Encryption-Then-Compression Systems Using Grayscale-Based Image Encryption for JPEG Images
نویسندگان
چکیده
منابع مشابه
Efficient Grayscale Image Encryption Then Compression System
In secret communication, images are widely used and the major issues are how to protect the image and also reduce size of the image in order to maximize the network utilization. Various techniques are there in order to secure the image and to reduce the size of the image. In many practical scenarios, encryption of an image has to be conducted before the image compression. In proposed scheme, bo...
متن کاملGrayscale Image Encryption using Cellular Automata
1. Seredynski M, Bouvary P.Block cipher based on reversible cellular automata. New Gener Comput 2005 ; 23: 245–58 (Ohmsha Ltd and Springer) 2. Faraoun Kamel,” Fast encryption of RGB color digital images using a tweakable cellular automaton based schema Optics & Laser Technology 64 (2014) 145–155 3. Toffoli TT ,Margolus N.Invertible cellular automata : a review . Physica D 2001;45:229–53. 4. Sza...
متن کاملJPEG image encryption using fuzzy PN sequences
The recent explosion in multimedia and networking application places a great demand on efficient transmission of images at low bit rate with high security. Mixing several existing standard encryption techniques with image encoding tends to change the compression ratio greatly. In this paper, a novel image encryption algorithm is embedded as a part of JPEG image encoding scheme to meet three maj...
متن کاملA New Method for Encryption of Color Images based on Combination of Chaotic Systems
This paper presents a new method for encryption of color images based on a combination of chaotic systems, which makes the image encryption more efficient and robust. The proposed algorithm generated three series of data, ranged between 0 and 255, using a chaotic Chen system. Another Chen system was then started with different initial values, which were converted to three series of numbers from...
متن کاملTransparent Image Encryption Using Progressive JPEG
Many application scenarios do not demand confidential encryption of visual data, but on the contrary require that certain image information is public (transparent encryption). One scenario is e.g., PayTV, where a low quality version should become public to attract possible customers. Transparent encryption can be implemented most efficiently in case of scalable bitstreams by encrypting enhancem...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Information Forensics and Security
سال: 2019
ISSN: 1556-6013,1556-6021
DOI: 10.1109/tifs.2018.2881677