Commutative encryption and authentication for OpenEXR high dynamic range images

For the sake of image security, confidentiality and integrity are always the first two concerns and can be further guaranteed by image encryption and authentication techniques, respectively. However, traditional image encryption and authentication for low dynamic range (LDR) images are not suitable...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:Multimedia tools and applications Ročník 80; číslo 18; s. 27807 - 27828
Hlavní autoři: Chen, Tzung-Her, Yan, Jing-Ya
Médium: Journal Article
Jazyk:angličtina
Vydáno: New York Springer US 01.07.2021
Springer Nature B.V
Témata:
ISSN:1380-7501, 1573-7721
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract For the sake of image security, confidentiality and integrity are always the first two concerns and can be further guaranteed by image encryption and authentication techniques, respectively. However, traditional image encryption and authentication for low dynamic range (LDR) images are not suitable to protect high dynamic range (HDR) images directly. Thus, encryption and authentication of HDR images should be redesigned and tailor-made. In this paper, a commutative HDR image encryption and authentication scheme is proposed to protect the promising one of HDR image formats, i.e., OpenEXR. Each HDR pixel value, which is recorded by 16-bit half floating-point numbers in the chunks part of the OpenEXR file layout, is split into the confidentiality part and the integrity part of the images. The most significant part is encrypted for confidentiality and the least significant one is used to embed the authentication bits. The proposed scheme not only guarantees the confidentiality and integrity of HDR images but also achieves format-compliance. To the best of our knowledge, this is the first attempt of research in terms of commutative encryption and authentication to HDR images. It enables the convenience or flexibility of verifying the integrity before/after decryption such that the proposed scheme is practical in real applications. The experimental results and theoretical analyses demonstrate that the proposed scheme does work well.
AbstractList For the sake of image security, confidentiality and integrity are always the first two concerns and can be further guaranteed by image encryption and authentication techniques, respectively. However, traditional image encryption and authentication for low dynamic range (LDR) images are not suitable to protect high dynamic range (HDR) images directly. Thus, encryption and authentication of HDR images should be redesigned and tailor-made. In this paper, a commutative HDR image encryption and authentication scheme is proposed to protect the promising one of HDR image formats, i.e., OpenEXR. Each HDR pixel value, which is recorded by 16-bit half floating-point numbers in the chunks part of the OpenEXR file layout, is split into the confidentiality part and the integrity part of the images. The most significant part is encrypted for confidentiality and the least significant one is used to embed the authentication bits. The proposed scheme not only guarantees the confidentiality and integrity of HDR images but also achieves format-compliance. To the best of our knowledge, this is the first attempt of research in terms of commutative encryption and authentication to HDR images. It enables the convenience or flexibility of verifying the integrity before/after decryption such that the proposed scheme is practical in real applications. The experimental results and theoretical analyses demonstrate that the proposed scheme does work well.
Author Yan, Jing-Ya
Chen, Tzung-Her
Author_xml – sequence: 1
  givenname: Tzung-Her
  orcidid: 0000-0001-5775-6034
  surname: Chen
  fullname: Chen, Tzung-Her
  email: thchen@mail.ncyu.edu.tw
  organization: Computer Science and Information Engineering, National Chiayi University
– sequence: 2
  givenname: Jing-Ya
  surname: Yan
  fullname: Yan, Jing-Ya
  organization: Computer Science and Information Engineering, National Chiayi University
BookMark eNp9kE1LAzEQhoNUsFX_gKeA52g-NpvsUUr9gEJBFLyFNJu0W7rZNUmF_ffGriB46GmG4X1mhmcGJr7zFoAbgu8IxuI-EoILijAlKHeYouEMTAkXDAlByST3TGIkOCYXYBbjDmNSclpMwWrete0h6dR8WWi9CUOfms5D7WuoD2lrfWqMPo5cF-Cqt37x8Qq3zWYL68HrtjEwaL-xsGn1xsYrcO70Ptrr33oJ3h8Xb_NntFw9vcwflsgwUiVEtDNWV0bSyjgssKwZXXMtma7rQlRaO1kUZVWV2NDSSGwcqwXTfC3W0nBn2SW4Hff2ofs82JjUrjsEn08qynlRlowXNKfomDKhizFYp_qQ_wyDIlj9iFOjOJXFqaM4NWRI_oNMk44KUtDN_jTKRjTmO1lK-PvqBPUNdE-F6Q
CitedBy_id crossref_primary_10_3390_app13106208
crossref_primary_10_3390_app122412856
Cites_doi 10.1016/j.sigpro.2013.11.028
10.1109/ICICCS.2016.7542294
10.1109/83.718488
10.1109/TIFS.2011.2109383
10.1109/TII.2020.3028612
10.1109/ACCESS.2020.3011524
10.1007/s11042-020-08658-3
10.1007/s11042-019-08594-x
10.1109/TCSVT.2017.2758268
10.1016/j.image.2018.08.010
10.4324/9780080927015
10.1109/TNNLS.2015.2512849
10.1007/s11042-014-2279-5
10.1007/978-3-319-01796-9_19
10.1016/j.displa.2011.02.004
10.1109/ICIP.1996.560753
10.1080/10867651.1998.10487485
10.1109/IIH-MSP.2013.128
10.1109/ICIP.2013.6738932
10.1016/B978-0-08-050754-5.50025-6
10.1007/978-3-540-44433-6
10.1109/TCYB.2017.2682561
10.1145/272991.272995
10.3390/sym11020293
10.1145/2000486.2000489
10.1007/s11042-020-09237-2
10.1109/TIP.2017.2651366
10.1109/TIP.2014.2372473
10.1109/TMM.2016.2605499
ContentType Journal Article
Copyright The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021
The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021.
Copyright_xml – notice: The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021
– notice: The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021.
DBID AAYXX
CITATION
3V.
7SC
7WY
7WZ
7XB
87Z
8AL
8AO
8FD
8FE
8FG
8FK
8FL
8G5
ABUWG
AFKRA
ARAPS
AZQEC
BENPR
BEZIV
BGLVJ
CCPQU
DWQXO
FRNLG
F~G
GNUQQ
GUQSH
HCIFZ
JQ2
K60
K6~
K7-
L.-
L7M
L~C
L~D
M0C
M0N
M2O
MBDVC
P5Z
P62
PHGZM
PHGZT
PKEHL
PQBIZ
PQBZA
PQEST
PQGLB
PQQKQ
PQUKI
Q9U
DOI 10.1007/s11042-021-11002-y
DatabaseName CrossRef
ProQuest Central (Corporate)
Computer and Information Systems Abstracts
ABI/INFORM Collection
ABI/INFORM Global (PDF only)
ProQuest Central (purchase pre-March 2016)
ABI/INFORM Global (Alumni Edition)
Computing Database (Alumni Edition)
ProQuest Pharma Collection
Technology Research Database
ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Central (Alumni) (purchase pre-March 2016)
ABI/INFORM Collection (Alumni Edition)
Research Library (Alumni Edition)
ProQuest Central (Alumni Edition)
ProQuest Central UK/Ireland
Advanced Technologies & Computer Science Collection
ProQuest Central Essentials
ProQuest Central
Business Premium Collection
Technology Collection
ProQuest One Community College
ProQuest Central Korea
Business Premium Collection (Alumni)
ABI/INFORM Global (Corporate)
ProQuest Central Student
Research Library Prep
SciTech Premium Collection
ProQuest Computer Science Collection
ProQuest Business Collection (Alumni Edition)
ProQuest Business Collection
Computer Science Database
ABI/INFORM Professional Advanced
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
ABI/INFORM Global
Computing Database
Research Library
Research Library (Corporate)
Advanced Technologies & Aerospace Database
ProQuest Advanced Technologies & Aerospace Collection
ProQuest One Academic
ProQuest One Academic (New)
ProQuest One Academic Middle East (New)
ProQuest One Business
ProQuest One Business (Alumni)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic (retired)
ProQuest One Academic UKI Edition
ProQuest Central Basic
DatabaseTitle CrossRef
ABI/INFORM Global (Corporate)
ProQuest Business Collection (Alumni Edition)
ProQuest One Business
Research Library Prep
Computer Science Database
ProQuest Central Student
Technology Collection
Technology Research Database
Computer and Information Systems Abstracts – Academic
ProQuest One Academic Middle East (New)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
Research Library (Alumni Edition)
ProQuest Pharma Collection
ABI/INFORM Complete
ProQuest Central
ABI/INFORM Professional Advanced
ProQuest One Applied & Life Sciences
ProQuest Central Korea
ProQuest Research Library
ProQuest Central (New)
Advanced Technologies Database with Aerospace
ABI/INFORM Complete (Alumni Edition)
Advanced Technologies & Aerospace Collection
Business Premium Collection
ABI/INFORM Global
ProQuest Computing
ABI/INFORM Global (Alumni Edition)
ProQuest Central Basic
ProQuest Computing (Alumni Edition)
ProQuest One Academic Eastern Edition
ProQuest Technology Collection
ProQuest SciTech Collection
ProQuest Business Collection
Computer and Information Systems Abstracts Professional
Advanced Technologies & Aerospace Database
ProQuest One Academic UKI Edition
ProQuest One Business (Alumni)
ProQuest One Academic
ProQuest One Academic (New)
ProQuest Central (Alumni)
Business Premium Collection (Alumni)
DatabaseTitleList
ABI/INFORM Global (Corporate)
Database_xml – sequence: 1
  dbid: BENPR
  name: ProQuest Central
  url: https://www.proquest.com/central
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
EISSN 1573-7721
EndPage 27828
ExternalDocumentID 10_1007_s11042_021_11002_y
GroupedDBID -4Z
-59
-5G
-BR
-EM
-Y2
-~C
.4S
.86
.DC
.VR
06D
0R~
0VY
123
1N0
1SB
2.D
203
28-
29M
2J2
2JN
2JY
2KG
2LR
2P1
2VQ
2~H
30V
3EH
3V.
4.4
406
408
409
40D
40E
5QI
5VS
67Z
6NX
7WY
8AO
8FE
8FG
8FL
8G5
8UJ
95-
95.
95~
96X
AAAVM
AABHQ
AACDK
AAHNG
AAIAL
AAJBT
AAJKR
AANZL
AAOBN
AARHV
AARTL
AASML
AATNV
AATVU
AAUYE
AAWCG
AAYIU
AAYQN
AAYTO
AAYZH
ABAKF
ABBBX
ABBXA
ABDZT
ABECU
ABFTV
ABHLI
ABHQN
ABJNI
ABJOX
ABKCH
ABKTR
ABMNI
ABMQK
ABNWP
ABQBU
ABQSL
ABSXP
ABTEG
ABTHY
ABTKH
ABTMW
ABULA
ABUWG
ABWNU
ABXPI
ACAOD
ACBXY
ACDTI
ACGFO
ACGFS
ACHSB
ACHXU
ACKNC
ACMDZ
ACMLO
ACOKC
ACOMO
ACPIV
ACREN
ACSNA
ACZOJ
ADHHG
ADHIR
ADIMF
ADINQ
ADKNI
ADKPE
ADMLS
ADRFC
ADTPH
ADURQ
ADYFF
ADYOE
ADZKW
AEBTG
AEFIE
AEFQL
AEGAL
AEGNC
AEJHL
AEJRE
AEKMD
AEMSY
AENEX
AEOHA
AEPYU
AESKC
AETLH
AEVLU
AEXYK
AFBBN
AFEXP
AFGCZ
AFKRA
AFLOW
AFQWF
AFWTZ
AFYQB
AFZKB
AGAYW
AGDGC
AGGDS
AGJBK
AGMZJ
AGQEE
AGQMX
AGRTI
AGWIL
AGWZB
AGYKE
AHAVH
AHBYD
AHKAY
AHSBF
AHYZX
AIAKS
AIGIU
AIIXL
AILAN
AITGF
AJBLW
AJRNO
AJZVZ
ALMA_UNASSIGNED_HOLDINGS
ALWAN
AMKLP
AMTXH
AMXSW
AMYLF
AMYQR
AOCGG
ARAPS
ARCSS
ARMRJ
ASPBG
AVWKF
AXYYD
AYJHY
AZFZN
AZQEC
B-.
BA0
BBWZM
BDATZ
BENPR
BEZIV
BGLVJ
BGNMA
BPHCQ
BSONS
CAG
CCPQU
COF
CS3
CSCUP
DDRTE
DL5
DNIVK
DPUIP
DU5
DWQXO
EBLON
EBS
EIOEI
EJD
ESBYG
FEDTE
FERAY
FFXSO
FIGPU
FINBP
FNLPD
FRNLG
FRRFC
FSGXE
FWDCC
GGCAI
GGRSB
GJIRD
GNUQQ
GNWQR
GQ6
GQ7
GQ8
GROUPED_ABI_INFORM_COMPLETE
GUQSH
GXS
H13
HCIFZ
HF~
HG5
HG6
HMJXF
HQYDN
HRMNR
HVGLF
HZ~
I-F
I09
IHE
IJ-
IKXTQ
ITG
ITH
ITM
IWAJR
IXC
IXE
IZIGR
IZQ
I~X
I~Z
J-C
J0Z
JBSCW
JCJTX
JZLTJ
K60
K6V
K6~
K7-
KDC
KOV
KOW
LAK
LLZTM
M0C
M0N
M2O
M4Y
MA-
N2Q
N9A
NB0
NDZJH
NPVJJ
NQJWS
NU0
O9-
O93
O9G
O9I
O9J
OAM
OVD
P19
P2P
P62
P9O
PF0
PQBIZ
PQBZA
PQQKQ
PROAC
PT4
PT5
Q2X
QOK
QOS
R4E
R89
R9I
RHV
RNI
RNS
ROL
RPX
RSV
RZC
RZE
RZK
S16
S1Z
S26
S27
S28
S3B
SAP
SCJ
SCLPG
SCO
SDH
SDM
SHX
SISQX
SJYHP
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
STPWE
SZN
T13
T16
TEORI
TH9
TSG
TSK
TSV
TUC
TUS
U2A
UG4
UOJIU
UTJUX
UZXMN
VC2
VFIZW
W23
W48
WK8
YLTOR
Z45
Z7R
Z7S
Z7W
Z7X
Z7Y
Z7Z
Z81
Z83
Z86
Z88
Z8M
Z8N
Z8Q
Z8R
Z8S
Z8T
Z8U
Z8W
Z92
ZMTXR
~EX
AAPKM
AAYXX
ABBRH
ABDBE
ABFSG
ABRTQ
ACSTC
ADHKG
ADKFA
AEZWR
AFDZB
AFFHD
AFHIU
AFOHR
AGQPQ
AHPBZ
AHWEU
AIXLP
ATHPR
AYFIA
CITATION
PHGZM
PHGZT
PQGLB
7SC
7XB
8AL
8FD
8FK
JQ2
L.-
L7M
L~C
L~D
MBDVC
PKEHL
PQEST
PQUKI
Q9U
ID FETCH-LOGICAL-c319t-1afcea9c829cf0708d32b5a83add479aaf84469960c26c80cf3d73a5b7b8c5fe3
IEDL.DBID M0C
ISICitedReferencesCount 2
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000654112900001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1380-7501
IngestDate Tue Nov 04 23:35:50 EST 2025
Sat Nov 29 06:20:11 EST 2025
Tue Nov 18 22:24:17 EST 2025
Fri Feb 21 02:48:14 EST 2025
IsPeerReviewed true
IsScholarly true
Issue 18
Keywords OpenEXR
Image encryption
Commutative
High dynamic range image
Image authentication
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c319t-1afcea9c829cf0708d32b5a83add479aaf84469960c26c80cf3d73a5b7b8c5fe3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0001-5775-6034
PQID 2554663542
PQPubID 54626
PageCount 22
ParticipantIDs proquest_journals_2554663542
crossref_primary_10_1007_s11042_021_11002_y
crossref_citationtrail_10_1007_s11042_021_11002_y
springer_journals_10_1007_s11042_021_11002_y
PublicationCentury 2000
PublicationDate 20210700
2021-07-00
20210701
PublicationDateYYYYMMDD 2021-07-01
PublicationDate_xml – month: 7
  year: 2021
  text: 20210700
PublicationDecade 2020
PublicationPlace New York
PublicationPlace_xml – name: New York
– name: Dordrecht
PublicationSubtitle An International Journal
PublicationTitle Multimedia tools and applications
PublicationTitleAbbrev Multimed Tools Appl
PublicationYear 2021
Publisher Springer US
Springer Nature B.V
Publisher_xml – name: Springer US
– name: Springer Nature B.V
References YuCMWuKCWangCMA distortion-free data hiding scheme for high dynamic range imagesDisplays201132522523610.1016/j.displa.2011.02.004
Brooker D (2012) Essential CG lighting techniques with 3ds Max. CRC Press
Hoefflinger B (2007) High-dynamic-range (HDR) vision. Springer, Berlin Heidelberg
LiMTHuangNCWangCMA data hiding scheme for high dynamic range imagesInternational Journal of Innovative Computing Information and Control (IJICIC)201175A20212035
ChenTSChangCCHwangMSA virtual image cryptosystem based upon vector quantizationIEEE Trans Image Process199871014851488171799810.1109/83.718488
LoCCHuYCA novel reversible image authentication scheme for digital imagesSignal Process20149817418510.1016/j.sigpro.2013.11.028
Cryptography Stack Exchange, https://crypto.stackexchange.com/questions/9603/why-should-i-make-my-cipher-public. Accessed 31 January 2021
LaserSoft Imaging SilverFast, http://www.silverfast.com/. Accessed 31 January 2021
ZhangLYLiuYPareschiFZhangYWongKWRovattiRSettiGOn the security of a class of diffusion mechanisms for image encryptionIEEE Trans Cybern20174841163117510.1109/TCYB.2017.2682561
GongXChenLYuFZhaoXWangSA secure image authentication scheme based on dual fragile watermarkMultimed Tools Appl20207925180711808810.1007/s11042-019-08594-x
LiXSunXLiuQImage integrity authentication scheme based on fixed point theoryIEEE Trans Image Process201424263264533012591408.94974
Lin KS, Chen TH, Lin CH, Chang SS (2014) A tailor-made encryption scheme for high-dynamic range images, In genetic and evolutionary computing (pp. 183–192). Springer, Cham
NiuYZhouZZhangXAn image encryption approach based on chaotic maps and genetic operationsMultimed Tools Appl20207935256132563310.1007/s11042-020-09237-2
KahanWIEEE standard 754 for binary floating-point arithmeticLecture Notes on the Status of IEEE199675494720–177611
HuangYHuangLWangYPengYYuFShape synchronization in driver-response of 4-D chaotic system and its application in image encryptionIEEE Access2020813530813531910.1109/ACCESS.2020.3011524
Adobe Photoshop, http://www.adobe.com/. Accessed 31 January 2021
ChengYMWangCMA novel approach to steganography in high-dynamic-range imagesIEEE Comput Archit Lett200916037080
MatsumotoMNishimuraTMersenne twister: a 623-dimensionally equidistributed uniform pseudo-random number generatorACM Trans Model Comput Simul (TOMACS)19988133010.1145/272991.272995
Stallings W (2013) Cryptography and network security: principles and practice. Pearson, sixth edition.
ChangCCNguyenTSLinCCA new distortion-free data embedding scheme for high-dynamic range imagesMultimed Tools Appl201675114516310.1007/s11042-014-2279-5
LinYTWangCMChenWSLinFPLinWA novel data hiding algorithm for high dynamic range imagesIEEE Trans Multimed201619119621110.1109/TMM.2016.2605499
Yan, J. Y., Chen, T. H., & Lin, C. H. (2013, October). Encryption in high dynamic range images for RGBE format. In 2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (pp. 493-496). IEEE.
GuerriniFOkudaMAdamiNLeonardiRHigh dynamic range image watermarking robust against tone-mapping operatorsIEEE Trans Inform Forensics Secur20116228329510.1109/TIFS.2011.2109383
KhuranaMSinghHTwo level phase retrieval in fractional Hartley domain for secure image encryption and authentication using digital signaturesMultimed Tools Appl20207919139671398610.1007/s11042-020-08658-3
RajeshSPaulVMenonVGKhosraviMRA secure and efficient lightweight symmetric encryption scheme for transfer of text files between embedded IoT devicesSymmetry201911229310.3390/sym11020293
KwonHJLeeSHCAM-based HDR image reproduction using CA–TC decoupled JCh decompositionSignal Process Image Commun20197011310.1016/j.image.2018.08.010
NVIDA developer, https://developer.nvidia.com/high-dynamic-range-display-development. Accessed 31 January 2021
Reinhard E, Heidrich W, Debevec P, Pattanaik S, Ward G, Myszkowski K (2010) High dynamic range imaging: acquisition, display, and image-based lighting. Morgan Kaufmann
Ward G (1991) Real pixels. Graphic gems II, edited by J. Arvo, academic press, Boston, MA.
ChangCCNguyenTSLinCCDistortion-free data embedding scheme for high dynamic range imagesJ Electron Sci Technol20131112026
KamiliAHurrahNNParahSABhatGMMuhammadKDWFCAT: dual watermarking framework for industrial image authentication and tamper localizationIEEE Trans Indust Inform2020175108511710.1109/TII.2020.3028612
Anand, A., Raj, A., Kohli, R., & Bibhu, V. (2016, February). Proposed symmetric key cryptography algorithm for data security. In 2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH) (pp. 159-162). IEEE.
Kainz F, Bogart R, Stanczyk P (2009) Technical introduction to OpenEXR. Industrial light and magic, 21. ISO 690.
Voyatzis, G., & Pitas, I. (1996, September). Applications of toral automorphisms in image watermarking. In proceedings of 3rd IEEE International Conference on Image Processing (Vol. 2, pp. 237-240). IEEE.
Autodesk 3ds Max, https://www.autodesk.com/. Accessed 31 January 2021
MahmalatSAydınTOSmolicAPipelines for HDR video coding based on luminance independent chromaticity preprocessingIEEE Trans Circ Syst Video Technol201728123467347710.1109/TCSVT.2017.2758268
Yan J.Y., Jeng F.G. & Chen T.H. (2014) An image authentication scheme for high dynamic range images. Proceedings of the 5th international conference on systematic innovation (ICSI).
ChenTHChangSSImage encryption on HDR images for OpenEXR formatInt J Sci Eng2014441923
Autrusseau, F., & Goudia, D. (2013, September). Non linear hybrid watermarking for high dynamic range images. In 2013 IEEE International Conference on Image Processing (pp. 4527-4531). IEEE.
LiZWeiZWenCZhengJDetail-enhanced multi-scale exposure fusionIEEE Trans Image Process201726312431252362395510.1109/TIP.2017.2651366
ChenWHLuoSZhengWXImpulsive synchronization of reaction–diffusion neural networks with mixed delays and its application to image encryptionIEEE Trans Neural Netw Learning Syst201627122696271010.1109/TNNLS.2015.2512849
LarsonGWLogluv encoding for full-gamut, high-dynamic range imagesJournal of Graphics Tools199831153110.1080/10867651.1998.10487485
LinPYLeeJSChangCCProtecting the content integrity of digital imagery with fidelity preservationACM Trans Multimed Comput Commun Appl (TOMM)20117312010.1145/2000486.2000489
OpenEXR downloads, http://www.openexr.com/downloads.html. Accessed 31 January 2021
11002_CR40
11002_CR41
11002_CR42
YM Cheng (11002_CR11) 2009; 16
11002_CR3
11002_CR2
CC Chang (11002_CR7) 2016; 75
11002_CR23
11002_CR1
S Rajesh (11002_CR36) 2019; 11
YT Lin (11002_CR29) 2016; 19
M Matsumoto (11002_CR32) 1998; 8
11002_CR5
11002_CR4
S Mahmalat (11002_CR31) 2017; 28
X Li (11002_CR25) 2014; 24
A Kamili (11002_CR19) 2020; 17
MT Li (11002_CR24) 2011; 7
Z Li (11002_CR26) 2017; 26
M Khurana (11002_CR20) 2020; 79
CC Chang (11002_CR6) 2013; 11
GW Larson (11002_CR22) 1998; 3
11002_CR15
11002_CR37
11002_CR38
W Kahan (11002_CR17) 1996; 754
11002_CR39
Y Huang (11002_CR16) 2020; 8
11002_CR18
PY Lin (11002_CR27) 2011; 7
Y Niu (11002_CR33) 2020; 79
TH Chen (11002_CR8) 2014; 4
CC Lo (11002_CR30) 2014; 98
WH Chen (11002_CR10) 2016; 27
HJ Kwon (11002_CR21) 2019; 70
11002_CR12
11002_CR34
11002_CR35
TS Chen (11002_CR9) 1998; 7
X Gong (11002_CR13) 2020; 79
LY Zhang (11002_CR44) 2017; 48
11002_CR28
CM Yu (11002_CR43) 2011; 32
F Guerrini (11002_CR14) 2011; 6
References_xml – reference: LarsonGWLogluv encoding for full-gamut, high-dynamic range imagesJournal of Graphics Tools199831153110.1080/10867651.1998.10487485
– reference: Lin KS, Chen TH, Lin CH, Chang SS (2014) A tailor-made encryption scheme for high-dynamic range images, In genetic and evolutionary computing (pp. 183–192). Springer, Cham
– reference: YuCMWuKCWangCMA distortion-free data hiding scheme for high dynamic range imagesDisplays201132522523610.1016/j.displa.2011.02.004
– reference: Autodesk 3ds Max, https://www.autodesk.com/. Accessed 31 January 2021
– reference: ChangCCNguyenTSLinCCDistortion-free data embedding scheme for high dynamic range imagesJ Electron Sci Technol20131112026
– reference: Brooker D (2012) Essential CG lighting techniques with 3ds Max. CRC Press
– reference: LaserSoft Imaging SilverFast, http://www.silverfast.com/. Accessed 31 January 2021
– reference: Autrusseau, F., & Goudia, D. (2013, September). Non linear hybrid watermarking for high dynamic range images. In 2013 IEEE International Conference on Image Processing (pp. 4527-4531). IEEE.
– reference: NiuYZhouZZhangXAn image encryption approach based on chaotic maps and genetic operationsMultimed Tools Appl20207935256132563310.1007/s11042-020-09237-2
– reference: HuangYHuangLWangYPengYYuFShape synchronization in driver-response of 4-D chaotic system and its application in image encryptionIEEE Access2020813530813531910.1109/ACCESS.2020.3011524
– reference: Yan J.Y., Jeng F.G. & Chen T.H. (2014) An image authentication scheme for high dynamic range images. Proceedings of the 5th international conference on systematic innovation (ICSI).
– reference: OpenEXR downloads, http://www.openexr.com/downloads.html. Accessed 31 January 2021
– reference: RajeshSPaulVMenonVGKhosraviMRA secure and efficient lightweight symmetric encryption scheme for transfer of text files between embedded IoT devicesSymmetry201911229310.3390/sym11020293
– reference: Reinhard E, Heidrich W, Debevec P, Pattanaik S, Ward G, Myszkowski K (2010) High dynamic range imaging: acquisition, display, and image-based lighting. Morgan Kaufmann
– reference: Kainz F, Bogart R, Stanczyk P (2009) Technical introduction to OpenEXR. Industrial light and magic, 21. ISO 690.
– reference: KhuranaMSinghHTwo level phase retrieval in fractional Hartley domain for secure image encryption and authentication using digital signaturesMultimed Tools Appl20207919139671398610.1007/s11042-020-08658-3
– reference: KwonHJLeeSHCAM-based HDR image reproduction using CA–TC decoupled JCh decompositionSignal Process Image Commun20197011310.1016/j.image.2018.08.010
– reference: Voyatzis, G., & Pitas, I. (1996, September). Applications of toral automorphisms in image watermarking. In proceedings of 3rd IEEE International Conference on Image Processing (Vol. 2, pp. 237-240). IEEE.
– reference: ChenTHChangSSImage encryption on HDR images for OpenEXR formatInt J Sci Eng2014441923
– reference: LiZWeiZWenCZhengJDetail-enhanced multi-scale exposure fusionIEEE Trans Image Process201726312431252362395510.1109/TIP.2017.2651366
– reference: ZhangLYLiuYPareschiFZhangYWongKWRovattiRSettiGOn the security of a class of diffusion mechanisms for image encryptionIEEE Trans Cybern20174841163117510.1109/TCYB.2017.2682561
– reference: Yan, J. Y., Chen, T. H., & Lin, C. H. (2013, October). Encryption in high dynamic range images for RGBE format. In 2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (pp. 493-496). IEEE.
– reference: MatsumotoMNishimuraTMersenne twister: a 623-dimensionally equidistributed uniform pseudo-random number generatorACM Trans Model Comput Simul (TOMACS)19988133010.1145/272991.272995
– reference: GuerriniFOkudaMAdamiNLeonardiRHigh dynamic range image watermarking robust against tone-mapping operatorsIEEE Trans Inform Forensics Secur20116228329510.1109/TIFS.2011.2109383
– reference: Ward G (1991) Real pixels. Graphic gems II, edited by J. Arvo, academic press, Boston, MA.
– reference: LinYTWangCMChenWSLinFPLinWA novel data hiding algorithm for high dynamic range imagesIEEE Trans Multimed201619119621110.1109/TMM.2016.2605499
– reference: LoCCHuYCA novel reversible image authentication scheme for digital imagesSignal Process20149817418510.1016/j.sigpro.2013.11.028
– reference: Adobe Photoshop, http://www.adobe.com/. Accessed 31 January 2021
– reference: KahanWIEEE standard 754 for binary floating-point arithmeticLecture Notes on the Status of IEEE199675494720–177611
– reference: Hoefflinger B (2007) High-dynamic-range (HDR) vision. Springer, Berlin Heidelberg
– reference: GongXChenLYuFZhaoXWangSA secure image authentication scheme based on dual fragile watermarkMultimed Tools Appl20207925180711808810.1007/s11042-019-08594-x
– reference: ChangCCNguyenTSLinCCA new distortion-free data embedding scheme for high-dynamic range imagesMultimed Tools Appl201675114516310.1007/s11042-014-2279-5
– reference: ChenWHLuoSZhengWXImpulsive synchronization of reaction–diffusion neural networks with mixed delays and its application to image encryptionIEEE Trans Neural Netw Learning Syst201627122696271010.1109/TNNLS.2015.2512849
– reference: Cryptography Stack Exchange, https://crypto.stackexchange.com/questions/9603/why-should-i-make-my-cipher-public. Accessed 31 January 2021
– reference: NVIDA developer, https://developer.nvidia.com/high-dynamic-range-display-development. Accessed 31 January 2021
– reference: ChenTSChangCCHwangMSA virtual image cryptosystem based upon vector quantizationIEEE Trans Image Process199871014851488171799810.1109/83.718488
– reference: ChengYMWangCMA novel approach to steganography in high-dynamic-range imagesIEEE Comput Archit Lett200916037080
– reference: LiXSunXLiuQImage integrity authentication scheme based on fixed point theoryIEEE Trans Image Process201424263264533012591408.94974
– reference: LiMTHuangNCWangCMA data hiding scheme for high dynamic range imagesInternational Journal of Innovative Computing Information and Control (IJICIC)201175A20212035
– reference: LinPYLeeJSChangCCProtecting the content integrity of digital imagery with fidelity preservationACM Trans Multimed Comput Commun Appl (TOMM)20117312010.1145/2000486.2000489
– reference: MahmalatSAydınTOSmolicAPipelines for HDR video coding based on luminance independent chromaticity preprocessingIEEE Trans Circ Syst Video Technol201728123467347710.1109/TCSVT.2017.2758268
– reference: Stallings W (2013) Cryptography and network security: principles and practice. Pearson, sixth edition.
– reference: KamiliAHurrahNNParahSABhatGMMuhammadKDWFCAT: dual watermarking framework for industrial image authentication and tamper localizationIEEE Trans Indust Inform2020175108511710.1109/TII.2020.3028612
– reference: Anand, A., Raj, A., Kohli, R., & Bibhu, V. (2016, February). Proposed symmetric key cryptography algorithm for data security. In 2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH) (pp. 159-162). IEEE.
– volume: 98
  start-page: 174
  year: 2014
  ident: 11002_CR30
  publication-title: Signal Process
  doi: 10.1016/j.sigpro.2013.11.028
– ident: 11002_CR2
  doi: 10.1109/ICICCS.2016.7542294
– volume: 7
  start-page: 1485
  issue: 10
  year: 1998
  ident: 11002_CR9
  publication-title: IEEE Trans Image Process
  doi: 10.1109/83.718488
– volume: 6
  start-page: 283
  issue: 2
  year: 2011
  ident: 11002_CR14
  publication-title: IEEE Trans Inform Forensics Secur
  doi: 10.1109/TIFS.2011.2109383
– volume: 17
  start-page: 5108
  year: 2020
  ident: 11002_CR19
  publication-title: IEEE Trans Indust Inform
  doi: 10.1109/TII.2020.3028612
– volume: 8
  start-page: 135308
  year: 2020
  ident: 11002_CR16
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2020.3011524
– volume: 79
  start-page: 13967
  issue: 19
  year: 2020
  ident: 11002_CR20
  publication-title: Multimed Tools Appl
  doi: 10.1007/s11042-020-08658-3
– ident: 11002_CR12
– ident: 11002_CR37
– volume: 79
  start-page: 18071
  issue: 25
  year: 2020
  ident: 11002_CR13
  publication-title: Multimed Tools Appl
  doi: 10.1007/s11042-019-08594-x
– volume: 28
  start-page: 3467
  issue: 12
  year: 2017
  ident: 11002_CR31
  publication-title: IEEE Trans Circ Syst Video Technol
  doi: 10.1109/TCSVT.2017.2758268
– volume: 11
  start-page: 20
  issue: 1
  year: 2013
  ident: 11002_CR6
  publication-title: J Electron Sci Technol
– ident: 11002_CR35
– volume: 70
  start-page: 1
  year: 2019
  ident: 11002_CR21
  publication-title: Signal Process Image Commun
  doi: 10.1016/j.image.2018.08.010
– volume: 754
  start-page: 11
  issue: 94720–1776
  year: 1996
  ident: 11002_CR17
  publication-title: Lecture Notes on the Status of IEEE
– ident: 11002_CR42
– ident: 11002_CR5
  doi: 10.4324/9780080927015
– volume: 7
  start-page: 2021
  issue: 5A
  year: 2011
  ident: 11002_CR24
  publication-title: International Journal of Innovative Computing Information and Control (IJICIC)
– ident: 11002_CR23
– ident: 11002_CR3
– ident: 11002_CR1
– volume: 27
  start-page: 2696
  issue: 12
  year: 2016
  ident: 11002_CR10
  publication-title: IEEE Trans Neural Netw Learning Syst
  doi: 10.1109/TNNLS.2015.2512849
– volume: 75
  start-page: 145
  issue: 1
  year: 2016
  ident: 11002_CR7
  publication-title: Multimed Tools Appl
  doi: 10.1007/s11042-014-2279-5
– ident: 11002_CR28
  doi: 10.1007/978-3-319-01796-9_19
– volume: 32
  start-page: 225
  issue: 5
  year: 2011
  ident: 11002_CR43
  publication-title: Displays
  doi: 10.1016/j.displa.2011.02.004
– ident: 11002_CR39
  doi: 10.1109/ICIP.1996.560753
– volume: 4
  start-page: 19
  issue: 4
  year: 2014
  ident: 11002_CR8
  publication-title: Int J Sci Eng
– volume: 3
  start-page: 15
  issue: 1
  year: 1998
  ident: 11002_CR22
  publication-title: Journal of Graphics Tools
  doi: 10.1080/10867651.1998.10487485
– ident: 11002_CR41
  doi: 10.1109/IIH-MSP.2013.128
– ident: 11002_CR18
– ident: 11002_CR4
  doi: 10.1109/ICIP.2013.6738932
– ident: 11002_CR34
– ident: 11002_CR40
  doi: 10.1016/B978-0-08-050754-5.50025-6
– ident: 11002_CR15
  doi: 10.1007/978-3-540-44433-6
– ident: 11002_CR38
– volume: 48
  start-page: 1163
  issue: 4
  year: 2017
  ident: 11002_CR44
  publication-title: IEEE Trans Cybern
  doi: 10.1109/TCYB.2017.2682561
– volume: 8
  start-page: 3
  issue: 1
  year: 1998
  ident: 11002_CR32
  publication-title: ACM Trans Model Comput Simul (TOMACS)
  doi: 10.1145/272991.272995
– volume: 11
  start-page: 293
  issue: 2
  year: 2019
  ident: 11002_CR36
  publication-title: Symmetry
  doi: 10.3390/sym11020293
– volume: 7
  start-page: 1
  issue: 3
  year: 2011
  ident: 11002_CR27
  publication-title: ACM Trans Multimed Comput Commun Appl (TOMM)
  doi: 10.1145/2000486.2000489
– volume: 79
  start-page: 25613
  issue: 35
  year: 2020
  ident: 11002_CR33
  publication-title: Multimed Tools Appl
  doi: 10.1007/s11042-020-09237-2
– volume: 16
  start-page: 70
  issue: 03
  year: 2009
  ident: 11002_CR11
  publication-title: IEEE Comput Archit Lett
– volume: 26
  start-page: 1243
  issue: 3
  year: 2017
  ident: 11002_CR26
  publication-title: IEEE Trans Image Process
  doi: 10.1109/TIP.2017.2651366
– volume: 24
  start-page: 632
  issue: 2
  year: 2014
  ident: 11002_CR25
  publication-title: IEEE Trans Image Process
  doi: 10.1109/TIP.2014.2372473
– volume: 19
  start-page: 196
  issue: 1
  year: 2016
  ident: 11002_CR29
  publication-title: IEEE Trans Multimed
  doi: 10.1109/TMM.2016.2605499
SSID ssj0016524
Score 2.2636702
Snippet For the sake of image security, confidentiality and integrity are always the first two concerns and can be further guaranteed by image encryption and...
SourceID proquest
crossref
springer
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 27807
SubjectTerms Computer Communication Networks
Computer Science
Confidentiality
Data Structures and Information Theory
Dynamic range
Encryption
Floating point arithmetic
Integrity
Multimedia Information Systems
Special Purpose and Application-Based Systems
SummonAdditionalLinks – databaseName: Springer LINK
  dbid: RSV
  link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3PS8MwFH7o9KAHp1NxOiUHbxpYk7ZJjyIbnqbMH-xW0jSBgVZpq7D_3iRLNxUV9Nw0hJe8H22-930Ap6aIIEmgA8yojnEYyggnQkeYxyrKTMZQTIVObIKNRnwySW58U1jVoN2bK0kXqZfNboFtJbGQAktzRvBsFdZMuuNWsGF8-7C4O4gjL2XL-9jkw8C3ynw_x-d0tKwxv1yLumwzbP9vnduw5atLdDE_DjuwoooOtBvlBuQduQObH2gId-HadYnUjgIcmQHlzMURJIocCYuAL2r_Zw-ZEhdZDMpgMkaW6Rjlc0V7VNomBTR9MuGp2oP74eDu8gp7oQUsjQfWOBBaKpFIThKpTQzgOSVZJDg1wS9kiRCam69Gy-MiSSx5X2qaMyqijGXcotXoPrSK50IdANImIIg4kZJmcaiVFpJJzS2-inGaMdGFoLF3Kj0LuRXDeEyX_MnWfqmxX-rsl866cLZ452XOwfHr6F6zjan3xyolFoxnaquQdOG82bbl459nO_zb8CPYIHbnHZ63B626fFXHsC7f6mlVnrhz-g4OeuJM
  priority: 102
  providerName: Springer Nature
Title Commutative encryption and authentication for OpenEXR high dynamic range images
URI https://link.springer.com/article/10.1007/s11042-021-11002-y
https://www.proquest.com/docview/2554663542
Volume 80
WOSCitedRecordID wos000654112900001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAVX
  databaseName: SpringerLINK Contemporary 1997-Present
  customDbUrl:
  eissn: 1573-7721
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0016524
  issn: 1380-7501
  databaseCode: RSV
  dateStart: 19970101
  isFulltext: true
  titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22
  providerName: Springer Nature
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LS8QwEB509aAH3-L6WHLwpsFt-kh6EpUVQVyX9bV6KWnagKB13a3C_nsz2dRVQS9eAqVpKJ1kZpp8830AuyaJYLGnPcp9HdEgUCGNpQ6piPIwNREj53lgxSZ4uy16vbjjNtyGDlZZ-UTrqLMXhXvkBwzhVCY6Buyw_0pRNQpPV52ExjTMYGaDkL6L5snnKUIUOlFb0aQmMnquaGZcOudhYQoCFJA0jdHR98A0yTZ_HJDauHO6-N83XoIFl3GSo_EUWYapvFiBxUrNgbjFvQLzX6gJV-HSVo6UlhacmA6DkfUtRBYZkYiKL0q320dM2ksQl9LqdQmyH5NsrHJPBli4QB6fjcsarsHNaev65Iw68QWqzKosqSe1ymWsBIuVNn5BZD5LQyl84xADHkuphfmTRG4XxSIlmkr7GfdlmPJUIILNX4da8VLkG0C0cRIyipXy0yjQuZaKKy0Qc8WFn3JZB6_68olyzOQokPGUTDiV0VqJsVZirZWM6rD3-Ux_zMvxZ-_tykSJW6PDZGKfOuxXRp7c_n20zb9H24I5hvPKYnq3oVYO3vIdmFXv5eNw0IBpfnffgJnjVrvTNVfnnDbsrMWWXZq2Ez6Ytnt1-wFgmfIj
linkProvider ProQuest
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V3Pb9MwFH7axqSNA9vK0Apj84GdwFpjJ7FzQAjBqlYtBaEi9RYcx5Yq0Wy0AZR_ir8RPzdpYRK79bBzHEuJv_fD9ve-B_DCJREsCWxABbcxDUMd0UTZiMrYRJmLGEaY0DebEKORnEyST1vwu6mFQVpl4xO9o86vNZ6RXzKkU7noGLI3N98pdo3C29WmhcYSFgNT_XJbtsXr_nu3vheMda_G73q07ipAtYNbSQNltVGJlizR1gFe5pxlkZLcWXooEqWsdFskFC3RLNayoy3PBVdRJjKJ1Czu5t2GByGXAu1qIOjq1iKO6ia6skNdJA7qIp1lqV6AhTBIiECRNkarfwPhOru9dSHr41z34L79oUN4VGfU5O3SBI5gyxQtOGi6VZDaebXg4V_Si4_ho6-MKb3sOXED5pX3nUQVOVHI-i_K-jSTuLSeIO_mavKZoLozyatCzaaazLEwg0xnziUvjuHLRj7yCewU14U5AWKdE1RxojXP4tAaq7TQViKnTEieCdWGoFnpVNfK69gA5Fu61oxGdKQOHalHR1q14eXqnZul7sido08bSKS1D1qkazy04VUDqvXj_8_29O7ZzmGvN_4wTIf90eAZ7DPEtOcvn8JOOf9hnsOu_llOF_Mzbx0Evm4abH8ABxJKpg
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V3PTxQxFH5BNEQOooBhFbUHOWGzTOdHOwdjjLCRYNaNwWTDZex02mQTGGB3gMy_5l_ne90OqyZy4-B5Ok1m-r0fbb_3PYC3mESIPHIRl7HLeJKYlOfapVxlNi0xYlhpE99sQg6HajzOR0vws6uFIVpl5xO9o67ODZ2R9wXRqTA6JqLvAi1itD_4cHHJqYMU3bR27TTmEDmy7Q1u32bvD_dxrXeEGBwcf_rMQ4cBbhB6DY-0M1bnRoncOAS_qmJRplrFaPWJzLV2CrdLJGBiRGbUnnFxJWOdlrJURNOKcd4H8FDiGKITjtKT2xuMLA0NddUex6gchYKdedleREUxRI4gwTbB2z-D4iLT_ety1se8wdr__LeewpOQabOPc9N4Bku2Xoe1rosFC05tHVZ_k2TcgK--YqbxcugMB0xb71OZriumqRqgbsIpJ8N0nxEf52D8jZHqM6vaWp9NDJtSwQabnKGrnm3C93v5yOewXJ_XdguYQ-eos9yYuMwSZ5020jhFXDOp4lLqHkTdqhcmKLJTY5DTYqElTUgpECmFR0rR9mD39p2LuR7JnaO3O3gUwTfNigU2evCuA9ji8b9ne3H3bG9gBTFWfDkcHr2Ex4Lg7WnN27DcTK_sK3hkrpvJbPraGwqDH_eNtV8VZlPK
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Commutative+encryption+and+authentication+for+OpenEXR+high+dynamic+range+images&rft.jtitle=Multimedia+tools+and+applications&rft.au=Chen%2C+Tzung-Her&rft.au=Yan%2C+Jing-Ya&rft.date=2021-07-01&rft.issn=1380-7501&rft.eissn=1573-7721&rft.volume=80&rft.issue=18&rft.spage=27807&rft.epage=27828&rft_id=info:doi/10.1007%2Fs11042-021-11002-y&rft.externalDBID=n%2Fa&rft.externalDocID=10_1007_s11042_021_11002_y
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1380-7501&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1380-7501&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1380-7501&client=summon