Partial Image Encryption Using Format-Preserving Encryption in Image Processing Systems For Internet of Things Environment
Partial Image Encryption Using Format-Preserving Encryption in Image Processing Systems For Internet of Things Environment
Partial Image Encryption Using Format-Preserving Encryption in Image Processing Systems For Internet of Things Environment
Abstract
Concomitant with advances in technology, the number of systems and devices that utilize image data has increased.
Nowadays, image processing devices incorporated into systems, such as the Internet of things, drones, and closed-circuit
television, can collect images of people and automatically share them with networks. Consequently, the threat of inva-
sion of privacy by image leakage has increased exponentially. However, traditional image-security methods, such as pri-
vacy masking and image encryption, have several disadvantages, including storage space wastage associated with data
padding, inability to decode, inability to recognize images without decoding, and exposure of private information after
decryption. This article proposes a method for partially encrypting private information in images using FF1 and FF3-1.
The proposed method encrypts private information without increasing the data size, solving the problem of wasted stor-
age space. Furthermore, using the proposed method, specific sections of encrypted images can be decrypted and recog-
nized before decryption of the entire information, which addresses the problems besetting traditional privacy masking
and image encryption methods. The results of histogram analysis, correlation analysis, number of pixels change rate, uni-
fied average change intensity, information entropy analysis, and NIST SP 800-22 verify the security and overall efficacy of
the proposed method.
Keywords
Partial image encryption, format-preserving encryption, FF1, FF3-1, IoT
Creative Commons CC BY: This article is distributed under the terms of the Creative Commons Attribution 4.0 License
(https://creativecommons.org/licenses/by/4.0/) which permits any use, reproduction and distribution of the work
without further permission provided the original work is attributed as specified on the SAGE and Open Access pages
(https://us.sagepub.com/en-us/nam/open-access-at-sage).
2 International Journal of Distributed Sensor Networks
masking involves methods such as blurring, mosaic privacy masking methods, image encryption methods,
masking, removal, and deformation. Blurring of a spe- and format-preserving encryption. Section
cific area in an image makes it difficult to recognize ‘‘Contribution’’ introduces the advantages of the pro-
objects. Mosaic masking is a technique that blurs a spe- posed method. Section ‘‘Proposed method’’ describes
cific area of a picture by weighting it in a tile form. the proposed new method for encrypting parts of
Removal and deformation involve deleting data in a images using format-preserving encryption. Section
specific area or modifying data using arbitrary values. ‘‘Experiment evaluation’’ compares the encryption
These privacy masking techniques all involve overwrit- results with traditional image security. Sections
ing data in the original image. Although they are fast ‘‘Performance’’ and ‘‘Optimal block size’’ measure the
and efficient because of the low performance load encryption/decryption speed and derives the optimal
involved, they make it impossible to recover the origi- encryption block size, respectively. Section ‘‘Security
nal data.21 This results in the problem of such methods evaluation’’ presents the results of security analyses and
only being applicable with images that do not need to other comparisons of the proposed method with exist-
be recovered, unless the original image is stored sepa- ing image-security techniques. Conclusions are pre-
rately. There are two methods of encrypting image sented in section ‘‘Conclusion.’’
data: (1) full encryption, which encrypts the entire
image using the likes of block-cipher-based and chaos-
map-based encryption, and (2) partial encryption, Related work
which selectively encrypts only the sensitive parts of an
image. Because of the nature of image file structures, it Closed-circuit television camera system model
is difficult to encrypt only a portion of an image using A closed-circuit television (CCTV) camera system takes
image full encryption. Therefore, encrypted images can- a picture of an image and stores it as data in a manner
not be recognized by users because all of the data must that a user can see. In a CCTV system, a CCTV camera
be encrypted—not only the data that would result in is connected to an image recorder. A digital video
privacy violations if revealed. Private information in an recorder (DVR) processes the codec algorithm and
image is defined as a visible face, part of the body, or analog image that fit the image sent from various types
vehicle registration number that could be used to iden- of CCTVs into the type and form that fits the intended
tify an individual. When using a block cipher, which is purpose. The video is stored on a hard disk in the
typically used to encrypt text data for image encryp- DVR machine and is transmitted to a video storage ser-
tion, the size of the encrypted image can be increased ver using Secure Sockets Layer (SSL)-encrypted com-
by padding. In particular, for an image, when the munication. The video storage server encrypts and
amount of data increases due to padding in every stores all the video sent from the DVR to protect pri-
frame, storage space may be wasted. In this article, we vate information. Control room operators and external
propose a partial image encryption method using users can see the images saved in the data storage ser-
format-preserving encryption that can protect informa- ver with appropriate user authentication. Figure 1
tion requiring privacy and utilize images while over- shows a schematic illustration of the CCTV camera
coming these problems. Format-preserving encryption system model.
is an algorithm that is suitable for encryption of data
that have a fixed length or format and characteristics
that do not increase the length of the cryptogram. Privacy masking techniques
Therefore, it is possible to encrypt only the private
information in an image, and because the data size does Privacy masking techniques, such as blurring, mosaic
not increase, the encrypted data can be stored effec- masking, removal, and deformation, protect sensitive
tively without wasting storage space. The proposed or personal information by changing some data in an
method does not result in an increase in the amount of image so that the original information cannot be seen.
data due to the application of padding when encrypting When these methods are used, it is difficult to recover
only part of an image. In addition, the proposed the original image. Blurring and mosaic masking tech-
method permits encrypted images to be recovered, niques blur the original image so that it cannot be prop-
addressing a problem associated with privacy masking. erly recognized. Removal and deformation methods
Furthermore, it allows encrypted images to be recog- delete original image pixel values or overwrite original
nized by encrypting only private information. This arti- image pixel values with different values using arbitrary
cle describes the proposed method and presents the values. Privacy masking methods do not permit recov-
results of comparisons of the method with existing ery of the original image because the original image
video security methods. The remainder of this article is data are modified. Another disadvantage of such meth-
organized as follows. Section ‘‘Related work’’ gives an ods is that the original image must be inferred, although
overview of image processing systems, traditional the exact original is unknown.
Jang and Lee 3
encryption. Privacy masking incurs a problem in that it large image can adversely affect image recognition. In
cannot be decrypted. The image full encryption method contrast, the proposed method allows encryption of just
encrypts all the pixels so that the image cannot be the license plate and the person in the car. Therefore, it
recognized at all until after decryption, and once is possible to collect images while solving the problem
decrypted, information requiring privacy cannot be of invasion of citizens’ privacy. In addition, privacy
protected. Traditional image partial encryption masking is not decrypted, but the proposed method has
encrypts a large rectangular range that includes the area the advantage of allowing the decryption and use of an
requiring protection. This incurs a problem in that even encrypted area as needed (such as in the case of a crime
non-sensitive parts of the image are encrypted. In addi- committed in the street). The format-preserving encryp-
tion, the use of a block cipher causes problems because tion used for encryption can encrypt even short-length
it produces an image file that does not conform to the data without padding. Therefore, there is no increase in
structure determined by padding. The proposed method the amount of data due to padding.
performs encryption by targeting a pixel range that spe-
cifically covers an area that the user wishes to encrypt.
There are various methods for detecting objects to be Proposed method
encrypted in images, such as the use of deep learning,
Partial image encryption using format-preserving
OpenCV, or software.36,49–51 The data can be recog-
nized and used normally except for the encrypted area, encryption
such that images can still be used while protecting pri- This article proposes an image partial encryption
vate information. For example, if the traditional image method based on format-preserving encryption. It was
partial encryption was used to partially encrypt the implemented and tested using FF1 and FF3-1. The pro-
license plate of a parked vehicle, and the person inside, posed method, which can be used to select and encrypt
as captured by CCTV, the entire image or the vehicle’s a portion of an image while preserving the data size,
license plate and the person to be encrypted must be consists of three steps: (1) selection of the encryption
encrypted with a rectangle. Encrypting an unnecessarily area, (2) encryption of image pixel values using format-
Jang and Lee 5
preserving encryption, and (3) storage of encrypted Table 1. Definition of fields and functions used in the
image pixel values. First, to select the area to be encryption/decryption process of the proposed method.
encrypted in a video, the area that corresponds to pri-
Notation Description
vate information that can identify an individual, such as
a face, a part of a body, or a vehicle number, must be n Number of pixels in the selected area
identified. The X and Y coordinate values of all pixels in PixelnX X coordinate of the selected pixel data
the selected area are checked, and the pixel values are PixelnY Y coordinate of the selected pixel data
stored in the byte array. For example, a red–green–blue Pixelnvalue Value of the selected pixel data
(RGB)-format image stores three bytes of pixel values SelectPixel All Q concatenated data
per pixel, while a gray-format image stores one byte of m Length of SelectPixel divided by 24 bytes
PixelArraym Byte array divided into 24-byte units for encryption
pixel values per pixel. The proposed method can be and decoding
applied to both RGB- and gray-format images. The l Byte length of PixelArray
pixel values stored in the byte array are encrypted using Cm Result of encrypting/decoding PixelArraym
format-preserving encryption. When encrypting using EncPixelnX Value obtained by encrypting and decoding Pixelnvalue
format-preserving encryption, data can be divided by Tn Tweak values required for encryption
t Length of T
block size. In this article, the block size is set to 24 bytes K AES 128-bit secret key used for encryption
for FF1 and 32 bytes for FF3-1. Details of the block size ½Xs Representation of X as a byte string of s bytes
setting are described in section ‘‘Optimal block size.’’ AESK (X) Function for AES encryption of X using key K
The encryption process requires plain text, a key, and a PRF(X) Function to perform initialization vector operation
tweak. The plain text is the pixel value of the selected for CBC process
HTD(X) Function to convert hexadecimal data to decimal
area, and the key uses a 128-bit AES key. The tweak
data
uses the X and Y coordinates of all of the pixel data in DTHr (X) Function to convert decimal data to hexadecimal
the block to be encrypted. Format-preserving encryption data of length r
use a tweak in the encryption and decryption process,
unlike ordinary block ciphers. If the pixel values are AES: advanced encryption standard; CBC: cipher block chaining.
encrypted using the same tweak, one can visually infer
the original image because the same pixel value becomes
the same cipher text. In this case, the correlation between as the pixel values of the existing X and Y coordinates.
pixels may be vulnerable to known and selective plain As Figure 4 shows, only the area selected as the private
text attacks.52,53 To solve this problem, the tweak must information in the original image is encrypted. In addi-
be a constantly changing value. The proposed method tion, the private information can be encrypted and pro-
uses tweak as the value obtained by concatenating the X tected, and users can use encrypted images.
and Y coordinates of the pixel value to be encrypted.
The final step in the process is encrypting of all the pixel Application scenario
values in the selected area. The decryption process is the
The proposed method can be used in various applica-
reverse of the encryption process. Table 1 summarizes
tions such as CCTV camera systems and image drone
the fields and functions used in the encryption/decryp-
systems. Figure 5 is an activity diagram of a scenario in
tion process of the proposed method. Figure 3 shows the
which the proposed method is applied to a CCTV cam-
entire process of encrypting pixel values in an RGB-for-
era system.
mat image using the proposed method. Algorithm 1
As shown in the figure, a CCTV camera shoots the
shows the process of dividing the pixel value into prede-
video, which is then transmitted to the storage server.
termined block units before the encryption process of
The server encrypts the privacy information of the
the proposed method is applied. Algorithm 2 calculates
video received from the CCTV camera using the pro-
tweak T values used in fpeEncryption and fpeDecryption.
Algorithms 3 and 4 detail the fpeEncryption and posed method and stores the video in the server.
fpeDecryption processes of the proposed method, respec- Security officers and general users can view the videos
tively. Figure 4 presents an example of the encryption with privacy information encrypted by connecting to
process used in the proposed method. the server or over the Internet. Figure 6 shows a CCTV
As shown in Figure 3, we select the X and Y coordi- camera system incorporated with improved security
nates and the pixel values of the privacy information in and applicability provided by the proposed method.
the image. Then, a PixelArray is created by concatenat-
ing the selected pixel values in 24 bytes. PixelArray val- Experiment evaluation
ues are computed with the fpeEncryption and
fpeDecryption functions, respectively, according to
Experimental results
encryption/decryption. As a result, the pixel data The proposed method was applied to images (6.1.01,
EncPixel value encrypted in the generated C are stored 4.1.02, 5.2.08, house, 5.3.01, and 2.2.02) from the USC-
6 International Journal of Distributed Sensor Networks
SIPI database of various formats and sizes. Figure 7 Comparison with traditional image-security methods
shows the original image, while Figures 8–10 show the The proposed method was compared with the tradi-
results of full image encryption using AES, FF1, and tional image-security methods to assess the possibility
FF3-1, respectively. Figures 11 and 12 show the results of decryption, the degree to which file sizes increase,
of encrypting only the information requiring privacy in and the possibility of recognizing encrypted images.
the image using the proposed method. The following problems arise when the traditional
image-security approach is applied to an image pro-
cessing system. Privacy masking prevents decoding
Increasing data size in videos because the original data are lost by modifying pixel
A video is data in which multiple frames are collected. values. Full image encryption using a block encryption
When a captured video is encrypted in real time, the method, such as AES, does not permit encryption of a
image data size may increase due to padding. Table 2 part of an image; the entire image must be encrypted.
summarizes the increase in the data size over time when Therefore, the image cannot be used until decoding is
all the frames of a captured video are encrypted in real performed, and private information is exposed when
time. The data size increases as a result of the addition the decoding is performed. In addition, because of the
of 16 bytes padding data to every frame under various characteristics of the block code, the size of the image
frame conditions. The units are Mb. is invariably increased by padding. Figure 13 shows the
For CCTV, which involves the continuous recording results of encryption using privacy masking, image full
of video, the size of the video may increase over time encryption, and the proposed method.
such that storage space is wasted. As the number of Figure 13(b) shows that private information can be
CCTV cameras capturing video increases, the wastage inferred when mosaic masking is used and is not
of server storage space worsens. decrypted. Figure 13(b) shows mosaic image using the
Jang and Lee 7
Figure 7. Original image: (a) 6.1.01, (b) 4.1.02, (c) 5.2.08, (d) house, (e) 5.3.01, and (f) 2.2.02.
Figure 8. Result of full encryption using AES: (a) 6.1.01, (b) 4.1.02, (c) 5.2.08, (d) house, (e) 5.3.01, and (f) 2.2.02.
Figure 9. Result of full encryption using FF1: (a) 6.1.01, (b) 4.1.02, (c) 5.2.08, (d) house, (e) 5.3.01, and (f) 2.2.02.
10 International Journal of Distributed Sensor Networks
Figure 10. Result of full encryption using FF3-1: (a) 6.1.01, (b) 4.1.02, (c) 5.2.08, (d) house, (e) 5.3.01, and (f) 2.2.02.
Figure 11. Result obtained with proposed method using FF1: (a) 6.1.01, (b) 4.1.02, (c) 5.2.08, (d) house, (e) 5.3.01, and (f) 2.2.02.
Figure 12. Result obtained with proposed method using FF3-1: (a) 6.1.01, (b) 4.1.02, (c) 5.2.08, (d) house, (e) 5.3.01, and (f) 2.2.02.
increases, but it is slightly slower at 25 bytes. FF1 was encrypts the plain text into 24-byte units and FF3-1
the fastest from a length of 25 + (32 3 a) bytes (e.g. encrypts it into 32 bytes.
25, 57, 89). FF3-1 gets faster as the block length
increases. Because of the characteristics of the algo-
rithm, the block length of FF3-1 was set to a maximum Security evaluation
of 32 bytes and tested. As a result, it can be seen that
32 bytes is the most efficient block length. Therefore, in To evaluate the security of the proposed method, histo-
the encryption process of the proposed method, FF1 gram, correlation coefficient, number of pixels change
Jang and Lee 11
Figure 13. Image encryption results: (a) original image (4,147,254 bytes), (b) privacy masking (4,147,254 bytes), (c) AES (4,147,270
bytes), (d) proposed method (FF1, 4,147,254 bytes), and (e) proposed method (FF3-1, 4,147,254 bytes).
!
1 X
N NPCR and UACI analysis
cov(x, y) = (xi E(x))(yi E(y)) ð2Þ
N i=1 The resistance to a chosen plain text attack (differential
attack) was evaluated using NPCR and UACI for an
1X N
image encrypted using the proposed method and block
E(x) = xi ð3Þ
N i=1 cipher encryption. NPCR is the pixel variation rate
between the plain text and the encrypted image, and
1X N UACI is the average variation intensity of plain text
D(x) = (xi E(x))2 ð4Þ and the encrypted image. This analysis method can
N i=1
reveal whether the change in the original image affects
encryption. If the original image is greatly changed in
Table 5 shows the correlation coefficient weight val-
comparison with the encrypted image, it can be said to
ues for RGB and gray images with respect to the origi-
have good resistance to a chosen plain text attack (dif-
nal image for AES and the proposed method. These
ferential attack). NPCR and UACI are calculated using
results show that the proposed method yields a correla-
formulas (5)–(7)54,55
tion coefficient weight value similar to those obtained
by image encryption with AES. P
i, j D(i, j)
NPCR = 3 100% ð5Þ
w3h
Jang and Lee 13
!
1 X jC1 (i, j) C2 (i, j)j through image encryption using block cipher (AES). In
UACI = 3 100% ð6Þ other words, the proposed method is as safe as image
w 3 h i, j F
encryption using a block cipher (AES).
1 C1 (i, j) 6¼ C2 (i:j)
D(i, j) ð7Þ
0 C1 (i, j) = C2 (i:j)
Information entropy analysis
In formula (6), C1 denotes a plain image, C2 denotes Information entropy analysis is used to measure the
an encrypted image, and w and h are the horizontal and complexity of the encrypted data. The encrypted data
vertical sizes of the image, respectively. F is a value that must be complex enough to prevent information on the
represents the maximum support pixel value compatible original data from being obtained. The optimal entropy
with the image format of the cipher text, and the image value of the RGB and gray images used is 8. Table 8
of the 8-bit format is 255. Tables 6 and 7 present the lists the entropy values for the original images in RGB
NPCR and UACI values, respectively, obtained for and gray formats and those achieved by encrypting the
images in RGB and gray formats with Figures 8–12. images using the proposed method and full encryption.
These results show that the proposed method yields The results in Table 8 show that the proposed
NPCR and UACI values similar to those obtained method and image encryption using a block cipher
14 International Journal of Distributed Sensor Networks
(AES) yield values close to the optimal entropy. The distribution of the histogram and correlation
Therefore, both the proposed method and the image coefficient of the proposed method is good, and the
encryption using a block cipher (AES) are sufficiently results of NPCR and UACI are very close to those
complex. obtained with encryption using AES. In addition, the
value of the information entropy is as close to the opti-
mal value as that of the AES-encoded image. Finally,
NIST SP 800-22 tests all the NIST SP 800-22 tests were passed. Therefore,
NIST SP 800-22 tests were used to test the cipher ran- the proposed method can be said to be a safe means of
using both FF1 and FF3-1.
domness.56 The goal of those tests is to analyze the ran-
domness of the encrypted image data. The analysis
consisted of 15 tests. For the experimental results Conclusion
obtained in this study, tests were performed on the data
for the encrypted region in the 1024 3 1024 size image In this article, we proposed a method for partially
of Figures 11 and 12, and all the tests were passed to encrypting private information, such as faces and body
verify the randomness. The test results are listed in parts, in images using the format-preserving encryption
Table 9. standards FF1 and FF3-1. Traditional image protec-
tion technology has problems such as increasing data
by padding and storage space wastage over time.
Security analysis comparison Furthermore, as the entire image is encrypted, the
image cannot be recognized before decryption and,
To evaluate the security level of images encrypted with once decrypted, information requiring privacy is
AES and with the proposed method, histogram, corre- exposed. Traditional partial image encryption incurs a
lation, NPCR, UACI, information entropy analysis, problem in that unnecessary portions are encrypted by
and NIST SP 800-22 were performed as described encrypting a rectangular area that covers the informa-
above. tion requiring privacy. The proposed method solves this
Jang and Lee 15
problem. The proposed method has no padding, so Proceedings of the 5th ACM symposium on computer
there is no increase in the data size, and the information human interaction for management of information technol-
requiring privacy can be specifically set and encrypted. ogy, Cambridge, MA, 4–5 December 2011, p.4. New
In this study, we measured the encryption and decryp- York: ACM.
6. Cho JH and Ahn CW. Auto detection system of personal
tion speed of the proposed method and determined the
information based on images and document analysis. J
most suitable block unit for encryption to improve the
Inst Internet Broadcast Commun 2015; 15(5): 183–192.
encryption and decryption speed of the image part. The 7. Bang J, Kang S and Kim MS. The study of factors to
security of the proposed method was evaluated through affect on users’ self-disclosure in social networking ser-
analysis of histograms, correlation coefficients, NPCR, vices. J Korea Acad Ind Cooperation Soc 2016; 17(8):
UACI, information entropy, and NIST SP 800-22. We 69–76.
verified through experiments that the proposed method 8. Kumari S. A research paper on cryptography encryption
is as secure as encryption using AES. The proposed and compression techniques. Int J Eng Comput Sci 2017;
method can be used in various environments that use 6(4): 20915–20919.
images, such as Internet of things (IoT), drones, and 9. De Choudhury M, Sundaram H, Lin YR, et al. Connect-
ing content to community in social media via image con-
CCTV, and can be useful in responding to image leak-
tent, user tags and user communication. In: 2009 IEEE
age threats, such as privacy invasion and confidential international conference on multimedia and expo, New
information leakage. York, 28 June–3 July 2009, pp.1238–1241. New York:
IEEE.
Declaration of conflicting interests 10. Yeung CMA, Kagal L, Gibbins N, et al. Providing access
control to online photo albums based on tags and linked
The author(s) declared no potential conflicts of interest with data. In: AAAI spring symposium on social semantic web:
respect to the research, authorship, and/or publication of this where Web 2.0 meets Web 3.0, Palo Alto, CA, 23–25
article. March 2009, pp.9–14. Menlo Park, CA: AAAI.
11. Pesce JP, Casas DL, Rauber G, et al. Privacy attacks in
Funding social media using photo tagging networks: a case study
with Facebook. In: Proceedings of the 1st workshop on
The author(s) disclosed receipt of the following financial sup- privacy and security in online social media, Lyon, 17 April
port for the research, authorship, and/or publication of this 2012, p.4. New York: ACM.
article: This work was supported by the National Research 12. Christin D, López PS, Reinhardt A, et al. Share with
Foundation of Korea (NRF) grant funded by the Korean strangers: privacy bubbles as user-centered privacy con-
government (MSIT; No. 2018R1A4A1025632), the Basic trol for mobile content sharing applications. Inform Secur
Science Research Program through the NRF that is funded Tech Rep 2013; 17(3): 105–116.
by the Ministry of Education (No. NRF- 13. Mannan M and Van Oorschot PC. Privacy-enhanced
2018R1D1A1B07047656), and the Soonchunhyang sharing of personal content on the web. In: Proceedings
University. of the 17th international conference on World Wide Web,
Beijing, China, 21–25 April 2008, pp.487–496. New York:
ORCID iD ACM.
14. Vyas N, Squicciarini AC, Chang CC, et al. Towards auto-
Wonyoung Jang https://orcid.org/0000-0002-2777-9830
matic privacy management in Web 2.0 with semantic
analysis on annotations. In: 2009 5th international confer-
References ence on collaborative computing: networking, applications
and worksharing, Washington, DC, 11–14 November
1. Yu J, Zhang B, Kuang Z, et al. iPrivacy: image privacy
2009, pp.1–10. New York: IEEE.
protection by identifying sensitive objects via deep multi-
15. Squicciarini AC, Shehab M and Paci F. Collective pri-
task learning. IEEE Trans Inf Foren Sec 2016; 12(5):
vacy management in social networks. In: Proceedings of
1005–1016.
the 18th international conference on World Wide Web,
2. Wang C, Zhang B, Ren K, et al. Privacy-assured out-
Madrid, 20–24 April 2009, pp.521–530. New York:
sourcing of image reconstruction service in cloud. IEEE
ACM.
Trans Emerg Top Comput 2013; 1(1): 166–177.
16. Klemperer P, Liang Y, Mazurek M, et al. Tag, you can
3. Nov O, Naaman M and Ye C. Motivational, structural
see it! Using tags for access control in photo sharing. In:
and tenure factors that impact online community photo Proceedings of the SIGCHI conference on human factors
sharing. In: Third international AAAI conference on in computing systems, Austin, TX, 5–10 May 2012,
Weblogs and social media, San Jose, CA, 17–20 May pp.377–386. New York: ACM.
2009. Menlo Park, CA: AAAI. 17. Ravichandran R, Benisch M, Kelley PG, et al. Capturing
4. Squicciarini AC, Xu H and Zhang X. CoPE: Enabling social networking privacy preferences. In: International
collaborative privacy management in online social net- symposium on privacy enhancing technologies symposium,
works. J Am Soc Inf Sci Technol 2011; 62(3): 521–534. Seattle, WA, 5–7 August 2009, pp.1–18. Berlin: Springer.
5. Wang N, Xu H and Grossklags J. Third-party apps on 18. Bonneau J, Anderson J and Church L. Privacy suites:
Facebook: privacy and the illusion of control. In: shared privacy for social networks. In: Proceedings of the
16 International Journal of Distributed Sensor Networks
5th symposium on usable privacy and security (SOUPS multimedia applications (SIGMAP), Barcelona, 28–31
2009), vol. 9, Mountain View, CA, 15–17 July 2009, July 2007, pp.324–329. New York: ACM.
pp.1–2. New York: ACM. 35. Parameshachari BD, Karappa R, Soyjaudah KS, et al.
19. Bonneau J, Anderson J and Danezis G. Prying data out Partial image encryption algorithm using pixel position
of a social network. In: 2009 international conference on manipulation technique: the smart copyback system. In:
advances in social network analysis and mining, Athens, 2014 4th international conference on artificial intelligence
20–22 July 2009, pp.249–254. New York: IEEE. with applications in engineering and technology, Kota
20. Fang L and LeFevre K. Privacy wizards for social net- Kinabalu, Malaysia, 3–5 December 2014, pp.177–181.
working sites. In: Proceedings of the 19th international New York: IEEE.
conference on World Wide Web, Raleigh, NC, 26–30 April 36. Panduranga HT and Naveenkumar SK. Selective image
2010, pp.351–360. New York: ACM. encryption for medical and satellite images. Int J Eng
21. Park SC. Design and implementation of personal infor- Technol 2013; 5(1): 115–121.
mation identification and masking system based on image 37. Abdmouleh MK, Khalfallah A and Bouhlel MS. A novel
recognition. J Inst Internet Broadcast Commun 2017; selective encryption scheme for medical images transmis-
17(5): 1–8. sion based-on JPEG compression algorithm. Procedia
22. Kaur M and Kumar V. A comprehensive review on Comput Sci 2017; 112: 369–376.
image encryption techniques. Arch Comput Method Eng 38. Parameshachari BD, Panduranga HT and Naveenkumar
2018; 27: 15–43. SK. Partial encryption of medical images by dual DNA
23. Younes MAB. A survey of the most current image addition using DNA encoding. In: 2017 international con-
encryption and decryption techniques. Int J Adv Res ference on recent innovations in signal processing and
Comput Sci 2019; 10(1): 9. embedded systems (RISE), Bhopal, India, 27–29 October
24. OVSENÍ KĹ, Turán J, Huszanı́k T, et al. Image encryp- 2017, pp.310–314. New York: IEEE.
tion algorithm with plaintext related chaining. Comput 39. Brightwell M and Smith H. Using datatype-preserving
Inf 2019; 38(3): 647–678. encryption to enhance data warehouse security. In: 20th
25. Brindha K, Sharma R and Saini S. Use of symmetric national information systems security conference proceed-
algorithm for image encryption. Int J Innov Res Comput ings (NISSC), Baltimore, MD, 7–10 October 1997,
Commun Eng 2014; 2(5): 4401–4407. pp.141–149. Gaithersburg, MD: NIST.
26. Gupta K, Gupta R, Agrawal R, et al. An ethical 40. Black J and Rogaway P. Ciphers with arbitrary finite
approach of block based image encryption using chaotic domains. In: Cryptographers’ track at the RSA confer-
map. Int J Secur Appl 2015; 9(9): 105–122. ence, San Jose, CA, 13–17 February 2002, pp.114–130.
27. Zhang Y. A fast image encryption algorithm based on Berlin: Springer.
convolution operation. IETE J Res 2017; 65(1): 4–18. 41. Bellare M, Ristenpart T, Rogaway P, et al. Format-pre-
28. Li Y, Wang C and Chen H. A hyper-chaos-based image serving encryption. In: International workshop on selected
encryption algorithm using pixel-level permutation and areas in cryptography, Calgary, AB, Canada, 13–14
bit-level permutation. Opt Lasers Eng 2017; 90: 238–246. August 2009, pp.295–312. Berlin: Springer.
29. Oravec J, Turan J, Ovsenı́k L, et al. Asymmetric image 42. Bellare M, Rogaway P and Spies T. The FFX mode of
encryption approach with plaintext-related diffusion. operation for format-preserving encryption. Gaithersburg,
Radioengineering 2018; 27(1): 281–288. MD: NIST, 2010.
30. Lagmiri SN, Elalami N and Elalami J. Color and gray 43. Vance J. VAES3 scheme for FFX: an addendum to the
images encryption algorithm using chaotic systems of dif- FFX mode of operation for format preserving encryption.
ferent dimensions. Int J Comput Sci Network Secur 2018; Gaithersburg, MD: NIST, 2011.
18(1): 79–86. 44. Brier E, Peyrin T and Stern J. BPS: a format-preserving
31. He J, Liu B, Kong D, et al. PUPPIES: transformation- encryption proposal. Ɋɟɠɢɦ ɞɨɫɬɭɩɭ ɞɨ ɪɟɫɭɪɫɭ, 2010.
supported personalized privacy preserving partial image http://csrc.nist.gov/groups/ST/toolkit/BCM/documents/pro
posedmodes/bps/bps-spec.pdf
sharing. In: 2016 46th annual IEEE/IFIP international
45. Dworkin MJ and Perlner RA. Analysis of VAES3 (FF2),
conference on dependable systems and networks (DSN),
2015, https://eprint.iacr.org/2015/306.pdf
Toulouse, 28 June–1 July 2016, pp.359–370. New York:
46. Dworkin M. Recommendation for block cipher modes of
IEEE.
operation: methods for format-preserving encryption. NIST
32. Parameshachari BD, Kiran Rashmi P, Supriya MC, et al.
Special Publication, 800-38G, 2016, https://nvlpubs.nist.-
Controlled partial image encryption based on LSIC and
gov/nistpubs/SpecialPublications/NIST.SP.800-38G.pdf
chaotic map. In: Proceedings of the 3rd international con-
47. Durak FB and Vaudenay S. Breaking the FF3 format-
ference on cryptography, security and privacy, Kuala Lum-
preserving encryption standard over small domains. In:
pur, Malaysia, 19–21 January 2019, pp.60–63. New York:
Annual international cryptology conference, Santa Bar-
ACM.
bara, CA, 20–24 August 2017, pp.679–707. Cham:
33. Steinebach M, Liu H, Stein R, et al. Hybrid image
Springer.
encryption. Electron Imaging 2018; 2018(7): 1–6.
48. Dworkin M. Recommendation for block cipher modes of
34. Wong A and Bishop W. Backwards compatible, multi-
operation: methods for format-preserving encryption.
level regions-of-interest (ROI) image encryption architec-
NIST Special Publication, 800-38G, Revision 1, 2019,
ture with biometric authentication. In: Proceedings of the
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/
second international conference on signal processing and
NIST.SP.800-38Gr1-draft.pdf
Jang and Lee 17
49. He K, Gkioxari G, Dollár P, et al. Mask R-CNN. In: Proceedings of the Korean information science society con-
Proceedings of the IEEE international conference on com- ference, 2012, pp.274–276. Seoul, Korea: Korean Insti-
puter vision, Venice, 22–29 October 2017, pp.2961–2969. tute of Information Scientists and Engineers.
New York: IEEE. 53. Pareek NK, Patidar V and Sud KK. Diffusion-substitu-
50. Su H, Wei S, Yan M, et al. Object detection and instance tion based gray image encryption scheme. Digital Signal
segmentation in remote sensing imagery based on precise Process 2013; 23(3): 894–901.
mask R-CNN. In: IGARSS 2019: 2019 IEEE interna- 54. Chen G, Mao Y and Chui CK. A symmetric image
tional geoscience and remote sensing symposium, Yoko- encryption scheme based on 3D chaotic cat maps. Chaos
hama, Japan, 28 July–2 August 2019, pp.1454–1457. New Soliton Fract 2004; 21(3): 749–761.
York: IEEE. 55. Mao Y, Chen G and Lian S. A novel fast image encryp-
51. Zhou Y, Panetta K, Cherukuri R, et al. Selective object tion scheme based on 3D chaotic baker maps. Int J Bifurc
encryption for privacy protection. In: Mobile multimedia/ Chaos 2004; 14(10): 3613–3624.
image processing, security, and applications 2009, vol. 56. Bassham LE III, Rukhin AL, Soto J, et al. A statistical
7351, Orlando, FL, 13–17 April 2009, p.73510F. Belling- test suite for random and pseudorandom number generators
ham, WA: International Society for Optics and Photonics. for cryptographic applications. Sp 800-22 rev. 1a, 2010,
52. Chung JY and Hong YS. Parallel image encryption https://csrc.nist.gov/publications/detail/sp/800-22/rev-1a/
schemes for security of ultra high resolution images. In: final