imageencryption has a significant role in the field of cryptography. A new encryption scheme is introduced to protect an image from unauthorized access, in this scheme two separate keys are used for imageencryption ...
详细信息
imageencryption has a significant role in the field of cryptography. A new encryption scheme is introduced to protect an image from unauthorized access, in this scheme two separate keys are used for imageencryption and data hiding with high degree of security. The content owner encrypts the original uncompressed image using an encryption key. The least significant bits (LSBs) of the encrypted image are compressed using a data hiding key to create space to embed an additional data. Run-Length Coding (RLC) and Haar Wavelet compression technique is employed to reduce the image size and facilitate faster transmission. Encrypted and decrypted sections, the quality of image retrieval and data extraction are achieved from RLC with their respective keys. In this scheme user can extract an image, data and both image and data based on the keys used.
Currently, research is focused on selective encryption to protect movies against attacks transmitted over a public network. This choice is taken to ensure the security of compressed data without adding an important su...
详细信息
Currently, research is focused on selective encryption to protect movies against attacks transmitted over a public network. This choice is taken to ensure the security of compressed data without adding an important supplemental computational time for the encryption. So the encryption module is inserted into the video compression chain. In this paper we present an encryption method based chaos inserted in the H.264/AVC chain specially for the motion vectors signs. The results will be deducted according to the values of PSNR (Peak Signal to Noise Ratio), SSIM (Structural SIMilarity) and the encryption rate. Motion vectors signs encryption (MVSE) seems being interesting to lose the visual quality of the video for Inter predicted frames since movies are sensible to the motion sign.
Growing reliance on digital communications has necessitated development of dependable and secure technologies to ensure that the transmission and reception of images over the Internet do not pose a risk to the data of...
详细信息
Growing reliance on digital communications has necessitated development of dependable and secure technologies to ensure that the transmission and reception of images over the Internet do not pose a risk to the data of individuals and governments. We propose developing a hybrid imageencryption and compression algorithm by combining compressive sensing, the gray wolf algorithm, and multi-dimensional chaotic systems. It aims to generate a highly secure encrypted image while conserving transmission and storage resources. This algorithm overlaps several stages designed to protect vital images while minimizing size. First, the image is converted to the frequency domain using the discrete wavelet transform. Then, the discrete wavelet transform coefficients are scrambled globally using the Waleed-Ali Map and the gray wolf algorithm. Second, the confused image is measured by a parameters-controlled matrix to reduce transmission costs. The final encrypted image is obtained after performing the diffusion operation with a bitstream derived from the Nahrain chaotic map. The average peak signal-to-noise ratio score was 53.1995, and the average mean squared error score was 0.6130, demonstrating that the plaintext and decrypted images are identical. The average correlation coefficient score was -0.010095;the average entropy analysis was 7.9987;and the average number of pixel change rate and unified average changing intensity analyses were 99.60 and 33.52, respectively. The experimental results demonstrate the algorithm's efficiency and robustness, as well as the high quality of the reconstructed image.
Chaos based encryption may offer new quality in secure data transmission. Many chaotic imageencryption and decryption algorithms have been reported in the literature. However, the feature of higher compression of the...
详细信息
Chaos based encryption may offer new quality in secure data transmission. Many chaotic imageencryption and decryption algorithms have been reported in the literature. However, the feature of higher compression of the still image standard JPEG200 can not be achieved on the compression of chaotic images. The error resilient tools do not correct transmission errors. Furthermore, these tools do not apply to the image header which is the most important part of the codestream. To be suitable for wireless multimedia applications, JPEG 2000 has to be robust to transmission errors. Hence, in this paper, a scheme called chaotic JPEG2000 is proposed to utilize the higher compression feature of the JPEG2000 for secure image source coding. Further, the proposed chaotic JPEG2000 is robustified by turbo channel coding for image communication over wireless channels with burst errors. The efficacy of the proposed scheme is demonstrated though implementation results for an image communication over Gaussian impulsive noisy wireless channels.
In this paper, we propose a spatio-color scrambled encryption-then-compression (EtC) system for the JPEG XS standard to enhance security and invisibility. Previously, a line-based spatial scrambling scheme compatible ...
详细信息
ISBN:
(数字)9798350385625
ISBN:
(纸本)9798350385632
In this paper, we propose a spatio-color scrambled encryption-then-compression (EtC) system for the JPEG XS standard to enhance security and invisibility. Previously, a line-based spatial scrambling scheme compatible with JPEG XS has been proposed for imageencryption in EtC systems. This scheme enhances privacy protection by facilitating imageencryption prior to compression. However, the visibility of color components remains unchanged from the original, while spatial components are scrambled. The proposed spatio-color scrambled EtC system for the JPEG XS standard introduces two color component scrambling techniques: RGB scrambling and YCbCr scrambling. Consequently, both security and invisibility performance are enhanced. Despite the introduction of color scrambling, the proposed EtC system maintains the same rate-distortion (RD) performance as the conventional spatial scrambling scheme. We demonstrate its efficacy through simulations using 8K ultra-high-definition images.
Data must be compressed before being sent online, saving money and time. Encrypting the data and compressing it are also necessary to ensure secure and fast data transmission over the internet. This study presents an ...
详细信息
ISBN:
(数字)9798350372847
ISBN:
(纸本)9798350372854
Data must be compressed before being sent online, saving money and time. Encrypting the data and compressing it are also necessary to ensure secure and fast data transmission over the internet. This study presents an effective model based on chaos encryption using a piecewise logistic sine map, RC4 encryption, data compression, and LSB steganography. The results of the model are shown, along with a comparison with the other pre-existing models. The results of the proposed model are better than those of other pre-existing techniques in terms of various performance metrics, as discussed in the paper.
Arithmetic coding is prevalent in compression for its remarkable performance, and it is also explored to design encryption schemes offering compression and secrecy simultaneously. Joint compression and encryption is a...
详细信息
Arithmetic coding is prevalent in compression for its remarkable performance, and it is also explored to design encryption schemes offering compression and secrecy simultaneously. Joint compression and encryption is a quite efficient and practical way to protect large volume of data, especially multimedia data, and numerous cryptosystem based on arithmetic coding have been proposed in recent years. In this paper, we present a new classification of secure arithmetic coding algorithms according to the selection of secret information. Then we analyze the security of encryption schemes based on interval swapping. We propose a simple yet efficient attack that could disclose the keystream that is used to make interval swapping decision. The attack works in static and content-based models of arithmetic coding.
暂无评论