A survey on secured image compression
Keywords:
Encryption, Permutation, RandomizationAbstract
n recent years, there is a rapid development in the multimedia and network technologies in computer era. Transmission of multimedia data over the network leads the major issues of security, privacy and data size. Security and privacy are not considered in the earlier Image compression techniques. To provide the privacy and security, the encryption is applied as well as compression reduces the data size. So that, to overcome the issues in multimedia and network technologies, compression is combined with encryption. Joint-Encryption-and-Compression (JEC) and Independent-Encryption-and Compression (IEC) are the two types of secured compression algorithms. To provide secured and fast transmission of multimedia data, the encryption and compression processes are performed simultaneously in JEC. Various image encryption schemes are classified and reviewed in this paper, with respect to various parameters like Compression Ratio (CR), Peak Signal-to-Noise Ratio (PSNR) and Mean Square Error (MSE), Time Consumption, Encryption Ratio, and Security techniques.
References
Afolabi, A.O. and Adagunodo, “Implementation of an improved data encryption algorithm in a web based learning system”, Phys. Int., 2: 31-35. DOI: 10.3844 / pisp. 2011.31.35, 2011.
Yuan Yan Tang, Fellow, IEEE ” Designing an Efficient Image Encryption-Then Compression System via Prediction”, IEEE, 2011,
Lier P., Moury, G., Latry C., and Cabot F., “Selection of the SPOT-5 image compression algorithm” in Earth Observing Systems III” (W.L.Barnes, ed.), vol. 3439-70, pp. 541, San Diego, CA, SPIE, Oct 1998.
Nikolaos G. Bourbakis, “Image Data Compression-Encryption Using G-Scan Patterns”, IEEE 0-7803-4053-1/97, pp. 117-1120, 1997.
S. S. Maniccam, and N. G. Bourbakis, “SCAN Based Lossless Image Compression and Encryption”, IEEE 0-7695-0446-9/99, pp. 490-499,
Masanori Ito, Noboru Ohnishi, Ayman Alfalou and Ali Mansour, “New Image Encryption And Compression Method Based On Independent Component Analysis”, IEEE, 2007
Younggap You, Hanbyeori Kim, “Endoscopy Image Compression and Encryption under Fault Tolerant Ubiquitous Environment”, 978-1-4244-4918-7 IEEE, pp. 165-168, 2009
. A. Alfalou C. Brosseau, N. Abdallah, and M. Jridi, “Simultaneous fusion, compression, and encryption of multiple images”, OPTICS EXPRESS 24024Vol. 19, No. 24 OSA, 2011
Goh Han Keat, Azman Samsudin and Zurinahni Zainol, “Enhanced performance of secure image using Wavelet compression”, Universiti Sains Malaysia (USM), pp. 71-74, 2005
A. Kingston, S. Colosimo, P. Campisi, F. Autrusseau, “Lossless Image Compression And Selective Encryption Using A Discrete Radon
Transform”, IEEE-1-4244-1437-7/07, ICIP, pp.IV 465-468, 2007
Anil Kumar A and Anamitra Makur, “Distributed Source Coding based Encryption and Lossless Compression of Gray Scale and Color Images” ,IEEE978-1-4244-2295-1, 760 MMSP Singapore, pp. 760-764, 2008
Fawad Ahmed, M Y Siyal and Vali Uddin Abbas, “A Perceptually Scalable and JPEG Compression Tolerant Image Encryption Scheme”, Fourth PacificRim Symposium on Image and Video Technology 978-0-7695-4285-0/ IEEE pp. 232-238, 2010
Mingyu Li, Xiaowei Yi and Hengtai Ma, “A Scalable Encryption Scheme for CCSDS Image Data Compression Standard” 978-1-4244-6943-7/ IEEE pp. 646-649, 2010
Wei Liu, Wenjun Zeng, Lina Dong and Qiuming Yao,” Resolution-progressive Compression of Encrypted Grayscale Images”, University of Missouri, Columbia MO 65211, USA, 2007
V.Radha, D.Maheswari, “Secured Compound Image Compression Using Encryption Techniques”, 978-1-4244-5967-4/ IEEE 2010.
Vikram Jagannathan, Aparna Mahadevan, R. Hariharan and E. Srinivasan, “Number Theory Based Image Compression Encryption and Application to Image Multiplexing” ‖ IEEE - ICSCN 2007, pp.59-64, 2007.
A. Alfalou, A. Loussert, A. Alkholidi, R. El Sawda, “System for image compression and encryption by spectrum fusion in order to optimize image transmission”, ISEN-BREST Laboratory L@BISEN, France, IEEE, 2007
Shaimaa A. El-said Khalid F. A. Hussein Mohamed M. Fouad, “Securing Image Transmission Using In- Compression Encryption Technique” International Journal of Computer Science and Security, (IJCSS), Volume (4): Issue (5) pp. 466-481, 2010
Eric Wharton, Karen Panetta, and Sos Agaian, “Simultaneous Encryption / Compression of Images Using Alpha Rooting”, Data Compression Conference 1068-0314/IEEE pp 551, 2008.
Yassin M. Y. Hasan, Mohammed F. A. Ahmed, and Tarik K. Abdelhamid, “Image adaptive selective encryption of vector quantization Index compression” 978-1-4244-5654-3/09IEEE pp. 1277- 1280 ICIP 2009.
Li Hengjian, Wang Jizhi, Wang Yinglong and Tian Min Xu Shujiang, “A flexible and secure image compression coding algorithm”, International Conference on Future Information Technology and Management Engineering 978-1-4244-9088-211 0/IEEE pp. 376-379, 2010.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2016 COMPUSOFT: An International Journal of Advanced Computer Technology
This work is licensed under a Creative Commons Attribution 4.0 International License.
©2023. COMPUSOFT: AN INTERNATIONAL OF ADVANCED COMPUTER TECHNOLOGY by COMPUSOFT PUBLICATION is licensed under a Creative Commons Attribution 4.0 International License. Based on a work at COMPUSOFT: AN INTERNATIONAL OF ADVANCED COMPUTER TECHNOLOGY. Permissions beyond the scope of this license may be available at Creative Commons Attribution 4.0 International Public License.