2024
DOI: 10.1145/3633459
|View full text |Cite
|
Sign up to set email alerts
|

JPEG-compatible Joint Image Compression and Encryption Algorithm with File Size Preservation

Yuxiang Peng,
Chong Fu,
Guixing Cao
et al.

Abstract: Joint image compression and encryption algorithms are intensively investigated due to their powerful capability of simultaneous image data compression and sensitive information protection. Unfortunately, most of the existing algorithms suffered from either poor compression efficiency or weak encryption strength, making them vulnerable to cryptanalysis. To address these limitations, we propose a chaos-based JPEG-compatible joint image compression and encryption algorithm. We separate the luminance and chrominan… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(9 citation statements)
references
References 38 publications
0
2
0
Order By: Relevance
“…The following Table 5 summarizes the previously studied methods of encrypting images [2] and the encryption times of image encryption using chaotic logistic maps [19]. Furthermore, the method proposed in [20] has excellent security and is based on the Jia chaotic system and a logistic map. Note that the algorithm introduced in [20] prioritizes security over encryption speed.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The following Table 5 summarizes the previously studied methods of encrypting images [2] and the encryption times of image encryption using chaotic logistic maps [19]. Furthermore, the method proposed in [20] has excellent security and is based on the Jia chaotic system and a logistic map. Note that the algorithm introduced in [20] prioritizes security over encryption speed.…”
Section: Resultsmentioning
confidence: 99%
“…Furthermore, the method proposed in [20] has excellent security and is based on the Jia chaotic system and a logistic map. Note that the algorithm introduced in [20] prioritizes security over encryption speed. Nevertheless, we can see that is notably slower than our proposed approach.…”
Section: Resultsmentioning
confidence: 99%
“…In addition, cloud services are generally unreliable due to incidents such as information leakage. Accordingly, various encryption methods that can preserve the JPEG format have been studied so far [1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17]. An example of encryption methods that can maintain the JPEG format is methods used in encryption-then-compression (EtC) systems [1][2][3], although the traditional way of securely transmitting images is to use a compression-thenencryption (CtE) system.…”
Section: Introductionmentioning
confidence: 99%
“…There are other methods that can generate encrypted JPEG images [10][11][12][13][14][15]. In the methods proposed in [10][11][12], encryption is applied in the DCT domain after quantization, and a format-compliant encoded sequence is output.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation