실시간 처리를 위한 쿼드트리 기반 무손실 영상압축 및 암호화

QuadTree-Based Lossless Image Compression and Encryption for Real-Time Processing

  • 윤정오 (경운대학교 정보통신공학과) ;
  • 성우석 (경북대학교 대학원 전자공학과) ;
  • 황찬식 (경북대학교 전기전자공학부)
  • Yoon, Jeong-Oh (Kyungwoon University) ;
  • Sung, Woo-Seok (Dept.of Electronics Engineering, Graduate School of Kyungpook National University) ;
  • Hwang, Chan-Sik (Dept.of Electronics Electrical Engineering, Kyungpook National University)
  • 발행 : 2001.10.01

초록

일반적으로 무손실 영상압축 및 암호화 방법에는 압축과 암호화 과정이 독립적으로 이루어진다. 압축 후 암호화를 수행하면 압축열이 암호에 대한 평문으로 사용되므로 압축에 따른 엔트로피가 감소하여 랜덤한 성질을 갖게된다. 그러나 압축열 전체에 대한 암호화는 수행시간이 길어져 실시간 처리를 저해하는 원인이 되기도 한다. 본 논문에서는 무손실 영상압축과 암호의 결합에서 전체 처리시간을 줄이는 방법을 제안한다. 이는 쿼드트리 압축 알고리즘으로 그레이 영상을 분해하여 구조부분만을 암호화하는 방법이다. 아울러 영상의 무상관성과 동질영역을 확보하기 위한 변환과정을 수행하여 무손실 압축성능을 개선하였고, 쿼드트리 분해시 암호화되지 않은 데이터를 레벨별로 재구성하여 안전성을 갖도록 하였다. 모의 실험을 통하여 제안한 방법이 영상 압축율의 개선과 암호화 방법의 안전성 확보 및 실시간 처리가 가능함을 확인하였다.

Generally, compression and encryption procedures are performed independently in lossless image compression and encryption. When compression is followed by encryption, the compressed-stream should have the property of randomness because its entropy is decreased during the compression. However, when full data is compressed using image compression methods and then encrypted by encryption algorithms, real-time processing is unrealistic due to the time delay involved. In this paper, we propose to combine compression and encryption to reduce the overall processing time. It is method decomposing gray-scale image by means of quadtree compression algorithms and encrypting the structural part. Moreover, the lossless compression ratio can be increased using a transform that provides an decorrelated image and homogeneous region, and the encryption security can be improved using a reconstruction of the unencrypted quadtree data at each level. We confirmed the increased compression ratio, improved encryption security, and real-time processing by using computer simulations.

키워드

참고문헌

  1. 'Data Encryption Standard(DES),' National Bureau of Standards FIPS Publication 46, 1977
  2. R. L. Rivest, A. Shamir, and L. Adleman, 'A Method for Obtaining Digital Signatures and Public Key Cryptosystems,' Comm. of the ACM, 21 pp.120-126, 1978 https://doi.org/10.1145/359340.359342
  3. D. Jones, 'Applications of Splay Trees to Data Compression,' comm. ACM, pp.996-1007, Aug. 1988 https://doi.org/10.1145/63030.63036
  4. X. Liu, P. G. Farrell, and C. A. Boyd, 'Resisting the Bergen-Hogan Attack on Adaptive Arithematic Coding,' Proc. 6th IBM Int., Conf., Cryptography Coding, pp.199-208, 1997
  5. Y. Matias and A. Shamir, 'A Video Scrambling Technique Based on Space Filling Curves,' Proc., CRYPTO., pp.398-417, 1988
  6. H. K. C. Chang and J. L. Liu, 'A Linear Quadtree Compression Scheme for Image Encryption,' Signal Proc. Image comm., Vol.10, No.4, pp.279-290, Sept. 1997 https://doi.org/10.1016/S0923-5965(96)00025-2
  7. S. S. Maniccam, N. G. Bourbakis, 'SCAN Based Lossless Image Compression and Encryption,' IEEE Trans., Image Processing, Vol.3, No.5, pp.490-499, Sept. 1999 https://doi.org/10.1109/ICIIS.1999.810321
  8. E. Shusterman and M. Feder, 'Image Compression via Improved Quadtree Decomposition Algorithms,' IEEE Trans., Image Proc., Vol.3, No.2, pp.207-215, Mar. 1994 https://doi.org/10.1109/83.277901
  9. C. E. Shannon, 'Communication Theory of Secrecy System,' Bell Syst. Tech. Journal, Vol.28, pp.656-715, Oct. 1949
  10. M. E. Hellman, 'An Extension of the Shannon Theory Approach to Cryptography,' IEEE Trans., Info. Theory, IT-23, No.3, pp.289-294, May, 1977
  11. Y. Wang, 'A Set of Transformations for Lossless Image Compression,' IEEE Trans. Image Processing, Vol.4, No.5, pp.677-679, May, 1995 https://doi.org/10.1109/83.382501
  12. ISO/IEC JTC 1/SC 29/WG 1(1994) 'Call for Contributions Lossless Compression of Continuous-Tone Still Picture,' ISO Working Document ISO/ LEC/ JTC 1/SC29/ WG 1/N41
  13. X. Wu, 'Lossless Compression of Continuous-Tone Images via Context Selection, Quantization, and Modelling,' IEEE Trans. Image Processing, Vol.6, pp.656-664, May, 1997 https://doi.org/10.1109/83.568923
  14. L. Shen and R.M.Rangayyan, 'Improved Joint Bi-Level Image Experts Group Data Compression of Continuous Tone Image,' SPIE, Vol.2727, pp.54-65, Mar, 1996 https://doi.org/10.1117/12.233278
  15. H. Cheng and X. Li, 'Partial Encryption of Compressed Images and Videos,' IEEE Trans. Signal Processing, Vol. 48, No.8, pp.2439-2451, Aug., 2000 https://doi.org/10.1109/78.852023
  16. D. E. Knuth, 'The Art of Computer Programming: Fundamental Algorithms,' Vol.1, Addison-Wesley, 3rd Edition, 1997