The paper presents a reversible data hiding method with image compression consisting of Huffman coding and block encrypted. In the proposed approach, the image is used to compressed for generating the specified space ...
详细信息
The proceedings contains 22 papers of SPIE : mathematics of data/imagecoding, compression, and encryption vi, with applications. The topics discussed include: natural language insensitive short textual string compres...
详细信息
The proceedings contains 22 papers of SPIE : mathematics of data/imagecoding, compression, and encryption vi, with applications. The topics discussed include: natural language insensitive short textual string compression;techniques for region coding in object-based image compression;boundary representation techniques for object-based image compression;meitei coding for subband image compression;standards-compatible compression for automated image recognition in sensor networks and surveillance systems and non-MSE data compression for emitter location for radar pulse trains.
The paper presents a novel approach for enhancing data security and efficiency using a hybrid cryptography model that is Advanced encryption Standard (AES) and Elliptic Curve Cryptography (ECC) with steganography and ...
详细信息
ISBN:
(数字)9798331527549
ISBN:
(纸本)9798331527556
The paper presents a novel approach for enhancing data security and efficiency using a hybrid cryptography model that is Advanced encryption Standard (AES) and Elliptic Curve Cryptography (ECC) with steganography and compression techniques to conceal the encrypted data within image file, also compression technique applied to reduce storage usage. The system employs AES for secure dataencryption due to its fast encryption time and reliability, while ECC is utilized for encrypting AES keys, benefiting from ECC's lower computational demands and smaller key sizes, which offer secure key exchange. Further to mask the encrypted data, steganography is implemented with inverted least significant bit (LSB) technique. Additionally, the model incorporates the WebP compression algorithm to reduce the overall data size, to facilitate data transmission efficiently without losing data integrity or security. Experimental results of research indicate that the system not only secures data effectively but also preserves the visual quality of digital carrier images. The steganalysis shows the performance of the proposed system performed is quantified by a Peak Signal-to-Noise Ratio (PSNR) of 68.90 and a Mean Squared Error (MSE) OF 0.0083, reflecting minimal and acceptable degradation in image quality. These metrics show the system's capability to maintain excellent image fidelity post encryption and embedding, confirming its reliability for secure communication applications where maintaining data integrity and efficiency is crucial.
In this paper, we present an implementation of the IDEA algorithm for imageencryption. The imageencryption is incorporated into the compression algorithm for transmission over a data network, in the proposed method,...
详细信息
ISBN:
(纸本)0819437670
In this paper, we present an implementation of the IDEA algorithm for imageencryption. The imageencryption is incorporated into the compression algorithm for transmission over a data network, in the proposed method, Embedded Wavelet Zero-tree coding is used for image compression. Experimental results show that our proposed scheme enhances data security and reduces the network bandwidth required for video transmissions. A software implementation and system architecture for hardware implementation of the IDEA imageencryption algorithm based on Field Programmable Gate Array (FPGA) technology are presented in this paper.
In this work, we extend arithmetic coding and present a dataencryption scheme that achieves data compression and data security at the same time. This scheme is based on a chaotic dynamics, which makes use of the fact...
详细信息
ISBN:
(纸本)0819441899
In this work, we extend arithmetic coding and present a dataencryption scheme that achieves data compression and data security at the same time. This scheme is based on a chaotic dynamics, which makes use of the fact that the decoding process of arithmetic coding scheme can be considered as the repetition of Bernoulli shift map. dataencryption is achieved by controlling the piecewise linear maps by a secret key in three kinds of approach: (i) perturbation method, (ii) switching method, and (iii) source extension method. Experimental results show that the obtained arithmetic codes for a message are randomly distributed on the mapping domain [0,1) by using different keys without seriously deteriorating the compression ratio, and the transition of the orbits in the domain [0,1) is similar to the chaotic dynamics.
Past research in the field of cryptography has not given much consideration to arithmetic coding as a feasible encryption technique, with studies proving compression-specific arithmetic. coding to be largely unsuitabl...
详细信息
ISBN:
(纸本)0819454990
Past research in the field of cryptography has not given much consideration to arithmetic coding as a feasible encryption technique, with studies proving compression-specific arithmetic. coding to be largely unsuitable for encryption. Nevertheless, adaptive modelling, which offers a huge model, variable in structure, and as completely as possible a function of the entire text that has been transmitted since the time the model was initialised, is a suitable candidate for a possible encryption-compression combine. The focus of the work presented in this paper has been to incorporate recent results of chaos theory, proven to be cryptographically secure, into arithmetic coding, to devise a convenient method to make the structure of the model unpredictable and variable in nature, and yet to retain, as far as is possible, statistical harmony, so that compression is possible. A chaos-based adaptive arithmetic coding-encryption technique has been designed, developed and tested and its implementation has been discussed. For typical text files, the proposed encoder gives compression between 67.5% and 70.5%, the zero-order compression suffering by about 6% due to encryption, and is not susceptible to previously carried out attacks on arithmetic coding algorithms.
This study presents a chaos-based crypto-compression scheme to protect the H.264 advanced video coding (AVC) used for the applications of video conference. To this end, a selective encryption approach was adopted. The...
详细信息
This study presents a chaos-based crypto-compression scheme to protect the H.264 advanced video coding (AVC) used for the applications of video conference. To this end, a selective encryption approach was adopted. The authors proposed to encrypt the inter-prediction, the intra-prediction and the context adaptive variable length coding. The format compliance and compression ratio are conserved. Their encryption method is based on two piecewise linear chaotic maps for pseudo-random bit generators. The first is considered as a decision module to choose either to encrypt or not, whereas the second is used for the encryption. The proposed encryption techniques were developed and discussed, and their experimental results indicate that the scheme is secure and very efficient according to the computing times. Moreover, it is suitable for real-time application and convenient for all the H.264/AVC profiles or even with other video compression standards.
Multimedia data may be transmitted or stored either according to the classical Shannon information theory or according to the newer Autosophy information theory. Autosophy algorithms combine very high "lossless&q...
详细信息
ISBN:
(纸本)0819454990
Multimedia data may be transmitted or stored either according to the classical Shannon information theory or according to the newer Autosophy information theory. Autosophy algorithms combine very high "lossless" data and image compression with virtually unbreakable "codebook" encryption. Shannon's theory treats all data items as "quantities", which are converted into binary digits (bit), for transmission in meaningless bit streams. Only "lossy" data compression is possible. A new "Autosophy" theory was developed by Klaus Holtz in 1974 to explain the functioning of natural self-assembling structures, such as chemical crystals or living trees. The same processes can also be used for growing self-assembling data structures, which grow like data crystals or data trees in electronic memories. This provides true mathematical learning algorithms, according to a new Autosophy information theory. Information in essence is only that which can be perceived and which is not already known by the receiver. The transmission bit rates are dependent on the data content only. applications already include the V.42bis compression standard in modems, the gif and tif formats for lossless image compression, and Autosophy Internet television. A new 64bit data format could make all future communications compatible and solve the Internet's Quality of Service (QoS) problems.
暂无评论