Digital images play a crucial role in modern communication, but the accompanying privacy concerns have become increasingly prominent. In this context, imageencryption technology has emerged as a vital means to safegu...
详细信息
Digital images play a crucial role in modern communication, but the accompanying privacy concerns have become increasingly prominent. In this context, imageencryption technology has emerged as a vital means to safeguard the security of digital image information. Over the past few years, a number of effective imageencryption schemes have been developed. However, the amalgamation of bit-level encryption techniques with compression algorithms remains underexplored. To leverage the advantages of these two technologies in terms of security and practicality, a novel multiple color images encryption and decryption scheme is devised based on a bit-level extension algorithm. Firstly, four color images are compressed by the discrete wavelet transform (DWT) to reduce transmission and storage consumption. Secondly, to carry out the bit-level scrambling and diffusion operations on pixels with fractional parts in the DWT domain and maintain the decryption image quality as much as possible, a bit-level extension algorithm is developed. Finally, three rounds of scrambling and diffusion operations based on the bit-level extension algorithm are conducted to enhance the randomness of the ciphertext image and conceal the plaintext information. To reinforce the resistance of the presented imageencryption and decryption scheme towards the chosen-plaintext and the differential attacks, secret keys are produced with the hash function SHA-512. The presented scheme undergoes a comprehensive analysis including decryption quality, key security, and resistance to the statistical and the differential attacks. The results are: average PSNR = 31.2631 dB, key space reaches 2472 , correlation coefficients are almost 0, average entropy = 7.9985 bits, average NPCR = 99.6089%, and average UACI = 33.4658%. Moreover, experimental simulations demonstrate that our solution exhibits a degree of resilience to noise interference and data loss. In summary, our presented multiple color images encryption and
Elliptic Curve Cryptography (ECC) is a way to keep information secure. It is better than RSA because it can provide the same level of security with smaller codes. This causes less use of resources and lower memory nee...
详细信息
ISBN:
(数字)9798350359299
ISBN:
(纸本)9798350359305
Elliptic Curve Cryptography (ECC) is a way to keep information secure. It is better than RSA because it can provide the same level of security with smaller codes. This causes less use of resources and lower memory needs. ECC surpasses RSA in several aspects, including lower bandwidth usage, faster computational times, and smaller key dimensions. Moreover, ECC can be effectively employed for imageencryption. This paper explores the application of ECC in imageencryption using MATLAB as the platform, delving into the processes of encryption, compression, and decryption.
Data must be compressed before being sent online, saving money and time. Encrypting the data and compressing it are also necessary to ensure secure and fast data transmission over the internet. This study presents an ...
详细信息
ISBN:
(数字)9798350372847
ISBN:
(纸本)9798350372854
Data must be compressed before being sent online, saving money and time. Encrypting the data and compressing it are also necessary to ensure secure and fast data transmission over the internet. This study presents an effective model based on chaos encryption using a piecewise logistic sine map, RC4 encryption, data compression, and LSB steganography. The results of the model are shown, along with a comparison with the other pre-existing models. The results of the proposed model are better than those of other pre-existing techniques in terms of various performance metrics, as discussed in the paper.
Reducing the volume of video and photo information while maintaining high-quality visual perception remains an urgent task that specialists in specific subject areas are constantly working on. However, without questio...
详细信息
All kinds of information should be compressed before being sent over the web to save time & expense. The primary goal of this article is to create and construct a systematic and safe technique for encryption data ...
详细信息
In this paper, we propose a spatio-color scrambled encryption-then-compression (EtC) system for the JPEG XS standard to enhance security and invisibility. Previously, a line-based spatial scrambling scheme compatible ...
详细信息
ISBN:
(数字)9798350385625
ISBN:
(纸本)9798350385632
In this paper, we propose a spatio-color scrambled encryption-then-compression (EtC) system for the JPEG XS standard to enhance security and invisibility. Previously, a line-based spatial scrambling scheme compatible with JPEG XS has been proposed for imageencryption in EtC systems. This scheme enhances privacy protection by facilitating imageencryption prior to compression. However, the visibility of color components remains unchanged from the original, while spatial components are scrambled. The proposed spatio-color scrambled EtC system for the JPEG XS standard introduces two color component scrambling techniques: RGB scrambling and YCbCr scrambling. Consequently, both security and invisibility performance are enhanced. Despite the introduction of color scrambling, the proposed EtC system maintains the same rate-distortion (RD) performance as the conventional spatial scrambling scheme. We demonstrate its efficacy through simulations using 8K ultra-high-definition images.
This paper presents SecretPixel, a steganographic tool that integrates random embedding techniques and advanced encryption to securely hide data within images. SecretPixel ensures confidentiality and integrity of the ...
详细信息
ISBN:
(数字)9798350379525
ISBN:
(纸本)9798350379532
This paper presents SecretPixel, a steganographic tool that integrates random embedding techniques and advanced encryption to securely hide data within images. SecretPixel ensures confidentiality and integrity of the embedded data using AES-2S6 and RSA-4096 encryption algorithms. The Pixel Scattered Embedding (PSE) method hides encrypted information across image pixels, using a seeded random generator, enhancing resistance against steganalysis detection. This combination of two-tiered encryption, efficient compression and embedding strategies makes SecretPixel an effective solution for data concealment in digital communication.
Data compression is an important part of information security because compressed data is more secure and easy to handle. Effective data compression technology creates efficient, secure, and easy-to-connect data. There...
详细信息
Data compression is an important part of information security because compressed data is more secure and easy to handle. Effective data compression technology creates efficient, secure, and easy-to-connect data. There are two types of compression algorithm techniques, lossy and lossless. These technologies can be used in any data format such as text, audio, video, or image file. The main objective of this study was to reduce the physical space on the various storage media and reduce the time of sending data over the Internet with a complete guarantee of encrypting this data and hiding it from intruders. Two techniques are implemented, with data loss (Lossy) and without data loss (Lossless). In the proposed paper a hybrid data compression algorithm increases the input data to be encrypted by RSA (Rivest-Shamir-Adleman) cryptography method to enhance the security level and it can be used in executing lossy and lossless compacting Steganography methods. This technique can be used to decrease the amount of every transmitted data aiding fast transmission while using slow internet or take a small space on different storage media. The plain text is compressed by the Huffman coding algorithm, and also the cover image is compressed by Discrete wavelet transform DWT based that compacts the cover image through lossy compression in order to reduce the cover image's dimensions. The least significant bit LSB will then be used to implant the encrypted data in the compacted cover image. We evaluated that system on criteria such as percentage Savings percentage, compression Time, compression Ratio, Bits per pixel, Mean Squared Error, Peak Signal to Noise Ratio, Structural Similarity Index, and compression Speed. This system shows a high-level performance and system methodology compared to other systems that use the same methodology.
In recent years, imageencryption has been broadly researched. Since a large proportion of images on Internet are compressed, and JPEG is the most widely adopted standards for imagecompression, a variety of joint ima...
详细信息
In recent years, imageencryption has been broadly researched. Since a large proportion of images on Internet are compressed, and JPEG is the most widely adopted standards for imagecompression, a variety of joint imagecompression and encryption algorithms have been proposed. JPEG imageencryption uses signal processing techniques as well as cryptographic techniques in different stages of the JPEG compression process. Based on the location where the encryption is taken place, these algorithms can be generally classified into three major categories: pre-compressionencryption algorithms, in-compressionencryption algorithms, and post-compressionencryption algorithms, which correspond to conduct encryption operations before, during, and after the compression process. From this perspective of classification, the authors give a comprehensive survey on representative imageencryption algorithms of each type, and show their properties and limitations. Some of the most recent encryption schemes that achieve protection at various positions of the compression process are selected for comparison, which are two pre-compressionencryption algorithms, four in-compressionencryption algorithms, and two post-compressionencryption algorithms. Possible future research directions on designing joint JPEG compression and encryption schemes are provided in the end, which may facilitate solving application scenario-oriented JPEG security problems with new technologies.
We propose a novel content based-image retrieval scheme for encryption-then-compression (EtC) images. In conventional retrieval schemes for EtC images, the JPEG standard was applied to EtC images as a compression meth...
详细信息
ISBN:
(纸本)9781665418751
We propose a novel content based-image retrieval scheme for encryption-then-compression (EtC) images. In conventional retrieval schemes for EtC images, the JPEG standard was applied to EtC images as a compression method, although EtC images can be applied to both JPEG compression and lossless compression methods such as JPEG-LS. In contrast, the proposed retrieval scheme allows the mixed-use of lossless and lossy-compression methods. In an experiment, the proposed method is demonstrated to maintain a high retrieval performance, even under the mixed-use of lossless- and lossy-compressed EtC images.
暂无评论