CFP last date
22 April 2024
Reseach Article

A Survey based on Designing an Efficient Image Encryption-then-Compression System

Published on May 2014 by Kalyani G. Nimbokar, Milind V. Sarode
National Level Technical Conference X-PLORE 2014
Foundation of Computer Science USA
XPLORE2014 - Number 1
May 2014
Authors: Kalyani G. Nimbokar, Milind V. Sarode
cc768181-41a9-41ce-b699-188272b30059

Kalyani G. Nimbokar, Milind V. Sarode . A Survey based on Designing an Efficient Image Encryption-then-Compression System. National Level Technical Conference X-PLORE 2014. XPLORE2014, 1 (May 2014), 6-8.

@article{
author = { Kalyani G. Nimbokar, Milind V. Sarode },
title = { A Survey based on Designing an Efficient Image Encryption-then-Compression System },
journal = { National Level Technical Conference X-PLORE 2014 },
issue_date = { May 2014 },
volume = { XPLORE2014 },
number = { 1 },
month = { May },
year = { 2014 },
issn = 0975-8887,
pages = { 6-8 },
numpages = 3,
url = { /proceedings/xplore2014/number1/16164-1409/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Level Technical Conference X-PLORE 2014
%A Kalyani G. Nimbokar
%A Milind V. Sarode
%T A Survey based on Designing an Efficient Image Encryption-then-Compression System
%J National Level Technical Conference X-PLORE 2014
%@ 0975-8887
%V XPLORE2014
%N 1
%P 6-8
%D 2014
%I International Journal of Computer Applications
Abstract

Image encryption has to be conducted prior to image compression. In this paper how to design a pair of image encryption and compression algorithms such that compressing encrypted images can still be efficiently performed. This paper introduced a highly efficient image encryption-then compression (ETC) system. The proposed image encryption scheme operated in the prediction error domain is able to provide a reasonably high level of security. More notably, the proposed compression approach applied to encrypted images is only slightly worse, unencrypted images as inputs. In contrast, most of the existing ETC solutions induce significant penalty on the compression efficiency.

References
  1. A. Kumar and A. Makur, "Distributed source coding based encryption and lossless compression of gray scale and color images," in Proc. MMSP, 2008, pp. 760–764.
  2. D. Schonberg, S. C. Draper, and K. Ramchandran, "On blind compression of encrypted correlated data approaching the source entropy rate," in Proc. 43rd Annu. Allerton Conf. , 2005, pp. 1–3.
  3. Z. Erkin, T. Veugen, T. Toft, and R. L. Lagendijk, "Generating private recommendations efficiently using homomorphic encryption and data packing," IEEE Trans. Inf. Forensics Security, vol. 7, no. 3, pp. 1053–1066, Jun. 2012
  4. T. Bianchi, A. Piva, and M. Barni, "On the implementation of the discrete Fourier transform in the encrypted domain," IEEE Trans. Inf. Forensics Security, vol. 4, no. 1, pp. 86–97, Mar. 2009.
  5. X. Zhang, "Lossy compression and iterative recobstruction for encrypted image," IEEE Trans. Inf. Forensics Security, vol. 6, no. 1, pp. 53–58 Mar. 2011
  6. X. Zhang, G. Sun, L. Shen, and C. Qin, "Compression of encrypted images with multilayer decomposition," Multimed. Tools Appl. , vol. 78,no. 3, pp. 1–13, Feb. 2013.
  7. Jiantao Zhou, Member, IEEE, Xianming Liu, Member, IEEE, Oscar C. Au, Fellow, IEEE,
  8. and Yuan Yan Tang, Fellow, IEEE" Designing an Efficient Image Encryption-Then Compression System via Prediction
  9. Error Clustering and Random Permutation" IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 9, NO. 1, JANUARY 2014.
  10. Sesha Pallavi Indrakanti Associate professor Department of Computer Applications, GVP Degree College (A),Visakhapatnam. "Permutation Based Image Encryption Technique" International Journal of Computer Applications (0975 – 8887) Volume 28– No. 8, August 2011
Index Terms

Computer Science
Information Sciences

Keywords

Compression Of Encrypted Image Encrypted Domain Signal Processing