Commutative encryption and authentication for OpenEXR high dynamic range images
For the sake of image security, confidentiality and integrity are always the first two concerns and can be further guaranteed by image encryption and authentication techniques, respectively. However, traditional image encryption and authentication for low dynamic range (LDR) images are not suitable...
Uloženo v:
| Vydáno v: | Multimedia tools and applications Ročník 80; číslo 18; s. 27807 - 27828 |
|---|---|
| Hlavní autoři: | , |
| Médium: | Journal Article |
| Jazyk: | angličtina |
| Vydáno: |
New York
Springer US
01.07.2021
Springer Nature B.V |
| Témata: | |
| ISSN: | 1380-7501, 1573-7721 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | For the sake of image security, confidentiality and integrity are always the first two concerns and can be further guaranteed by image encryption and authentication techniques, respectively. However, traditional image encryption and authentication for low dynamic range (LDR) images are not suitable to protect high dynamic range (HDR) images directly. Thus, encryption and authentication of HDR images should be redesigned and tailor-made. In this paper, a commutative HDR image encryption and authentication scheme is proposed to protect the promising one of HDR image formats, i.e., OpenEXR. Each HDR pixel value, which is recorded by 16-bit half floating-point numbers in the chunks part of the OpenEXR file layout, is split into the confidentiality part and the integrity part of the images. The most significant part is encrypted for confidentiality and the least significant one is used to embed the authentication bits. The proposed scheme not only guarantees the confidentiality and integrity of HDR images but also achieves format-compliance. To the best of our knowledge, this is the first attempt of research in terms of commutative encryption and authentication to HDR images. It enables the convenience or flexibility of verifying the integrity before/after decryption such that the proposed scheme is practical in real applications. The experimental results and theoretical analyses demonstrate that the proposed scheme does work well. |
|---|---|
| AbstractList | For the sake of image security, confidentiality and integrity are always the first two concerns and can be further guaranteed by image encryption and authentication techniques, respectively. However, traditional image encryption and authentication for low dynamic range (LDR) images are not suitable to protect high dynamic range (HDR) images directly. Thus, encryption and authentication of HDR images should be redesigned and tailor-made. In this paper, a commutative HDR image encryption and authentication scheme is proposed to protect the promising one of HDR image formats, i.e., OpenEXR. Each HDR pixel value, which is recorded by 16-bit half floating-point numbers in the chunks part of the OpenEXR file layout, is split into the confidentiality part and the integrity part of the images. The most significant part is encrypted for confidentiality and the least significant one is used to embed the authentication bits. The proposed scheme not only guarantees the confidentiality and integrity of HDR images but also achieves format-compliance. To the best of our knowledge, this is the first attempt of research in terms of commutative encryption and authentication to HDR images. It enables the convenience or flexibility of verifying the integrity before/after decryption such that the proposed scheme is practical in real applications. The experimental results and theoretical analyses demonstrate that the proposed scheme does work well. |
| Author | Yan, Jing-Ya Chen, Tzung-Her |
| Author_xml | – sequence: 1 givenname: Tzung-Her orcidid: 0000-0001-5775-6034 surname: Chen fullname: Chen, Tzung-Her email: thchen@mail.ncyu.edu.tw organization: Computer Science and Information Engineering, National Chiayi University – sequence: 2 givenname: Jing-Ya surname: Yan fullname: Yan, Jing-Ya organization: Computer Science and Information Engineering, National Chiayi University |
| BookMark | eNp9kE1LAzEQhoNUsFX_gKeA52g-NpvsUUr9gEJBFLyFNJu0W7rZNUmF_ffGriB46GmG4X1mhmcGJr7zFoAbgu8IxuI-EoILijAlKHeYouEMTAkXDAlByST3TGIkOCYXYBbjDmNSclpMwWrete0h6dR8WWi9CUOfms5D7WuoD2lrfWqMPo5cF-Cqt37x8Qq3zWYL68HrtjEwaL-xsGn1xsYrcO70Ptrr33oJ3h8Xb_NntFw9vcwflsgwUiVEtDNWV0bSyjgssKwZXXMtma7rQlRaO1kUZVWV2NDSSGwcqwXTfC3W0nBn2SW4Hff2ofs82JjUrjsEn08qynlRlowXNKfomDKhizFYp_qQ_wyDIlj9iFOjOJXFqaM4NWRI_oNMk44KUtDN_jTKRjTmO1lK-PvqBPUNdE-F6Q |
| CitedBy_id | crossref_primary_10_3390_app13106208 crossref_primary_10_3390_app122412856 |
| Cites_doi | 10.1016/j.sigpro.2013.11.028 10.1109/ICICCS.2016.7542294 10.1109/83.718488 10.1109/TIFS.2011.2109383 10.1109/TII.2020.3028612 10.1109/ACCESS.2020.3011524 10.1007/s11042-020-08658-3 10.1007/s11042-019-08594-x 10.1109/TCSVT.2017.2758268 10.1016/j.image.2018.08.010 10.4324/9780080927015 10.1109/TNNLS.2015.2512849 10.1007/s11042-014-2279-5 10.1007/978-3-319-01796-9_19 10.1016/j.displa.2011.02.004 10.1109/ICIP.1996.560753 10.1080/10867651.1998.10487485 10.1109/IIH-MSP.2013.128 10.1109/ICIP.2013.6738932 10.1016/B978-0-08-050754-5.50025-6 10.1007/978-3-540-44433-6 10.1109/TCYB.2017.2682561 10.1145/272991.272995 10.3390/sym11020293 10.1145/2000486.2000489 10.1007/s11042-020-09237-2 10.1109/TIP.2017.2651366 10.1109/TIP.2014.2372473 10.1109/TMM.2016.2605499 |
| ContentType | Journal Article |
| Copyright | The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021 The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021. |
| Copyright_xml | – notice: The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021 – notice: The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021. |
| DBID | AAYXX CITATION 3V. 7SC 7WY 7WZ 7XB 87Z 8AL 8AO 8FD 8FE 8FG 8FK 8FL 8G5 ABUWG AFKRA ARAPS AZQEC BENPR BEZIV BGLVJ CCPQU DWQXO FRNLG F~G GNUQQ GUQSH HCIFZ JQ2 K60 K6~ K7- L.- L7M L~C L~D M0C M0N M2O MBDVC P5Z P62 PHGZM PHGZT PKEHL PQBIZ PQBZA PQEST PQGLB PQQKQ PQUKI Q9U |
| DOI | 10.1007/s11042-021-11002-y |
| DatabaseName | CrossRef ProQuest Central (Corporate) Computer and Information Systems Abstracts ABI/INFORM Collection ABI/INFORM Global (PDF only) ProQuest Central (purchase pre-March 2016) ABI/INFORM Global (Alumni Edition) Computing Database (Alumni Edition) ProQuest Pharma Collection Technology Research Database ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central (Alumni) (purchase pre-March 2016) ABI/INFORM Collection (Alumni Edition) Research Library (Alumni Edition) ProQuest Central (Alumni Edition) ProQuest Central UK/Ireland Advanced Technologies & Computer Science Collection ProQuest Central Essentials ProQuest Central Business Premium Collection Technology Collection ProQuest One Community College ProQuest Central Korea Business Premium Collection (Alumni) ABI/INFORM Global (Corporate) ProQuest Central Student Research Library Prep SciTech Premium Collection ProQuest Computer Science Collection ProQuest Business Collection (Alumni Edition) ProQuest Business Collection Computer Science Database ABI/INFORM Professional Advanced Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional ABI/INFORM Global Computing Database Research Library Research Library (Corporate) Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection ProQuest One Academic ProQuest One Academic (New) ProQuest One Academic Middle East (New) ProQuest One Business ProQuest One Business (Alumni) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic (retired) ProQuest One Academic UKI Edition ProQuest Central Basic |
| DatabaseTitle | CrossRef ABI/INFORM Global (Corporate) ProQuest Business Collection (Alumni Edition) ProQuest One Business Research Library Prep Computer Science Database ProQuest Central Student Technology Collection Technology Research Database Computer and Information Systems Abstracts – Academic ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection Computer and Information Systems Abstracts ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College Research Library (Alumni Edition) ProQuest Pharma Collection ABI/INFORM Complete ProQuest Central ABI/INFORM Professional Advanced ProQuest One Applied & Life Sciences ProQuest Central Korea ProQuest Research Library ProQuest Central (New) Advanced Technologies Database with Aerospace ABI/INFORM Complete (Alumni Edition) Advanced Technologies & Aerospace Collection Business Premium Collection ABI/INFORM Global ProQuest Computing ABI/INFORM Global (Alumni Edition) ProQuest Central Basic ProQuest Computing (Alumni Edition) ProQuest One Academic Eastern Edition ProQuest Technology Collection ProQuest SciTech Collection ProQuest Business Collection Computer and Information Systems Abstracts Professional Advanced Technologies & Aerospace Database ProQuest One Academic UKI Edition ProQuest One Business (Alumni) ProQuest One Academic ProQuest One Academic (New) ProQuest Central (Alumni) Business Premium Collection (Alumni) |
| DatabaseTitleList | ABI/INFORM Global (Corporate) |
| Database_xml | – sequence: 1 dbid: BENPR name: ProQuest Central url: https://www.proquest.com/central sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering Computer Science |
| EISSN | 1573-7721 |
| EndPage | 27828 |
| ExternalDocumentID | 10_1007_s11042_021_11002_y |
| GroupedDBID | -4Z -59 -5G -BR -EM -Y2 -~C .4S .86 .DC .VR 06D 0R~ 0VY 123 1N0 1SB 2.D 203 28- 29M 2J2 2JN 2JY 2KG 2LR 2P1 2VQ 2~H 30V 3EH 3V. 4.4 406 408 409 40D 40E 5QI 5VS 67Z 6NX 7WY 8AO 8FE 8FG 8FL 8G5 8UJ 95- 95. 95~ 96X AAAVM AABHQ AACDK AAHNG AAIAL AAJBT AAJKR AANZL AAOBN AARHV AARTL AASML AATNV AATVU AAUYE AAWCG AAYIU AAYQN AAYTO AAYZH ABAKF ABBBX ABBXA ABDZT ABECU ABFTV ABHLI ABHQN ABJNI ABJOX ABKCH ABKTR ABMNI ABMQK ABNWP ABQBU ABQSL ABSXP ABTEG ABTHY ABTKH ABTMW ABULA ABUWG ABWNU ABXPI ACAOD ACBXY ACDTI ACGFO ACGFS ACHSB ACHXU ACKNC ACMDZ ACMLO ACOKC ACOMO ACPIV ACREN ACSNA ACZOJ ADHHG ADHIR ADIMF ADINQ ADKNI ADKPE ADMLS ADRFC ADTPH ADURQ ADYFF ADYOE ADZKW AEBTG AEFIE AEFQL AEGAL AEGNC AEJHL AEJRE AEKMD AEMSY AENEX AEOHA AEPYU AESKC AETLH AEVLU AEXYK AFBBN AFEXP AFGCZ AFKRA AFLOW AFQWF AFWTZ AFYQB AFZKB AGAYW AGDGC AGGDS AGJBK AGMZJ AGQEE AGQMX AGRTI AGWIL AGWZB AGYKE AHAVH AHBYD AHKAY AHSBF AHYZX AIAKS AIGIU AIIXL AILAN AITGF AJBLW AJRNO AJZVZ ALMA_UNASSIGNED_HOLDINGS ALWAN AMKLP AMTXH AMXSW AMYLF AMYQR AOCGG ARAPS ARCSS ARMRJ ASPBG AVWKF AXYYD AYJHY AZFZN AZQEC B-. BA0 BBWZM BDATZ BENPR BEZIV BGLVJ BGNMA BPHCQ BSONS CAG CCPQU COF CS3 CSCUP DDRTE DL5 DNIVK DPUIP DU5 DWQXO EBLON EBS EIOEI EJD ESBYG FEDTE FERAY FFXSO FIGPU FINBP FNLPD FRNLG FRRFC FSGXE FWDCC GGCAI GGRSB GJIRD GNUQQ GNWQR GQ6 GQ7 GQ8 GROUPED_ABI_INFORM_COMPLETE GUQSH GXS H13 HCIFZ HF~ HG5 HG6 HMJXF HQYDN HRMNR HVGLF HZ~ I-F I09 IHE IJ- IKXTQ ITG ITH ITM IWAJR IXC IXE IZIGR IZQ I~X I~Z J-C J0Z JBSCW JCJTX JZLTJ K60 K6V K6~ K7- KDC KOV KOW LAK LLZTM M0C M0N M2O M4Y MA- N2Q N9A NB0 NDZJH NPVJJ NQJWS NU0 O9- O93 O9G O9I O9J OAM OVD P19 P2P P62 P9O PF0 PQBIZ PQBZA PQQKQ PROAC PT4 PT5 Q2X QOK QOS R4E R89 R9I RHV RNI RNS ROL RPX RSV RZC RZE RZK S16 S1Z S26 S27 S28 S3B SAP SCJ SCLPG SCO SDH SDM SHX SISQX SJYHP SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE SZN T13 T16 TEORI TH9 TSG TSK TSV TUC TUS U2A UG4 UOJIU UTJUX UZXMN VC2 VFIZW W23 W48 WK8 YLTOR Z45 Z7R Z7S Z7W Z7X Z7Y Z7Z Z81 Z83 Z86 Z88 Z8M Z8N Z8Q Z8R Z8S Z8T Z8U Z8W Z92 ZMTXR ~EX AAPKM AAYXX ABBRH ABDBE ABFSG ABRTQ ACSTC ADHKG ADKFA AEZWR AFDZB AFFHD AFHIU AFOHR AGQPQ AHPBZ AHWEU AIXLP ATHPR AYFIA CITATION PHGZM PHGZT PQGLB 7SC 7XB 8AL 8FD 8FK JQ2 L.- L7M L~C L~D MBDVC PKEHL PQEST PQUKI Q9U |
| ID | FETCH-LOGICAL-c319t-1afcea9c829cf0708d32b5a83add479aaf84469960c26c80cf3d73a5b7b8c5fe3 |
| IEDL.DBID | M0C |
| ISICitedReferencesCount | 2 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000654112900001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1380-7501 |
| IngestDate | Tue Nov 04 23:35:50 EST 2025 Sat Nov 29 06:20:11 EST 2025 Tue Nov 18 22:24:17 EST 2025 Fri Feb 21 02:48:14 EST 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 18 |
| Keywords | OpenEXR Image encryption Commutative High dynamic range image Image authentication |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c319t-1afcea9c829cf0708d32b5a83add479aaf84469960c26c80cf3d73a5b7b8c5fe3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0001-5775-6034 |
| PQID | 2554663542 |
| PQPubID | 54626 |
| PageCount | 22 |
| ParticipantIDs | proquest_journals_2554663542 crossref_primary_10_1007_s11042_021_11002_y crossref_citationtrail_10_1007_s11042_021_11002_y springer_journals_10_1007_s11042_021_11002_y |
| PublicationCentury | 2000 |
| PublicationDate | 20210700 2021-07-00 20210701 |
| PublicationDateYYYYMMDD | 2021-07-01 |
| PublicationDate_xml | – month: 7 year: 2021 text: 20210700 |
| PublicationDecade | 2020 |
| PublicationPlace | New York |
| PublicationPlace_xml | – name: New York – name: Dordrecht |
| PublicationSubtitle | An International Journal |
| PublicationTitle | Multimedia tools and applications |
| PublicationTitleAbbrev | Multimed Tools Appl |
| PublicationYear | 2021 |
| Publisher | Springer US Springer Nature B.V |
| Publisher_xml | – name: Springer US – name: Springer Nature B.V |
| References | YuCMWuKCWangCMA distortion-free data hiding scheme for high dynamic range imagesDisplays201132522523610.1016/j.displa.2011.02.004 Brooker D (2012) Essential CG lighting techniques with 3ds Max. CRC Press Hoefflinger B (2007) High-dynamic-range (HDR) vision. Springer, Berlin Heidelberg LiMTHuangNCWangCMA data hiding scheme for high dynamic range imagesInternational Journal of Innovative Computing Information and Control (IJICIC)201175A20212035 ChenTSChangCCHwangMSA virtual image cryptosystem based upon vector quantizationIEEE Trans Image Process199871014851488171799810.1109/83.718488 LoCCHuYCA novel reversible image authentication scheme for digital imagesSignal Process20149817418510.1016/j.sigpro.2013.11.028 Cryptography Stack Exchange, https://crypto.stackexchange.com/questions/9603/why-should-i-make-my-cipher-public. Accessed 31 January 2021 LaserSoft Imaging SilverFast, http://www.silverfast.com/. Accessed 31 January 2021 ZhangLYLiuYPareschiFZhangYWongKWRovattiRSettiGOn the security of a class of diffusion mechanisms for image encryptionIEEE Trans Cybern20174841163117510.1109/TCYB.2017.2682561 GongXChenLYuFZhaoXWangSA secure image authentication scheme based on dual fragile watermarkMultimed Tools Appl20207925180711808810.1007/s11042-019-08594-x LiXSunXLiuQImage integrity authentication scheme based on fixed point theoryIEEE Trans Image Process201424263264533012591408.94974 Lin KS, Chen TH, Lin CH, Chang SS (2014) A tailor-made encryption scheme for high-dynamic range images, In genetic and evolutionary computing (pp. 183–192). Springer, Cham NiuYZhouZZhangXAn image encryption approach based on chaotic maps and genetic operationsMultimed Tools Appl20207935256132563310.1007/s11042-020-09237-2 KahanWIEEE standard 754 for binary floating-point arithmeticLecture Notes on the Status of IEEE199675494720–177611 HuangYHuangLWangYPengYYuFShape synchronization in driver-response of 4-D chaotic system and its application in image encryptionIEEE Access2020813530813531910.1109/ACCESS.2020.3011524 Adobe Photoshop, http://www.adobe.com/. Accessed 31 January 2021 ChengYMWangCMA novel approach to steganography in high-dynamic-range imagesIEEE Comput Archit Lett200916037080 MatsumotoMNishimuraTMersenne twister: a 623-dimensionally equidistributed uniform pseudo-random number generatorACM Trans Model Comput Simul (TOMACS)19988133010.1145/272991.272995 Stallings W (2013) Cryptography and network security: principles and practice. Pearson, sixth edition. ChangCCNguyenTSLinCCA new distortion-free data embedding scheme for high-dynamic range imagesMultimed Tools Appl201675114516310.1007/s11042-014-2279-5 LinYTWangCMChenWSLinFPLinWA novel data hiding algorithm for high dynamic range imagesIEEE Trans Multimed201619119621110.1109/TMM.2016.2605499 Yan, J. Y., Chen, T. H., & Lin, C. H. (2013, October). Encryption in high dynamic range images for RGBE format. In 2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (pp. 493-496). IEEE. GuerriniFOkudaMAdamiNLeonardiRHigh dynamic range image watermarking robust against tone-mapping operatorsIEEE Trans Inform Forensics Secur20116228329510.1109/TIFS.2011.2109383 KhuranaMSinghHTwo level phase retrieval in fractional Hartley domain for secure image encryption and authentication using digital signaturesMultimed Tools Appl20207919139671398610.1007/s11042-020-08658-3 RajeshSPaulVMenonVGKhosraviMRA secure and efficient lightweight symmetric encryption scheme for transfer of text files between embedded IoT devicesSymmetry201911229310.3390/sym11020293 KwonHJLeeSHCAM-based HDR image reproduction using CA–TC decoupled JCh decompositionSignal Process Image Commun20197011310.1016/j.image.2018.08.010 NVIDA developer, https://developer.nvidia.com/high-dynamic-range-display-development. Accessed 31 January 2021 Reinhard E, Heidrich W, Debevec P, Pattanaik S, Ward G, Myszkowski K (2010) High dynamic range imaging: acquisition, display, and image-based lighting. Morgan Kaufmann Ward G (1991) Real pixels. Graphic gems II, edited by J. Arvo, academic press, Boston, MA. ChangCCNguyenTSLinCCDistortion-free data embedding scheme for high dynamic range imagesJ Electron Sci Technol20131112026 KamiliAHurrahNNParahSABhatGMMuhammadKDWFCAT: dual watermarking framework for industrial image authentication and tamper localizationIEEE Trans Indust Inform2020175108511710.1109/TII.2020.3028612 Anand, A., Raj, A., Kohli, R., & Bibhu, V. (2016, February). Proposed symmetric key cryptography algorithm for data security. In 2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH) (pp. 159-162). IEEE. Kainz F, Bogart R, Stanczyk P (2009) Technical introduction to OpenEXR. Industrial light and magic, 21. ISO 690. Voyatzis, G., & Pitas, I. (1996, September). Applications of toral automorphisms in image watermarking. In proceedings of 3rd IEEE International Conference on Image Processing (Vol. 2, pp. 237-240). IEEE. Autodesk 3ds Max, https://www.autodesk.com/. Accessed 31 January 2021 MahmalatSAydınTOSmolicAPipelines for HDR video coding based on luminance independent chromaticity preprocessingIEEE Trans Circ Syst Video Technol201728123467347710.1109/TCSVT.2017.2758268 Yan J.Y., Jeng F.G. & Chen T.H. (2014) An image authentication scheme for high dynamic range images. Proceedings of the 5th international conference on systematic innovation (ICSI). ChenTHChangSSImage encryption on HDR images for OpenEXR formatInt J Sci Eng2014441923 Autrusseau, F., & Goudia, D. (2013, September). Non linear hybrid watermarking for high dynamic range images. In 2013 IEEE International Conference on Image Processing (pp. 4527-4531). IEEE. LiZWeiZWenCZhengJDetail-enhanced multi-scale exposure fusionIEEE Trans Image Process201726312431252362395510.1109/TIP.2017.2651366 ChenWHLuoSZhengWXImpulsive synchronization of reaction–diffusion neural networks with mixed delays and its application to image encryptionIEEE Trans Neural Netw Learning Syst201627122696271010.1109/TNNLS.2015.2512849 LarsonGWLogluv encoding for full-gamut, high-dynamic range imagesJournal of Graphics Tools199831153110.1080/10867651.1998.10487485 LinPYLeeJSChangCCProtecting the content integrity of digital imagery with fidelity preservationACM Trans Multimed Comput Commun Appl (TOMM)20117312010.1145/2000486.2000489 OpenEXR downloads, http://www.openexr.com/downloads.html. Accessed 31 January 2021 11002_CR40 11002_CR41 11002_CR42 YM Cheng (11002_CR11) 2009; 16 11002_CR3 11002_CR2 CC Chang (11002_CR7) 2016; 75 11002_CR23 11002_CR1 S Rajesh (11002_CR36) 2019; 11 YT Lin (11002_CR29) 2016; 19 M Matsumoto (11002_CR32) 1998; 8 11002_CR5 11002_CR4 S Mahmalat (11002_CR31) 2017; 28 X Li (11002_CR25) 2014; 24 A Kamili (11002_CR19) 2020; 17 MT Li (11002_CR24) 2011; 7 Z Li (11002_CR26) 2017; 26 M Khurana (11002_CR20) 2020; 79 CC Chang (11002_CR6) 2013; 11 GW Larson (11002_CR22) 1998; 3 11002_CR15 11002_CR37 11002_CR38 W Kahan (11002_CR17) 1996; 754 11002_CR39 Y Huang (11002_CR16) 2020; 8 11002_CR18 PY Lin (11002_CR27) 2011; 7 Y Niu (11002_CR33) 2020; 79 TH Chen (11002_CR8) 2014; 4 CC Lo (11002_CR30) 2014; 98 WH Chen (11002_CR10) 2016; 27 HJ Kwon (11002_CR21) 2019; 70 11002_CR12 11002_CR34 11002_CR35 TS Chen (11002_CR9) 1998; 7 X Gong (11002_CR13) 2020; 79 LY Zhang (11002_CR44) 2017; 48 11002_CR28 CM Yu (11002_CR43) 2011; 32 F Guerrini (11002_CR14) 2011; 6 |
| References_xml | – reference: LarsonGWLogluv encoding for full-gamut, high-dynamic range imagesJournal of Graphics Tools199831153110.1080/10867651.1998.10487485 – reference: Lin KS, Chen TH, Lin CH, Chang SS (2014) A tailor-made encryption scheme for high-dynamic range images, In genetic and evolutionary computing (pp. 183–192). Springer, Cham – reference: YuCMWuKCWangCMA distortion-free data hiding scheme for high dynamic range imagesDisplays201132522523610.1016/j.displa.2011.02.004 – reference: Autodesk 3ds Max, https://www.autodesk.com/. Accessed 31 January 2021 – reference: ChangCCNguyenTSLinCCDistortion-free data embedding scheme for high dynamic range imagesJ Electron Sci Technol20131112026 – reference: Brooker D (2012) Essential CG lighting techniques with 3ds Max. CRC Press – reference: LaserSoft Imaging SilverFast, http://www.silverfast.com/. Accessed 31 January 2021 – reference: Autrusseau, F., & Goudia, D. (2013, September). Non linear hybrid watermarking for high dynamic range images. In 2013 IEEE International Conference on Image Processing (pp. 4527-4531). IEEE. – reference: NiuYZhouZZhangXAn image encryption approach based on chaotic maps and genetic operationsMultimed Tools Appl20207935256132563310.1007/s11042-020-09237-2 – reference: HuangYHuangLWangYPengYYuFShape synchronization in driver-response of 4-D chaotic system and its application in image encryptionIEEE Access2020813530813531910.1109/ACCESS.2020.3011524 – reference: Yan J.Y., Jeng F.G. & Chen T.H. (2014) An image authentication scheme for high dynamic range images. Proceedings of the 5th international conference on systematic innovation (ICSI). – reference: OpenEXR downloads, http://www.openexr.com/downloads.html. Accessed 31 January 2021 – reference: RajeshSPaulVMenonVGKhosraviMRA secure and efficient lightweight symmetric encryption scheme for transfer of text files between embedded IoT devicesSymmetry201911229310.3390/sym11020293 – reference: Reinhard E, Heidrich W, Debevec P, Pattanaik S, Ward G, Myszkowski K (2010) High dynamic range imaging: acquisition, display, and image-based lighting. Morgan Kaufmann – reference: Kainz F, Bogart R, Stanczyk P (2009) Technical introduction to OpenEXR. Industrial light and magic, 21. ISO 690. – reference: KhuranaMSinghHTwo level phase retrieval in fractional Hartley domain for secure image encryption and authentication using digital signaturesMultimed Tools Appl20207919139671398610.1007/s11042-020-08658-3 – reference: KwonHJLeeSHCAM-based HDR image reproduction using CA–TC decoupled JCh decompositionSignal Process Image Commun20197011310.1016/j.image.2018.08.010 – reference: Voyatzis, G., & Pitas, I. (1996, September). Applications of toral automorphisms in image watermarking. In proceedings of 3rd IEEE International Conference on Image Processing (Vol. 2, pp. 237-240). IEEE. – reference: ChenTHChangSSImage encryption on HDR images for OpenEXR formatInt J Sci Eng2014441923 – reference: LiZWeiZWenCZhengJDetail-enhanced multi-scale exposure fusionIEEE Trans Image Process201726312431252362395510.1109/TIP.2017.2651366 – reference: ZhangLYLiuYPareschiFZhangYWongKWRovattiRSettiGOn the security of a class of diffusion mechanisms for image encryptionIEEE Trans Cybern20174841163117510.1109/TCYB.2017.2682561 – reference: Yan, J. Y., Chen, T. H., & Lin, C. H. (2013, October). Encryption in high dynamic range images for RGBE format. In 2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (pp. 493-496). IEEE. – reference: MatsumotoMNishimuraTMersenne twister: a 623-dimensionally equidistributed uniform pseudo-random number generatorACM Trans Model Comput Simul (TOMACS)19988133010.1145/272991.272995 – reference: GuerriniFOkudaMAdamiNLeonardiRHigh dynamic range image watermarking robust against tone-mapping operatorsIEEE Trans Inform Forensics Secur20116228329510.1109/TIFS.2011.2109383 – reference: Ward G (1991) Real pixels. Graphic gems II, edited by J. Arvo, academic press, Boston, MA. – reference: LinYTWangCMChenWSLinFPLinWA novel data hiding algorithm for high dynamic range imagesIEEE Trans Multimed201619119621110.1109/TMM.2016.2605499 – reference: LoCCHuYCA novel reversible image authentication scheme for digital imagesSignal Process20149817418510.1016/j.sigpro.2013.11.028 – reference: Adobe Photoshop, http://www.adobe.com/. Accessed 31 January 2021 – reference: KahanWIEEE standard 754 for binary floating-point arithmeticLecture Notes on the Status of IEEE199675494720–177611 – reference: Hoefflinger B (2007) High-dynamic-range (HDR) vision. Springer, Berlin Heidelberg – reference: GongXChenLYuFZhaoXWangSA secure image authentication scheme based on dual fragile watermarkMultimed Tools Appl20207925180711808810.1007/s11042-019-08594-x – reference: ChangCCNguyenTSLinCCA new distortion-free data embedding scheme for high-dynamic range imagesMultimed Tools Appl201675114516310.1007/s11042-014-2279-5 – reference: ChenWHLuoSZhengWXImpulsive synchronization of reaction–diffusion neural networks with mixed delays and its application to image encryptionIEEE Trans Neural Netw Learning Syst201627122696271010.1109/TNNLS.2015.2512849 – reference: Cryptography Stack Exchange, https://crypto.stackexchange.com/questions/9603/why-should-i-make-my-cipher-public. Accessed 31 January 2021 – reference: NVIDA developer, https://developer.nvidia.com/high-dynamic-range-display-development. Accessed 31 January 2021 – reference: ChenTSChangCCHwangMSA virtual image cryptosystem based upon vector quantizationIEEE Trans Image Process199871014851488171799810.1109/83.718488 – reference: ChengYMWangCMA novel approach to steganography in high-dynamic-range imagesIEEE Comput Archit Lett200916037080 – reference: LiXSunXLiuQImage integrity authentication scheme based on fixed point theoryIEEE Trans Image Process201424263264533012591408.94974 – reference: LiMTHuangNCWangCMA data hiding scheme for high dynamic range imagesInternational Journal of Innovative Computing Information and Control (IJICIC)201175A20212035 – reference: LinPYLeeJSChangCCProtecting the content integrity of digital imagery with fidelity preservationACM Trans Multimed Comput Commun Appl (TOMM)20117312010.1145/2000486.2000489 – reference: MahmalatSAydınTOSmolicAPipelines for HDR video coding based on luminance independent chromaticity preprocessingIEEE Trans Circ Syst Video Technol201728123467347710.1109/TCSVT.2017.2758268 – reference: Stallings W (2013) Cryptography and network security: principles and practice. Pearson, sixth edition. – reference: KamiliAHurrahNNParahSABhatGMMuhammadKDWFCAT: dual watermarking framework for industrial image authentication and tamper localizationIEEE Trans Indust Inform2020175108511710.1109/TII.2020.3028612 – reference: Anand, A., Raj, A., Kohli, R., & Bibhu, V. (2016, February). Proposed symmetric key cryptography algorithm for data security. In 2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH) (pp. 159-162). IEEE. – volume: 98 start-page: 174 year: 2014 ident: 11002_CR30 publication-title: Signal Process doi: 10.1016/j.sigpro.2013.11.028 – ident: 11002_CR2 doi: 10.1109/ICICCS.2016.7542294 – volume: 7 start-page: 1485 issue: 10 year: 1998 ident: 11002_CR9 publication-title: IEEE Trans Image Process doi: 10.1109/83.718488 – volume: 6 start-page: 283 issue: 2 year: 2011 ident: 11002_CR14 publication-title: IEEE Trans Inform Forensics Secur doi: 10.1109/TIFS.2011.2109383 – volume: 17 start-page: 5108 year: 2020 ident: 11002_CR19 publication-title: IEEE Trans Indust Inform doi: 10.1109/TII.2020.3028612 – volume: 8 start-page: 135308 year: 2020 ident: 11002_CR16 publication-title: IEEE Access doi: 10.1109/ACCESS.2020.3011524 – volume: 79 start-page: 13967 issue: 19 year: 2020 ident: 11002_CR20 publication-title: Multimed Tools Appl doi: 10.1007/s11042-020-08658-3 – ident: 11002_CR12 – ident: 11002_CR37 – volume: 79 start-page: 18071 issue: 25 year: 2020 ident: 11002_CR13 publication-title: Multimed Tools Appl doi: 10.1007/s11042-019-08594-x – volume: 28 start-page: 3467 issue: 12 year: 2017 ident: 11002_CR31 publication-title: IEEE Trans Circ Syst Video Technol doi: 10.1109/TCSVT.2017.2758268 – volume: 11 start-page: 20 issue: 1 year: 2013 ident: 11002_CR6 publication-title: J Electron Sci Technol – ident: 11002_CR35 – volume: 70 start-page: 1 year: 2019 ident: 11002_CR21 publication-title: Signal Process Image Commun doi: 10.1016/j.image.2018.08.010 – volume: 754 start-page: 11 issue: 94720–1776 year: 1996 ident: 11002_CR17 publication-title: Lecture Notes on the Status of IEEE – ident: 11002_CR42 – ident: 11002_CR5 doi: 10.4324/9780080927015 – volume: 7 start-page: 2021 issue: 5A year: 2011 ident: 11002_CR24 publication-title: International Journal of Innovative Computing Information and Control (IJICIC) – ident: 11002_CR23 – ident: 11002_CR3 – ident: 11002_CR1 – volume: 27 start-page: 2696 issue: 12 year: 2016 ident: 11002_CR10 publication-title: IEEE Trans Neural Netw Learning Syst doi: 10.1109/TNNLS.2015.2512849 – volume: 75 start-page: 145 issue: 1 year: 2016 ident: 11002_CR7 publication-title: Multimed Tools Appl doi: 10.1007/s11042-014-2279-5 – ident: 11002_CR28 doi: 10.1007/978-3-319-01796-9_19 – volume: 32 start-page: 225 issue: 5 year: 2011 ident: 11002_CR43 publication-title: Displays doi: 10.1016/j.displa.2011.02.004 – ident: 11002_CR39 doi: 10.1109/ICIP.1996.560753 – volume: 4 start-page: 19 issue: 4 year: 2014 ident: 11002_CR8 publication-title: Int J Sci Eng – volume: 3 start-page: 15 issue: 1 year: 1998 ident: 11002_CR22 publication-title: Journal of Graphics Tools doi: 10.1080/10867651.1998.10487485 – ident: 11002_CR41 doi: 10.1109/IIH-MSP.2013.128 – ident: 11002_CR18 – ident: 11002_CR4 doi: 10.1109/ICIP.2013.6738932 – ident: 11002_CR34 – ident: 11002_CR40 doi: 10.1016/B978-0-08-050754-5.50025-6 – ident: 11002_CR15 doi: 10.1007/978-3-540-44433-6 – ident: 11002_CR38 – volume: 48 start-page: 1163 issue: 4 year: 2017 ident: 11002_CR44 publication-title: IEEE Trans Cybern doi: 10.1109/TCYB.2017.2682561 – volume: 8 start-page: 3 issue: 1 year: 1998 ident: 11002_CR32 publication-title: ACM Trans Model Comput Simul (TOMACS) doi: 10.1145/272991.272995 – volume: 11 start-page: 293 issue: 2 year: 2019 ident: 11002_CR36 publication-title: Symmetry doi: 10.3390/sym11020293 – volume: 7 start-page: 1 issue: 3 year: 2011 ident: 11002_CR27 publication-title: ACM Trans Multimed Comput Commun Appl (TOMM) doi: 10.1145/2000486.2000489 – volume: 79 start-page: 25613 issue: 35 year: 2020 ident: 11002_CR33 publication-title: Multimed Tools Appl doi: 10.1007/s11042-020-09237-2 – volume: 16 start-page: 70 issue: 03 year: 2009 ident: 11002_CR11 publication-title: IEEE Comput Archit Lett – volume: 26 start-page: 1243 issue: 3 year: 2017 ident: 11002_CR26 publication-title: IEEE Trans Image Process doi: 10.1109/TIP.2017.2651366 – volume: 24 start-page: 632 issue: 2 year: 2014 ident: 11002_CR25 publication-title: IEEE Trans Image Process doi: 10.1109/TIP.2014.2372473 – volume: 19 start-page: 196 issue: 1 year: 2016 ident: 11002_CR29 publication-title: IEEE Trans Multimed doi: 10.1109/TMM.2016.2605499 |
| SSID | ssj0016524 |
| Score | 2.2636702 |
| Snippet | For the sake of image security, confidentiality and integrity are always the first two concerns and can be further guaranteed by image encryption and... |
| SourceID | proquest crossref springer |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 27807 |
| SubjectTerms | Computer Communication Networks Computer Science Confidentiality Data Structures and Information Theory Dynamic range Encryption Floating point arithmetic Integrity Multimedia Information Systems Special Purpose and Application-Based Systems |
| SummonAdditionalLinks | – databaseName: Springer LINK dbid: RSV link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3PS8MwFH7o9KAHp1NxOiUHbxpYk7ZJjyIbnqbMH-xW0jSBgVZpq7D_3iRLNxUV9Nw0hJe8H22-930Ap6aIIEmgA8yojnEYyggnQkeYxyrKTMZQTIVObIKNRnwySW58U1jVoN2bK0kXqZfNboFtJbGQAktzRvBsFdZMuuNWsGF8-7C4O4gjL2XL-9jkw8C3ynw_x-d0tKwxv1yLumwzbP9vnduw5atLdDE_DjuwoooOtBvlBuQduQObH2gId-HadYnUjgIcmQHlzMURJIocCYuAL2r_Zw-ZEhdZDMpgMkaW6Rjlc0V7VNomBTR9MuGp2oP74eDu8gp7oQUsjQfWOBBaKpFIThKpTQzgOSVZJDg1wS9kiRCam69Gy-MiSSx5X2qaMyqijGXcotXoPrSK50IdANImIIg4kZJmcaiVFpJJzS2-inGaMdGFoLF3Kj0LuRXDeEyX_MnWfqmxX-rsl866cLZ452XOwfHr6F6zjan3xyolFoxnaquQdOG82bbl459nO_zb8CPYIHbnHZ63B626fFXHsC7f6mlVnrhz-g4OeuJM priority: 102 providerName: Springer Nature |
| Title | Commutative encryption and authentication for OpenEXR high dynamic range images |
| URI | https://link.springer.com/article/10.1007/s11042-021-11002-y https://www.proquest.com/docview/2554663542 |
| Volume | 80 |
| WOSCitedRecordID | wos000654112900001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAVX databaseName: SpringerLINK Contemporary 1997-Present customDbUrl: eissn: 1573-7721 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0016524 issn: 1380-7501 databaseCode: RSV dateStart: 19970101 isFulltext: true titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22 providerName: Springer Nature |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LS8QwEB509aAH3-L6WHLwpsFt-kh6EpUVQVyX9bV6KWnagKB13a3C_nsz2dRVQS9eAqVpKJ1kZpp8830AuyaJYLGnPcp9HdEgUCGNpQ6piPIwNREj53lgxSZ4uy16vbjjNtyGDlZZ-UTrqLMXhXvkBwzhVCY6Buyw_0pRNQpPV52ExjTMYGaDkL6L5snnKUIUOlFb0aQmMnquaGZcOudhYQoCFJA0jdHR98A0yTZ_HJDauHO6-N83XoIFl3GSo_EUWYapvFiBxUrNgbjFvQLzX6gJV-HSVo6UlhacmA6DkfUtRBYZkYiKL0q320dM2ksQl9LqdQmyH5NsrHJPBli4QB6fjcsarsHNaev65Iw68QWqzKosqSe1ymWsBIuVNn5BZD5LQyl84xADHkuphfmTRG4XxSIlmkr7GfdlmPJUIILNX4da8VLkG0C0cRIyipXy0yjQuZaKKy0Qc8WFn3JZB6_68olyzOQokPGUTDiV0VqJsVZirZWM6rD3-Ux_zMvxZ-_tykSJW6PDZGKfOuxXRp7c_n20zb9H24I5hvPKYnq3oVYO3vIdmFXv5eNw0IBpfnffgJnjVrvTNVfnnDbsrMWWXZq2Ez6Ytnt1-wFgmfIj |
| linkProvider | ProQuest |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V3Pb9MwFH7axqSNA9vK0Apj84GdwFpjJ7FzQAjBqlYtBaEi9RYcx5Yq0Wy0AZR_ir8RPzdpYRK79bBzHEuJv_fD9ve-B_DCJREsCWxABbcxDUMd0UTZiMrYRJmLGEaY0DebEKORnEyST1vwu6mFQVpl4xO9o86vNZ6RXzKkU7noGLI3N98pdo3C29WmhcYSFgNT_XJbtsXr_nu3vheMda_G73q07ipAtYNbSQNltVGJlizR1gFe5pxlkZLcWXooEqWsdFskFC3RLNayoy3PBVdRJjKJ1Czu5t2GByGXAu1qIOjq1iKO6ia6skNdJA7qIp1lqV6AhTBIiECRNkarfwPhOru9dSHr41z34L79oUN4VGfU5O3SBI5gyxQtOGi6VZDaebXg4V_Si4_ho6-MKb3sOXED5pX3nUQVOVHI-i_K-jSTuLSeIO_mavKZoLozyatCzaaazLEwg0xnziUvjuHLRj7yCewU14U5AWKdE1RxojXP4tAaq7TQViKnTEieCdWGoFnpVNfK69gA5Fu61oxGdKQOHalHR1q14eXqnZul7sido08bSKS1D1qkazy04VUDqvXj_8_29O7ZzmGvN_4wTIf90eAZ7DPEtOcvn8JOOf9hnsOu_llOF_Mzbx0Evm4abH8ABxJKpg |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V3PTxQxFH5BNEQOooBhFbUHOWGzTOdHOwdjjLCRYNaNwWTDZex02mQTGGB3gMy_5l_ne90OqyZy4-B5Ok1m-r0fbb_3PYC3mESIPHIRl7HLeJKYlOfapVxlNi0xYlhpE99sQg6HajzOR0vws6uFIVpl5xO9o67ODZ2R9wXRqTA6JqLvAi1itD_4cHHJqYMU3bR27TTmEDmy7Q1u32bvD_dxrXeEGBwcf_rMQ4cBbhB6DY-0M1bnRoncOAS_qmJRplrFaPWJzLV2CrdLJGBiRGbUnnFxJWOdlrJURNOKcd4H8FDiGKITjtKT2xuMLA0NddUex6gchYKdedleREUxRI4gwTbB2z-D4iLT_ety1se8wdr__LeewpOQabOPc9N4Bku2Xoe1rosFC05tHVZ_k2TcgK--YqbxcugMB0xb71OZriumqRqgbsIpJ8N0nxEf52D8jZHqM6vaWp9NDJtSwQabnKGrnm3C93v5yOewXJ_XdguYQ-eos9yYuMwSZ5020jhFXDOp4lLqHkTdqhcmKLJTY5DTYqElTUgpECmFR0rR9mD39p2LuR7JnaO3O3gUwTfNigU2evCuA9ji8b9ne3H3bG9gBTFWfDkcHr2Ex4Lg7WnN27DcTK_sK3hkrpvJbPraGwqDH_eNtV8VZlPK |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Commutative+encryption+and+authentication+for+OpenEXR+high+dynamic+range+images&rft.jtitle=Multimedia+tools+and+applications&rft.au=Chen%2C+Tzung-Her&rft.au=Yan%2C+Jing-Ya&rft.date=2021-07-01&rft.issn=1380-7501&rft.eissn=1573-7721&rft.volume=80&rft.issue=18&rft.spage=27807&rft.epage=27828&rft_id=info:doi/10.1007%2Fs11042-021-11002-y&rft.externalDBID=n%2Fa&rft.externalDocID=10_1007_s11042_021_11002_y |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1380-7501&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1380-7501&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1380-7501&client=summon |