2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT) 2019
DOI: 10.1109/icct46177.2019.8969039
|View full text |Cite
|
Sign up to set email alerts
|

Paradigms of Image Compression and Encryption: A Review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 12 publications
0
3
0
Order By: Relevance
“…One of the other security methods in addition to the image encryption procedure is to use an image compression process following the security scheme so that size of images will be significantly reduced [52]. This security procedure maintains the assurance of contents.…”
Section: Dss-applied Cryptographic Techniquesmentioning
confidence: 99%
“…One of the other security methods in addition to the image encryption procedure is to use an image compression process following the security scheme so that size of images will be significantly reduced [52]. This security procedure maintains the assurance of contents.…”
Section: Dss-applied Cryptographic Techniquesmentioning
confidence: 99%
“…In this paper, we present a comprehensive analysis of the JPEG-compatible CPE schemes in terms of their encryption and compression efficiencies. The existing surveys in the literature are either focused on the image encryption techniques that are applicable for raw image protection [1,2,36,37] or nonstandard image compression formats [38,39]. To the best of our knowledge, Refs.…”
Section: Introductionmentioning
confidence: 99%
“…Current review papers [2–4 ] often analyse encryption techniques operated on various image types, a comprehensive review on JPEG related encryption schemes and the guideline for designing scenario‐oriented JPEG encryption method are missing. Therefore, in this paper, we try to give a summary of state‐of‐the‐art JPEG compatible joint compression and encryption algorithms, and offer researchers with some suggestions and strategies to develop new joint compression and encryption schemes.…”
Section: Introductionmentioning
confidence: 99%