A survey on secured image compression

Authors

  • Shunmugan S Research Scholar, Manonmaniam Sundaranar University, Thirunelveli

Keywords:

Encryption, Permutation, Randomization

Abstract

n recent years, there is a rapid development in the multimedia and network technologies in computer era. Transmission of multimedia data over the network leads the major issues of security, privacy and data size. Security and privacy are not considered in the earlier Image compression techniques. To provide the privacy and security, the encryption is applied as well as compression reduces the data size. So that, to overcome the issues in multimedia and network technologies, compression is combined with encryption. Joint-Encryption-and-Compression (JEC) and Independent-Encryption-and Compression (IEC) are the two types of secured compression algorithms. To provide secured and fast transmission of multimedia data, the encryption and compression processes are performed simultaneously in JEC. Various image encryption schemes are classified and reviewed in this paper, with respect to various parameters like Compression Ratio (CR), Peak Signal-to-Noise Ratio (PSNR) and Mean Square Error (MSE), Time Consumption, Encryption Ratio, and Security techniques.

References

Afolabi, A.O. and Adagunodo, “Implementation of an improved data encryption algorithm in a web based learning system”, Phys. Int., 2: 31-35. DOI: 10.3844 / pisp. 2011.31.35, 2011.

Yuan Yan Tang, Fellow, IEEE ” Designing an Efficient Image Encryption-Then Compression System via Prediction”, IEEE, 2011,

Lier P., Moury, G., Latry C., and Cabot F., “Selection of the SPOT-5 image compression algorithm” in Earth Observing Systems III” (W.L.Barnes, ed.), vol. 3439-70, pp. 541, San Diego, CA, SPIE, Oct 1998.

Nikolaos G. Bourbakis, “Image Data Compression-Encryption Using G-Scan Patterns”, IEEE 0-7803-4053-1/97, pp. 117-1120, 1997.

S. S. Maniccam, and N. G. Bourbakis, “SCAN Based Lossless Image Compression and Encryption”, IEEE 0-7695-0446-9/99, pp. 490-499,

Masanori Ito, Noboru Ohnishi, Ayman Alfalou and Ali Mansour, “New Image Encryption And Compression Method Based On Independent Component Analysis”, IEEE, 2007

Younggap You, Hanbyeori Kim, “Endoscopy Image Compression and Encryption under Fault Tolerant Ubiquitous Environment”, 978-1-4244-4918-7 IEEE, pp. 165-168, 2009

. A. Alfalou C. Brosseau, N. Abdallah, and M. Jridi, “Simultaneous fusion, compression, and encryption of multiple images”, OPTICS EXPRESS 24024Vol. 19, No. 24 OSA, 2011

Goh Han Keat, Azman Samsudin and Zurinahni Zainol, “Enhanced performance of secure image using Wavelet compression”, Universiti Sains Malaysia (USM), pp. 71-74, 2005

A. Kingston, S. Colosimo, P. Campisi, F. Autrusseau, “Lossless Image Compression And Selective Encryption Using A Discrete Radon

Transform”, IEEE-1-4244-1437-7/07, ICIP, pp.IV 465-468, 2007

Anil Kumar A and Anamitra Makur, “Distributed Source Coding based Encryption and Lossless Compression of Gray Scale and Color Images” ,IEEE978-1-4244-2295-1, 760 MMSP Singapore, pp. 760-764, 2008

Fawad Ahmed, M Y Siyal and Vali Uddin Abbas, “A Perceptually Scalable and JPEG Compression Tolerant Image Encryption Scheme”, Fourth PacificRim Symposium on Image and Video Technology 978-0-7695-4285-0/ IEEE pp. 232-238, 2010

Mingyu Li, Xiaowei Yi and Hengtai Ma, “A Scalable Encryption Scheme for CCSDS Image Data Compression Standard” 978-1-4244-6943-7/ IEEE pp. 646-649, 2010

Wei Liu, Wenjun Zeng, Lina Dong and Qiuming Yao,” Resolution-progressive Compression of Encrypted Grayscale Images”, University of Missouri, Columbia MO 65211, USA, 2007

V.Radha, D.Maheswari, “Secured Compound Image Compression Using Encryption Techniques”, 978-1-4244-5967-4/ IEEE 2010.

Vikram Jagannathan, Aparna Mahadevan, R. Hariharan and E. Srinivasan, “Number Theory Based Image Compression Encryption and Application to Image Multiplexing” ‖ IEEE - ICSCN 2007, pp.59-64, 2007.

A. Alfalou, A. Loussert, A. Alkholidi, R. El Sawda, “System for image compression and encryption by spectrum fusion in order to optimize image transmission”, ISEN-BREST Laboratory L@BISEN, France, IEEE, 2007

Shaimaa A. El-said Khalid F. A. Hussein Mohamed M. Fouad, “Securing Image Transmission Using In- Compression Encryption Technique” International Journal of Computer Science and Security, (IJCSS), Volume (4): Issue (5) pp. 466-481, 2010

Eric Wharton, Karen Panetta, and Sos Agaian, “Simultaneous Encryption / Compression of Images Using Alpha Rooting”, Data Compression Conference 1068-0314/IEEE pp 551, 2008.

Yassin M. Y. Hasan, Mohammed F. A. Ahmed, and Tarik K. Abdelhamid, “Image adaptive selective encryption of vector quantization Index compression” 978-1-4244-5654-3/09IEEE pp. 1277- 1280 ICIP 2009.

Li Hengjian, Wang Jizhi, Wang Yinglong and Tian Min Xu Shujiang, “A flexible and secure image compression coding algorithm”, International Conference on Future Information Technology and Management Engineering 978-1-4244-9088-211 0/IEEE pp. 376-379, 2010.

Downloads

Published

2024-02-26

How to Cite

Shunmugan, S. (2024). A survey on secured image compression. COMPUSOFT: An International Journal of Advanced Computer Technology, 5(07), 2187–2190. Retrieved from https://ijact.in/index.php/j/article/view/380

Issue

Section

Review Article

Similar Articles

1 2 3 4 > >> 

You may also start an advanced similarity search for this article.