2017 IEEE 13th International Colloquium on Signal Processing &Amp; Its Applications (CSPA) 2017
DOI: 10.1109/cspa.2017.8064937
|View full text |Cite
|
Sign up to set email alerts
|

Joint image compression and encryption based on compressed sensing and entropy coding

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0
2

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 15 publications
0
4
0
2
Order By: Relevance
“…Employing the new combined simultaneous compression-encryption approach highly reduces the required resources for encryption (computational and power resources), according to [ 15 ] and [ 18 ]. Owing to such an attractive property, lots of works are devoted to this topic [ 19 , 20 , 21 , 22 , 23 ], some of them are also chaotic map based. In [ 22 ], we proposed three techniques for enhancing various chaos-based joint compression and encryption (JCAE) schemes.…”
Section: Discussionmentioning
confidence: 99%
“…Employing the new combined simultaneous compression-encryption approach highly reduces the required resources for encryption (computational and power resources), according to [ 15 ] and [ 18 ]. Owing to such an attractive property, lots of works are devoted to this topic [ 19 , 20 , 21 , 22 , 23 ], some of them are also chaotic map based. In [ 22 ], we proposed three techniques for enhancing various chaos-based joint compression and encryption (JCAE) schemes.…”
Section: Discussionmentioning
confidence: 99%
“…To mention a few, one may refer to Refs. [ 75 , 76 , 77 , 78 ]. The impact of key entropy on the security of an image encryption scheme was studied by Ye et al [ 79 ].…”
Section: Entropy and Encryptionmentioning
confidence: 99%
“…To enhance the defence ability against differential analysis, such measures could be adopted as conducting non‐linear and complicated operations in some significant data, applying self‐synchronous key‐stream instead of synchronous key‐stream, and designing permutation process related to plain‐images and complicated diffusion rules. Techniques, such as DCT coefficients’ sign encryption, block permutation, and appended bits encryption, are not secure enough when used alone, they should be combined with other encryption operations. Encryption operations, such as intra‐block shuffling, category address mapping, and frequency‐based permutation, decrease JPEG's compression performance significantly. They should not be used in applications that highlight the compression efficiency. Some hash functions and chaotic systems could be utilised to generate the pseudo‐random key‐stream [22, 48, 59, 76 ] because of their good properties, such as sensitive to input changes, abundant and complex dynamic behaviours, and so on. Technologies, such as compressive sensing and deep learning, could be integrated with traditional encryption operations to further enhance the whole system's compression efficiency and secrecy [100, 101 ]. From Table 5, we find that no encryption schemes can satisfy all evaluation criteria, trading off all aforementioned criteria according to the specific application scenario is a critical task. In the design process of most image encryption algorithms, no targeted application scenario is considered.…”
Section: Perspectives and Future Research Directionsmentioning
confidence: 99%