A Content-Adaptive Joint Image Compression and Encryption Scheme

Peiya Li, Kwok Tung Lo

Research output: Journal article publicationJournal articleAcademic researchpeer-review

65 Citations (Scopus)


IEEE For joint image compression and encryption schemes, the encryption power and compression efficiency are commonly two contradictory things. In this paper, we propose a new joint image compression and encryption scheme based on lossy JPEG standard, which aims at encryption power's enhancement, on the premise of maintaining JPEG's compression efficiency. The proposed scheme is image-content-adaptive, since the secret encryption key is generated from the plain-image using BLAKE2 hash algorithm. Three encryption operations are contained in our scheme, alternating new orthogonal transforms transformation, DC coefficients encryption, and AC coefficients encryption. To save the cost for transmitting different encryption keys each time to decoder for decryption when plain-image changes, we propose to embed the encryption key into the entropy encoded bitstream of some AC coefficients, and the whole embedding procedure is controlled by another secret key called embedding key. Extensive experiments are conducted to show that our encryption scheme is JPEG friendly, and has good confusion and diffusion properties. Detailed security analysis is also given to illustrate the proposed scheme's persistence to various cryptanalysis strategies.
Original languageEnglish
Article number10.1109/TMM.2017.2786860
Pages (from-to)1960-1972
Number of pages13
JournalIEEE Transactions on Multimedia
Publication statusPublished - 1 Aug 2018


  • data embedding
  • Encryption
  • Image coding
  • Image encryption
  • orthogonal transforms
  • security analysis
  • Standards
  • Transform coding
  • Transforms

ASJC Scopus subject areas

  • Signal Processing
  • Media Technology
  • Computer Science Applications
  • Electrical and Electronic Engineering


Dive into the research topics of 'A Content-Adaptive Joint Image Compression and Encryption Scheme'. Together they form a unique fingerprint.

Cite this