DubaiSat-2 is the United Arab Emirates (UAE) second earth observation satellite. It was launched into a 600 km orbit on the 21st of November 2013. The satellite is owned and operated by the Mohammed Bin Rashid Space C...
详细信息
With the development of digital technologies, compression and encryption have become important aspects of information. In many applications, encryption of compressed images is considered vital for hiding data. In this...
详细信息
With the development of digital technologies, compression and encryption have become important aspects of information. In many applications, encryption of compressed images is considered vital for hiding data. In this work, we implemented the imagecompression-encryption hardware on a FPGA. JPEG was used as a compression standard and Tiny encryption Algorithm was used as an encryption algorithm. Discrete Cosine Transform coefficients were encrypted by using two methods. First, only DC coefficients of each 8×8 block of image were encrypted. Then, along with DC coefficients, first five AC coefficients of each 8×8 block of image were encrypted. In the result, encrypted images and PSNR values were given in order to determine success of the work. This work is novel from the point of view encryption methods.
The proceedings contain 119 papers. The special focus in this conference is on Advances in Electrical and Computer technologies. The topics include: Sum modified laplacian-based image fusion in dct domain with super r...
ISBN:
(纸本)9789811555572
The proceedings contain 119 papers. The special focus in this conference is on Advances in Electrical and Computer technologies. The topics include: Sum modified laplacian-based image fusion in dct domain with super resolution;a supplement to "pre: A simple, pragmatic, and provably correct algorithm";effective compression of digital images using spiht coding with selective decomposition bands;reconfigurable lut-based dynamic obfuscation for hardware security;detection and control of phishing attack in electronic medical record application;smart apron using embroidered textile fractal antenna for e-health monitoring system;design of modified wideband log periodic microstrip antenna with slot for navigational application;machine learning approach to condition monitoring of an automotive radiator cooling fan system;sensors network for temperature measurement in a cocoa fermentator;communication-aware virtual machine placement in cloud;migration from silicon to gallium nitride devices—a review;high-speed modified da architecture for dwt computation in secure image encoding;satellite image classification with data augmentation and convolutional neural network;design and randomness evaluation of a chaotic neural encryption and decryption network for trng;circuit modelling of graphene and carbon nanotube-based multilayer structures for high-frequency absorption;pi and sliding mode control of quanser qnet 2.0 hvac system;robust control of position and speed for a dc servomotor system using various control techniques;mpc-based temperature control of cstr process and its comparison with pid;microgrid integration in kerala power grid—a case study;design of control system for autonomous harvester based on navigation inputs;design and optimization of microgrid as ev charging source;preface.
Traditional fast Discrete Cosine Transforms (DCT)/ Inverse DCT (IDCT) algorithms have focused on reducing the arithmetic complexity. In this manuscript, we implemented a new architecture simultaneous for image compres...
详细信息
Traditional fast Discrete Cosine Transforms (DCT)/ Inverse DCT (IDCT) algorithms have focused on reducing the arithmetic complexity. In this manuscript, we implemented a new architecture simultaneous for imagecompression and encryption technique suitable for real-time applications. Here, contrary to traditional compression algorithms, only special points of DCT outputs are calculated. For the encryption process, LFSR is used to generate random number and added to some DCT outputs. Both DCT algorithm and arithmetic operators used in algorithm are optimized in order to realize a compression with reduced operator requirements and to have a faster throughput. High Performance Multiplier (HPM) is being used for integer multiplications. Simulation results show the compression ratio around 66% and a PSNR about 24dB. The throughput of this architecture is 624 M samples/s with a clock frequency of 78 MHz.
In this paper we have proposed an image crypto-compression system that guarantees a secure storage and transfer while preserving the performance of the used compression method. Regarding compression, we have chosen to...
详细信息
In this paper we have proposed an image crypto-compression system that guarantees a secure storage and transfer while preserving the performance of the used compression method. Regarding compression, we have chosen to use the discrete cosine transformation (DCT), Huffman coding and RLE because of their efficiency and their use in most current cryptocompression systems. As for encryption, we have made the choice to use the chaos for its good cryptographic properties. Experimental results confirm that our system is efficient, secure and greatly improve the compression ratio of the image while maintaining the performance of the encryption algorithm.
This work combines Arnold transform method with the spatial domain to encrypt a covered image and also recovers the covered image by the application of inverse Arnold transform. First, transform a cover image into sub...
详细信息
For telecommunication systems, various compression and encryption techniques are proposed to satisfy a fast and secure transmission. However these two techniques have been studied separately. In this paper we propose ...
详细信息
For telecommunication systems, various compression and encryption techniques are proposed to satisfy a fast and secure transmission. However these two techniques have been studied separately. In this paper we propose a method combining encryption and compression based on Independent Component Analysis (ICA) and Discrete Cosine Transform (DCT). For encryption, target images are covered with an insignificant image to hide them and their mixtures to be transmitted are obtained. The receiver reconstructs the original images applying some ICA algorithm to the mixed images. In compression process, using DCT and simple low pass filter, the size of transmission can be reduced. Throughout several computer simulations, the performance of the proposed method is confirmed.
In today's scenario many secret image files are needed to be transmitted over Internet for various important purposes. So protection of these files is an important issue. Efficient cryptographic methods are there ...
详细信息
ISBN:
(纸本)9783642272448
In today's scenario many secret image files are needed to be transmitted over Internet for various important purposes. So protection of these files is an important issue. Efficient cryptographic methods are there to protect data but every thing depends on the protection of encryption key. Various secret sharing schemes are available in the literature but computational complexity is very high in most of the cases that leads to single point failure. To overcome this drawback shared cryptography becomes more popular. Here we are suggesting a novel secret sharing scheme which employs simple graphical masking method, performed by simple ANDing for share generation and reconstruction can be done by performing simple ORing the qualified set of legitimate shares. Here sharing and reconstruction are so simple, then our scheme may be applied in many hand held system with very low end processors. Not only that, the generated shares are compressed and each share contains partial secret information. Again decompression is possible only when qualified set of legitimate shares are available, that leads to added protection to the secret and reduced bandwidth requirement for transmission.
The JPEG compression techniques are known as a standardlossy compression techniques for images. In this paper, an adaptive approach is proposed where some changes in the quantization stage are made. The proposed appro...
详细信息
ISBN:
(纸本)9781538608739
The JPEG compression techniques are known as a standardlossy compression techniques for images. In this paper, an adaptive approach is proposed where some changes in the quantization stage are made. The proposed approach mainly changes on the quantization matrix, according to the context of each image. Moreover, the adaptive approach has been developed to work as an encryption system that enables users to restore the original images after decompressing them. Compared to the standard JPEG quantization matrix, the proposed approach introduces an efficient compression system that decreases error rate in several tested scenarios, And efficient encryption system has been obtained as well.
We propose a novel content based-image retrieval scheme for encryption-then-compression (EtC) images. In conventional retrieval schemes for EtC images, the JPEG standard was applied to EtC images as a compression meth...
详细信息
ISBN:
(数字)9781665418751
ISBN:
(纸本)9781665448086
We propose a novel content based-image retrieval scheme for encryption-then-compression (EtC) images. In conventional retrieval schemes for EtC images, the JPEG standard was applied to EtC images as a compression method, although EtC images can be applied to both JPEG compression and lossless compression methods such as JPEG-LS. In contrast, the proposed retrieval scheme allows the mixed-use of lossless and lossy-compression methods. In an experiment, the proposed method is demonstrated to maintain a high retrieval performance, even under the mixed-use of lossless- and lossy-compressed EtC images.
暂无评论