2005
DOI: 10.1117/12.619896
|View full text |Cite
|
Sign up to set email alerts
|

<title>On encryption-compression tradeoff of pre/post-filtered images</title>

Abstract: Advances in network communications have necessitated secure local-storage and transmission of multimedia content. In particular, military networks need to securely store sensitive imagery which at a later stage may be transmitted over bandwidth-constrained wireless networks. This work investigates compression efficiency of JPEG and JPEG 2000 standards for encrypted images. An encryption technique proposed by Kuo et al. in [4] is employed. The technique scrambles the phase spectrum of an image by addition of t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
8
0

Year Published

2008
2008
2015
2015

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(8 citation statements)
references
References 5 publications
0
8
0
Order By: Relevance
“…Thus, we denote Confusion Degree (CD) as the difference of the ciphertext and plaintext in a cryptographic system. As in [13], we employ MeanSquare-Error (MSE) in order to quantitatively measure this difference.…”
Section: Experimentalresultsmentioning
confidence: 99%
“…Thus, we denote Confusion Degree (CD) as the difference of the ciphertext and plaintext in a cryptographic system. As in [13], we employ MeanSquare-Error (MSE) in order to quantitatively measure this difference.…”
Section: Experimentalresultsmentioning
confidence: 99%
“…Thus, users pay a price for security proportional to their desired level of security. Further, the use of compression after encryption [13] fails to exploit the spatial and psycho-visual redundancies efficiently as the encryption of an uncompressed image removes intelligibility from the original image and hence incurring compression penalties. This results in a tradeoff between the competing requirements of encryption and compression.…”
Section: Introductionmentioning
confidence: 97%
“…Several authors have demonstrated that significant compression of encrypted data can be obtained in the general case [2,[7][8][9][10][11][12][13]. In specific situations, the authors claim that the same code rate is achievable by encrypting before compressing as compressing before encrypting.…”
Section: Introductionmentioning
confidence: 98%