2017
DOI: 10.1587/transinf.2016mul0002
|View full text |Cite
|
Sign up to set email alerts
|

An Encryption-then-Compression System for Lossless Image Compression Standards

Abstract: SUMMARYIn many multimedia applications, image encryption has to be conducted prior to image compression. This letter proposes an Encryption-then-Compression system using JPEG XR/JPEG-LS friendly perceptual encryption method, which enables to be conducted prior to the JPEG XR/JPEG-LS standard used as an international standard lossless compression method. The proposed encryption scheme can provides approximately the same compression performance as that of the lossless compression without any encryption. It is al… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
82
0
2

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 75 publications
(84 citation statements)
references
References 9 publications
0
82
0
2
Order By: Relevance
“…Block scrambling-based image encryption schemes have been proposed for EtC systems [5]- [8], in which a user wants to securely transmit image I to an audience, via a Social Networking Service (SNS) provider, as illustrated in Fig. 1.…”
Section: Block Scrambling-based Image Encryptionmentioning
confidence: 99%
See 2 more Smart Citations
“…Block scrambling-based image encryption schemes have been proposed for EtC systems [5]- [8], in which a user wants to securely transmit image I to an audience, via a Social Networking Service (SNS) provider, as illustrated in Fig. 1.…”
Section: Block Scrambling-based Image Encryptionmentioning
confidence: 99%
“…In the schemes [4]- [8], an image with X × Y pixels is first divided into non-overlapped blocks with B x × B y , then four block scrambling-based processing steps, as illustrated in Fig. 2, is applied to the divided image.…”
Section: Block Scrambling-based Image Encryptionmentioning
confidence: 99%
See 1 more Smart Citation
“…Block-Permutation-Based Encryption (BPBE) schemes [10][11][12][13] comprise one of the perceptual encryption techniques. In BPBE schemes, first, an original image is divided into definite block size, and the four processes of encryption, namely block scrambling, block rotation/inversion, negative-positive transformation and color component shuffling, are processed.…”
Section: Introductionmentioning
confidence: 99%
“…In BPBE schemes, first, an original image is divided into definite block size, and the four processes of encryption, namely block scrambling, block rotation/inversion, negative-positive transformation and color component shuffling, are processed. The main feature of BPBE schemes is that the compression efficiency of the encrypted images is compatible with JPEG compression [11]. Similarly, the BPBE schemes have been proposed for encryption-then-compression (ETC) technique [14][15][16][17][18][19][20], in which a user securely transmits images via a Social Network Service (SNS) provider.…”
Section: Introductionmentioning
confidence: 99%