Compressing Encrypted Data: A Permutation Approach

被引:0
|
作者
Kang, Wei [1 ]
Liu, Nan [2 ]
机构
[1] Southeast Univ, Sch Informat Sci & Engn, Nanjing 210096, Jiangsu, Peoples R China
[2] Southeast Univ, Natl Mobile Commun Res Lab, Nanjing 210096, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In a system where it is necessary to perform both encryption and lossy compression, the conventional way is to compress first and then encrypt the compressed data. Furthermore, this separation proves to be optimal. In certain applications where sensitive information should be protected as early as possible, it is preferable to perform encryption first and then compress the encrypted data. We call this the reversed system. Johnson et al. proposed an achievability scheme for the reversed system that utilizes modulo-sum encryption followed by compression using Wyner-Ziv distributed source coding with side information. However, the scheme requires more compression rate and secrecy key rate than the conventional system that first compresses and then encrypts. In this paper, we propose a new achievability scheme for the reversed system where encryption is done using a permutation cipher and then the encrypted data is compressed using the optimal rate-distortion code. The proposed scheme can achieve the optimal compression rate and secret key rate, and therefore shows that reversing the order of encryption and compression does not lead to performance loss of an encryption-compression system.
引用
收藏
页码:1382 / 1386
页数:5
相关论文
共 50 条
  • [1] On compressing encrypted data
    Johnson, M
    Ishwar, P
    Prabhakaran, V
    Schonberg, D
    Ramchandran, K
    IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2004, 52 (10) : 2992 - 3006
  • [2] On compressing encrypted data without the encryption key
    Johnson, M
    Wagner, D
    Ramchandran, K
    THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2004, 2951 : 491 - 504
  • [3] Security of compressing encrypted sources
    Jakimoski, G.
    Subbalakshmi, K. P.
    CONFERENCE RECORD OF THE FORTY-FIRST ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS & COMPUTERS, VOLS 1-5, 2007, : 901 - 903
  • [4] Compressing Encrypted Data: Achieving Optimality and Strong Secrecy via Permutations
    Kang, Wei
    Liu, Nan
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2016, 62 (12) : 7153 - 7163
  • [5] Separable Reversible Data Hiding in Encrypted Image With Classification Permutation
    Yin, Bangxu
    Chen, Fan
    He, Hongjie
    Yan, Shu
    2017 IEEE THIRD INTERNATIONAL CONFERENCE ON MULTIMEDIA BIG DATA (BIGMM 2017), 2017, : 201 - 204
  • [6] SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES WITH HISTOGRAM PERMUTATION
    Fujiyoshi, Masaaki
    ELECTRONIC PROCEEDINGS OF THE 2013 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO WORKSHOPS (ICMEW), 2013,
  • [7] Compressing Encrypted Images With Auxiliary Information
    Zhang, Xinpeng
    Ren, Yanli
    Shen, Liquan
    Qian, Zhenxing
    Feng, Guorui
    IEEE TRANSACTIONS ON MULTIMEDIA, 2014, 16 (05) : 1327 - 1336
  • [8] Reversible Data Hiding in Encrypted Image Based on Block Classification Permutation
    Mo, Qun
    Yao, Heng
    Cao, Fang
    Chang, Zheng
    Qin, Chuan
    CMC-COMPUTERS MATERIALS & CONTINUA, 2019, 59 (01): : 119 - 133
  • [9] Fast Permutation Architecture on Encrypted Data for Secure Neural Network Inference
    Hu, Xiao
    Tian, Jing
    Wang, Zhongfeng
    APCCAS 2020: PROCEEDINGS OF THE 2020 IEEE ASIA PACIFIC CONFERENCE ON CIRCUITS AND SYSTEMS (APCCAS 2020), 2020, : 141 - 144
  • [10] Reversible Data Hiding in Permutation-based Encrypted Images with Strong Privacy
    Shiu, Chih-Wei
    Chen, Yu-Chi
    Hong, Wien
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2019, 13 (02): : 1020 - 1042