Security Improvements of JPEG Images Using Image De-Identification
-
Published:2024-04-02
Issue:7
Volume:13
Page:1332
-
ISSN:2079-9292
-
Container-title:Electronics
-
language:en
-
Short-container-title:Electronics
Author:
Kang Ho-Seok1, Cha Seongjun2, Kim Sung-Ryul3ORCID
Affiliation:
1. Institute for Ubiquitous Information Technology and Applications (UbiTA), Konkuk University, Seoul 05029, Republic of Korea 2. INTHESMART (iTS) Corporation, Seoul 03082, Republic of Korea 3. Department of Computer Engineering, Konkuk University, Seoul 05029, Republic of Korea
Abstract
Today, as data is easily exposed through various channels, such as storing data in cloud services or exchanging data through a SNS (Social Network Service), related privacy issues are receiving a significant amount of attention. In addition, for data that are more sensitive to personal information, such as medical images, more attention should be paid to privacy protection. De-identification is a common method for privacy protection. Typically, it is a method of deleting or masking individual identifiers and omitting quasi-identifiers such as birth dates. In the case of images, de-identification is performed by mosaic processing or applying various effects. In this paper, we present a method of de-identifying an image by encrypting only some of the data in the JPEG (Joint Photograph Experts Group) image format, one of the most common image compression formats, so that the entire image cannot be recognized. The purpose of this paper is to protect images by encrypting only small parts, and not the entire image. This work is suitable for the fast and safe transmission and verification of high-capacity images. We have shown that images can be de-identified by encrypting data from the DHT (Define Huffman Table) segment among the JPEG header segments. Through experiments, we confirmed that that these images could not be identified after encrypting only a minimal portion, compared to previous studies that encrypted entire images, and the encryption speed and decryption speed were also faster and more effective than the results of previous studies. A model was implemented to de-identify images using AES-256 (Advanced Encryption Standard-256) and symmetric key encryption algorithm in the Huffman tables of JPEG headers, resulting in the ability to render entire images unidentifiable quickly and effectively.
Funder
Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education
Reference22 articles.
1. Overview on personal information de-identification based on big data;Kim;Rev. Korean Soc. Internet Inf.,2015 2. A Modified AES Based Algorithm for Image Encryption;Zeghid;Int. J. Comput. Sci. Eng.,2007 3. Singh, A., Agarwal, P., and Chand, M. (2019, January 25–26). Image Encryption and Analysis using Dynamic AES. Proceedings of the IEEE International Conference on Optimization and Applications (ICOA), Kenitra, Morocco. 4. Daemen, J., and Rijmen, V. (2002). The Design pf Rijndael: The Advanced Encryption Standard (AES), Springer. 5. Dworkin, M.J., Barker, E.B., Nechvatal, J.R., Foti, J., Bassham, L.E., Roback, E., and Dray, J.F. (2001). Advanced Encryption Standard (AES), National Institute of Standards and Technology. Federal Inf. Process. Stds. (NIST FIPS)—197.
|
|