2016
DOI: 10.5815/ijigsp.2016.06.08
|View full text |Cite
|
Sign up to set email alerts
|

A Non-format Compliant Scalable RSA-based JPEG Encryption Algorithm

Abstract: A non-format compliant JPEG encryption algorithm is proposed which is based on a modification of the RSA encryption system. Firstly, an alternate form of entropy coding is described, which is more suited to the proposed algorithm, instead of the zigzag coding scheme used in JPEG. The algorithm for the encryption and decryption process is then elaborated. A variant of the algorithm, also based on the RSA algorithm is also described, which is faster than the original algorithm, but expands the bit stream slightl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0
1

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 26 publications
(3 citation statements)
references
References 14 publications
0
2
0
1
Order By: Relevance
“…This leads to significant shortcomings arising in the process of video data reconstruction, from the point of view of ensuring the appropriate level of reliability. The main ones are the following [20][21][22][23]25]: loss of relevance due to time delays arising in the process of video data delivery; partial or complete destruction of video data, which makes it impossible to identify key elements.…”
Section: Introductionmentioning
confidence: 99%
“…This leads to significant shortcomings arising in the process of video data reconstruction, from the point of view of ensuring the appropriate level of reliability. The main ones are the following [20][21][22][23]25]: loss of relevance due to time delays arising in the process of video data delivery; partial or complete destruction of video data, which makes it impossible to identify key elements.…”
Section: Introductionmentioning
confidence: 99%
“…Various options for scrambling data in the process of performing compression conversion are presented in [17,34,35]. Options regarding the use of encryption transformations in various compression schemes are given in [36,37]. Options for ensuring the confidentiality of the JPEG bitstream are proposed in [38][39][40].…”
Section: Introductionmentioning
confidence: 99%
“…Підходи відносно скремблювання бітового потоку JPEG запропоновані в [27][28][29][30]. Приклади відносно використання перетворень шифрування в різних схемах компресії наведено в [31][32][33];…”
unclassified