Open Access

Joint Encryption and Compression of Correlated Sources with Side Information

EURASIP Journal on Information Security20082007:098374

DOI: 10.1155/2007/98374

Received: 6 March 2007

Accepted: 7 November 2007

Published: 21 February 2008

Abstract

We propose a joint encryption and compression (JEC) scheme with emphasis on application to video data. The proposed JEC scheme uses the philosophy of distributed source coding with side information to reduce the complexity of the compression process and at the same time uses cryptographic principles to ensure that security is built into the scheme. The joint distributed compression and encryption is achieved using a special class of codes called high-diffusion (HD) codes that were proposed recently in the context of joint error correction and encryption. By using the duality between channel codes and Slepian-Wolf coding, we construct a joint compression and encryption scheme that uses these codes in the diffusion layer. We adapt this cipher to MJPEG2000 with the inclusion of minimal amount of joint processing of video frames at the encoder.

[123456789101112131415161718192021222324]

Authors’ Affiliations

(1)
Department of Electrical and Computer Engineering, Stevens Institute of Technology

References

  1. ISO/IEC 15444-3:2002 : Information technology—JPEG2000 image coding system—part 3: motion jpeg2000. 2002.
  2. Wu C-P, Kuo C-CJ: Design of integrated multimedia compression and encryption systems. IEEE Transactions on Multimedia 2005, 7(5):828-839. 10.1109/TMM.2005.854469View ArticleGoogle Scholar
  3. Wen JG, Kim H, Villasenor JD: Binary arithmetic coding with key-based interval splitting. IEEE Signal Processing Letters 2006, 13(2):69-72. 10.1109/LSP.2005.861589View ArticleGoogle Scholar
  4. Grangetto M, Magli E, Olmo G: Multimedia selective encryption by means of randomized arithmetic coding. IEEE Transactions on Multimedia 2006, 8(5):905-917. 10.1109/TMM.2006.879919View ArticleGoogle Scholar
  5. Jakimoski G, Subbalakshmi KP: Cryptanalysis of some multimedia encryption schemes. to appear in IEEE Transactions on Multimedia
  6. Pradhan SS, Ramchandran K: Distributed source coding using syndromes (DISCUS): design and construction, (DCC '99). Proceedings of the Conference on Data Compression, 1999, Washington, DC, USA 158.Google Scholar
  7. Girod B, Aaron AM, Rane S, Rebollo-Monedero D: Distributed video coding. Proceedings of the IEEE 2005, 93(1):71-83. 10.1109/JPROC.2004.839619View ArticleGoogle Scholar
  8. Johnson M, Ishwar P, Prabhakaran V, Schonberg D, Ramchandran K: On compressing encrypted data. IEEE Transactions on Signal Processing 2004, 52(10):2992-3006. 10.1109/TSP.2004.833860MathSciNetView ArticleGoogle Scholar
  9. Mathur CN, Narayan K, Subbalakshmi KP: High diffusion codes: a class of maximum distance separable codes for error resilient block ciphers. Proceedings of the IEEE GLOBECOM Workshop: 2nd IEEE International Workshop on Adaptive Wireless Networks (AWiN '05), November 2005, St. Louis, Mo, USAGoogle Scholar
  10. Mathur CN, Narayan K, Subbalakshmi KP: On the design of error-correcting ciphers. Eurasip Journal on Wireless Communications and Networking 2006, 2006: 12 pages. 10.1155/WCN/2006/42871View ArticleGoogle Scholar
  11. Mathur CN, Narayan K, Subbalakshmi KP: High diffusion cipher: encryption and error correction in a single cryptographic primitive. Proocedings of the 4th International Conference on Applied Cryptography and Network Security (American Conference on Neutron Scattering), June 2006, Singapore 3989: 309-324.Google Scholar
  12. Narayan K: On the design of secure error resilient diffusion layers for block ciphers, M.S. thesis. , Castle Point on Hudson, Hoboken, NJ, USA; 2005.Google Scholar
  13. Mathur CN: A mathematical framework for combining error correction and encryption, Ph.D. thesis. 2007.Google Scholar
  14. Specification for the advanced encryption standard (AES) 2001.Federal Information Processing Standards (FIPS) Publication 19
  15. Daemen J, Rijmen V: The Design of Rijndael. Springer; 2002.MATHView ArticleGoogle Scholar
  16. Slepian D, Wolf JK: Noiseless coding of correlated information sources. IEEE Transactions on Information Theory 1973, 19(4):471-480. 10.1109/TIT.1973.1055037MATHMathSciNetView ArticleGoogle Scholar
  17. Shannon CE: Communication Theory of Secrecy System. 1946. Now declassified confidential reporGoogle Scholar
  18. Vernam GS: Secret signaling system. 1919. U.S. Patent 131071Google Scholar
  19. Stinson DR: Cryptography: Theory and Practices. In Discrete Mathematics and Its Applications. Edited by: Rosen KH. CRC Press, 2000 Corporate Blvd., N.W., Boca Raton, Fla, USA; 1995.Google Scholar
  20. Lin S, Costello DJ: Error Control Coding. 2nd edition. Prentice-Hall, Upper Saddle River, NJ, USA; 2004.Google Scholar
  21. Daemen J, Rijmen VAES Proposal: Rijndael, http://csrc.nist.gov/archive/aes/index.html
  22. Gantmacher FR: The Theory of Matrices. Volume 2. Chelsa, New York, NY, USA; 1964.Google Scholar
  23. Fomin S, Zelevinsky A: Total positivity: tests and parameterizations. December 1999, http://arxiv.org/PS_cache/math/pdf/9912/9912128v1.pdfGoogle Scholar
  24. Taubman DS, Marcellin MW: JPEG2000 Image Compression Fundamentals, Standards and Practice. Kluwer Academic, Dordrecht, The Netherlands; 2002.View ArticleGoogle Scholar

Copyright

© Haleem et al. 2007

This article is published under license to BioMed Central Ltd. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.