Hostname: page-component-77f85d65b8-pztms Total loading time: 0 Render date: 2026-03-30T07:24:46.374Z Has data issue: false hasContentIssue false

Grayscale-based block scrambling image encryption using YCbCr color space for encryption-then-compression systems

Published online by Cambridge University Press:  01 February 2019

Warit Sirichotedumrong
Affiliation:
Tokyo Metropolitan University, 6-6 Asahigaoka, Hino-shi, Tokyo, 191-0065, Japan
Hitoshi Kiya*
Affiliation:
Tokyo Metropolitan University, 6-6 Asahigaoka, Hino-shi, Tokyo, 191-0065, Japan
*
Corresponding author: Hitoshi Kiya Email: kiya@tmu.ac.jp

Abstract

A novel grayscale-based block scrambling image encryption scheme is presented not only to enhance security, but also to improve the compression performance for Encryption-then-Compression (EtC) systems with JPEG compression, which are used to securely transmit images through an untrusted channel provider. The proposed scheme enables the use of a smaller block size and a larger number of blocks than the color-based image encryption scheme. Images encrypted using the proposed scheme include less color information due to the use of grayscale images even when the original image has three color channels. These features enhance security against various attacks, such as jigsaw puzzle solver and brute-force attacks. Moreover, generating the grayscale-based images from a full-color image in YCbCr color space allows the use of color sub-sampling operation, which can provide the higher compression performance than the conventional grayscale-based encryption scheme, although the encrypted images have no color information. In an experiment, encrypted images were uploaded to and then downloaded from Twitter and Facebook, and the results demonstrated that the proposed scheme is effective for EtC systems and enhances the compression performance, while maintaining the security against brute-force and jigsaw puzzle solver attacks.

Information

Type
Original Paper
Creative Commons
Creative Common License - CCCreative Common License - BYCreative Common License - NCCreative Common License - ND
This is an Open Access article, distributed under the terms of the Creative Commons Attribution-NonCommercial-NoDerivatives licence (http://creativecommons.org/licenses/by-nc-nd/4.0/), which permits non-commercial re-use, distribution, and reproduction in any medium, provided the original work is unaltered and is properly cited. The written permission of Cambridge University Press must be obtained for commercial re-use or in order to create a derivative work.
Copyright
Copyright © The Authors, 2019
Figure 0

Fig. 1. EtC system.

Figure 1

Fig. 2. Color-based block scrambling image encryption.

Figure 2

Fig. 3. Block rotation and inversion. (a) Block rotation, (b) block inversion

Figure 3

Table 1. Permutation of color components for a random integer. For example, if the random integer is equal to 2, the red component is replaced by the green one, and the green component is replaced by the red one while the blue component is not replaced.

Figure 4

Fig. 4. Examples of images encrypted by using the color-based, conventional grayscale-based, and proposed schemes. n is the number of divided blocks. (a) Original image (X × Y = 512 × 512), (b) color-based scheme (Bx = By = 16, n = 1024), (c) conventional grayscale-based scheme (Bx = By = 8, n = 12288), (d) proposed scheme with 4:2:0 sub-sampling (Bx = By = 8, n = 6144), (e) proposed scheme without sub-sampling (Bx = By = 8, n = 12288).

Figure 5

Fig. 5. Sub-sampling in JPEG encoder and interpolation of chroma components in JPEG decoder.

Figure 6

Fig. 6. Example of the decrypted images with the color-based scheme including block distortion (Bx = By = 8, $Q_{f_u}=100$, and 4:2:0 sub-sampling). (a) Downloaded from Twitter (PSNR=29.44dB), (b) downloaded from Facebook (PSNR = 26.93 dB).

Figure 7

Fig. 7. Conventional grayscale-based encryption.

Figure 8

Fig. 8. Conventional grayscale-based image generation.

Figure 9

Fig. 9. Proposed grayscale-based image encryption.

Figure 10

Fig. 10. Proposed grayscale-based image generation. (a) Ig without sub-sampling (4:4:4), (b) Ig with 4:2:0 sub-sampling.

Figure 11

Fig. 11. Proposed grayscale-based image decryption procedure.

Figure 12

Fig. 12. Reconstruction of decrypted images. (a) Ig without sub-sampling (4:4:4), (b) Ig with 4:2:0 sub-sampling.

Figure 13

Fig. 13. G-table. (a) Ig without sub-sampling, (b) Ig with 4:2:0 sub-sampling.

Figure 14

Table 2. Relationship between uploaded JPEG files and downloaded ones in terms of sub-sampling ratios and the maximum resolutions. Providers do not resize uploaded images when their resolutions are less than or equal to the maximum resolutions, e.g. the maximum resolutions of Twitter and Tumblr are 4096 × 4096 and 1280 × 1280, respectively [29].

Figure 15

Table 3. Parameters used for uploaded JPEG images

Figure 16

Fig. 14. R-D curves of uploaded JPEG images. (a) Without sub-sampling (4:4:4), (b) with 4:2:0 sub-sampling. Note that the conventional grayscale-based scheme cannot consider 4:2:0 color sub-sampling. (c) Comparison between the proposed scheme with 4:2:0 sub-sampling and the conventional one.

Figure 17

Fig. 15. Decrypted images after compressing and decompressing encrypted ones (Qf = 90). (a) Original image (X × Y = 512 × 512), (b) proposed scheme without color sub-sampling (PSNR = 35.72 dB), (c) proposed scheme with 4:2:0 color sub-sampling (PSNR = 33.93 dB), (d) encryption scheme in [25] (PSNR = 10.32 dB, sub-sampling ratio = 4:2:0), (e) encryption scheme in [26].

Figure 18

Fig. 16. R-D curves of downloaded JPEG images from Twitter. (a) Uploaded without sub-sampling (4:4:4), (b) uploaded with 4:2:0 sub-sampling.

Figure 19

Fig. 17. R-D curves of downloaded JPEG images from Facebook. (a) Uploaded without sub-sampling (4:4:4), (b) uploaded with 4:2:0 sub-sampling.

Figure 20

Table 4. Security evaluation of the color-based, conventional, and proposed scheme against the extended jigsaw puzzle solver [27–29].

Figure 21

Fig. 18. Assembled images by using the extended jigsaw puzzle solver [27–29]. a) Original image (X × Y = 256 × 144), (b) encrypted image (color-based scheme, Bx = By = 16, n = 144), (c) encrypted image (color-based scheme, Bx = By = 8, n = 576), (d) encrypted image (proposed scheme without sub-sampling, Bx = By = 8, n = 1728), (e) encrypted image (proposed scheme with 4:2:0 sub-sampling, Bx = By = 8, n = 864), (f) encrypted image (conventional scheme, Bx = By = 8, n = 1728), (g) assembled image (color-based scheme, Bx = By = 16, Lc = 0.208), (h) assembled image (color-based scheme, Bx = By = 8, Lc = 0.012), (i) assembled image (proposed scheme without sub-sampling, Bx = By = 8, Lc = 0.002), (j) assembled image (proposed scheme with 4:2:0 sub-sampling, Bx = By = 8, Lc = 0.002), (k) assembled image (conventional scheme, Bx = By = 8, Lc = 0.002).

Figure 22

Fig. 19. Running time of assembling encrypted images from resized ultra-eye dataset (256 × 144).

Figure 23

Table 5. Key space of the color-based, conventional, and proposed scheme (Np = 256 × 144)