2013
DOI: 10.1186/1687-5281-2013-32
|View full text |Cite
|
Sign up to set email alerts
|

Performing scalable lossy compression on pixel encrypted images

Abstract: Compression of encrypted data draws much attention in recent years due to the security concerns in a service-oriented environment such as cloud computing. We propose a scalable lossy compression scheme for images having their pixel value encrypted with a standard stream cipher. The encrypted data are simply compressed by transmitting a uniformly subsampled portion of the encrypted data and some bitplanes of another uniformly subsampled portion of the encrypted data. At the receiver side, a decoder performs con… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
30
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 29 publications
(30 citation statements)
references
References 7 publications
(23 reference statements)
0
30
0
Order By: Relevance
“…The way of obtaining h t 's can also be regarded as a process of on-line learning the image local characteristics over the encrypted domain. In contrast, in the existing schemes [11], [14], the base layer coding and the enhancement layer coding are independently carried out, wasting the valuable information gained in the base layer.…”
Section: A Base Layer Encodingmentioning
confidence: 99%
See 1 more Smart Citation
“…The way of obtaining h t 's can also be regarded as a process of on-line learning the image local characteristics over the encrypted domain. In contrast, in the existing schemes [11], [14], the base layer coding and the enhancement layer coding are independently carried out, wasting the valuable information gained in the base layer.…”
Section: A Base Layer Encodingmentioning
confidence: 99%
“…Kang et. al later proposed an interpolation-based method for recovering compressed encrypted images, where compression is achieved by down-sampling and bit-plane decomposition [14]. We also devised a high-performance compression system for encrypted images, achieving nearly the same compression efficiency as a conventional image codec taking original, unencrypted images as input [15].…”
mentioning
confidence: 99%
“…Recently, Zhang et al constructed a novel ETC system, which generates the auxiliary information as well as the stream-cipher encrypted image at the content owner side for improving the performance of compression and reconstruction [18]. Besides the CS and quantization, the down-sampling technique is also adopted for data reduction [19][20][21].…”
Section: Introductionmentioning
confidence: 99%
“…To obtain higher compression ratios with feasible reconstruction quality, lossy compression of encrypted data has also been studied so far [12][13][14][15][16][17][18][19][20][21]. In [12], Kumar and Makur employed the compressive sensing (CS) [22,23] technique to compress the encrypted image and then reconstruct the original image by modifying the basis pursuit algorithm.…”
Section: Introductionmentioning
confidence: 99%
“…Kang et al [12] proposed the application of lossy scalable compression technique after cryptographic process using standard stream cipher method. The values of image pixels that have been encrypted with standard a stream cipher are then put into the compression process by sending subsamples and bit planes.…”
Section: Symmetric Cryptographic Methods With Lossy Compressionmentioning
confidence: 99%