Next Article in Journal
Texture Based Quality Analysis of Simulated Synthetic Ultrasound Images Using Local Binary Patterns
Previous Article in Journal
Characterization of Crystallographic Structures Using Bragg-Edge Neutron Imaging at the Spallation Neutron Source
Article Menu
Issue 1 (January) cover image

Export Article

Open AccessArticle
J. Imaging 2018, 4(1), 1;

Integrated Model of Image Protection Techniques

Graduate School of Advanced Integration Science, Chiba University, Chiba 263-8522, Japan
Graduate School of Engineering, Chiba University, Chiba 263-8522, Japan
Faculty of System Design, Tokyo Metropolitan University, Tokyo 192-0364, Japan
Author to whom correspondence should be addressed.
Received: 6 September 2017 / Revised: 13 December 2017 / Accepted: 18 December 2017 / Published: 21 December 2017
Full-Text   |   PDF [2430 KB, uploaded 25 December 2017]   |  


We propose an integrated model of Block-Permutation-Based Encryption (BPBE) and Reversible Data Hiding (RDH). The BPBE scheme involves four processes for encryption, namely block scrambling, block-rotation/inversion, negative-positive transformation and the color component shuffling. A Histogram Shifting (HS) method is adopted for RDH in our model. The proposed scheme can be well suitable for the hierarchical access control system, where the data can be accessed with the different access rights. This scheme encrypts R, G and B components independently. Therefore, we can generate similar output images from different input images. Additionally, the key derivation scheme also provides the security according to the different access rights. Our scheme is also resilient against brute-force attacks and Jigsaw Puzzle Solvers (JPSs). Furthermore, the compression performance is also not severely degraded using a standard lossless compression method. View Full-Text
Keywords: block-permutation-based encryption; reversible data hiding; integrated model; hash chain; key derivation; key space block-permutation-based encryption; reversible data hiding; integrated model; hash chain; key derivation; key space

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited (CC BY 4.0).

Share & Cite This Article

MDPI and ACS Style

Aryal, A.; Imaizumi, S.; Horiuchi, T.; Kiya, H. Integrated Model of Image Protection Techniques. J. Imaging 2018, 4, 1.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics



[Return to top]
J. Imaging EISSN 2313-433X Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top