• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A New Encryption-Then-Compression Scheme on Gray Images Using the Markov Random Field

    2018-08-15 10:38:30ChuntaoWangYangFengTianzhengLiHaoXieandGooRakKwon
    Computers Materials&Continua 2018年7期

    Chuntao Wang , Yang Feng Tianzheng Li Hao Xie and Goo-Rak Kwon

    Abstract: Compressing encrypted images remains a challenge. As illustrated in our previous work on compression of encrypted binary images, it is preferable to exploit statistical characteristics at the receiver. Through this line, we characterize statistical correlations between adjacent bitplanes of a gray image with the Markov random field(MRF), represent it with a factor graph, and integrate the constructed MRF factor graph in that for binary image reconstruction, which gives rise to a joint factor graph for gray images reconstruction (JFGIR). By exploiting the JFGIR at the receiver to facilitate the reconstruction of the original bitplanes and deriving theoretically the sum-product algorithm (SPA) adapted to the JFGIR, a novel MRF-based encryption-then-compression(ETC) scheme is thus proposed. After preferable universal parameters of the MRF between adjacent bitplanes are sought via a numerical manner, extensive experimental simulations are then carried out to show that the proposed scheme successfully compresses the first 3 and 4 most significant bitplanes (MSBs) for most test gray images and the others with a large portion of smooth area, respectively. Thus, the proposed scheme achieves significant improvement against the state-of-the-art leveraging the 2-D Markov source model at the receiver and is comparable or somewhat inferior to that using the resolution-progressive strategy in recovery.

    Keywords: Encryption-then-compression, compressing encrypted image, Markov random field, compression efficiency, factor graph.

    1 Introduction

    Compressing encrypted signals is such a kind of technology that addresses the encryption-then-compression (ETC) problem in the service-oriented scenarios like distributed processing, cloud computing, etc. [Johnson, Ishwar and Prabhakaran (2004);Erkin, Piva, Katzenbeisser et al. (2007)]. In these scenarios, the content owner merely encrypts its signal and then sends it to the network or cloud service provider for the sake of limited computational resources. The service provider then compresses, without access to the encryption key, encrypted signals for saving bandwidth and storage space. The receiver finally performs the successive decompression and decryption to reconstruct the original signal.

    As the encryption prior to the compression masks the original signal, one may intuitively believe that it would be intractable to compress the encrypted signal. By taking the encryption key as the side information of the encrypted signal and further formulating the ETC problem as the distributed coding with side information at the decoder, however,Johnson et al. [Johnson, Ishwar, Prabhakaran et al. (2004)] demonstrated via the information theory that the ETC system would neither sacrifice the compression efficiency nor degrade the security, as achieved in the conventional compression-thenencryption (CTE) scenario that compresses the original signal before encryption.According to [Johnson, Ishwar, Prabhakaran et al. (2004)], by taking the syndrome of a channel code as the compressed sequence, channel codes like the low-density paritycheck (LDPC) code can be exploited to compress the encrypted signal, and the DISCUS-style Slepian-Wolf decoder [Pradhan and Ramchandran (2003)] can then be used to recover the original signal. To illustrate this, Johnson et al. [Johnson, Ishwar,Prabhakaran et al. (2004)] also proposed 2 practical ETC schemes, which well demonstrates the feasibility and effectiveness of the ETC system.

    From then on, a lot of ETC schemes [Schonberg, Draper and Ramchandran (2005, 2006);Schonberg, Draper, Yeo et al. (2008); Lazzeretti and Barni (2008); Kumar and Makur(2008); Zhou, An, Zhai et al. (2014); Liu, Zeng, Dong et al. (2010); Wang, Xiao, Peng et al. (2018)] have been developed. These schemes compress the cipher-stream-encrypted signal by generating the syndrome of LDPC code, and perfectly reconstruct the original signal via the joint LDPC decoding and decryption. Brief introduction to them are presented in the next section.

    In contrast to these lossless compression schemes, a number of lossy compression approaches [Kumar and Makur (2009); Zhang (2011); Song, Lin and Shen (2013); Zhang(2015); Zhang, Ren, Feng et al. (2011); Zhang, Feng, Ren et al. (2012); Zhang, Sun, Shen et al. (2013); Zhang, Ren, Shen et al. (2014); Wang and Ni (2015); Wang, Ni and Huang(2015); Kumar and Vaish (2017); Wang, Ni, Zhang et al. (2018); Kang, Peng, Xu et al.(2013); Hu, Li and Yang (2014); Zhou, Liu, An et al. (2014)] have also been developed to improve the compression efficiency at the cost of tolerable quality loss. The approaches of Kumar et al. [Kumar and Makur (2009); Zhang, Ren, Feng et al. (2011);Song, Lin and Shen (2013); Zhang, Wong, Zhang et al. (2015)] use the CS technique[Donoho (2006)] to compress the stream-cipher encrypted data and modified the basis pursuit (BP) algorithm to reconstruct the original signal. In an alternative way, the schemes of Zhang et al. [Zhang (2011); Zhang, Feng, Ren et al. (2012); Zhang, Sun, Shen et al. (2013); Zhang, Ren, Shen et al. (2014); Wang and Ni (2015); Wang, Ni and Huang(2015); Kumar and Vaish (2017); Wang, Ni, Zhang et al. (2018)] condense the streamciphered or permutation-ciphered signal mainly using a scalar quantizer, while the methods of [Kang, Peng, Xu et al. (2013); Hu, Li and Yang (2014); Zhou, Liu, An et al.(2014)] compress the encrypted signal via the uniform down-sampling.

    Similar to conventional compression approaches, ETC schemes also exploit the redundancy of the original sign al to achieve good compression efficiency. For instance,the ETC methods of Lazzeretti et al. [Lazzeretti and Barni (2008); Kumar and Makur(2008); Zhou, Au, Zhai et al. (2014)] and [Wang, Ni, Zhang et al. (2018)] leverage the redundancy by generating prediction errors before encryption. The approaches of Liu et al. [Liu, Zeng, Dong et al. (2010); Zhang, Ren, Feng et al. (2011); Zhang, Sun, Shen et al.(2013); Wang and Ni (2015); Wang, Ni and Huang (2015); Kumar and Vaish (2017)]exploit the redundancy by optimizing the compressor with statistical characteristics of the original signal that is intentionally revealed by the content owner. These two categories,however, either remarkably increase the computational burden at the content owner or considerably degrade the security by disclosing statistical distributions to the service provider.

    Regarding that the receiver has both the encryption key and feasible computational resources, it is preferable to make full use of statistical correlations of the original signal at the receiver, as analyzed in our recent work [Wang, Ni, Zhang et al. (2018)]. To illustrate this, the work of Wang et al. [Wang, Ni, Zhang et al. (2018)] uses the Markov random field (MRF) to characterize spatial statistical characteristics of a binary image and seamlessly integrates it with the LDPC decoding and decryption via the factor graph.By leveraging the MRF at the receiver side, the work of Wang et al. [Wang, Ni, Zhang et al. (2018)] achieves significant improvement in terms of compression efficiency over the method of Schonberg et al. [Schonberg, Draper and Ramchandran (2008)] using the 2-dimensional (D) Markov source model at the receiver.

    In light of this, in this paper we extend our previous work [Wang, Ni, Zhang et al. (2018)]to gray images. Specifically, since each bit-plane of a gray image can be considered as a binary image, we apply the algorithm in Wang et al. [Wang, Ni, Zhang et al. (2018)] on each bit-plane of a gray image to achieve the lossless compression for each bit-plane. By observing that adjacent bit-planes resemble each other, we further exploit the MRF to characterize statistical correlations between adjacent bit-planes and incorporate it in the reconstruction of corresponding bitplanes, aiming to achieve higher compression efficiency for gray images. By representing the MRF between adjacent bitplanes with a factor graph and further incorporating it in the joint factor graph for binary image reconstruction, we construct a joint factor graph for gray image reconstruction (JFGIR)followed by theoretically deriving the sum-product algorithm (SPA) adapted to the JFGIR. Assisted by the stream-cipher-based encryption, LDPC-based compression, and JFGIR-involved reconstruction, this then gives rise to an MRF-based ETC scheme for gray images. Experimental results show that the proposed scheme achieves compression efficiency better than or comparable to the state-of-the-arts exploiting statistical correlations at the receiver.

    The contribution of this work is two-fold: i) Exploiting the MRF to characterize statistical correlations between two adjacent bit-planes of a gray image; and ii) Constructing a JFGIR to seamlessly integrate LDPC decoding, decryption, and the MRF within a bitplane and between adjacent bit-planes, and deriving theoretically the SPA adapted to the constructed JFGIR.

    The rest of the paper is organized as follows. Section 2 briefly reviews ETC schemes that perform lossless compression on encrypted images. Section 3 presents the construction of JFGIR and the theoretical derivation of the SPA for the JFGIR. The proposed scheme for gray images are introduced in Section 4, and experimental results and analysis are given in Section 5. Section 6 finally draws the conclusion.

    2 Prior arts

    As this paper focuses on the lossless compression of encrypted images, in this section we mainly review ETC schemes for lossless compression of encrypted images. Brief introductions to these ETC schemes are presented below.

    Based on Johnson et al.’s work [Johnson, Ishwar, Ramchandran et al. (2004)], Schonberg et al. [Schonberg, Draper and Ramchandran (2005, 2006); Schonberg, Draper, Yeo et al.(2008)] further integrated the Markov model in image reconstruction. These well exploit statistical correlations between adjacent image pixels and thus significantly improve the compression efficiency.

    A number of ETC approaches generating prediction errors before encryption have also been proposed in the literature [Lazzeretti and Barni (2008); Kumar and Makur (2008);Zhou, Liu, Au et al. (2014)]. In Lazzeretti et al. [Lazzeretti and Barni (2008)], the authors extended the Johnson et al.’s scheme [Johnson, Ishwar, Ramchandran et al. (2004)] to gray and color images by leveraging the spatial, cross-plane, and cross-band correlations before stream-cipher-based encryption, achieving good compression efficiency. By imposing the LDPC-based compression on encrypted prediction errors rather than directly on image pixels, Kumar and Makur obtained higher compression efficiency[Kumar and Makur (2008)]. Zhou et al. [Zhou, Au, Zhai et al. (2014)] obtained nearly the same compression efficiency as the conventional compression schemes with original,unencrypted images as input through prediction error clustering and random permutation.In an alternative way, Liu et al. [Liu, Zeng, Au et al. (2010)] compressed the encrypted gray image in a progressive manner and exploited the low-resolution sub-image to learn source statistics for high-resolution ones. Compared to the practical lossless ETC scheme in Johnson et al. [Johnson, Ishwar and Ramchandran (2004)], the work of Liu et al. [Liu,Zeng, Au et al. (2010)] achieves better compression efficiency.

    Recently, Wang et al. [Wang, Ni, Zhang et al. (2018)] developed another ETC scheme using the MRF. They deployed the MRF [Li (1995)] to characterize the spatial statistical characteristic of a binary image, represented the MRF with a factor graph [Kschischang,Frey and Loeliger (2001)], sophisticatedly integrated the factor graph for the MRF with those for the decryption and LDPC decoding to construct a joint factor graph for binary image reconstruction, and derived theoretically the SPA for the constructed joint factor graph. This MRF-based scheme achieves significant improvement over the ETC approach using the 2-D Markov source model [Schonberg, Draper and Ramchandran (2006)].

    3 Design of JFGIR and derivation of SPA

    3.1 Characterization of statistical correlations between adjacent bitplanes

    Let I( x, y)be an 8-bit image of size m×n . Then its kt h(k =1, ,8)bit-plane, says, is obtained as:

    Figure 1: Illustration of 8 bit-planes of Image “Man”, where bitplanes from left to right are B8( x, y), B7( x, y), ..., and B1( x, y), respectively

    Fig. 1 illustrates 8 bit-planes of gray image “Man”. It is observed that any two adjacent bit-planes, Bk( x, y)and Bk?1(x, y)(k = 8, ,2), resemble each other. That is, if Bk( x, y)is equal to b( b =0,1), then Bk?1(x, y) =b may hold with high probability.Therefore, there exists statistical correlations between Bk( x, y). Similar results can also be found in other gray images.

    As the MRF well characterizes the spatial statistical feature of binary images, as demonstrated in Wang et al. [Wang, Ni, Zhang et al. (2018)], we deploy the MRF [Li(1995)] to model statistical correlations between Bk( x, y)and Bk?1(x, y). As the MRF within a bitplane has, according to Wang et al. [Wang, Ni, Zhang et al. (2018)], already taken into account spatial statistical correlations between pixels in the neighborhood, we mainly characterize statistical correlations between bits Bk( x, y)and Bk?1(x, y)at the same coordination rather than modeling those between Bk(x, y)and Bk?1( (x) , (y )),where (x)denotes a set containing xand its neighborhood. Thus, statistical correlations between bits Bk(x, y)and Bk?1(x, y)can be characterized with the MRF as:

    where p(·)is a probability function, and Fk(x, y)denotes a random variable for bit Bk(x, y)that takes on values in the state space, Φ={0,1}. The Tin Eq. (2) is a temperature constant and Zis a normalizing constant defined as:

    where Ω= {Fk=(Fk(1,1), ,Fk(x, y) , ,Fk(m, n) )|Fk(x, y)∈ Φ}is a configuration set including all possible realizations of Fk. The U( Fk)in Eq. (3) is an energy function defined as:

    where C is a set of cliques formed by the neighborhood system, and Vc(·)is a potential function defined on a given clique c( c ∈C)(e.g. in our case bits Bk(x, y)and Bk?1(x, y)form a clique). Eq. (2) calculates the probability of Fk?1(x, y)givenFk(x, y), and p( Fk(x, y) |Fk?1(x, y))can be computed similarly.

    3.2 Design of JFGIR

    To seamlessly integrate the MRF between adjacent bit-planes in the bit-plane reconstruction using the factor graph, we further represent the MRF between adjacent bitplanes with a factor graph [Kschischang, Frey and Loeliger (2001)]. By denoting Fk(x, y)and Fk?1(x, y)with variable nodes (VNs) and characterizing the statistical correlation in Eq. (2) with a factor node (FN), we construct a factor graph for the MRF between adjacent bit-planes, as shown in Fig. 2, where circles and squares stand for VNs and FNs, respectively.

    Figure 2: Illustration of the factor graph for the MRF between adjacent bit-planes, where Bk and B k?1denotes 2 adjacent bit-planes and stands for the statistical correlation between Fk(x, y)and F k ?1(x, y)

    According to our previous work [Wang, Ni, Zhang et al. (2018)], the factor graph for the reconstruction of each bit-plane can be constructed as Fig. 3, where the bit-plane index,k , is omitted for simplicity. As shown in Fig. 3, the factor graphs in boxes with solid lines, dot lines, and dot-and-dash lines are those for the MRF within a bit-plane,decryption, and LDPC-based decompression, respectively. Sj( j= 1, ,q)are LDPC syndrome bits, which are taken as the encrypted and decompressed bit sequence,Yi(i =1, ,m n)is the decompressed but encrypted sequence, Kiis the encryption key sequence, Fi(i =(y ?1)n +x)is a 1-D bit sequence converted from a given bit-plane, and Fx,ydenotes bits of a 2-D bit-plane.Mx,yNx,y, Px,y, ti, and gjrepresent the constraints imposed by the MRF within a bit-plane, image source prior, decryption, and LDPC code, respectively.

    By merging the same VNs of Figs. 2 and 3, we can build the JFGIR for the reconstruction of two adjacent bit-planes, Bk(x, y)and Bk?1(x, y)(k =8, ,2). As illustrated in Fig. 1,the randomness of Bk(x, y)(i.e. entropy) is less than that of Bk?1(x, y). Thus,Bk(x, y)would achieve higher lossless compression efficiency than Bk?1(x, y)and provide more statistical information for Bk?1(x, y), and vice versa. Therefore, it is preferable to first reconstruct Bk(x, y)and then exploit its statistical correlation to recover Bk?1(x, y).

    Figure 3: Illustration of the factor graph for reconstruction of each bit-plane Bk of size m×n

    3.3 Derivation of SPA adapted to JFGIR

    By taking the probability distribution of each bit in a bit-plane as a marginal function in the MRF, each bit-plane can thus be effectively recovered by running the SPA on the constructed JFGIR. By using the log(p (0) p(1))as the message passed between VNs and FNs, where p(0)and p(1)denote the probabilities of bits 0 and 1, respectively, we then derive the SPA adapted to the JFGIR as follows.

    Figure 4: Flowchart of the SPA on the JFGIR

    Fig. 4 plots the flowchart of the SPA, where vVN→FNand μFN→VNdenote a message updated from a VN to an FN and that from an FN to a VN, respectively. The initialization step initializes all vVN→FNs according to the received syndrome Sp(p = 1, ,q), the secret key Ki(i =1, ,m n), and the source prior Px,y(x ∈ [1,n] , y ∈[1,m]). Via vVN→FNs,messages μFN→VNare updated via the product operation of the SPA, which are then used to yield messages vVN→FNs by means of the sum operation of the SPA. To check whether convergence is met or not, the decompressed but encrypted sequenceis estimated using vVN→FNs and S′=HY is calculated accordingly. Ifis equal to, then convergence is met and the original bitplane B( x, y)can be perfectly recovered;otherwise, continue to execute these update and estimation steps until convergence is achieved or the predefined maximum iteration number is reached. Due to space limitation,details of these steps for the JFGIR within a bitplane is omitted here and recommended to refer to our previous work [Wang, Ni, Zhang et al. (2018)], while the involved details for the JFGIR between adjacent bitplanes are presented below, where the superscript k indicating the bit-plane index is re-inserted here to make symbols clear.

    1) Initialization. As Bk( x, y)has been reconstructed in recovering Bk?1(x, y), message(k =8, ,2)(see also Fig. 2) is initialed as:

    The derivation is omitted here for space limitation.

    4 Proposed scheme

    Fig. 5 illustrates the proposed MRF-based ETC scheme for encrypted gray images.Details for these steps are given below.

    Figure 5: The proposed scheme

    1) Bit-plane division. This step divides a gray image, I( x, y), of size m×ninto 8 bitplanes Bk( x, y) (k =1, ,8)using Eq. (1).

    2) Bit-plane encryption. First generate a pseudorandom Bernoulli(1/2) bit sequence of length mn, says Kk={,i =1, ,m n}, via the kth secret key K EY+2k, where KEY is a one-time-pad initial secret key. Then encrypt Bk( x, y)with the stream cipher, i.e.,

    3) Bit-plane compression. According to Johnson et al. [Johnson, Ishwar, Prabhakaran et al. (2004)], the service provider can compress, without access to the encryption key, each encrypted bit-plane using the channel code of LDPC. In particular, Ykis compressed as Sk=HYk, where H is a parity-check matrix of size (1 ? R) mn ×mn , whereis the code rate of LDPC.

    To compress bitplanes with nearly equiprobable 0 s and 1 s, a doping technology is employed [Wang, Ni, Zhang et al. (2018)]. That is, a number of encrypted but uncompressed bits are sent to the receiver, and these doped bits are then used at the receiver as the “catalyst” to guide the SPA towards convergence. This is essentially equivalent to construct the parity-check matrix in case of doping as follows [Wang, Ni,Zhang et al. (2018)]:

    where the D of size dp_ rate ×(( 1 ?R )×mn)contains doped rows, each of which consists of one 1 at a random column and mn?10 s. The dp_ratedenotes the doping rate, i.e. the ratio between the number of doped bits and the length of (1 ? R)×mn. Thus,the compression rate in terms of bit per bit (bpb) is computed as:

    4) Bit-plane reconstruction. First reconstruct the MSB, B8( x, y), using the MRF-based method for a binary image [Wang, Ni, Zhang et al. (2018)] (see also Fig. 3), in which the secret key KEY+28is used, where KEYis sent through a secret channel from the content owner side. Based on the reconstructedB8( x, y), we then recover B7( x, y)by running the SPA on the JFGIR (see also Figs. 2 and 4). After obtaining B7( x, y), we proceed to recover B6( x, y), and so on.

    5) Gray-image reconstruction. By merging the 8 recovered bit-planes Bk( x, y)(k =1, ,8), we thus reconstruct the original gray image I′( x, y).

    5 Experimental results and analysis

    In this section, we evaluate the proposed scheme. We first set parameters for the MRF and then compare compression efficiency of the proposed scheme with prior arts.

    5.1 Experimental setting

    To characterize natural images with both smooth and context areas, we deploy the discontinuity-adaptive potential function [AL-Shaykh and Mersereau (1998); Wang, Xiao,Peng et al. (2018)], i.e.

    where F1and F2are essentially a pair of elements in a clique of a given random field,and δis a model parameter to control the sharpness of edges.

    According to Eqs. (2)-(4) and (10), the concerned MRF has 3 parameters, i.e. δ, P, and T. As assessed in our previous work [Wang, Ni, Zhang et al. (2018)], the MRF parameters of δ=45and T =0.00049are a preferable setting, and P=0.35and P=0.5 are used for compression of encrypted binary images without and with doping,respectively. As each bit-plane of a gray image can be considered as a binary image,these MRF parameters in Wang et al. [Wang, Ni, Zhang et al. (2018)] are adopted in the reconstruction of each bit-plane.

    Considering that the MRF between adjacent bitplanes may be different to that within a bitplane, we further seek a feasible setting for the MRF between adjacent bitplanes. In more detail, parameters δand P are set as 45 and 0.5, respectively, and parameter Tis decreased gradually from 1. Extensive experimental simulation shows that T =0.005is desirable for the MRF between B8( x, y)and B7( x, y)and T=0.05is feasible for the MRF between adjacent bitplanes from B7( x, y)to B5( x, y). The Tfor the MRF between other adjacent bitplanes, however, are intractable because bitplanes from B4( x, y)to B1( x, y)cannot be compressed, as demonstrated below. This universal parameter setting really works for all test gray images as it provides sufficient side information to guide the SPA towards convergence.

    In the simulation, we test 10 100× 100gray images with diverse texture characteristics, as illustrated in Fig. 6. Each test gray image is encrypted, compressed, and reconstructed via the algorithm in Section 4 (see also Fig. 5), and the lossless compression performance are assessed with compression rates in terms of bpb (bit per bit) and bit per pixel (bpp),where the bpb is used for each bitplane while the bpp is for a gray image. In compressionstage, LDPC code rates, , are set to be [0.03,0.95]with step 0.025, and the achieved minimum compression rate (MinCR) (see Eq. (9)) is taken as the compression rate (CR)for the involved bitplane, where the minimum doping rate dp_ratecorresponding to a givenis sought via a binary search.

    Each LDPC code is of length 10000, its degree distribution is obtained from the LTHC website [Amraoui and Urbanke (2003)], and the Hnewin Eq. (8) is constructed via the PEG method [Hu, Eleftherious and Arnold (2005)].

    5.2 Experimental results and analysis

    Via the mentioned settings, we run the proposed algorithm on 10 test gray images. Table 1 summarizes lossless compression rates for 8 bitplanes of each test image. It is found that the first 3 MSBs of most test images can be successfully compressed while the other 5 bitplanes cannot. This is because bitplanes from B5( x, y)to B1( x, y)are nearly random(see also Fig. 1) and thus cannot be well characterized with the MRF, which in turn makes the compression and reconstruction of these bitplanes difficult. Nevertheless,bitplanes B5( x, y)of images “F16” and “Milkdrop” with a large portion of smooth area are two exceptions, which can be compressed by the proposed scheme.

    Table 1: Compression rates (CRs) for 8 bitplanes of each gray image and their summary CRs (SCRs), where CRk (k=8, ..., 1) denotes the CR for bitplane B k( x, y)in terms of bpb

    Figure 6: 10 test images of size 100× 100

    We further evaluate the proposed scheme by comparing it with the state of the arts[Schonberg (2006); Schonberg (2007); Liu, Zeng, Dong et al. (2010)] that also exploit statistical characteristics of natural images at the receiver. The work of Schonberg[Schonberg (2006, 2007)] incorporates the 2-D Markov source model in the reconstruction of binary image and successfully compresses the first 2 encrypted MSBs in a lossless way. Via a resolution-progressive manner, the approach of Liu et al. [Liu,Zeng, Dong et al. (2010)] uses low-resolution sub-images to learn source statistics for high-resolution ones, which can compress the first 4 encrypted MSBs. Regarding that the proposed scheme succeeds to compress the first 3 encrypted MSBs for most test gray images and the first 4 encrypted MSBs for a few test images with a large portion of smooth area (e.g. f16 and milkdrop), it achieves significant improvement in terms of compression efficiency against the method of Schonberg et al. [Schonberg, Draper and Ramchandran (2006); Schonberg (2007)], while it is comparable or somewhat inferior to the approach of Liu et al. [Liu, Zeng, Dong et al. (2010)]. The improvement over the method of Schonberg et al. [Schonberg, Draper and Ramchandran (2006); Schonberg(2007)] comes from the fact that the MRF is better than the 2-D Markov source model in characterizing natural gray images with complex intrinsic structure, while the weakness in comparison to the scheme of Liu et al. [Liu, Zeng, Dong et al. (2010)] attributes to the evidence that the first 4 or 5 encrypted LSBs are difficult to model with the MRF.

    Table 2: Compression rates (CRs) and numerical results of H1(X)and H∞(X)for the first 3 MSBs of each test gray image

    In addition, we also examine the bound for compression of encrypted gray images. As compressing encrypted gray images is essentially equivalent to 8-bitplane compression,the bound for compression of encrypted binary images given in Wang et al. [Wang, Ni,Zhang et al. (2018)] can be taken for analysis here. As discussed in Wang et al. [Wang,Ni, Zhang et al. (2018)], the compression bound is equal to the entropy rate of the adopted MRF source, says H∞(X), the derivation for which is omitted her for space limitation and recommended to refer to Wang et al. [Wang, Ni, Zhang et al. (2018)]. For convenience, the entropy rate of independent identically distributed (i.i.d.) source,namely H1(X), is also compared. Tab. 2 lists compression rates, H1(X)and H∞(X), for the first 3 MSBs of each test gray image, where results for the 4thMSB are not given as the 4thMSB of most test images cannot be compressed. It is observed that compression rates for the first 3 MSBs are far lower than H1(X)due to the exploitation of the MRF in the reconstruction process, while there still exist sizeable gaps from the bound H∞(X)for the proposed scheme to improve.

    6 Conclusion

    In this paper, we have presented a new ETC scheme for gray images using the MRF. We deployed the MRF to characterize statistical correlations between adjacent bitplanes and within a bitplane, represented them with factor graphs, and further seamlessly integrated the built MRF factor graphs in those for decryption and LDPC decoding, yielding a JFGIR (joint factor graph for gray image reconstruction). The SPA adapted to the JFGIR is then derived theoretically by applying the theory of factor graph. Via the constructed JFGIR and the derived SPA, an MRF-based scheme for compression of encrypted gray images is thus developed, which uses the stream cipher to encrypt each bitplane, employs the LDPC code to compresses each bitplane, and exploits the JFGIR to facilitate inferring the original bitplane. Numerical results show that a universal MRF parameter setting works well for all gray images as the setting provides sufficient side information to guide the SPA towards convergence. Extensive experimental simulation demonstrates that the proposed scheme successfully compresses the first 3 and 4 MSBs for most test gray images and a few test images with a large portion of smooth area, respectively, which achieves significant improvement in terms of compression efficiency over the prior stateof-the-art using the 2-D Markov source model while is comparable or somewhat inferior to that adopting the resolution-progressive strategy.

    Acknowledgement:This work is supported in part by the National Natural Science Foundation of China under contracts 61672242 and 61702199, in part by China Spark Program under Grant 2015GA780002, in part by The National Key Research and Development Program of China under Grant 2017YFD0701601, and in part by Natural Science Foundation of Guangdong Province under Grant 2015A030313413.

    亚洲国产日韩一区二区| 成人特级av手机在线观看| 一区二区三区乱码不卡18| 日本与韩国留学比较| 一个人看视频在线观看www免费| 中文字幕免费在线视频6| 男插女下体视频免费在线播放| 久久人人爽人人爽人人片va| 日本黄大片高清| 免费黄网站久久成人精品| 欧美成人a在线观看| 午夜日本视频在线| 亚洲精品一二三| 国产爽快片一区二区三区| 少妇猛男粗大的猛烈进出视频 | 青春草亚洲视频在线观看| 欧美bdsm另类| 高清午夜精品一区二区三区| 99久久精品一区二区三区| 亚洲精品中文字幕在线视频 | 欧美xxxx性猛交bbbb| 精品少妇久久久久久888优播| 又大又黄又爽视频免费| 亚洲欧美一区二区三区黑人 | 人妻制服诱惑在线中文字幕| 最近中文字幕高清免费大全6| 国产一区二区亚洲精品在线观看| 亚洲欧美成人综合另类久久久| 哪个播放器可以免费观看大片| 99久久精品一区二区三区| 国产精品蜜桃在线观看| 国语对白做爰xxxⅹ性视频网站| 卡戴珊不雅视频在线播放| 亚洲色图综合在线观看| av免费在线看不卡| 天堂中文最新版在线下载 | 国产精品一区二区在线观看99| 国产综合懂色| 欧美性感艳星| 国内揄拍国产精品人妻在线| 亚洲电影在线观看av| 免费不卡的大黄色大毛片视频在线观看| 男人舔奶头视频| 国产男女超爽视频在线观看| 午夜视频国产福利| 少妇人妻精品综合一区二区| 啦啦啦中文免费视频观看日本| 色视频在线一区二区三区| 亚洲av成人精品一二三区| 街头女战士在线观看网站| freevideosex欧美| 日韩人妻高清精品专区| 日韩国内少妇激情av| 国产欧美日韩精品一区二区| 欧美 日韩 精品 国产| 禁无遮挡网站| 国产高清有码在线观看视频| 欧美性感艳星| 九色成人免费人妻av| 人妻 亚洲 视频| 99久国产av精品国产电影| videossex国产| 日韩欧美精品免费久久| 久久久久久九九精品二区国产| 18+在线观看网站| 亚洲天堂国产精品一区在线| 热re99久久精品国产66热6| 亚洲av免费高清在线观看| 欧美激情在线99| 亚洲av一区综合| 七月丁香在线播放| 免费播放大片免费观看视频在线观看| av播播在线观看一区| 久久鲁丝午夜福利片| 久久精品熟女亚洲av麻豆精品| 如何舔出高潮| 亚洲人与动物交配视频| 亚洲综合精品二区| 在线观看美女被高潮喷水网站| 国产精品人妻久久久影院| 视频区图区小说| 国产精品国产三级专区第一集| 日本黄大片高清| 国产精品一区二区三区四区免费观看| 精品一区二区三卡| 丝瓜视频免费看黄片| 熟女人妻精品中文字幕| 日韩成人av中文字幕在线观看| 亚洲欧洲日产国产| 国产成人91sexporn| 欧美日韩视频精品一区| 欧美精品一区二区大全| 99视频精品全部免费 在线| 久久亚洲国产成人精品v| 婷婷色av中文字幕| 最近的中文字幕免费完整| 热99国产精品久久久久久7| 麻豆国产97在线/欧美| 日韩欧美精品v在线| 日韩欧美 国产精品| 久久久亚洲精品成人影院| 精品人妻偷拍中文字幕| 久久热精品热| 三级国产精品欧美在线观看| 欧美最新免费一区二区三区| 国产精品久久久久久久电影| 亚洲精品日韩在线中文字幕| 国内少妇人妻偷人精品xxx网站| 一级av片app| 青青草视频在线视频观看| 日韩,欧美,国产一区二区三区| 国产免费又黄又爽又色| 别揉我奶头 嗯啊视频| 精品国产露脸久久av麻豆| 91狼人影院| 国产欧美日韩精品一区二区| 人妻少妇偷人精品九色| 亚洲av免费高清在线观看| 97精品久久久久久久久久精品| 乱系列少妇在线播放| 国产免费视频播放在线视频| 插阴视频在线观看视频| 亚洲最大成人手机在线| 一二三四中文在线观看免费高清| 18禁在线播放成人免费| 性插视频无遮挡在线免费观看| 六月丁香七月| 国产成人免费无遮挡视频| 久久久久久伊人网av| 欧美日韩视频精品一区| 日韩av在线免费看完整版不卡| av在线观看视频网站免费| av女优亚洲男人天堂| 一级毛片电影观看| 一级片'在线观看视频| 最近最新中文字幕免费大全7| 欧美日韩精品成人综合77777| 中文欧美无线码| 蜜臀久久99精品久久宅男| 亚洲精品久久久久久婷婷小说| 国产黄频视频在线观看| 少妇丰满av| 91aial.com中文字幕在线观看| 99久久中文字幕三级久久日本| 亚洲怡红院男人天堂| 日本午夜av视频| 自拍偷自拍亚洲精品老妇| 久久热精品热| 日韩av在线免费看完整版不卡| 91久久精品电影网| 在线精品无人区一区二区三 | 天堂俺去俺来也www色官网| 亚洲高清免费不卡视频| 嫩草影院新地址| 我要看日韩黄色一级片| 在线观看国产h片| 综合色丁香网| 青青草视频在线视频观看| 欧美国产精品一级二级三级 | 欧美成人午夜免费资源| 亚洲精品456在线播放app| 亚洲欧美日韩卡通动漫| 听说在线观看完整版免费高清| 日韩大片免费观看网站| 五月玫瑰六月丁香| 国产视频首页在线观看| 七月丁香在线播放| 国产真实伦视频高清在线观看| 亚洲欧美精品专区久久| 自拍偷自拍亚洲精品老妇| 日本黄大片高清| 亚洲国产高清在线一区二区三| 久久久亚洲精品成人影院| 人人妻人人澡人人爽人人夜夜| 国产久久久一区二区三区| 水蜜桃什么品种好| 91精品国产九色| 中文字幕制服av| 亚洲图色成人| 免费黄频网站在线观看国产| 看黄色毛片网站| 岛国毛片在线播放| 国产伦精品一区二区三区四那| 日韩视频在线欧美| 国产淫语在线视频| 久久鲁丝午夜福利片| 男的添女的下面高潮视频| 黄色一级大片看看| www.av在线官网国产| 亚洲最大成人中文| 久久久久久久久久久免费av| 一级毛片黄色毛片免费观看视频| 午夜福利在线观看免费完整高清在| 亚洲欧美精品自产自拍| 中文字幕av成人在线电影| 久久久亚洲精品成人影院| 我的老师免费观看完整版| av播播在线观看一区| 看非洲黑人一级黄片| 在线观看一区二区三区| 免费播放大片免费观看视频在线观看| 99热国产这里只有精品6| 亚洲伊人久久精品综合| 最近最新中文字幕免费大全7| 18禁裸乳无遮挡动漫免费视频 | 久久久久精品性色| 狂野欧美激情性bbbbbb| 久久99热6这里只有精品| 熟妇人妻不卡中文字幕| 欧美高清性xxxxhd video| 老师上课跳d突然被开到最大视频| 欧美日本视频| 波野结衣二区三区在线| 欧美日韩一区二区视频在线观看视频在线 | 成人国产av品久久久| 永久网站在线| 亚洲精品亚洲一区二区| 亚洲精品,欧美精品| www.av在线官网国产| 亚洲av男天堂| 身体一侧抽搐| 大陆偷拍与自拍| 国产毛片在线视频| 国内精品美女久久久久久| 成人黄色视频免费在线看| 精品久久久久久电影网| 国产成人91sexporn| 麻豆国产97在线/欧美| 国精品久久久久久国模美| 久久久久性生活片| 女的被弄到高潮叫床怎么办| 精品亚洲乱码少妇综合久久| kizo精华| 91久久精品电影网| 亚洲欧美成人综合另类久久久| 大片电影免费在线观看免费| 天美传媒精品一区二区| 大香蕉97超碰在线| 亚洲欧美日韩另类电影网站 | 国产黄a三级三级三级人| 最近手机中文字幕大全| 欧美3d第一页| 美女高潮的动态| 国产黄色视频一区二区在线观看| 女的被弄到高潮叫床怎么办| 美女被艹到高潮喷水动态| 国产高清不卡午夜福利| 国产成人一区二区在线| 国产熟女欧美一区二区| 亚洲精品视频女| 视频区图区小说| a级毛片免费高清观看在线播放| 毛片一级片免费看久久久久| 黄色视频在线播放观看不卡| 免费黄网站久久成人精品| 日韩欧美一区视频在线观看 | 欧美精品国产亚洲| 免费大片18禁| 91久久精品国产一区二区成人| 一个人观看的视频www高清免费观看| 禁无遮挡网站| 麻豆乱淫一区二区| 成年av动漫网址| 老师上课跳d突然被开到最大视频| 国产在线男女| 人妻制服诱惑在线中文字幕| av.在线天堂| 亚洲真实伦在线观看| 3wmmmm亚洲av在线观看| 26uuu在线亚洲综合色| 亚洲av福利一区| 亚洲av电影在线观看一区二区三区 | 国内精品宾馆在线| 少妇人妻精品综合一区二区| 别揉我奶头 嗯啊视频| 亚洲av中文字字幕乱码综合| 大香蕉久久网| 成年女人看的毛片在线观看| 亚洲精品自拍成人| 3wmmmm亚洲av在线观看| 黑人高潮一二区| 成人特级av手机在线观看| 亚洲四区av| 在线免费十八禁| 免费看av在线观看网站| 特大巨黑吊av在线直播| 国产91av在线免费观看| 不卡视频在线观看欧美| 精品国产一区二区三区久久久樱花 | 成人特级av手机在线观看| 高清欧美精品videossex| 精品人妻一区二区三区麻豆| 国产有黄有色有爽视频| 日韩伦理黄色片| 国产视频首页在线观看| 久久久精品欧美日韩精品| 啦啦啦中文免费视频观看日本| 黄色视频在线播放观看不卡| tube8黄色片| 波野结衣二区三区在线| 99热国产这里只有精品6| 日本爱情动作片www.在线观看| 欧美成人a在线观看| 亚洲精品第二区| 亚洲精品一区蜜桃| 久久久久久久久久久免费av| 神马国产精品三级电影在线观看| 精品午夜福利在线看| 久久精品久久精品一区二区三区| 日韩一区二区三区影片| 97超碰精品成人国产| 成人亚洲欧美一区二区av| 久久热精品热| 久久久久久伊人网av| 天美传媒精品一区二区| 中文乱码字字幕精品一区二区三区| 又爽又黄a免费视频| 国产精品一区二区在线观看99| 亚洲国产av新网站| 嫩草影院入口| 99热这里只有精品一区| 丝瓜视频免费看黄片| 欧美日本视频| 亚洲经典国产精华液单| 亚洲天堂av无毛| 亚洲av电影在线观看一区二区三区 | 美女高潮的动态| 少妇熟女欧美另类| 日韩电影二区| av.在线天堂| www.色视频.com| 91久久精品国产一区二区成人| 婷婷色av中文字幕| 欧美老熟妇乱子伦牲交| 国产乱人视频| 久久精品综合一区二区三区| 欧美zozozo另类| 丰满少妇做爰视频| 亚洲精品456在线播放app| 夜夜爽夜夜爽视频| 波多野结衣巨乳人妻| 99视频精品全部免费 在线| 亚洲精品久久久久久婷婷小说| 欧美精品国产亚洲| 18禁裸乳无遮挡免费网站照片| 在线亚洲精品国产二区图片欧美 | 波多野结衣巨乳人妻| 91午夜精品亚洲一区二区三区| 亚洲精品色激情综合| 舔av片在线| 韩国高清视频一区二区三区| 伊人久久精品亚洲午夜| 久久精品久久久久久噜噜老黄| 精品久久国产蜜桃| 一本一本综合久久| 免费看日本二区| 欧美高清成人免费视频www| 麻豆久久精品国产亚洲av| 日本猛色少妇xxxxx猛交久久| 久久精品国产亚洲网站| 内射极品少妇av片p| 午夜福利在线在线| 亚洲精品国产色婷婷电影| 丝袜美腿在线中文| av在线app专区| 熟女电影av网| 在线观看三级黄色| 免费观看的影片在线观看| 色视频www国产| 一级毛片aaaaaa免费看小| 寂寞人妻少妇视频99o| 高清av免费在线| 最近的中文字幕免费完整| 男女无遮挡免费网站观看| 亚洲精品视频女| 少妇裸体淫交视频免费看高清| 日韩 亚洲 欧美在线| 联通29元200g的流量卡| 天天躁夜夜躁狠狠久久av| 国产一区亚洲一区在线观看| 成年人午夜在线观看视频| 日本三级黄在线观看| 亚洲成人av在线免费| 精品久久国产蜜桃| 女人被狂操c到高潮| 精品酒店卫生间| 久久精品久久久久久噜噜老黄| 欧美国产精品一级二级三级 | 国产老妇女一区| 自拍欧美九色日韩亚洲蝌蚪91 | av播播在线观看一区| 69人妻影院| 国产v大片淫在线免费观看| kizo精华| av播播在线观看一区| 欧美日韩视频高清一区二区三区二| 国产精品蜜桃在线观看| av福利片在线观看| 在线观看三级黄色| 免费黄色在线免费观看| 国产探花极品一区二区| 五月伊人婷婷丁香| 男男h啪啪无遮挡| 在线观看人妻少妇| 成人毛片60女人毛片免费| 久久久国产一区二区| 亚洲欧美日韩另类电影网站 | 亚洲va在线va天堂va国产| 欧美一级a爱片免费观看看| 纵有疾风起免费观看全集完整版| 亚洲内射少妇av| 久久精品夜色国产| 欧美+日韩+精品| 日韩伦理黄色片| 国产免费视频播放在线视频| 亚洲不卡免费看| .国产精品久久| 菩萨蛮人人尽说江南好唐韦庄| 亚洲国产最新在线播放| 乱码一卡2卡4卡精品| 三级经典国产精品| 日韩欧美精品v在线| 最近中文字幕高清免费大全6| 少妇熟女欧美另类| 国产伦在线观看视频一区| 国产精品偷伦视频观看了| 黄色怎么调成土黄色| 高清毛片免费看| 日本-黄色视频高清免费观看| 亚州av有码| 久久人人爽人人片av| 精品酒店卫生间| 亚洲国产精品专区欧美| 高清欧美精品videossex| 97在线人人人人妻| 欧美激情久久久久久爽电影| 久久99热这里只有精品18| 午夜福利视频精品| 别揉我奶头 嗯啊视频| 午夜福利网站1000一区二区三区| 亚洲最大成人av| 国产久久久一区二区三区| av福利片在线观看| 一本—道久久a久久精品蜜桃钙片 精品乱码久久久久久99久播 | 亚洲欧美一区二区三区国产| 国产精品99久久久久久久久| 男女那种视频在线观看| 久久久久久久久久人人人人人人| www.av在线官网国产| 亚洲一级一片aⅴ在线观看| 一区二区三区四区激情视频| 久久精品国产亚洲av天美| 免费大片黄手机在线观看| 中国三级夫妇交换| 99热这里只有精品一区| 91午夜精品亚洲一区二区三区| 中文字幕亚洲精品专区| 亚洲色图综合在线观看| 国产在线一区二区三区精| 亚洲精品乱码久久久久久按摩| 久久久精品欧美日韩精品| 亚洲精品国产av蜜桃| 午夜福利网站1000一区二区三区| 久久久久久久精品精品| 中文字幕久久专区| 深夜a级毛片| 性色avwww在线观看| kizo精华| 日韩精品有码人妻一区| 99久久精品国产国产毛片| 亚洲精品一二三| 黄片wwwwww| 18禁裸乳无遮挡免费网站照片| 国产在线男女| 日本午夜av视频| 大香蕉97超碰在线| 91狼人影院| 色吧在线观看| a级毛色黄片| av天堂中文字幕网| 国产av不卡久久| 久久精品国产亚洲网站| 国产成人freesex在线| 大码成人一级视频| 亚洲精品成人av观看孕妇| 亚洲无线观看免费| 日本wwww免费看| 久久久久国产精品人妻一区二区| 岛国毛片在线播放| 国产一区二区亚洲精品在线观看| 亚洲国产成人一精品久久久| 人妻夜夜爽99麻豆av| 久久99热这里只频精品6学生| 国产一区有黄有色的免费视频| 国产精品偷伦视频观看了| 一级毛片我不卡| 日韩成人伦理影院| 日韩大片免费观看网站| 国产亚洲一区二区精品| 日本免费在线观看一区| 综合色丁香网| 男人添女人高潮全过程视频| 婷婷色综合大香蕉| 成年人午夜在线观看视频| 女人久久www免费人成看片| 色哟哟·www| av线在线观看网站| 国产黄频视频在线观看| 五月天丁香电影| 国产成人精品福利久久| 激情 狠狠 欧美| 午夜视频国产福利| 一本—道久久a久久精品蜜桃钙片 精品乱码久久久久久99久播 | 中文乱码字字幕精品一区二区三区| 久久女婷五月综合色啪小说 | 精品久久久精品久久久| 欧美激情国产日韩精品一区| 国产成人免费观看mmmm| 欧美日韩亚洲高清精品| 欧美日韩在线观看h| 人妻系列 视频| 日韩一本色道免费dvd| 久久国内精品自在自线图片| 久久鲁丝午夜福利片| 夫妻午夜视频| 久久久久久久久久久丰满| 国产精品福利在线免费观看| 国产人妻一区二区三区在| 国产熟女欧美一区二区| 一区二区三区免费毛片| 十八禁网站网址无遮挡 | 国产在线一区二区三区精| 自拍偷自拍亚洲精品老妇| 久久国内精品自在自线图片| 国产探花极品一区二区| 亚洲精品国产成人久久av| av专区在线播放| 黑人高潮一二区| 丝袜喷水一区| 国产精品一及| 熟妇人妻不卡中文字幕| 深夜a级毛片| 成年免费大片在线观看| av网站免费在线观看视频| 国产精品嫩草影院av在线观看| 欧美日韩一区二区视频在线观看视频在线 | 国产男人的电影天堂91| av线在线观看网站| 亚洲怡红院男人天堂| 九九爱精品视频在线观看| 看非洲黑人一级黄片| 女的被弄到高潮叫床怎么办| 哪个播放器可以免费观看大片| 99热全是精品| 午夜日本视频在线| 黄色视频在线播放观看不卡| 日本-黄色视频高清免费观看| 国语对白做爰xxxⅹ性视频网站| 国产黄片美女视频| 久久韩国三级中文字幕| 日韩视频在线欧美| 在线观看三级黄色| 国产成人a区在线观看| 自拍欧美九色日韩亚洲蝌蚪91 | 久久久久久伊人网av| 99热全是精品| 又黄又爽又刺激的免费视频.| 成人高潮视频无遮挡免费网站| 欧美精品人与动牲交sv欧美| 嫩草影院新地址| 人妻 亚洲 视频| 91午夜精品亚洲一区二区三区| 亚洲精品日本国产第一区| 久久精品国产亚洲av天美| 午夜福利高清视频| 国内精品宾馆在线| 日韩,欧美,国产一区二区三区| 天美传媒精品一区二区| 色5月婷婷丁香| 亚州av有码| 国产黄色视频一区二区在线观看| av.在线天堂| 日韩成人av中文字幕在线观看| kizo精华| 亚洲国产精品专区欧美| 三级国产精品片| 亚洲真实伦在线观看| 久久韩国三级中文字幕| 午夜视频国产福利| 一级毛片电影观看| 高清在线视频一区二区三区| 永久免费av网站大全| 亚洲四区av| 天天一区二区日本电影三级| 麻豆国产97在线/欧美| 亚洲三级黄色毛片| 少妇人妻一区二区三区视频| 国产淫片久久久久久久久| 亚洲电影在线观看av| 欧美国产精品一级二级三级 | 久热久热在线精品观看| 国产白丝娇喘喷水9色精品| 成人特级av手机在线观看| 好男人在线观看高清免费视频| 久久久久久久久久成人| 日韩伦理黄色片| 国产免费视频播放在线视频| 男人添女人高潮全过程视频| 视频区图区小说| 久久久久精品性色| 91午夜精品亚洲一区二区三区| 久久人人爽av亚洲精品天堂 | 午夜亚洲福利在线播放| 联通29元200g的流量卡| 久久久久久国产a免费观看|