2009
DOI: 10.1007/s11760-009-0131-6
|View full text |Cite
|
Sign up to set email alerts
|

JPEG image encryption using fuzzy PN sequences

Abstract: The recent explosion in multimedia and networking application places a great demand on efficient transmission of images at low bit rate with high security. Mixing several existing standard encryption techniques with image encoding tends to change the compression ratio greatly. In this paper, a novel image encryption algorithm is embedded as a part of JPEG image encoding scheme to meet three major necessities: (1) to provide temporal security against casual observer, (2) to preserve the compression ratio, (3) r… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
3
0
1

Year Published

2012
2012
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 23 publications
(4 citation statements)
references
References 14 publications
(18 reference statements)
0
3
0
1
Order By: Relevance
“…The special nature of the JPEG encoding process makes JPEG-related algorithms a class apart from those applied to other image formats. There are two broad categories of JPEG encryption--format-compliant [4][5] [9][10] and nonformat-compliant. In the former case, the encryption algorithm is bound by the restriction that the encrypted output must conform to the JPEG algorithm and format.…”
Section: Background and Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The special nature of the JPEG encoding process makes JPEG-related algorithms a class apart from those applied to other image formats. There are two broad categories of JPEG encryption--format-compliant [4][5] [9][10] and nonformat-compliant. In the former case, the encryption algorithm is bound by the restriction that the encrypted output must conform to the JPEG algorithm and format.…”
Section: Background and Related Workmentioning
confidence: 99%
“…In the latter case, there is no such restriction and hence, these class of algorithms can afford to be much more flexible and inventive. Format-compliant algorithms usually are based on shuffling of DC coefficients [Niu et al,5], randomly shuffling the signs of the AC coefficients, a combination of several scrambling and shuffling operations using the XOR operation [12], a combination of several operations at the bit stream level [4], permutation of the zigzag scheme used in JPEG encryption [11] or the use of fuzzy PN sequences [9].…”
Section: Background and Related Workmentioning
confidence: 99%
“…[12] and improved encryption method based on two dimensional Fourier Transform, crossover operation and the use of a keyed mutation function. In [13], B.K. Shreyamshakumar et al showed that, image cryptosystem usually manipulates an entire data set without any presumption about compression at later time; consequently, the secure transmission of image has become more costly in term of time, bandwidth and complexity.…”
Section: Introductionmentioning
confidence: 99%
“…JPEG ag iletişimi, kablosuz haberleşme, medikal, multimedya ve özellikle gömülü sistemlerde çogunlukla kullanılmaktadır [2]. Günümüz teknolojisinde, ücretli televizyon yayınları, özel video konferanslar, medikal görüntüleme, endüstriyel ve askeri görüntüleme gibi uygulamalarda sayısal görüntü ve videoların güvenligi büyük bir önem kazanmıştır [3].…”
Section: Introductionunclassified