2020
DOI: 10.1016/j.procs.2020.03.218
|View full text |Cite
|
Sign up to set email alerts
|

Joint image compression and encryption using a novel column-wise scanning and optimization algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
2
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 22 publications
(6 citation statements)
references
References 6 publications
0
5
0
Order By: Relevance
“…Block division of images has been done for three modes with dimensions 16, 32, and 64. Figure (4) shows the process view of the proposed method. In this article, we have used two meta-heuristic algorithms, one based on evolutionary structure (genetics) and the other based on collective intelligence (gray wolf) as test steps.…”
Section: -Suggested Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…Block division of images has been done for three modes with dimensions 16, 32, and 64. Figure (4) shows the process view of the proposed method. In this article, we have used two meta-heuristic algorithms, one based on evolutionary structure (genetics) and the other based on collective intelligence (gray wolf) as test steps.…”
Section: -Suggested Methodsmentioning
confidence: 99%
“…Since the transfer of images between communication paths is a costly process, the main goal in image compression is to reduce the number of bits needed to display an image [3]. As we know, the identification of data redundancy is the most important part in image compression, and among the types of data redundancy, we can mention cryptographic redundancy [4], inter-pixel redundancy [5] and psychooptical redundancy [6]. The main goal of image compression algorithms is to try to reduce all types of image redundancies, but which type of algorithm to use depends on how to use the information in the image.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Security evaluation index of image encryption algorithm: after image encryption, it is first necessary to ensure that the encrypted image shows a seemingly random and meaningless picture to the outside world, and that the third party can't get any effective information through intuitive feeling, and that all kinds of cryptographic analysis methods still can't get any plaintext information, that is, the security of the cryptographic system should be strong; At the same time, because of the large amount of image data, intelligent vehicles require high real-time performance of algorithms, so whether fast encryption/decryption can be realized in the case of large amount of data is also an important index to measure the system [11][12][13] .…”
Section: Design Of Multi-chaos Fast Image Encryption Algorithmmentioning
confidence: 99%
“…The primary objective of image compression is to reduce the number of bits necessary to display an image, since the transfer of images is a costly process [3]. Image compression begins with identifying data redundancy, and among the types of data redundancy, we can mention cryptographic redundancy [4], inter-pixel redundancy [5], and psychovisual redundancy [6]. The main objective of image compression algorithms is to reduce all types of image redundancy.…”
Section: Introductionmentioning
confidence: 99%