BACKWARDS COMPATIBLE, MULTI-LEVEL REGIONS-OF-INTEREST (ROI) IMAGE ENCRYPTION ARCHITECTURE WITH BIOMETRIC AUTHENTICATION

Alexander Wong, William Bishop

2007

Abstract

Digital image archival and distribution systems are an indispensable part of the modern digital age. Organizations perceive a need for increased information security. However, conventional image encryption methods are not versatile enough to meet more advanced image security demands. We propose a universal multi-level ROI image encryption architecture that is based on biometric data. The proposed architecture ensures that different users can only view certain parts of an image based on their level of authority. Biometric authentication is used to ensure that only an authorized individual can view the encrypted image content. The architecture is designed such that it can be applied to any existing raster image format while maintaining full backwards compatibility so that images can be viewed using popular image viewers. Experimental results demonstrate the effectiveness of this architecture in providing conditional content access.

References

  1. Chen, R., Lai, J., and Lu, W. (2005). Image encryption using progressive cellular automata substitution and SCAN. In Proceedings of the International Symposium on Circuits and Systems, volume 2, pages 1690- 1693.
  2. Dang, P. and Chau, P. (2000). Image encryption for secure internet multimedia applications. IEEE Transactions on Consumer Electronics, 46(3):295-403.
  3. Delac, K. and Grgic, M. (2004). A survey of biometric recognition methods. In Proceedings of the 46th International Symposium on Electronics in Marine, pages 184-193.
  4. Dufaux, F. and Ebrahimi, T. (2004). Video surveillance using JPEG 2000. In Proceedings of SPIE: Applications of Digital Image Processing XXVII, volume 5558, pages 268-275.
  5. Dufaux, F., Wee, S., Apostolopoulos, J., and Ebrahimi, T. (2004). JPSEC for secure imaging in JPEG 2000. In Proceedings of SPIE: Applications of Digital Image Processing XXVII, volume 5558, pages 319-330.
  6. Halevi, S., Coppersmith, D., and Jutla, C. (2002). Scream: a software-efficient stream cipher. Technical Report 2002/019, Cryptology ePrint Archive. http: //eprint.iacr.org/2002/019.
  7. Hou, Q. and Wang, Y. (2003). Security traffic transmission based on EZW and AES. In Proceedings of IEEE Intelligent Transportation Systems, volume 1, pages 86-89.
  8. Li, C., Li, S., Zhang, D., and Chen, G. (2004a). Cryptanalysis of a chaotic neural network based multimedia encryption scheme. In Proceedings of Advances in Multimedia Information Processing (PCM 2004), volume 3, pages 418-425.
  9. Li, S., Li, C., Chen, G., and Mou, X. (2004b). Cryptanalysis of the RCES/RSES image encryption scheme. Technical Report 2004/376, Cryptology ePrint Archive. http://eprint.iacr.org/2004/376.
  10. Li, S. and Zheng, X. (2002a). Cryptanalysis of a chaotic image encryption method. In Proceedings of the International Symposium on Circuits and Systems, pages 708-711.
  11. Li, S. and Zheng, X. (2002b). On the security of an image encryption method. In Proceedings of the International Conference on Image Processing, pages 925- 928.
  12. Rogaway, P. and Coppersmith, D. (1998). A software optimized encryption algorithm. Journal of Cryptology, 11(4):273-287.
  13. Salleh, M., Ibrahim, S., and Isnin, I. (2003). Enhanced chaotic image encryption algorithm based on Baker's map. In Proceedings of the International Symposium on Circuits and Systems, volume 2, pages 508-511.
  14. Seo, Y., Kim, D., Yoo, J., Suijit, D., and Agrawal, A. (2003). Wavelet domain image encryption by subband selection and data bit selection. In Proceedings of the World Wide Congress (3G Wireless).
  15. Wong, A. and Bishop, W. (2006). Expert knowledge based automatic regions-of-interest (ROI) selection in scanned documents for digital image encryption. In Proceedings of the Third Canadian Conference on Computer and Robot Vision, page 51.
  16. Zhang, H., Feng, W., Hui, L., Hai, L., and Chou, L. (2003). A new image encryption algorithm based on chaos system. In Proceedings of Robotics, Intelligent Systems and Signal Processing, volume C16, pages 1-8.
  17. Ziedan, I., Fouad, M., and Salem, D. (2003). Application of data encryption standard to bitmap and JPEG images. In Proceedings of the Twentieth National Radio Science Conference, volume C16, pages 1-8.
Download


Paper Citation


in Harvard Style

Wong A. and Bishop W. (2007). BACKWARDS COMPATIBLE, MULTI-LEVEL REGIONS-OF-INTEREST (ROI) IMAGE ENCRYPTION ARCHITECTURE WITH BIOMETRIC AUTHENTICATION . In Proceedings of the Second International Conference on Signal Processing and Multimedia Applications - Volume 1: SIGMAP, (ICETE 2007) ISBN 978-989-8111-13-5, pages 320-325. DOI: 10.5220/0002140903200325


in Bibtex Style

@conference{sigmap07,
author={Alexander Wong and William Bishop},
title={BACKWARDS COMPATIBLE, MULTI-LEVEL REGIONS-OF-INTEREST (ROI) IMAGE ENCRYPTION ARCHITECTURE WITH BIOMETRIC AUTHENTICATION},
booktitle={Proceedings of the Second International Conference on Signal Processing and Multimedia Applications - Volume 1: SIGMAP, (ICETE 2007)},
year={2007},
pages={320-325},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002140903200325},
isbn={978-989-8111-13-5},
}


in EndNote Style

TY - CONF
JO - Proceedings of the Second International Conference on Signal Processing and Multimedia Applications - Volume 1: SIGMAP, (ICETE 2007)
TI - BACKWARDS COMPATIBLE, MULTI-LEVEL REGIONS-OF-INTEREST (ROI) IMAGE ENCRYPTION ARCHITECTURE WITH BIOMETRIC AUTHENTICATION
SN - 978-989-8111-13-5
AU - Wong A.
AU - Bishop W.
PY - 2007
SP - 320
EP - 325
DO - 10.5220/0002140903200325