Compression and Encryption Algorithms for Image Satellite Communication
نویسنده
چکیده
Satellite communication systems are now designed according to an outdated Shannon information theory where all data is transmitted in meaningless bit streams. The advantages for satellite communication may include: high image compression and unbreakable encryption. So, this paper combines the compression and encryption techniques into two phases, encoding and decoding phase. The fractal compression technique is selected to compress the aerial images due its high compression capability and the Enhanced Hill Multimedia Cryptosystem (EHMC) is used for encryption to perform the goal. The fractal image compression of the input aerial image is the first stage in the encoding phase. The fractal compression technique divides the original image into two different block sizes called range and domain blocks. The best match between the range and domain blocks is known as the transformation mapping. All the transformation mappings are recorded as the output compressed file of the input aerial image. The encryption which was done by the EHMC is the second encoding stage The EHMC belongs to the private-key techniques and works with linear transformation theory is applied on the output-compressed file. At the decoding phase, the secured compressed image is decrypted by the EHMC. Finally, the original image is reconstructed from the highly secured compressed file using the fractal decompression process. The objective of the paper is to provide an approach in the area of robust encrypted compression techniques, which achieve the privacy and confidentiality of aerial and remote sensing images transmitted over an insecure channel from unauthorized access.
منابع مشابه
On the Application of Image Decomposition to Image Compression
The recent explosion in multimedia and networking applications places a great demand on efficient data storage and transmission techniques. In addition, network communication, especially wireless communication, can easily be intercepted. Therefore, sensitive information must be protected from eavesdroppers. These two problems have traditionally been treated independently of each other. In this ...
متن کاملPartial encryption of compressed images and videos
The increased popularity of multimedia applications places a great demand on eecient data storage and transmission techniques. Network communication, especially over a wireless network , can easily be intercepted and must be protected from eavesdroppers. Unfortunately, en-cryption and decryption are slow and it is often diicult, if not impossible, to carry out real-time secure image and video c...
متن کاملA stack-based chaotic algorithm for encryption of colored images
In this paper, a new method is presented for encryption of colored images. This method is based on using stack data structure and chaos which make the image encryption algorithm more efficient and robust. In the proposed algorithm, a series of data whose range is between 0 and 3 is generated using chaotic logistic system. Then, the original image is divided into four subimages, and these four i...
متن کاملImage Encryption by Using Combination of DNA Sequence and Lattice Map
In recent years, the advancement of digital technology has led to an increase in data transmission on the Internet. Security of images is one of the biggest concern of many researchers. Therefore, numerous algorithms have been presented for image encryption. An efficient encryption algorithm should have high security and low search time along with high complexity.DNA encryption is one of the fa...
متن کاملفشردهسازی تصویر با کمک حذف و کدگذاری هوشمندانه اطلاعات تصویر و بازسازی آن با استفاده از الگوریتم های ترمیم تصویر
Compression can be done by lossy or lossless methods. The lossy methods have been used more widely than the lossless compression. Although, many methods for image compression have been proposed yet, the methods using intelligent skipping proper to the visual models has not been considered in the literature. Image inpainting refers to the application of sophisticated algorithms to replace lost o...
متن کامل