 10.1109/icb.2016.7550053 Type Conference Proceeding Abstract Author Hofbauer H Pages 1-4 -
2016
Title Compression Standards in Finger Vein Recognition DOI 10.1109/icb.2016.7550046 Type Conference Proceeding Abstract Author Ablinger V Pages 1-7 -
2016
Title TripleA: Accelerated Accuracy-Preserving Alignment for Iris-Codes DOI 10.1109/icb.2016.7550063 Type Conference Proceeding Abstract Author Rathgeb C Pages 1-8 -
2016
Title Biometric Menagerie in Time-Span Separated Fingerprint Data DOI 10.1109/biosig.2016.7736913 Type Conference Proceeding Abstract Author Kirchgasser S Pages 1-7 -
2016
Title Efficient Fingerprint Image Protection Principles Using Selective JPEG2000 Encryption DOI 10.1109/splim.2016.7528392 Type Conference Proceeding Abstract Author Draschl M Pages 1-5 -
2016
Title Experimental analysis regarding the influence of iris segmentation on the recognition rate DOI 10.1049/iet-bmt.2015.0069 Type Journal Article Author Hofbauer H Journal IET Biometrics Pages 200-211 Link Publication -
2021
Title Security Assessment of Selectively Encrypted Visual Data: Iris Recognition on Protected Samples DOI 10.1109/icip42928.2021.9506294 Type Conference Proceeding Abstract Author Rieger M Pages 3008-3012 -
2020
Title Efficient Fingervein Sample Image Encryption DOI 10.1109/iwbf49977.2020.9107943 Type Conference Proceeding Abstract Author Shekhawat S Pages 1-6 -
2020
Title Security Assessment of Partially Encrypted Visual Data: Using Iris Recognition as Generic Measure DOI 10.1109/iwbf49977.2020.9107967 Type Conference Proceeding Abstract Author Rieger M Pages 1-6 -
2020
Title PRNU-based detection of facial retouching DOI 10.1049/iet-bmt.2019.0196 Type Journal Article Author Rathgeb C Journal IET Biometrics Pages 154-164 Link Publication -
2017
Title Towards Pre-alignment of Near-infrared Iris Images DOI 10.1109/btas.2017.8272718 Type Conference Proceeding Abstract Author Drozdowski P Pages 359-366 -
2017
Title Non-reference Image Quality Assessment for Fingervein Presentation Attack Detection DOI 10.1007/978-3-319-59126-1_16 Type Book Chapter Author Bhogal A Publisher Springer Nature Pages 184-196 -
2017
Title Sensor Dependency in Efficient Fingerprint Image Protection Using Selective JPEG2000 Encryption DOI 10.1109/iwbf.2017.7935094 Type Conference Proceeding Abstract Author Draschl M Pages 1-6 -
2017
Title Non-Reference Image Quality Assessment for Biometric Presentation Attack Detection DOI 10.1109/iwbf.2017.7935080 Type Conference Proceeding Abstract Author Bhogal A Pages 1-6 -
2016
Title Image Segmentation Based Visual Security Evaluation DOI 10.1145/2909827.2930806 Type Conference Proceeding Abstract Author Kauba C Pages 175-180