{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T04:17:06Z","timestamp":1760242626715,"version":"build-2065373602"},"reference-count":26,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2017,12,21]],"date-time":"2017-12-21T00:00:00Z","timestamp":1513814400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J. Imaging"],"abstract":"<jats:p>We propose an integrated model of Block-Permutation-Based Encryption (BPBE) and Reversible Data Hiding (RDH). The BPBE scheme involves four processes for encryption, namely block scrambling, block-rotation\/inversion, negative-positive transformation and the color component shuffling. A Histogram Shifting (HS) method is adopted for RDH in our model. The proposed scheme can be well suitable for the hierarchical access control system, where the data can be accessed with the different access rights. This scheme encrypts R, G and B components independently. Therefore, we can generate similar output images from different input images. Additionally, the key derivation scheme also provides the security according to the different access rights. Our scheme is also resilient against brute-force attacks and Jigsaw Puzzle Solvers (JPSs). Furthermore, the compression performance is also not severely degraded using a standard lossless compression method.<\/jats:p>","DOI":"10.3390\/jimaging4010001","type":"journal-article","created":{"date-parts":[[2017,12,21]],"date-time":"2017-12-21T12:16:14Z","timestamp":1513858574000},"page":"1","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Integrated Model of Image Protection Techniques"],"prefix":"10.3390","volume":"4","author":[{"given":"Anu","family":"Aryal","sequence":"first","affiliation":[{"name":"Graduate School of Advanced Integration Science, Chiba University, Chiba 263-8522, Japan"}]},{"given":"Shoko","family":"Imaizumi","sequence":"additional","affiliation":[{"name":"Graduate School of Engineering, Chiba University, Chiba 263-8522, Japan"}]},{"given":"Takahiko","family":"Horiuchi","sequence":"additional","affiliation":[{"name":"Graduate School of Engineering, Chiba University, Chiba 263-8522, Japan"}]},{"given":"Hitoshi","family":"Kiya","sequence":"additional","affiliation":[{"name":"Faculty of System Design, Tokyo Metropolitan University, Tokyo 192-0364, Japan"}]}],"member":"1968","published-online":{"date-parts":[[2017,12,21]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"1673","DOI":"10.1109\/83.650120","article-title":"Secure spread spectrum watermarking for multimedia","volume":"6","author":"Cox","year":"1997","journal-title":"IEEE Trans. Image Process."},{"key":"ref_2","unstructured":"Tirkel, A.Z., Osborne, C.F., and Schyndel, R.G. (1996, January 25). Image watermarking-a spread spectrum application. Proceedings of the IEEE 4th International Symposium on Spread Spectrum Techniques and Applications, Mainz, Germany."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"578","DOI":"10.1117\/1.482612","article-title":"Invisible watermarking for image verification","volume":"7","author":"Yeung","year":"1998","journal-title":"Electron. Imaging"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Golijan, M., Fridrich, J.J., and Du, R. (2001, January 25\u201327). Distortion-free data embedding. Proceedings of the International Workshop on Information Hiding, Pittsburgh, PA, USA.","DOI":"10.1007\/3-540-45496-9_3"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"1646","DOI":"10.1049\/el:20021131","article-title":"Distortionless data hiding based on integer wavelet transform","volume":"38","author":"Xuan","year":"2002","journal-title":"IEEE Electron. Lett."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","article-title":"Reversible data embedding using a difference expansion","volume":"13","author":"Tian","year":"2003","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"721","DOI":"10.1109\/TIP.2006.891046","article-title":"Expansion embedding techniques for reversible watermarking","volume":"16","author":"Thodi","year":"2007","journal-title":"IEEE Trans. Image Process."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1109\/LSP.2014.2346989","article-title":"Reversible image data hiding with contrast enhancement","volume":"22","author":"Wu","year":"2015","journal-title":"IEEE Signal Process. Lett."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","article-title":"Reversible data hiding","volume":"16","author":"Ni","year":"2006","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Imaizumi, S., Ogasawara, T., and Kiya, H. (2017, January 12\u201314). Block-Permutation-Based-Encryption Scheme with Enhanced Color Scrambling. Proceedings of the 20th Scandinavian Conference on Image Analysis, Troms\u00f8, Norway.","DOI":"10.1007\/978-3-319-59126-1_47"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1587\/transinf.2016MUL0002","article-title":"An Encryption-then-Compression System for Lossless Image Compression Standards","volume":"E100-D","author":"Kurihara","year":"2017","journal-title":"IEICE Trans. Inf. Syst."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Watanabe, O., Uchida, A., Fukuhara, T., and Kiya, H. (2015, January 19\u201324). An Encryption-then-Compression System for JPEG 2000 Standard. Proceedings of the 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Brisbane, Australia.","DOI":"10.1109\/ICASSP.2015.7178165"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"2238","DOI":"10.1587\/transfun.E98.A.2238","article-title":"An Encryption-then-Compression System for JPEG\/Motion JPEG Standard","volume":"E98-A","author":"Kurihara","year":"2015","journal-title":"IEICE Trans. Fundam."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1109\/TIFS.2013.2291625","article-title":"Designing an efficient image encryption-then-compression system via prediction error clustering and random permutation","volume":"9","author":"Zhou","year":"2014","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Erkin, Z., Piva, A., Katzenbeisser, S., Lagendijk, R.L., Shokrollahi, J., Neven, G., and Barni, M. (2007). Protection and retrieval of encrypted multimedia content: When cryptography meets signal processing. EURASIP J. Inf. Secur., 2007.","DOI":"10.1186\/1687-417X-2007-078943"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"1097","DOI":"10.1109\/TIP.2009.2038773","article-title":"Efficient compression of encrypted grayscale images","volume":"19","author":"Liu","year":"2010","journal-title":"IEEE Trans. Image Process."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"2992","DOI":"10.1109\/TSP.2004.833860","article-title":"On compressing encrypted data","volume":"52","author":"Johnson","year":"2004","journal-title":"IEEE Trans. Signal Process."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Hu, R., Li, X., and Yang, B. (2014, January 4\u20139). A new lossy compression scheme for encrypted gray-scale images. Proceedings of the 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Florence, Italy.","DOI":"10.1109\/ICASSP.2014.6855035"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Yi, S., and Zhou, Y. (2017, January 17\u201320). Adaptive code embedding for reversible data hiding in encrypted images. Proceedings of the 2017 IEEE International Conference on Image Processing (ICIP), Beijing, China.","DOI":"10.1109\/ICIP.2017.8297098"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Chuman, T., Kurihara, K., and Kiya, H. (2017, January 10\u201314). Security evaluation for block scrambling-based ETC systems against extended jigsaw puzzle solver attacks. Proceedings of the 2017 IEEE International Conference on Multimedia and Expo (ICME), Hong Kong, China.","DOI":"10.1109\/ICME.2017.8019487"},{"key":"ref_21","unstructured":"International Organization for Standardization (1999). ISO\/ICE 14495-1:1999 Information Technology\u2014Lossless and Nearlossless Compression of Continuous-Tone Still Images Baseline, International Organization for Standardization."},{"key":"ref_22","unstructured":"(2017, September 06). Content-Based Image Retrieval Database. Available online: http:\/\/imagedatabase.cs.washington.edu\/groundtruth."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"1534","DOI":"10.1587\/elex.7.1534","article-title":"An efficient access control method for composite multimedia content","volume":"7","author":"Imaizumi","year":"2010","journal-title":"IEICE Electron. Express"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Gallagher, A. (2012, January 16\u201321). Jigsaw puzzles with pieces of unknown orientation. Proceedings of the 2012 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Providence, RI, USA.","DOI":"10.1109\/CVPR.2012.6247699"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Cho, T., Avidan, S., and Freeman, W. (2010, January 13\u201318). A probabilistic image jigsaw puzzle solvers. Proceedings of the 2010 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), San Francisco, CA, USA.","DOI":"10.1109\/CVPR.2010.5540212"},{"key":"ref_26","unstructured":"(2017, September 06). SIPI Database. Available online: http:\/\/sipi.usc.edu\/database."}],"container-title":["Journal of Imaging"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2313-433X\/4\/1\/1\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T18:54:51Z","timestamp":1760208891000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2313-433X\/4\/1\/1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,21]]},"references-count":26,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2018,1]]}},"alternative-id":["jimaging4010001"],"URL":"https:\/\/doi.org\/10.3390\/jimaging4010001","relation":{},"ISSN":["2313-433X"],"issn-type":[{"type":"electronic","value":"2313-433X"}],"subject":[],"published":{"date-parts":[[2017,12,21]]}}}