Partial encryption of compressed images and videos

نویسندگان

  • Howard Cheng
  • Xiaobo Li
چکیده

The increased popularity of multimedia applications places a great demand on eecient data storage and transmission techniques. Network communication, especially over a wireless network , can easily be intercepted and must be protected from eavesdroppers. Unfortunately, en-cryption and decryption are slow and it is often diicult, if not impossible, to carry out real-time secure image and video communication and processing. Methods have been proposed to combine compression and encryption together to reduce the overall processing time 3, 4, 12, 18, 20], but they are either insecure or too computationally intensive. We propose a novel solution, called partial encryption, in which a secure encryption algorithm is used to encrypt only part of the compressed data. Partial encryption is applied to several image and video compression algorithms in this paper. Only 13%{27% of the output from quadtree compression algorithms 13, 17, 29, 30, 31, 32] is encrypted for typical images, and less than 2% is encrypted for 512 512 images compressed by the SPIHT algorithm 26]. The results are similar for video compression, resulting in a signiicant reduction in encryption and decryption time. The proposed partial encryption schemes are fast, secure, and do not reduce the compression performance of the underlying compression algorithm.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

High Resolution Image Encryption & Reconstruction Using Scalable Codes

This paper proposes a novel scheme of scalable coding for encrypted gray images. Although there have been a lot of works on scalable coding of unencrypted images/videos the scalable coding of encrypted data has not been reported. In the encryption phase of the proposed scheme, the pixel values are completely concealed so that an attacker cannot obtain any statistical information of an original ...

متن کامل

A New Method for Encryption of Color Images based on Combination of Chaotic Systems

This paper presents a new method for encryption of color images based on a combination of chaotic systems, which makes the image encryption more efficient and robust. The proposed algorithm generated three series of data, ranged between 0 and 255, using a chaotic Chen system. Another Chen system was then started with different initial values, which were converted to three series of numbers from...

متن کامل

A stack-based chaotic algorithm for encryption of colored images

In this paper, a new method is presented for encryption of colored images. This method is based on using stack data structure and chaos which make the image encryption algorithm more efficient and robust. In the proposed algorithm, a series of data whose range is between 0 and 3 is generated using chaotic logistic system. Then, the original image is divided into four subimages, and these four i...

متن کامل

Haze Removal of Secure Remote Surveillance System

A reliable method for dehazing image and video was proposed. The goal is to achieve good dehazed images and videos with proper security at the receiver side. The image was dehazed by dark channel prior. The system based on fast single image dehazing and here the codecs used is joint photographic expert group. Then the compressed image is extended to compressed video, by using codecs H.264. Then...

متن کامل

Wavelet Domain Image Encryption by Subband Selection and Data Bit Slelection

Widespread popularity of wireless data communication devices, coupled with the availability of higher bandwidths, has led to an increased user demand for content-rich media such as images and videos. Since such content often tends to be either private, sensitive, or paid for, there exists a requirement for securing such communication. However, solutions that rely only on traditional compute-int...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IEEE Trans. Signal Processing

دوره 48  شماره 

صفحات  -

تاریخ انتشار 2000